Page 166 / 308 Scroll up to view Page 161 - 165
161
IP Tunnel
An IP Tunnel is an Internet Protocol (IP) network communication channels between two networks of
different protocols. It is used to transport another network protocol by encapsulation of its packets.
IP Tunnels are often used to connect two disjoint IP networks that do not have a native routing path
to each other, via an underlying routable protocol across an intermediate transport network, like VPN.
Another prominent use of IP Tunnel is to connect islands of IPv6 installations across the IPv4
internet.
IPv6inIPv4
6in4 is an Internet transition mechanism for migrating from IPv4 to IPv6. 6in4 uses tunneling to
encapsulate IPv6 traffic over explicitly configured IPv4 links. The 6in4 traffic is sent over the IPv4
Internet inside IPv4 packets whose IP headers have the IP Protocol number set to 41. This protocol
number is specifically designated for IPv6 capsulation.
6RD:
6RD is a mechanism to facilitate IPv6 rapid deployment across IPv4 infrastructures of internet
service providers (ISPs).
It is derived from 6to4, a preexisting mechanism to transporting IPv6 packets over IPv4
infrastructure network, with the significant change that it operates entirely within the enduser’s ISP
network, thus avoiding the major architectural problems inherent in the original design of 6to4.
Click
Add
button to manually add the 6in4 rules.
Tunnel Name:
User-defined name.
Mechanism:
Here only 6RD.
Page 167 / 308
162
Associated WAN Interface:
The applied WAN interface with the set tunnel, thus when there are
packets from/to the WAN interface, the tunnel would be used to transport the packets.
Associated LAN Interface:
Set the linked LAN interface with the tunnel.
Method:
6rd operation mechanism:
manually configured or automatically configured. If manually,
please fill out the following 6rd parameters.
V4 Common Bit Length:
Specify the length of IPv4 address carried in IPv6 prefix, for example, 0
means to carry all the 32 bits of IPv4 address while 8 carries 24 bits of the IPv4 address.
6rd Prefix with Prefix Length:
Enter the 6rd prefix and prefix length you uniquely designate to 6rd
by the ISP( The 6rd prefix and prefix length are to replace the standard 6to4 prefix 2002::/16 by an
IPv6 prefix that belongs to the ISP-assigned.)
Border Relay IPv4 Address:
The IPv4 address of the border relay. The relay is used to unwrap
capsulated IPv4 packets into IPv6 packets and send them to the IPv6 network.
Page 168 / 308
163
IPv4inIPv6
4in6 refers to tunneling of IPv4 in IPv6. It is an inherent internet interoperation mechanism allowing
IPv4 to be used in an IPv6 only network.
4in6 uses tunneling to encapsulate IPv4 traffic over configured IPv6 tunnels. 4in6 tunnels are usually
manually configured but they can be automated using protocols such as TSP to allow easy
connection to a tunnel broker.
DS – Lite
DS –Lite, or Dual-Stack Lite, is designed to let an ISP omit the deployment of any IPv4 address to
the customer’s CPE. Instead, only global IPv6 addresses are provided (Regular Dual-Stack Lite
deploys global addresses for both IPv4 and IPv6).
The CPE distributes private IPv4 addresses for the LAN clients, the same as a NAT device. The
subnet information is chosen by the customer, identically to the NAT model. However, instead of
performing the NAT itself, the CPE encapsulates the IPv4 packet inside an IPv6 packet.
Click
Add
button to manually add the 4in6 rules.
Tunnel Name:
User-defined tunnel name.
Mechanism:
It is the 4in6 tunnel operation technology. Please select DS-Lite.
Associated WAN Interface:
The applied WAN interface with the set tunnel, and when there are
packets from/to the WAN interface, the tunnel would be used to transport the packets.
Associated LAN Interface:
Specify the linked LAN interface with the tunnel.
Method:
Manually to specify the AFTP (Address Family Transition Router) address or Automatic.
AFTR:
Specify the address of AFTP (Address Family Transition Router) from your ISP.
Page 169 / 308
164
Security
IP Filtering Outgoing
IP filtering enables you to configure your router to block specified internal/external users (
IP address
)
from Internet access, or you can disable specific service requests (
Port number
) to /from Internet.
The relationship among all filters is
“or”
operation, which means that the router checks these
different filter rules one by one, starting from the first rule. As long as one of the rules is satisfied, the
specified action will be taken.
Outbound IP Filtering by default is set to
forward
all outgoing traffic from LAN to go through the
router, but user can set rules to
block
the specific outgoing traffic.
Note:
The maximum number of entries: 32.
Click
Add
button to enter the exact rule setting page.
Filter Name:
A user-defined rule name. User can select simply from the list box for the application
for quick setup.
IP Version:
Select the IP Version, IPv4 or IPv6.
Protocol:
Set the traffic type (TCP/UDP, TCP, UDP, ICMP,RAW, Any ) that the rule applies to.
Source IP address:
This is the Address-Filter used to allow or block traffic to/from particular IP
address(es) featured in the IP range. If you leave empty, it means any IP address.
Source Port [port or port:port]:
The port or port range defines traffic from the port (specific
application) or port in the set port range
blocked to go through the router. Default is set port from
range 1 – 65535.
Destination IP address:
Traffic from LAN with the
particular traffic destination address specified in
the IP range is to be blocked from going through the router, similarly set as the Source IP address
above.
Page 170 / 308
165
Destination Port [port or port: port]:
Traffic with the particular set destination port or port in the set
port range is to be blocked from going through the router. Default is set port from port range: 1 –
65535.
Time Schedule:
Select or set exactly when the rule works. When set to “Always On”, the rule will
work all time; and also you can set the precise time when the rule works, like 01:00-19:00 from
Monday to Friday. Or you can select the already set timeslot in “
Time Schedule
” during which the
rule works. And when set to “Disable”, the rule is disabled or inactive and there will be an icon”
” in list table indicating the rule is inactive. See
Time Schedule
.
Action:
Select to
drop
or
forward
the packets fit the outgoing filtering rule.
Log:
check the check-box to record the security log. To check the log, users can turn to
Security Log
.
Example:
For example, if there is an outgoing rule set as follows, then the 21 application between
source IP and destination IP will be blocked. Or exactly in the rule below, all traffic trying to access
FTP will be blocked.
(The rule is active; disable field shows the status of the rule, active or inactive)

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top