138
Example 1: Filter Name
: In_Filter1
Protocol
: TCP
Policy
: Allow
Source IP Address
: 210.168.219.45
Source Subnet Mask
: 255.255.0.0
Source Port
: 80
Dest. IP Address
: NA
Dest. Subnet Mask
: NA
Dest. Port
: NA
Selected WAN interface : br0
This filter will ACCEPT all TCP packets coming from WAN interface “br0” with IP
Address/Subnet Mask 210.168.219.45/16 with a source port of 80, irrespective
of the destination. All other incoming packets on this interface are DROPPED.
Example 2: Filter Name
: In_Filter2
Protocol
: UDP
Policy
: Allow
Source IP Address
: 210.168.219.45
Source Subnet Mask
: 255.255.0.0
Source Port
: 5060:6060
Dest. IP Address
: 192.168.1.45
Dest. Sub. Mask
: 255.255.255.0
Dest. Port
: 6060:7070
Selected WAN interface : br0
This rule will ACCEPT all UDP packets coming from WAN interface “br0” with IP
Address/Subnet Mask 210.168.219.45/16 and a source port in the range of
5060 to 6060, destined to 192.168.1.45/24 and a destination port in the range
of 6060 to 7070. All other incoming packets on this interface are DROPPED.
MAC LAYER FILTER
These rules help in the filtering of Layer 2 traffic. MAC Filtering is only effective in
Bridge mode. After a Bridge mode connection is created, navigate to Advanced
Setup
Security
MAC Filtering in the WUI.
Example 1: Global Policy
: Forwarded
Protocol Type
: PPPoE
Dest. MAC Address
: 00:12:34:56:78:90
Source MAC Address
: NA
Src. Interface
: eth1
Dest. Interface
: eth2
Addition of this rule drops all PPPoE frames going from eth1 to eth2 with a
Destination MAC Address of 00:12:34:56:78:90 irrespective of its Source MAC
Address. All other frames on this interface are forwarded.
Example 2: Global Policy
: Blocked
Protocol Type
: PPPoE
Dest. MAC Address
: 00:12:34:56:78:90
Source MAC Address
: 00:34:12:78:90:56
Src. Interface
: eth1
Dest. Interface
: eth2
Addition of this rule forwards all PPPoE frames going from eth1 to eth2 with a
Destination MAC Address of 00:12:34:56:78 and Source MAC Address of
00:34:12:78:90:56. All other frames on this interface are dropped.
Содержание AR-5389
Страница 1: ...74ok AR 5389 ADSL2 WLAN Router User Manual Version A1 0 February 5 2014...
Страница 16: ...15 STEP 3 After successfully logging in for the first time you will reach this screen...
Страница 31: ...30 4 7 IGMP Proxy Displays a list of IGMP Proxy entries...
Страница 57: ...56 5 5 6 SIP ALG This page allows you to enable disable SIP ALG...
Страница 100: ...99 Enter a certificate name and click Apply to import the CA certificate...
Страница 117: ...116 6 6 Site Survey The graph displays wireless APs found in your neighborhood by channel...
Страница 119: ...118 6 8 WiFi Button This page allows you to enable or disable the WiFi Button...
Страница 132: ...131 NOTE Passwords can be up to 16 characters in length...
Страница 157: ...156 The settings shown above are described below...