© Microhard Systems Inc.
105
4.0 Configuration
Image 4-8-3: Firewall > Rules
4.8.3 Firewall > Rules
Once the firewall is turned on, rules configuration can be used to define specific rules on how local and
remote devices access different ports and services. MAC List and IP List are used for general access, and
are applied before rules are processed.
Rule Name
The rule name is used to identify the created rule. Each rule must have a
unique name and up to 10 characters can be used.
Values (10 Chars)
characters
Action
The Action is used to define how the rule handles the connection request.
ACCEPT will allow a connection, while REJECT (error) and DROP
(quietly dropped), will refuse connections.
This is configured based on how the
WAN/4G Request
and
LAN to
WAN/4G Access Control
are configured in the previous menus.
Values (selection)
ACCEPT
DROP
REJECT
Source
Select the zone which is to be the source of the data traffic. WAN applies
to the connection to the cellular carrier. The LAN refers to local connections
on the IPn4G (Ethernet/WiFi).
Values
LAN
WAN
(Additional LAN Interfaces)
None
Refer to Appendix E for an
example of how to set up a
firewall to block all
connections and then add
access to only specific IP’s
and Ports.
Appendix E: Firewall
Example