Chapter 10 Firewall
LTE6100 User’s Guide
73
Each field is described in the following table.
10.4 The Access Control Screen
Click Security > Firewall > Access Control to display the following screen. This screen displays a
list of the configured incoming or outgoing filtering rules.
Figure 41
Security > Firewall > Access Control
Each field is described in the following table.
Table 29
Security > Firewall > Services > Add New Service Entry
LABEL
DESCRIPTION
Name
Type a descriptive name for the service.
Type
Select the protocol type (TCP, UDP or ICMP or Others) of the service.
Protocol
Number
Enter the protocol number of the service type.
Source Port,
Destination
Port
The source port defines from which port number(s) the service traffic is sent. The
destination port defines the port number(s) the destination hosts use to receive the service
traffic.
Select Single if the service uses one and only one source or destination port, then enter the
port number.
Select Multiple if the service uses two or more source or destination ports, then enter a
port range. For example, suppose you want to define the Gnutella service. Select TCP type
and enter a port range of 6345-6349.
Apply
Click Apply to save your changes.
Back
Click Back to exit this screen without saving your changes.
Table 30
Security > Firewall > Access Control
LABEL
DESCRIPTION
Rules Storage
Space usage(%)
This bar shows the percentage of the LTE Device’s space has been used. If the usage is
almost full, you may need to remove an existing filter rule before you create a new one.
Add new ACL rule
Click this to go to add a filter rule for incoming or outgoing IP traffic.
Name
This displays the name of the rule.
Src IP
This displays the source IP addresses to which this rule applies. Please note that a blank
source address is equivalent to Any.
Dst IP
This displays the destination IP addresses to which this rule applies. Please note that a
blank destination address is equivalent to Any.
Services
This displays the protocol type and a port range that define the service to which this rule
applies.
Summary of Contents for LTE6100
Page 4: ...Contents Overview LTE6100 User s Guide 4...
Page 11: ...11 PART I User s Guide...
Page 12: ...12...
Page 16: ...Chapter 1 Introduction LTE6100 User s Guide 16...
Page 24: ...24...
Page 30: ...Chapter 3 Connection Status and System Info LTE6100 User s Guide 30...
Page 38: ...Chapter 4 Broadband LTE6100 User s Guide 38...
Page 48: ...Chapter 6 Routing LTE6100 User s Guide 48...
Page 66: ...Chapter 8 Network Address Translation NAT LTE6100 User s Guide 66...
Page 78: ...Chapter 10 Firewall LTE6100 User s Guide 78...
Page 84: ...Chapter 12 Parental Control LTE6100 User s Guide 84...
Page 104: ...Chapter 15 Traffic Status LTE6100 User s Guide 104...
Page 106: ...Chapter 16 User Account LTE6100 User s Guide 106...
Page 120: ...Chapter 22 Backup Restore LTE6100 User s Guide 120...
Page 122: ...Chapter 23 Diagnostic LTE6100 User s Guide 122...
Page 166: ...Appendix B Setting Up Your Computer s IP Address LTE6100 User s Guide 166...
Page 176: ...Appendix C Pop up Windows JavaScript and Java Permissions LTE6100 User s Guide 176...
Page 180: ...Appendix D Common Services LTE6100 User s Guide 180...
Page 184: ...Appendix E Legal Information LTE6100 User s Guide 184...
Page 188: ...Index LTE6100 User s Guide 188...
Page 189: ...Index LTE6100 User s Guide 189...