Page 126 / 249 Scroll up to view Page 121 - 125
Chapter 18 Static Route
NBG6515 User’s Guide
126
Figure 95
Network > Static Route
The following table describes the labels in this screen.
Table 62
Network > Static Route
LABEL
DESCRIPTION
Static Routing Settings
Route Name
Enter a the name that describes or identifies this route.
Destination IP
Address
Enter the IP network address of the final destination.
IP Subnet Mask
This is the subnet to which the route’s final destination belongs.
Gateway IP
Address
Enter the the IP address of the gateway.
Metric
Assign a number to identify the route.
Interface
Select the NBG port types. The port types are
WAN
and
LAN
.
Add Rule
Click this to add the IP static route.
Application Rules Summary
#
This is the number of an individual static route.
Active
The rules are always on and this is indicated by the icon.
Route Name
This is the name that describes or identifies this route.
Destination
This parameter specifies the IP network address of the final destination. Routing is
always based on network number.
Gateway
This is the IP address of the gateway. The gateway is a router or switch on the
same network segment as the device's LAN or WAN port. The gateway helps
forward packets to their destinations.
Metric
This is the number assigned to the route.
Interface
This displays the NBG port types. The port types are
WAN
and
LAN
.
Delete
Click the Delete icon to remove a static route from the NBG. A window displays
asking you to confirm that you want to delete the route.
Reset
Click
Reset
to begin configuring this screen afresh.
Page 127 / 249
NBG6515 User’s Guide
127
C
HAPTER
19
Firewall
19.1
Overview
This chapter shows you how to enable and configure the firewall that protects your NBG and your
LAN from unwanted or malicious traffic.
Enable the firewall to protect your LAN computers from attacks by hackers on the Internet and
control access between the LAN and WAN. By default the firewall:
allows traffic that originates from your LAN computers to go to all of the networks.
blocks traffic that originates on the other networks from going to the LAN.
The following figure illustrates the default firewall action. User
A
can initiate an IM (Instant
Messaging) session from the LAN to the WAN (1). Return traffic for this session is also allowed (2).
However other traffic initiated from the WAN is blocked (3 and 4).
Figure 96
Default Firewall Action
19.2
What You Can Do
Use the
General
(
Section 19.4 on page 128
) screen to enable or disable the NBG’s firewall.
Use the
MAC Filtering Rule
screen (
Section 19.5 on page 129
) to configure the NBG to block
access to devices or block the devices from accessing the NBG.
Use the
IP Filtering Rule
screen (
Section 19.6 on page 130
) to configure the NBG to block
access to devices or block the devices from accessing the NBG.
Page 128 / 249
Chapter 19 Firewall
NBG6515 User’s Guide
128
19.3
What You Need To Know
The NBG’s firewall feature physically separates the LAN and the WAN and acts as a secure gateway
for all data passing between the networks.
It is designed to protect against Denial of Service (DoS) attacks when activated (click
the
General
tab under
Firewall
and then click the
Enable
Firewall
check box). The NBG's purpose is to allow a
private Local Area Network (LAN) to be securely connected to the Internet. The NBG can be used to
prevent theft, destruction and modification of data, as well as log events, which may be important
to the security of your network.
The NBG is installed between the LAN and a broadband modem connecting to the Internet. This
allows it to act as a secure gateway for all data passing between the Internet and the LAN.
The NBG has one Ethernet WAN port and four Ethernet LAN ports, which are used to physically
separate the network into two areas.The WAN (Wide Area Network) port attaches to the broadband
(cable or DSL) modem to the Internet.
The LAN (Local Area Network) port attaches to a network of computers, which needs security from
the outside world. These computers will have access to Internet services such as e-mail, FTP and
the World Wide Web. However, "inbound access" is not allowed (by default) unless the remote host
is authorized to use a specific service.
19.4
General Firewall Screen
Use this screen to enable or disable the NBG’s firewall, and set up firewall logs. Click
Security
>
Firewall
to open the
General
screen.
Figure 97
Security > Firewall > General
The following table describes the labels in this screen.
Table 63
Security > Firewall > General
LABEL
DESCRIPTION
Firewall Setup
Enable Firewall
Select this check box to activate the firewall. The NBG performs access control and protects
against Denial of Service (DoS) attacks when the firewall is activated.
Page 129 / 249
Chapter 19 Firewall
NBG6515 User’s Guide
129
19.5
MAC Filtering Rule Screen
If an outside user attempts to probe an unsupported port on your NBG, an ICMP response packet is
automatically returned. This allows the outside user to know the NBG exists. Use this screen to
prevent the ICMP response packet from being sent. This keeps outsiders from discovering your NBG
when unsupported ports are probed.
You can also use this screen to enable service blocking, enter/delete/modify the services you want
to block and the date/time you want to block them.
Click
Security
>
Firewall
>
MAC Filtering Rule
. The screen appears as shown next.
Figure 98
Security > Firewall > MAC Filtering Rule
ICMP
Internet Control Message Protocol is a message control and error-reporting protocol
between a host server and a gateway to the Internet. ICMP uses Internet Protocol (IP)
datagrams, but the messages are processed by the TCP/IP software and directly apparent to
the application user.
Enable ICMP
(WAN Ping)
Select this check box to activate the ICMP. The NBG will respond to WAN incoming Ping
requests.
Apply
Click
Apply
to save the settings.
Reset
Click
Reset
to start configuring this screen again.
Table 63
Security > Firewall > General
LABEL
DESCRIPTION
Page 130 / 249
Chapter 19 Firewall
NBG6515 User’s Guide
130
The following table describes the labels in this screen.
See
Appendix D on page 225
for commonly used services and port numbers.
19.6
IP Filtering Rule Screen
If an outside user attempts to probe an unsupported port on your NBG, an ICMP response packet is
automatically returned. This allows the outside user to know the NBG exists. Use this screen to
prevent the ICMP response packet from being sent. This keeps outsiders from discovering your NBG
when unsupported ports are probed.
You can also use this screen to enable service blocking, enter/delete/modify the services you want
to block and the date/time you want to block them.
Click
Security
>
Firewall
>
IP Filtering Rule
. The screen appears as shown next.
Table 64
Security > Firewall > MAC Filtering Rule
LABEL
DESCRIPTION
MAC Filtering Rule
Enable MAC
Filtering
Select this check box to enable MAC address filtering.
Define the filter action for the list of MAC addresses in the
MAC Filtering Table
.
Select
Allow
to permit access to the NBG, MAC addresses not listed will be denied access to
the NBG.
Select
Deny
to block access to the NBG, MAC addresses not listed will be allowed to access
the NBG.
MAC Filtering Table
Client PC MAC
Address
Enter the MAC address of the computer for which the MAC filtering rule applies.
Comment
Enter a name that identifies or describes the firewall rule.
Add
Click this to add the MAC filtering rule.
MAC Filtering Table
NO.
This is the number of an individual MAC filtering rule.
Client PC MAC
Address
This field displays the MAC address of the computer.
Comment
This field displays the descriptions of the MAC filtering rule.
Select
Select the MAC filtering rule which you want to delete.
Delete Selected
Click the
Delete Selected
button to remove the MAC filtering rule which selected from the
MAC Filtering Table
. A window displays asking you to confirm that you want to delete the
rule.
Delete All
Click the
Delete All
button to remove all MAC filtering rules from the NBG. A window
displays asking you to confirm that you want to delete all rules.
Apply
Click
Apply
to save your changes back to the NBG.
Reset
Click
Reset
to start configuring this screen again.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top