Solwise SAR715PVW ADSL Ethernet Router User’s Guide
Chapter
5
. The Configuration Screens in More Detail
71
2.
In the
Host IP Address
text box, type the IP address that you want
to allow/block.
3.
In the
Host Subnet Mask
text box, type the IP mask address. If you
want to filter a range of addresses, you can specify the mask, for
example,
255.255.255.0
. If you want to filter a single IP address, use
the specific IP mask address, for example,
255.255.255.255
.
4.
Click on the
Direction
drop-down list and select the direction of
traffic that you want the validator to filter.
5.
Click on
Apply
. The
Configure Validators
page is displayed,
containing details of the host validator that you have just added.
6.
Each portfilter displayed in the
Configure Validators
page has a
Delete Host Validator
hyperlink assigned to it. To delete a validator,
click on this link, then at the confirmation page, click on the
Delete
Host Validator
button. The validator is removed from the
Firewall configuration.
Configuring triggers
A trigger allows an application to open a secondary port in order to
transport packets. The most common applications that require
secondary ports are FTP and NetMeeting
To configure a trigger:
1.
Go to the
Policies, Triggers and Intrusion Detection
section of the
Security Interface Configuration
. Click on
Firewall Trigger Configuration
The
Firewall Trigger Configuration
page is displayed. There are no
triggers defined at this time. Click on the
New Trigger
link. The
following page is displayed: