3. CONFIGURATION
3.8
Firewall Configuration
The first security element which incoming packets pass is a check of the enabled source
IP addresses and destination ports. You can specify the IP addresses as an IP address from
which you can remotely access the router and the internal network connected behind a router.
To enable this function, marking the
Enable filtering of incoming packets
check box located
at the top of the
Firewall Configuration
page. Accessibility is checked against the IP address
table. This means that access is permitted only to addresses specified in the table. It is pos-
sible to specify up to eight remote IP addresses for access. You can specify the following
parameters:
Item
Description
Source
IP address from which access to the router is allowed.
Protocol
Specifies the protocol used for remote access:
•
all
– Access for all protocols is active.
•
TCP
– Access for the TCP protocol is active.
•
UDP
– Access for the UDP protocol is active.
•
ICMP
– Access for the ICMP protocol is active.
Target Port
The port number on which access to the router is allowed.
Action
Specifies the type of action the router performs:
•
allow
– The router allows the packets to enter the network.
•
deny
– The router denies the packets from entering the network
Table 31: Filtering of Incoming Packets
The next section of the configuration form specifies the forwarding policy. If you unmark
the
Enabled filtering of forwarded packets
check box, then packets are automatically accepted.
If you activate this function, and a packet is addressed to another network interface, then the
router sends the packet to the FORWARD chain. When the FORWARD chain accepts the
packet and there is a rule for forwarding it, the router sends the packet. If a forwarding rule is
unavailable, then the router drops the packet.
This configuration form also contains a table for specifying the filter rules. It is possible
to create a rule to allow data with the selected protocol by specifying only the protocol, or to
create stricter rules by specifying values for source IP addresses, destination IP addresses,
and ports.
49
Summary of Contents for B+B SmartWorx LR77 v2
Page 1: ...Configuration Manual for v2 Routers ...
Page 18: ...2 STATUS WiFi Scan output may look like this Figure 4 WiFi Scan 11 ...
Page 29: ...3 CONFIGURATION Figure 12 Example 1 LAN Configuration Page 22 ...
Page 34: ...3 CONFIGURATION Figure 19 Example of VRRP configuration backup router 27 ...
Page 42: ...3 CONFIGURATION Figure 20 Mobile WAN Configuration 35 ...
Page 50: ...3 CONFIGURATION Figure 24 WiFi Configuration 43 ...
Page 75: ...3 CONFIGURATION Figure 36 IPsec Tunnels Configuration 68 ...
Page 105: ...3 CONFIGURATION Figure 54 Expansion Port Configuration 98 ...
Page 110: ...3 CONFIGURATION Figure 59 Example 2 USB port configuration 103 ...