Page 156 / 382 Scroll up to view Page 151 - 155
Chapter 9 MAC Filter
P-870HN-51b User’s Guide
156
9.2
The MAC Filter Screen
Click
Security > MAC Filter
to display the following screen. This screen displays
the default global MAC filtering policy and a list of the custom MAC filtering rules.
The MAC filtering rules apply only to frames going through a bridge connection.
Figure 78
MAC Filter
The following table describes the labels in this screen.
Table 46
MAC Filter
LABEL
DESCRIPTION
MAC Filtering
Policy For Each
Interface
Interface
This displays the interface to which this rule is applied.
Policy
This displays the MAC filtering policy for each WAN interface in bridge
mode on the Device. By default, the Device allows all frames to pass
through the bridge connection.
Change
Select the check box next to the interface for which you want to change
the MAC filtering policy.
Change Policy
Select the
Change
check box and click
Change Policy
to have the
Device change to block or allow all frames on this interface.
Interface
This displays the interface to which this rule is applied.
Protocol
This displays the service to which this rule applies.
Destination
MAC
This displays the destination MAC address to which this rule applies.
Please note that a blank destination address is equivalent to
Any
.
Page 157 / 382
Chapter 9 MAC Filter
P-870HN-51b User’s Guide
157
9.2.1
Creating MAC Filtering Rules
In the
MAC Filter
screen, click
Add
to display this screen and refer to the
following table for information on the labels.
Figure 79
MAC Filter: Add
The following table describes the labels in this screen.
Source MAC
This displays the source MAC address to which this rule applies. Please
note that a blank source address is equivalent to
Any
.
Frame Direction
This displays the direction of travel of frame to which this rule applies.
Remove
Select the rule(s) you want to delete in the
Remove
column and then
click the
Remove
button.
Add
Click
Add
to create a new rule.
Remove
Click
Remove
to delete the selected rule(s).
Table 46
MAC Filter (continued)
LABEL
DESCRIPTION
Table 47
MAC Filtering: Add
LABEL
DESCRIPTION
Protocol Type
Select the service to which this rule applies.
Destination MAC
Address
Enter a destination MAC address in valid MAC address format, that is,
six hexadecimal character pairs to apply the filter rule to the specified
MAC address. Please note that a blank destination address is
equivalent to
Any
.
Source MAC
Address
Enter a source MAC address in valid MAC address format, that is, six
hexadecimal character pairs to apply the filter rule to the specified
MAC address. Please note that a blank source address is equivalent to
Any
.
Frame Direction
Select the travel direction of frame to which this rule applies.
Page 158 / 382
Chapter 9 MAC Filter
P-870HN-51b User’s Guide
158
WAN Interfaces
Select the WAN interface to which this rule applies.
Save/Apply
Click
Save/Apply
to save your customized settings and exit this
screen.
Table 47
MAC Filtering: Add (continued)
LABEL
DESCRIPTION
Page 159 / 382
P-870HN-51b User’s Guide
159
C
HAPTER
10
Firewall
10.1
Overview
This chapter shows you how to enable and configure the Device firewall settings.
The Device firewall is a packet filtering firewall and restricts access based on the
source/destination computer network address of a packet and the type of
application.
10.1.1
What You Can Do in this Chapter
The
Incoming
screen lets you view and configure incoming IP filtering rules
(
Section 10.3 on page 160
).
10.2
What You Need to Know
The following terms and concepts may help as you read through this chapter.
Basics
Computers share information over the Internet using a common language called
TCP/IP. TCP/IP, in turn, is a set of application protocols that perform specific
functions. An “extension number”, called the "TCP port" or "UDP port" identifies
these protocols, such as HTTP (Web), FTP (File Transfer Protocol), POP3 (E-mail),
etc. For example, Web traffic by default uses TCP port 80.
When computers communicate on the Internet, they are using the client/server
model, where the server "listens" on a specific TCP/UDP port for information
requests from remote client computers on the network. For example, a Web
server typically listens on port 80. Please note that while a computer may be
intended for use over a single port, such as Web on port 80, other ports are also
active. If the person configuring or managing the computer is not careful, a hacker
could attack it over an unprotected port.
Page 160 / 382
Chapter 10 Firewall
P-870HN-51b User’s Guide
160
Some of the most common IP ports are:
Default Filtering Policies
Filtering rules are grouped based on the direction of travel of packets to which
they apply.
The default rule for incoming traffic blocks all incoming connections from the WAN
to the LAN. If you wish to allow certain WAN users to have access to your LAN,
you will need to create custom rules to allow it.
Note: If you configure filtering rules without a good understanding of how they work,
you might inadvertently introduce security risks to the firewall and to the
protected network. Make sure you test your rules after you configure them.
These custom rules work by comparing the Source IP address, Destination IP
address and IP protocol type of network traffic to rules set by the administrator.
Your customized rules take precedence and override the Device’s default rules.
10.3
The Firewall Screen
Click
Security > Firewall > Incoming
to display the following screen. This
screen displays a list of the configured incoming filtering rules.
Figure 80
Firewall > Incoming
Table 48
Common IP Ports
21
FTP
53
DNS
23
Telnet
80
HTTP
25
SMTP
110
POP3

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top