http://www.uttglobal.com
Page
10810810
UTT Technologies
Chapter 9 Firewall
Chapter 8 Firewall
This chapter describes how to configure firewall features, including access control,
domain filtering, and attack prevention.
8.1 Access Control
This section describes the
Firewall > Access Control
page, which includes the
Access
Rule List
and
Access Rule Settings
.
8.1.1 Introduction to Access Control
8.1.1.1 The Purpose of Access Control Feature
By flexibly utilizing access control, you can not only assign different Internet access
privileges to different LAN users, but also assign different Internet access privileges to the
same users based on schedules. In practice, you can set appropriate access rules
according to the actual requirements of your organization. Such as, for a school, you can
block the students from accessing game websites; for a family, you can only allow your
children to access the Internet during the specified period of time; for a business, you can
block the Financial Department’s employees from accessing the Internet.
8.1.1.2 The Operation Principle of Access Control
By default, the Gigabit Router will forward all the valid packets received by the LAN
interface because no access rule exists. After you have configured some access rules, the
Gigabit Router will examine each packet received by the LAN interface to determine
whether to forward or drop it, based on the criteria you specified in the access rules.
More specifically, when receiving a packet initiated from LAN, the Gigabit Router will
analyze the packet by extracting its source MAC address, source IP address, destination
IP address, protocol type, port number, content, and the date and time at which the packet
was received, and then compare them with each rule in decreasing order of priority. The