Page 106 / 135 Scroll up to view Page 101 - 105
SECURITY
Version 2.0, 07/2015. Copyright
2015 Hitron Technologies
2
Hitron CGNM/ CGNM-3552 User’s Guide
7.1.2
Device Filtering
Every networking device has a unique Media Access Control (MAC) address that
uniquely identifies it on the network. When you enable MAC address filtering on the
CGNM/ CGNM-3552’s firewall, you can set up a list of devices, identified by their
MAC addresses, and then specify whether you want to:
Deny the devices on the list access to the CGNM/ CGNM-3552 and the network
(in which case all other devices can access the network)
or
Allow the devices on the list to access the network (in which case no other
devices can access the network).
7.1.3
Service Filtering
Service filtering is a way of preventing users on the LAN from connecting with devices
on the WAN via specific services, protocols or applications. It achieves this by
permitting or denying traffic from the LAN to pass to the WAN, based on the target
port.
7.2
The Firewall Screen
Use this screen to turn firewall features on or off and to allow or permit certain
applications and protocols. You can select the level of firewall protection from pre-
defined options, or create a custom protection profile.
NOTE:
To block specific ports, use the Service Filter screen (see
The Service Filter
Screen
on page
5
).
Click
Security
>
Firewall
. The following screen displays.
Page 107 / 135
SECURITY
Version 2.0, 07/2015. Copyright
2015 Hitron Technologies
3
Hitron CGNM/ CGNM-3552 User’s Guide
Figure 46:
The Security: Firewall Screen
Page 108 / 135
SECURITY
Version 2.0, 07/2015. Copyright
2015 Hitron Technologies
4
Hitron CGNM/ CGNM-3552 User’s Guide
The following table describes the labels in this screen.
Table 37:
The Security: Firewall Screen
Firewall Level
Select the level of firewall protection that you want to
apply to your LAN. Details about the protection level
display beneath the buttons.
(Security Level)
These fields describe the specific protocols and
applications that are permitted or denied by the firewall
security level you select.
When you select
Custom
in the
Firewall Level
field,
additional fields display that allow you to toggle specific
features on or off:
Entire Firewall
: select
ON
to enable firewall
security protection, or select
OFF
to disable it (not
recommended).
HTTP
: use this field to
Allow
or
Deny
HyperText
Transfer Protocol traffic.
ICMP
: use this field to
Allow
or
Deny
Internet
Control Message Protocol traffic.
Multicast
: use this field to
Allow
or
Deny
multicast
traffic (sent to multiple devices at once).
P2P
: use this field to
Allow
or
Deny
peer-to-peer
traffic (such as BitTorrent).
Ident
: use this field to
Allow
or
Deny
Identification
protocol traffic. The Identification protocol allows
remote hosts to request identifying information
about users of a device.
Save Changes
Click this to save your changes to the fields in this
screen.
Cancel
Click this to return the fields in this screen to their last-
saved values without saving your changes.
Help
Click this to see information about the fields in this
screen.
Page 109 / 135
SECURITY
Version 2.0, 07/2015. Copyright
2015 Hitron Technologies
5
Hitron CGNM/ CGNM-3552 User’s Guide
7.3
The Service Filter Screen
Use this screen to configure service filtering. You can turn service filtering on or off
and configure new and existing service filtering rules.
Click
Security
>
Service Filter
. The following screen displays.
Figure 47:
The Security: Service Filter Screen
The following table describes the labels in this screen.
Table 38:
The Security: Service Filter Screen
Managed Services
Filter Enabled
Use this field to turn service filtering on or off.
Select
Enabled
to turn service filtering on.
Select
Disabled
to turn service filtering off.
Host Name
This displays the name you assigned to the filtering rule
when you created it.
Page 110 / 135
SECURITY
Version 2.0, 07/2015. Copyright
2015 Hitron Technologies
6
Hitron CGNM/ CGNM-3552 User’s Guide
Protocol
This field displays the protocol or protocols to which this
filtering rule applies:
Transmission Control Protocol (
TCP
)
User Datagram Protocol (
UDP
)
Port Range
This displays the start and end port for which this
filtering rule applies.
Managed Weekdays
This displays the days of the week on which this rule
applies.
Managed Time
This displays the start (
From
) and end (
To
) of the time
period during which this rule applies, on the specified
Managed Weekdays
.
Status
This displays the status of a service filter rule.
Manage
Click
Manage
to make changes to a port blocking rule
(see
Adding or Editing a Service Filter Rule
on page
7
).
Action
Click
Delete
to remove the existing
service filter
from the
list.
NOTE:
The deleted rule’s information cannot be
retrieved.
Add Managed Service
Click this to add a new service filtering rule (see
Adding
or Editing a Service Filter Rule
on page
7
).
Save Changes
Click this to save your changes to the fields in this
screen.
Help
Click this to see information about the fields in this
screen.
Trust PC List
Host Name
This displays the name of the trust device connected.
IP Address
This displays the IP address of the trust network device
connected.
Status
This displays whether or not the service filter rule is
enabled to the trust device connected.
Manage
Click
Manage
to make changes to the trust device’s
service filter status
(see
Adding or Editing a Trust PC List
on page
9
).
Action
Click
Delete
to remove the existing trust device from the
list.
Table 38:
The Security: Service Filter Screen (continued)

Rate

4.3 / 5 based on 3 votes.

Popular Hitron Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top