![Comtrend Corporation NexusLink 3241eu User Manual Download Page 179](http://html1.mh-extra.com/html/comtrend-corporation/nexuslink-3241eu/nexuslink-3241eu_user-manual_2648651179.webp)
178
Appendix A - Firewall
STATEFUL PACKET INSPECTION
Refers to an architecture, where the firewall keeps track of packets on each
connection traversing all its interfaces and makes sure they are valid. This is in
contrast to static packet filtering which only examines a packet based on the
information in the packet header.
DENIAL OF SERVICE ATTACK
Is an incident in which a user or organization is deprived of the services of a
resource they would normally expect to have. Various DoS attacks the device can
withstand are ARP Attack, Ping Attack, Ping of Death, Land, SYN Attack, Smurf
Attack, and Tear Drop.
TCP/IP/PORT/INTERFACE FILTER
These rules help in the filtering of traffic at the Network layer (i.e. Layer 3).
When a Routing interface is created,
Enable Firewall
must be checked.
Navigate to Advanced Setup
Security
IP Filtering.
OUTGOING IP FILTER
Helps in setting rules to DROP packets from the LAN interface. By default, if the
Firewall is Enabled, all IP traffic from the LAN is allowed. By setting up one or more
filters, specific packet types coming from the LAN can be dropped.
Example 1:
Filter Name
: Out_Filter1
Protocol
: TCP
Source IP address
: 192.168.1.45
Source Subnet Mask
: 255.255.255.0
Source Port
: 80
Dest. IP Address
: NA
Dest. Subnet Mask
: NA
Dest. Port
: NA
This filter will Drop all TCP packets coming from the LAN with IP
Address/Subnet Mask of 192.168.1.45/24 having a source port of 80
irrespective of the destination. All other packets will be Accepted.
Example 2:
Filter Name
: Out_Filter2
Protocol
: UDP
Source IP Address
: 192.168.1.45
Source Subnet Mask
: 255.255.255.0
Source Port
: 5060:6060
Dest. IP Address
: 172.16.13.4
Dest. Subnet Mask
: 255.255.255.0
Dest. Port
: 6060:7070
This filter will drop all UDP packets coming from the LAN with IP Address /
Subnet Mask of 192.168.1.45/24 and a source port range of 5060 to 6060,
destined to 172.16.13.4/24 and a destination port range of 6060 to 7070.
INCOMING IP FILTER
Helps in setting rules to Allow or Deny packets from the WAN interface. By default,
all incoming IP traffic from the WAN is Blocked, if the Firewall is Enabled. By setting
up one or more filters, specific packet types coming from the WAN can be Accepted.
Summary of Contents for NexusLink 3241eu
Page 1: ...261103 018 NexusLink 3241u 3241eu Bonding IAD User Manual Version A1 0 May 17 2017...
Page 16: ...15 STEP 3 After successfully logging in for the first time you will reach this screen...
Page 63: ...62 A maximum of 100 entries can be added to the URL Filter list...
Page 66: ...65 Click Enable to activate the QoS Queue Click Add to display the following screen...
Page 82: ...81 5 11 DSL Bonding This page displays the bonding status of the connected xDSL line...
Page 83: ...82 5 12 UPnP Select the checkbox provided and click Apply Save to enable UPnP protocol...
Page 103: ...102 Enter a certificate name and click Apply to import the CA certificate...
Page 115: ...114 Enter the MAC address in the box provided and click Apply Save...
Page 118: ...117...
Page 122: ...121 6 7 Site Survey 5GHz The graph displays wireless APs found in your neighborhood by channel...
Page 133: ...132 Enter the MAC address in the box provided and click Apply Save...
Page 141: ...140 6 17 WiFi Passpoint Note This function is not supported on this release...
Page 144: ...143 7 1 SIP Basic Setting...
Page 149: ...148 7 2 SIP Advanced Setting...
Page 150: ...149 7 2 1 Global Parameters This screen contains the advanced SIP configuration settings...
Page 154: ...153 7 3 SIP Debug Setting This screen contains SIP configuration settings used for debugging...
Page 187: ...186 STEP 2 Click the Windows start button Then select Control Panel...
Page 188: ...187 STEP 3 Select Devices and Printers STEP 4 Select Add a printer...
Page 214: ...213 F2 4 PPP over ATM PPPoA IPv4 STEP 1 Click Next to continue...