4. CONFIGURATION
Item
Description
Source
IP address from which access to the router is allowed
Protocol
Specifies protocol for remote access:
•
all
– access is enabled for all protocols
•
TCP
– access is enabled for TCP protocol
•
UDP
– access is enabled for UDP protocol
•
ICMP
– access is enabled for ICMP protocol
Target Port
The port number on which access to the router is allowed
Action
Type of action:
•
allow
– access is allowed
•
deny
– access is denied
Table 28: Filtering of incoming packets
The following part of the configuration form defines the forwarding policy. If
Enabled filter-
ing of forwarded packets
item is not checked, packets will be accepted automatically. If this
item is checked and incoming packet is addressed to another network interface, it will forward
the packet according the rules defined in this second table. If the packet is alowed according
to the table, it will be sent out according to the routing table. If the forwarding rule does not
exist, packet will be dropped.
In tables with rules it is possible to allow all traffic within the selected protocol (the rule
specifies only a protocol). Or you can create strict rules by specifying source and destination
IP addresses and ports.
Item
Description
Source
IP address of source device
Destination
IP address of destination device
Protocol
Specifies protocol for remote access:
•
all
– access is enabled for all protocols
•
TCP
– access is enabled for TCP protocol
•
UDP
– access is enabled for UDP protocol
•
ICMP
– access is enabled for ICMP protocol
Target Port
The port number on which access to the router is allowed
Continued on next page
39
Содержание V3
Страница 1: ...Configuration Manual for v3 Routers ...
Страница 17: ...3 STATUS Figure 2 Mobile WAN status 8 ...
Страница 20: ...3 STATUS Figure 4 WiFi Scan 11 ...
Страница 29: ...4 CONFIGURATION Figure 11 Example 1 Topology of LAN Configuration Figure 12 Example 1 LAN Configuration 20 ...
Страница 37: ...4 CONFIGURATION Figure 17 Mobile WAN configuration 28 ...
Страница 64: ...4 CONFIGURATION Figure 36 IPsec tunnels configuration 55 ...
Страница 76: ...4 CONFIGURATION Figure 47 Example of the MIB browser Figure 48 Example of SNMP configuration 67 ...
Страница 91: ...4 CONFIGURATION Figure 59 Example 2 USB port configuration 82 ...