805U-E Wireless Ethernet
User Manual
Man_805U-E Rev 1.5
Page 36
The Routing Rules configuration page can be accessed by selecting the “Routing” link on any
of the configuration web pages. Up to 30 routing rules may be added to each 905U-E. The
table below summarises the configurable parameters a routing rule.
Name
A name to describe the routing rule (Max 32 characters).
Destination
The destination network (or host) IP address (to specify a network
address set the host address to 0. i.e. for a class C IP address
192.168.0.0 would specify a destination network, while 192.168.0.16
specifies a destination host).
Gateway
The IP address of the next-hop router for the specified destination.
Subnet Mask
The subnet mask for the destination network.
3.12
Wireless Message Filtering
When configured as a Bridge, the 805U-E will transmit all broadcast messages appearing at
its wired Ethernet port. When the 805U-E is configured as a Router, this does not occur.
In many cases, the intended recipient of the broadcast traffic does not lie at the opposite end
of a proposed radio link. Reducing unnecessary broadcast traffic sent over the radio link, will
increase available bandwidth for data. The 805U-E has a filtering feature to help reduce
unnecessary wireless transmissions and enhance security.
The 805U-E may be configured to reject or accept messages to and from certain Addresses.
To accept wireless messages from particular devices a “Whitelist” of Addresses must be
made. Alternatively to reject messages from particular devices, a “Blacklist” of Addresses
must be made. Filtering applies only to messages appearing at the wired Ethernet port of the
configured 805U-E.
The Filter comprises of two lists: one of MAC Addresses and another listing IP protocol
details. Each list may be set as either a blacklist (to block traffic for listed devices and
protocols), or as a whitelist (to allow traffic for listed devices and protocols). The Filter
operates on two rules listed below.
1. A Blacklist has priority over a whitelist. Traffic matching detail in a blacklist will be
discarded if it also appears in a whitelist.
2. When one or both lists are whitelists, traffic must have matching detail in at least one of
the whitelists for it to be passed. Note that, as this must agree with rule 1 above, the traffic
detail must not match anything in a blacklist, if present, for it to be passed.
When configuring a Whitelist it is important to add the Addresses of all devices connected to
the 805U-E wired Ethernet port, that communicate over the wireless link. It is particularly
important to add the Address of the configuration PC to the Whitelist. Failure to add this
address will prevent the configuration PC from making any further changes to configuration.
Design of the filter may be simplified by monitoring network traffic and forming a profile of