Page 71 / 106 Scroll up to view Page 66 - 70
Firewall
5-37
5
Station List
Display the station information which associated to this wireless AP/Router.
Figure 5-26.
Station List
Firewall
The wireless AP/Router provides extensive firewall protection by restricting
connection parameters to limit the risk of intrusion and defending against a wide
array of common hacker attacks.
MAC/IP/Port Filtering
MAC/IP/Port filtering restricts connection parameters to limit the risk of intrusion and
defends against a wide array of common hacker attacks. IP/Port filtering allows the
unit to permit, deny or proxy traffic through its MAC addresses, IP addresses and
ports.
The wireless AP/Router allows you define a sequential list of permit or deny filtering
rules (up to 32). This device tests ingress packets against the filter rules one by one.
A packet will be accepted as soon as it matches a permit rule, or dropped as soon
as it matches a deny rule. If no rules match, the packet is either accepted or dropped
depending on the default policy setting.
Page 72 / 106
System Configuration
5-38
5
Figure 5-27.
MAC/IP/Port Filtering Settings
MAC/IP/Port Filtering
– Enables or disables MAC/IP/Port Filtering. (Default:
Disable)
Default Policy
– When MAC/IP/Port Filtering is enabled, the default policy will be
enabled. If you set the default policy to “Dropped”, all incoming packets that don’t
match the rules will be dropped and vise versa. (Default: Disable)
MAC Address
– Specifies the MAC address to block or allow traffic from.
Destination IP Address
– Specifies the destination IP address to block or allow
traffic from.
Source IP Address
– Specifies the source IP address to block or allow traffic from.
Protocol
– Specifies the destination port type, TCP, UDP or ICMP. (Default:
None).
Destination Port Range
– Specifies the range of destination port to block traffic
from the specified LAN IP address from reaching.
Page 73 / 106
Firewall
5-39
5
Source Port Range
– Specifies the range of source port to block traffic from the
specified LAN IP address from reaching.
Action
– Specifies if traffic should be accepted or dropped. (Default: Accept)
Comment
– Enter a useful comment to help identify the filtering rules.
Figure 5-28.
MAC/IP/Port Filtering Rules
Current Filter Rules
The Current Filter Table displays the configured IP addresses and ports that are
permitted or denied access to and from the ADSL/Router.
Select
– Selects a table entry.
MAC Address
– Displays a MAC address to filter.
Destination IP Address
– Displays the destination IP address.
Source IP Address
– Displays the source IP address.
Protocol
– Displays the destination port type.
Destination Port Range
– Displays the destination port range.
Source Port Range
– Displays the source port range.
Action
– Displays if the specified traffic is accepted or dropped.
Comment
– Displays a useful comment to identify the routing rules.
Page 74 / 106
System Configuration
5-40
5
Virtual Server Settings (Port Forwarding)
Virtual Server (sometimes referred to as Port Forwarding) is the act of forwarding a
network port from one network node to another. This technique can allow an
external user to reach a port on a private IP address (inside a LAN) from the outside
through a NAT-enabled router. (Maximum 32 entries are allowed.)
Figure 5-29.
Virtual Server Settings (Port Forwarding)
Virtual Server Setting
– Selects between enabling or disabling port forwarding the
virtual server. (Default: Disable)
IP Address
– Specifies the IP address on the local network to allow external
access to.
Port Range
– Specifies the port range through which traffic is forwarded.
Protocol
– Specifies a protocol to use for port forwarding, either TCP, UDP or both.
Comment
– Enter a useful comment to help identify the forwarded port service on
the network.
Page 75 / 106
Firewall
5-41
5
Current Virtual Servers
The Current Virtual Servers displays the entries that are allowed to forward packets
through the wireless AP/Router’s firewall.
Select
– Selects an entry in the Current Virtual Servers.
IP Address
– Displays an IP address on the local network to allow external access
to.
Port Range
– Displays the local port range.
Protocol
– Displays the protocol used for forwarding of this port.
Comment
– Displays a useful comment to identify the nature of the port to be
forwarded.
DMZ
Enables a specified host PC on the local network to access the Internet without any
firewall protection. Some Internet applications, such as interactive games or video
conferencing, may not function properly behind the wireless AP/Router's firewall. By
specifying a Demilitarized Zone (DMZ) host, the PC's TCP ports are completely
exposed to the Internet, allowing open two-way communication. The host PC should
be assigned a static IP address (which is mapped to its MAC address) and this must
be configured as the DMZ IP address.
Figure 5-30.
DMZ Settings
DMZ Settings
– Sets the DMZ status to enabled, but changes do not take affect
until the Apply changes button has been pressed and changes are saved to the
running configuration. (Default: Disable)
DMZ IP Address
– Specifies an IP address on the local network allowed
unblocked access to the WAN.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top