Configuring IP Firewall Filters for an interface
823
Programming Operations Guide
Adding an Input Filter for a Firewall Filter Interface
Before you can specify a Rule Order, you must add Filter Rules.
The maximum number of Input Filter Rules you can add is 32.
1
Click the
Input Filters’ Rule Settings
tab.
The Input Filters’ Rule Settings screen appears.
2
On the
Configuration
menu, click
Add Input Filter Rule
.
3
Configure the Input Filter Rule settings according to the following table.
Table 259
Firewall Input Filter Rule settings
Attribute
Description
Rule Name (IR#
or OR#)
Allows you to assign a number to the Rule.
Stateful
Allows you to specify if the states of connections that match this rule will be monitored. This
permits the creation of one-way rules. For example, you can permit inside traffic to return but
block traffic originating from the outside.
For more information refer to
“Stateful Packet Filters” on page 820
.
The values are
Yes
and
No
. The default is
Yes
.
Disposition
Allows you to specify if a packet that matches this rule passes through or is blocked.
The values are
Block
or
Pass
. The default is
Block
.
Protocol
Allows you to specify the protocol type of the packet to be filtered.
The values are;
IP
,
TCP
,
UDP
,
TCP/UDP
,
ICMP
,
OSPF
,
PPTP
,
IPSEC_AH AND IPSEC_ESP
.
The default is
IP
.
Source IP Type
Allows you to specify if the Source IP is
Fixed
or
Dynamic
.
Use Dynamic when the IP is assigned by an outside source. For example, your Internet Service
Provider (ISP) assigns your IP address. If you specify Dynamic, Source IP and Source IP Mask
do not need to be entered.
The default is
Fixed
.
Note
: Dynamic does not match all IP addresses. If you want to match all IP addresses, enter an
IP address of 0.0.0.0 and a mask of 0.0.0.0.
Source IP
Allows you to specify the source address of the packet to be filtered.
Source Range
Mask
Allows you to specify the source address mask of the packet to be filtered.
If you enter 255.255.255.255, then the Source IP is a single address.
If you enter 0.0.0.0, then the Source IP is all possible addresses.
Source Port
Range (#-#)
Allows you to specify a single entry, a range of entries (1-65535) or one of the following:
ALL
,
FTP
,
Telnet
,
SMTP
,
SNMP
,
DNS
,
DHCP
,
TFTP
,
Gopher
,
Finger
,
HTTP
,
H.323
,
POP
,
NNTP
,
NetBios
,
RPC
,
SUNNFS
and
DCOM
.
Non-standard
FTP Port
Select
Yes
if the Source Port Range contains non-standard FTP ports.
Select
No
if the Source Port Range does not contain non-standard FTP ports.
If your FTP server behind the Business Communications Manager listens on a non-standard
port, you must select
Yes
for this option. This is because FTP uses two ports - command(21) and
data(20). When a port other than 21 is used for FTP, the IP Firewall needs to be able to deal with
the alternate data port as well.
The default is
No
.
Summary of Contents for BCM 3.7
Page 4: ...4 Software licensing N0008589 3 3...
Page 32: ...32 Contents N0008589 3 3 W 937 Index 939...
Page 46: ...46 Tables N0008589 3 3...
Page 64: ...64 How to get help N0008589 3 3...
Page 90: ...90 Manually activating Telnet N0008589 3 3...
Page 116: ...116 Delayed system restart N0008589 3 3...
Page 194: ...194 Configuring a data module N0008589 3 3...
Page 276: ...276 Setting line telco features N0008589 3 3...
Page 310: ...310 Using COS passwords N0008589 3 3...
Page 364: ...364 Enhanced 911 E911 configuration N0008589 3 3...
Page 380: ...380 Renumbering DNs N0008589 3 3...
Page 398: ...398 Saving wizard pages on your computer N0008589 3 3...
Page 458: ...458 Voice Mail settings N0008589 3 3...
Page 488: ...488 Setting system telco features N0008589 3 3...
Page 508: ...508 Other programming that affects public networking N0008589 3 3...
Page 522: ...522 PRI networking using Call by Call services N0008589 3 3...
Page 592: ...592 Monitoring Hunt groups N0008589 3 3...
Page 636: ...636 Configuring Double Density N0008589 3 3...
Page 640: ...640 Using the Network Update Wizard N0008589 3 3...
Page 666: ...666 Importing and Exporting DHCP data N0008589 3 3...
Page 722: ...722 Restarting the router N0008589 3 3...
Page 726: ...726 Important Web Cache considerations N0008589 3 3...
Page 748: ...748 Configuring an Interface with NAT N0008589 3 3...
Page 794: ...794 IPSec N0008589 3 3...
Page 818: ...818 Configuring the Policy Agent characteristics N0008589 3 3...
Page 832: ...832 Firewall rules for Business Communications Manager with Dialup interfaces N0008589 3 3...
Page 876: ...876 ISDN Programming N0008589 3 3...
Page 1004: ...1004 Index N0008589 3 3...