34
4.6 Security Settings
4.6.1 Packet Filter
Packet Filter enables you to control what packets are allowed to pass the router. Outbound
filter applies on all outbound packets. However, Inbound filter applies on packets that
destined to Virtual Servers or DMZ host only. You can select one of the two filtering policies:
•
Allow all to pass except those match the specified rules
•
Deny all to pass except those match the specified rules
You can specify 8 rules for each direction: inbound or outbound. For each rule, you can define
the following:
•
Source IP address
•
Source port address
•
Destination IP address
•
Destination port address
•
Protocol: TCP or UDP or both.
•
Use Rule#
For source or destination IP address, you can define a single IP address (4.3.2.1) or a range
of IP addresses (4.3.2.1-4.3.2.254). An empty implies all IP addresses.
For source or destination port, you can define a single port (80) or a range of ports
(1000-1999). Add prefix "T" or "U" to specify TCP or UDP protocol. For example, T80, U53,
U2000-2999. No prefix indicates both TCP and UDP are defined. An empty implies all port
addresses. Packet Filter can work with Scheduling Rules, and give user more flexibility on
Access control. For Detail, please refer to Scheduling Rule.
Each rule can be enabled or disabled individually.
4.6.1.1 Inbound Filter:
To enable
Inbound Packet Filter
click the check box next to
Enable
in the
Inbound
Packet Filter
field.
Suppose you have SMTP Server (25), POP Server (110), Web Server (80), FTP Server (21),
and News Server (119) defined in Virtual Server or DMZ Host.
Example 1: