Page 51 / 98 Scroll up to view Page 46 - 50
51
HITRON CVE-30360 USER’S GUIDE
FIREWALL
FIGURE 15:
The Firewall > MAC Filtering Screen
The following table describes the labels in this screen.
TABLE 15:
The Firewall > MAC Filtering Screen
MAC Filter Options
MAC Filter Options
Use this field to control whether the CVE-30360 performs
MAC filtering.
Select
Allow-All
to turn MAC filtering off. All devices
may access the CVE-30360 and the network.
Select
Allow
to permit only devices with the MAC
addresses you set up in the
Allow Table
to access the
CVE-30360 and the network. All other devices are
denied access.
Select
Deny
to permit all devices except those with the
MAC addresses you set up in the
Deny Table
to
access the CVE-30360 and the network. The specified
devices are denied access.
Allow Table (up to 16 Items)
Page 52 / 98
52
HITRON CVE-30360 USER’S GUIDE
FIREWALL
#
This displays the index number assigned to the permitted
device.
Device Name
This displays the name you gave to the permitted device.
MAC Address
This displays the MAC address of the permitted device.
Delete
Select a permitted device’s radio button (
) and click this
to remove the device from the list. The device may no
longer access the CVE-30360 and the network.
NOTE:
Make sure you do not delete your management
computer from the list; if you do so, you will need
to log back in from another computer, or reset the
CVE-30360.
Deny Table (up to 16 Items)
Device Name
This displays the name you gave to the denied device.
MAC Address
This displays the MAC address of the denied device.
Delete
Select a denied device’s radio button (
) and click this to
remove the device from the list. The device may now
access the CVE-30360 and the network.
Auto-Learned LAN Devices
Device Name
This displays the name of each network device that has
connected to the CVE-30360 on the LAN.
MAC Address
This displays the MAC address of each network device
that has connected to the CVE-30360 on the LAN.
Type
Use this field to specify the list to which you want to add
the device.
Select
Allow
to add the device to the
Allow Table
.
Select
Deny
to add the device to the
Deny Table
.
Manually-Added LAN Devices
Device Name
Enter the name to associate with a network device that
you want to permit or deny access to the CVE-30360 and
the network.
NOTE:
This name is arbitrary, and does not affect
functionality in any way.
MAC Address
Specify the MAC address of the network device that you
want to permit or deny access to the CVE-30360 and the
network.
Type
Use this field to specify the list to which you want to add
the device.
Select
Allow
to add the device to the
Allow Table
.
Select
Deny
to add the device to the
Deny Table
.
TABLE 15:
The Firewall > MAC Filtering Screen (continued)
Page 53 / 98
53
HITRON CVE-30360 USER’S GUIDE
FIREWALL
4.4
THE IP FILTERING SCREEN
Use this screen to configure IP filtering. You can turn IP filtering on or off and
configure new and existing IP filtering rules.
Click
Firewall
>
IP Filtering
. The following screen displays.
FIGURE 16:
The Firewall > IP Filtering Screen
The following table describes the labels in this screen.
Add
Click this to add the device to the list you specified.
Cancel
Click this to clear the
Manually-Added LAN Devices
fields.
Apply
Click this to save your changes to the fields in this screen.
Cancel
Click this to return the fields in this screen to their last-
saved values without saving your changes.
Help
Click this to see information about the fields in this screen.
TABLE 16:
The Firewall > IP Filtering Screen
All IP Filtering Rules
Use this to turn IP filtering on or off.
Deselect the checkbox to enable IP filtering.
Select the checkbox to disable IP filtering (default).
NOTE:
You can add, edit or delete IP filtering rules only
when this checkbox is deselected.
Select
Select an IP filtering rule’s radio button (
) before
clicking
Edit
or
Delete
.
#
This displays the arbitrary identification number
assigned to the IP filtering rule.
Application Name
This displays the arbitrary name you assigned to the
rule when you create it.
TABLE 15:
The Firewall > MAC Filtering Screen (continued)
Page 54 / 98
54
HITRON CVE-30360 USER’S GUIDE
FIREWALL
4.4.1
ADDING OR EDITING AN IP FILTERING RULE
To add a new IP filtering rule, click
Add
in the
Firewall
>
IP Filtering
screen.
To edit an existing IP filtering rule, select the rule’s radio button (
) in the
Firewall
>
IP Filtering
screen and click the
Edit
button.
The following screen displays.
Port Range
This displays the start and end values of the ports to
which communications from the specified IP addresses
is not permitted.
Protocol
This displays the type of communications that are not
permitted:
TCP
displays if communications via the
Transmission Control Protocol are not permitted.
UDP
displays if communications via the User
Datagram Protocol are not permitted.
TCP/UDP
displays if communications via the
Transmission Control Protocol and the User
Datagram Protocol are not permitted.
IP Address Range
This displays the start and end IP address from which
communications to the specified ports are not permitted.
Enable
Use this field to turn each IP filtering rule on or off.
Select this checkbox to enable the IP filtering rule.
Deselect this checkbox to disable the IP filtering rule.
Add New
Click this to define a new IP filtering rule. See
Adding or
Editing an IP Filtering Rule
on page
54
for information
on the screen that displays.
Edit
Select an IP filtering rule’s radio button (
) and click
this to make changes to the rule. See
Adding or Editing
an IP Filtering Rule
on page
54
for information on the
screen that displays.
Delete
Select an IP filtering rule’s radio button (
) and click
this to remove the rule. The deleted rule’s information
cannot be retrieved.
Apply
Click this to save your changes to the fields in this
screen.
Cancel
Click this to return the fields in this screen to their last-
saved values without saving your changes.
Help
Click this to see information about the fields in this
screen.
TABLE 16:
The Firewall > IP Filtering Screen (continued)
Page 55 / 98
55
HITRON CVE-30360 USER’S GUIDE
FIREWALL
FIGURE 17:
The Firewall > IP Filtering > Add/Edit Screen
The following table describes the labels in this screen.
TABLE 17:
The Firewall > IP Filtering > Add/Edit Screen
Application Name
Enter a name for the application that you want to block.
NOTE:
This name is arbitrary, and does not affect
functionality in any way.
Port Range
Use these fields to specify the target port range to which
communication should be blocked.
Enter the start port number in the first field, and the end
port number in the second field.
To specify only a single port, enter its number in both
fields.
Protocol
Use this field to specify whether the CVE-30360 should
block communication via:
Transmission Control Protocol (
TCP
)
User Datagram Protocol (
UDP
)
Both
TCP and UDP.
NOTE:
If in doubt, leave this field at its default (
Both
).
IP Address Range
Use these fields to specify the range of local computers’
IP addresses from which communications should be
blocked.
Enter the start IP address in the first field, and the end IP
address in the second.
To specify only a single IP address, enter it in both fields.
Connected Computers
Click this to see a list of the computers currently
connected to the CVE-30360 on the LAN.
Back
Click this to return to the
Firewall
>
IP filtering
screen
without saving your changes to the IP filtering rule.
Apply
Click this to save your changes to the fields in this
screen.

Rate

4.5 / 5 based on 2 votes.

Popular Hitron Technologies Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top