![D-Link GLB-802C Скачать руководство пользователя страница 27](http://html.mh-extra.com/html/d-link/glb-802c/glb-802c_user-manual_77350027.webp)
CHAPTER-3
D-Link GLB-802C ADSL2+ Router User Manual
24
Enter or select data for each field that applies to the rule. The following table describes the fields:
Field
Description
Rule ID
Each rule must be assigned a sequential ID
number. Rules are processed from lowest to
highest on each data packet, until a match is
found. It is recommended to assign rule IDs in
multiples of 5 or 10 (e.g.,
10
,
20
,
30
) so that
enough room is left between them for inserting
new rules if necessary.
Action
The action that will be taken when a packet
matches the rule criteria. The action can be
Accept
(forward to destination) or
Deny
(discard the
packet).
Direction
Specifies whether the rule should apply to data
packets that are incoming or outgoing on the
selected interface.
Incoming
refers to packets coming from the LAN,
and
outgoing
refers to packets going to the
Internet.
Interface
The interface on the router on which the rule will
take effect.
In Interface
The interface from which packets must have been
forwarded to the interface specified in the
previous selection. This option is valid only for
the outgoing direction.
Log Option
When
Enabled
is selected, a log entry will be
created on the system each time this rule is
invoked. The log entry will include the time of the
violation, the source address of the computer
responsible for the violation, the destination IP
address, the protocol being used, the source and
destination ports, and the number violations
occurring in the previous x minutes.
Security Level
The security level that must be enabled globally
for this rule to take affect. A rule will be active
only if its security level is the same as the globally
configured setting. For example, if the rule is set
to
Medium
and the global firewall level is set to
Medium
, then the rule will be active; but if the
global firewall level is set to
High
or
Low
, then
the rule will be inactive.
Black List Status
Specifies whether or not a violation of this rule
will result in the offending computer's IP
address being added to the blacklist, which blocks
the router from forwarding packets from that
source for a specified period of time.
Log Tag
A description of up to 16 characters to be
recorded in the log in the event that a packet
violates this rule. Be sure to set the Log Option to
Enable
when a Log Tag is configured.