160
C
HAPTER
11: A
DMINISTRATION AND
A
DVANCED
O
PERATIONS
4
Enter the blocked network’s starting IP address in the
Source Addr. Range
Begin
box and the blocked network’s ending IP address in the
Source
Addr. Range End
box.
5
Select
*
from the
Destination Ethernet
list.
6
Since the intent is to block access to all servers, enter
*
in the
Destination
Addr. Range Begin
box.
7
Click
Add Rule
.
Enabling the ISP to Ping the Firewall
By default, the Firewall does not respond to pings from the Internet.
However, Ping is a tool that many ISPs use to verify that the Internet
connection is active.
In this example, you limit the source to allow the ISP to ping the Firewall
only.
1
For the Action, choose
Allow
.
2
From the
Service
list, choose
Ping
.
3
Select
WAN
from the
Source Ethernet
list.
4
Enter the starting IP address of the ISP’s network in the
Source Addr.
Range Begin
box and the network’s ending IP address in the
Source Addr.
Range End
box.
5
Select
WAN
from the
Destination Ethernet
list.
6
Since the intent is to allow a ping only to the Firewall, enter the Firewall’s
LAN IP Address in the
Destination Addr. Range Begin
box.
7
Click
Add Rule
.
Restore the Default Network Access Rules
If the Firewall’s network access rules have been modified or deleted, the
administrator may wish to restore them to the factory default settings.
The default rules block all incoming traffic from the WAN to the LAN and
allow all outgoing traffic from the LAN to the WAN.
Click the
Restore Rules to Defaults
button at the bottom of the Rules
page to restore the default network access rules. A dialog box will display
the message, “This will erase all settings you have made on the Services
and Rules tab.” Click
OK
and restart the Firewall for the changes to take
effect.
DUA1611-0AAA02.book Page 160 Thursday, August 2, 2001 4:01 PM
Содержание 3C16111 - SuperStack 3 Firewall Web Site Filter
Страница 18: ...18 DUA1611 0AAA02 book Page 18 Thursday August 2 2001 4 01 PM ...
Страница 50: ...50 DUA1611 0AAA02 book Page 50 Thursday August 2 2001 4 01 PM ...
Страница 96: ...96 CHAPTER 6 USING THE FIREWALL DIAGNOSTIC TOOLS DUA1611 0AAA02 book Page 96 Thursday August 2 2001 4 01 PM ...
Страница 122: ...122 CHAPTER 8 ADVANCED SETTINGS DUA1611 0AAA02 book Page 122 Thursday August 2 2001 4 01 PM ...
Страница 150: ...150 CHAPTER 10 CONFIGURING HIGH AVAILABILITY DUA1611 0AAA02 book Page 150 Thursday August 2 2001 4 01 PM ...
Страница 152: ...152 DUA1611 0AAA02 book Page 152 Thursday August 2 2001 4 01 PM ...
Страница 166: ...166 CHAPTER 11 ADMINISTRATION AND ADVANCED OPERATIONS DUA1611 0AAA02 book Page 166 Thursday August 2 2001 4 01 PM ...
Страница 174: ...174 DUA1611 0AAA02 book Page 174 Thursday August 2 2001 4 01 PM ...
Страница 178: ...178 CHAPTER 13 TYPES OF ATTACK AND FIREWALL DEFENCES DUA1611 0AAA02 book Page 178 Thursday August 2 2001 4 01 PM ...
Страница 190: ...190 CHAPTER 14 NETWORKING CONCEPTS DUA1611 0AAA02 book Page 190 Thursday August 2 2001 4 01 PM ...
Страница 192: ...192 DUA1611 0AAA02 book Page 192 Thursday August 2 2001 4 01 PM ...
Страница 206: ...206 APPENDIX D TECHNICAL SUPPORT DUA1611 0AAA02 book Page 206 Thursday August 2 2001 4 01 PM ...
Страница 212: ...212 INDEX DUA1611 0AAA02 book Page 212 Thursday August 2 2001 4 01 PM ...
Страница 214: ...DUA1611 0AAA02 book Page 214 Thursday August 2 2001 4 01 PM ...