Page 51 / 85 Scroll up to view Page 46 - 50
Router User’s Guide
Monitoring Network Health
9. If you selected
This IP Address
, enter an IP address in the
IP Address
field. And do one of the
following:
Enter a netmask in the
Netmask
field.
Or, select
or Host
to use your Router netmask as the source netmask.
10. Under the
Destination
heading, select a network connection from the
Network Interface
drop-down
menu.
11. Select one of the following options:
Any IP Address
Select this option if this rule applies to any IP address of the destination.
This IP Address
Select this option if a rule applies to a specific IP address of the destination.
12. If you selected
This IP Address
, enter an IP address in the
IP Address
field. And do one of the
following:
Enter a netmask in the
Netmask
field.
Or, select
or Host
to use your Router netmask as the destination netmask.
13. Click
Next
. This displays the “Protocol Definition” window.
14. Do one of the following:
Select one of the following protocol options from the
Select by Name
drop-down menu. This
defines the types of packets filtered.
Any Protocol
TCP (Transmission Control Protocol)
Provides reliable, sequenced, and unduplicated delivery of bytes to remote or local users.
Click Next to display the “
TCP/UDP Options
” window.
UDP
(User Datagram Protocol)
Provides for the exchange of datagrams without acknowledgement or guaranteed delivery.
Click Next to display the “
TCP/UDP Options
” window.
ICMP
(Internet Control Message Protocol)
A mechanism that provides for peer communication. The most commonly used application for
this protocol is the PING command. Click
Next
to display the “
ICMP Options
” window.
GRE
(Generic Routing Encapsulation):
A tunneling protocol that is used primarily for VPN (Virtual Private Networks).
Type a protocol number in the
Select by Number
field.
15. Click
Finish
.
48
Page 52 / 85
Router User’s Guide
Monitoring Network Health
TCP/UDP Options Window
The “TCP/UDP Options” window is displayed if you select TCP or UDP protocol from the “
Protocol
Definition
” window. If you selected either of these protocol types, you must identify the source and
destination ports.
1.
Select one of the following options from the
Source Port Operator
drop-down menu and the
Destination Port Operator
drop-down menu:
any
Any port is acceptable as the source/destination port.
less than or equal to
A port less than or equal to the numeric value in the
Port 1
field is acceptable as the
source/destination port. Be sure to provide a value in the
Port 1
field.
equal to
A port equal to the numeric value in the
Port 1
field is acceptable as the source/destination port.
Be sure to provide a value in the
Port 1
field.
greater than or equal to
a port greater than or equal to the numeric value in the
Port 1
field is acceptable as the
source/destination port. Be sure to provide a value in the
Port 1
field.
range
Any port between the value of the entry in the
Port 1
field and the value in the
Port 2
field is
acceptable as the source/destination port. Be sure to provide a value in the
Port 1
and
Port 2
fields.
2. Optionally, select the
Check TCP syn packets
checkbox if you wish this rule to prevent the blocking
of synchronization packets for pre-existing sessions.
3. Click
Next
.
4. Click
Finish
.
49
Page 53 / 85
Router User’s Guide
Monitoring Network Health
ICMP Options Window
The “ICMP Options” window is displayed if you select ICMP protocol from the “
Protocol Definition
window.
1.
Do one of the following:
Select any of the ICMP options you wish to filter.
Select the
All Types
checkbox to filter all options.
2. Click
Next
.
3. Click
Finish
.
50
Page 54 / 85
Router User’s Guide
Monitoring Network Health
Clone IP Filter Rules
The “Clone Rule Definitions” window is displayed when you select
Clone IP Filter Level
from the
Firewall IP Configuration Wizard
” window. Using this option, you can clone either high or low level rules
and modify them according to your needs. If you choose to clone IP filter rules, the rules already defined
in the Rule Definition table are discarded.
To clone IP filter rules:
1. Click
Clone IP Filter Level
from the “Firewall IP Filter Configuration Wizard” window. This displays
the “Clone Rule Definition” window.
2.
Select one of the following from the
Select
preconfigured firewall level for cloning
drop-down
menu.
Low
Clones low-level IP filter rules.
Medium
Clones medium-level IP filter rules.
High
Clones high-level IP filter rules.
3. Click
Apply
. This displays the “Firewall IP Filter Configuration Wizard” window with the selected rule
set showing in the Rule Definition table.
4.
Disable or delete any rule as desired.
51
Page 55 / 85
Router User’s Guide
Monitoring Network Health
Log
Firewall Logging displays attempts (both failures and successes) to access data through he firewall.
Firewall log entries are defined on the
Firewall Settings
Configuration
screen found under the
Security
menu.
To view the firewall log, select
Setup>Firewall>Log
from the left navigation pane of the Web interface.
This displays the “Firewall Log” window.
52

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top