![Teltonika RUT5 Series User Manual Download Page 49](http://html1.mh-extra.com/html/teltonika/rut5-series/rut5-series_user-manual_1084875049.webp)
49
Field name
Sample Value
Explanation
1. Name
“ruleName”
Used to make rule management easier
2. Family
IPv4
Only IPv4 is currently supported
3. Protocol
TCP/UDP/Other…
Protocol of the packet that is being matched against traffic rules.
4. Source
IPv4 address
The source of the packet.
5. Destination IPv4 address
The destination of the packet
6. Action
Drop/Accept/Reject
+ chain + additional
rules
Action to be taken on the packet if it matches the rule. You can also define
additional options like limiting packet volume, and defining to which chain the
rule belongs
7. Enable
Checked/Unchecked Self-explanatory. Uncheck to make the rule inactive. The rule will not be
deleted, but it also will not be loaded into the firewall.
8. Sort
Up/Down
When a packet arrives, it gets checked for a matching rule. If there are several
rules that match the rule, the first one is applied i.e. the order of the rule list
impacts how your firewall operates, therefore you are given the ability to sort
your list as you wish.
Custom Rules
Here you have the ultimate freedom in defining your rules – you can enter them straight into the iptables program. Just
type them out into the text field ant it will get executed as a linux shell script. If you are unsure of how to use iptables,
check the internet out for manuals, examples and explanations.
Static Routes
Static routes provide a way of entering custom entries in the internal routing table of the router.
Field name
Value
Explanation
1. Interface
Lan/wan
The zone where the ‘Target’ resides
2. Target
IPv4 address
The source of the traffic.
3. IPv4-Netmask
IPv4 mask
Mask that is applied to the Target to determine to what actual IP
addresses the routing rule applies
4. IPv4-Gateway
IPv4 address
To where the router should send all the traffic that applies to the rule
5. Metric
integer
Used as a sorting measure. If a packet about to be routed fits two rules,
the one with the higher metric is applied.
Additional note on Target & Netmask: You can define a rule that applies to a single IP like this: Target - some IP;
Netmask - 255.255.255.255. Furthermore you can define a rule that applies to a segment of IPs like this: Target – some
IP that STARTS the segment; Netmask – Netmask that defines how large the segment is. E.g.:
192.168.55.161
255.255.255.255
Only applies to 192.168.55.161
192.168.55.0
255.255.255.0
Applies to IPs in range 192.168.55.0-192.168.55.255