Page 36 / 56 Scroll up to view Page 31 - 35
EchoLife BM635
User Guide
4 Configuring Advanced Functions
Issue 01 (2008-06-15)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd
4-5
Parameter
Description
Enable DMZ
It indicates whether to enable the DMZ.
4.2.3 Configuring Port Mapping
Port mapping supports the mapping between the interfaces at the WAN side and the
interfaces at the LAN side. Up to 32 port mapping rules can be defined.
Adding Port Mapping
In the navigation tree, choose
Advanced
>
NAT
, and then click the
Port Mapping
tab.
Two port mapping modes are available:
z
Custom
: It indicates the self-defined mode.
z
Application
: It indicates the mode provided by the system.
When selecting
Custom
, you must set the following parameters.
Parameter
Description
Interface
It indicates the interface type.
Protocol
It indicates the interface protocol.
External Port
It indicates the external port number.
Internal Port
It indicates the internal port number.
Internal Host
It indicates the IP address of the internal host.
Source IP Address
It indicates the source host IP address.
Mapping Name
It indicates the mapping name.
When you select
Application
, the system displays values of all parameters. You can
keep the default values or modify them.
Deleting Port Mapping
Select the mapping name to be deleted, and then click
Remove
.
4.2.4 Configuring a Port Trigger
During remote access, the specified port of the firewall on the router must be enabled for
certain applications. Port trigger is used to set up a new connection between the remote
applications at the WAN side and the applications at the LAN side that require the use of
certain ports. Up to 32 port trigger rules can be defined.
Adding a Port Trigger
In the navigation tree, choose
Advanced
>
NAT
, and then click the
Port Trigger
tab.
Page 37 / 56
4 Configuring Advanced Functions
EchoLife BM635
User Guide
4-6
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd
Issue 01 (2008-06-15)
Two port mapping modes are available:
z
Custom
: It indicates the self-defined mode.
z
Application
: It indicates the mode provided by the system.
When selecting
Custom
, you must set the following parameters.
Parameter
Description
Trigger Protocol
It indicates the protocol type.
Interface
It indicates the interface type.
Trigger Start Port
It indicates the start port number.
Trigger End Port
It indicates the end port number.
Open Start Port
It indicates the open start port number.
Open End Port
It indicates the open end port number.
Trigger
Description
It indicates the new rule name.
When you select
Application
, the system displays values of all parameters. You can
keep the default values or modify them.
Deleting a Port Trigger
Select the trigger name to be deleted, and then click
Remove
.
4.3 Configuring the ACL
Access control list (ACL) guarantees QoSs of File Transfer Protocol (FTP), Hypertext
Transfer Protocol (HTTP), Telnet, and Secure Shell (SSH) services. By controlling and
managing packets, ACL increases utilization of network links, limits network traffic, and
enhances network performance.
Step 1
In the navigation tree, choose
Advanced
>
ACL
, and then click the
ACL
tab.
Step 2
The ACL of a service can be enabled or disabled.
Step 3
Click
Apply
.
----End
4.4 Configuring the SNTP
Simple Network Time Protocol (SNTP) is used to synchronize network time.
Step 1
In the navigation tree, choose
Advanced
>
SNTP
, and then click the
SNTP
tab.
Step 2
Select the
Auto Synchronization Network Time Server
check box.
Page 38 / 56
EchoLife BM635
User Guide
4 Configuring Advanced Functions
Issue 01 (2008-06-15)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd
4-7
Step 3
Select an option respectively from
Primary SNTP Server
,
Secondary SNTP Server
,
and
Time Zone
.
Note:
If
Primary SNTP Server
and
Secondary SNTP Server
drop-down list boxes do not contain
the required options, enter the server names in the text boxes.
Step 4
Click
Apply
.
----End
4.5 Configuring the Security
The security function is used to control the rights of sending and receiving packets and
the period for accessing the network.
Two options are available:
z
Black
: It indicates that the black list member does not have the corresponding rights.
z
White
: It indicates that the white list member has the corresponding rights.
4.5.1 Configuring the URL Filter
The universal resource locator (URL) filter is used to prevent a network device at the
LAN side to access certain web sites at the WAN side.
Adding a URL Filter Rule
Step 1
In the navigation tree, choose
Advanced
>
Security
, and then click the
URL Filter
tab.
Step 2
Select
Enable URL Filter
to enable the URL filter.
Step 3
Select
Black
or
White
.
Step 4
Click
New
.
Step 5
Enter an address in
URL
.
Step 6
Click
Apply
.
----End
Modifying a URL Filter Rule
Select a URL filter rule to be modified, modify it, and then click
Apply
.
Deleting a URL Filter Rule
Select the URL filter rule to be deleted, and then click
Remove
.
4.5.2 Configuring a MAC Filter
The MAC filter can filter data frames according to the defined filter rule. The filter takes
effect only when all conditions of the filter rule are met.
Page 39 / 56
4 Configuring Advanced Functions
EchoLife BM635
User Guide
4-8
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd
Issue 01 (2008-06-15)
Adding a MAC Filter Rule
Step 1
In the navigation tree, choose
Advanced
>
Security
, and then click the
MAC Filter
tab.
Step 2
Select
Enable MAC Filter
to enable the MAC filter.
Step 3
Select
Black
or
White
.
Step 4
Click
New
.
Step 5
Set the following parameters of the MAC filter rule.
Parameter
Description
Filter Name
It indicates the MAC filter rule name.
Source MAC
Address
It indicates the source host MAC address.
Destination MAC
Address
It indicates the destination host MAC address.
Start Time
It indicates the effective time of a rule, in the format of hh: mm.
End Time
It indicates the expiration time of a rule, in the format of hh: mm.
Day
It indicates the effective date of a rule.
Enable
It indicates whether to use this rule.
Step 6
Click
Apply
.
----End
Modifying a MAC Filter Rule
Select a MAC filter rule to be modified, modify it, and then click
Apply
.
Deleting a MAC Filter Rule
Select the MAC filter rule to be deleted, and then click
Remove
.
4.5.3 Configuring an IP Incoming Filter
When the firewall is enabled, the IP incoming filter can be used to receive certain
specified IP packets at the WAN side.
Adding an IP Incoming Filter Rule
Step 1
In the navigation tree, choose
Advanced
>
Security
, and then click the
IP Incoming
tab.
Step 2
Select
Enable IP Incoming Filter
to enable the IP incoming filter.
Step 3
Click
New
.
Step 4
Set the following parameters of the IP incoming filter rule.
Page 40 / 56
EchoLife BM635
User Guide
4 Configuring Advanced Functions
Issue 01 (2008-06-15)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd
4-9
Parameter
Description
Filter Name
It indicates the name of an IP incoming filter rule.
Protocol
It indicates a protocol type.
Enable
It indicates whether to use this rule.
Source Start
Address
It indicates the start IP address of the source host.
Source End
Address
It indicates the end IP address of the source host.
Source Start Port
It indicates the start port number of the source host.
Source End Port
It indicates the end port number of the source host.
Destination Start
Address
It indicates the start IP address of the destination host.
Destination End
Address
It indicates the end IP address of the destination host.
Destination Start
Port
It indicates the start port number of the destination host.
Destination End
Port
It indicates the end port number of the destination host.
Interface
It indicates the interface type.
Step 5
Click
Apply
.
----End
Modifying an IP Incoming Filter Rule
Select an IP incoming filter rule to be modified, modify it, and then click
Apply
.
Deleting an IP Incoming Filter Rule
Select the IP incoming filter rule to be deleted, and then click
Remove
.
4.5.4 Configuring an IP Outgoing Filter
The IP outgoing filter is used to prevent the LAN side from sending certain IP packets.
The configuration of an IP outgoing filter rule is the same as that of an IP incoming filter
rule. For detailed parameter settings, see section 4.5.3 "Configuring an IP Incoming
Filter"

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top