135
1.877.877.2269
BLACKBOX.COM
NEED HELP?
LEAVE THE TECH TO US
LIVE 24/7
TECHNICAL
SUPPORT
1.877.877.2269
For example, to forward port 8443 to an internal HTTPS server on 192.168.10.2, use the following settings:
TABLE 6-8. PORT/PROTOCOL FORWARDING EXAMPLE
FIELD
DESCRIPTION
Name
Administrator’s choice
Input Interface
Any
Source Address/Address Range
Leave blank
Destination Address/Address Range
Leave blank
Input Port Range
8443
Protocol
TCP
Output Address
192.168.10.2
Output Port Range
443
6.8.4 FIREWALL RULES
Firewall rules can be used to block or allow traffic through an interface based on port number, the source IP address, the
destination IP address or range, the direction (ingress or egress), the protocol or any combination of these. This can be used to
allow custom on-box services, or block traffic based on policy.
To setup a firewall rule:
Navigate to System > Firewall.
Click the Firewall Rules tab.
NOTE: Prior to firmware v3.4, this tab was labeled Port Rules and fewer firewall rules could be configured.
Click New Firewall Rule.
Fill in the following fields.
TABLE 6-9. FIREWALL RULE FIELDS
FIELD
PURPOSE
Name
Name the rule. This name should describe the policy the firewall rule is being used to implement (for example,
Block FTP or Allow Tony).
Interface
Select the interface that the firewall rule will be applied to. Choices include Any, Dialout/Cellular, VPN, Network
Interface, and Dial-in.
Port Range
Specify the Port or range of Ports (for example 1000 – 1500) that the rule will apply to. This may be left blank for
Any.
Source MAC Address
Specify the source MAC address to be matched. This may be left blank for Any. MAC addresses use the format
XX:XX:XX:XX:XX:XX, where XX are hex digits
Source Address Range
Specify the source IP address (or address range) to match. IP address ranges use the format ip/netmask (where
netmask is in bits 1-32). This may be left blank for Any..
CHAPTER 6: FIREWALL, FAILOVER AND OOB ACCESS