46
4.3.6.2.
Firewall
Firewall Configuration
In this web interface, you can set up firewall to prevent unauthorized Internet users from
accessing private networks connected to the Internet (input rule), or prevent unauthorized
private network devices from accessing the Internet (output rule).
Firewall supports two types of rules: input access rule and output access rule. Each type
supports at most 10 items.
Through this web page, you could set up and enable/disable firewall with input/output rules.
System could prevent unauthorized access, or access other networks set in rules for security.
Firewall, is also called access list, is a simple implementation of a Cisco-like access list
(firewall). It supports two access lists: one for filtering input packets, and the other for filtering
output packets. Each kind of list could be added 10 items.
We will give you an instance for your reference.
Field name
explanation
Enable Input Rules
Select it to Enable in_ access rule
Enable Output Rules
Select it to Enable out_ access rule
Input/Output
Specify current adding rule by selecting input rule or output rule.
Deny/Permit
Specify current adding rule by selecting Deny rule or Permit rule.
Protocol
Filter protocol type. You can select TCP, UDP, ICMP, or IP.
Port Range
Set the filter Port
range
Src Address
Set source address. It can be single IP address, network address,
complete address 0.0.0.0, or network address similar to *.*.*.0
Dest Address
Set the destination address. It can be IP address, network address,
complete address 0.0.0.0, or network address similar to *.*.*.*
Src Mask
Set the
source address’ mask. For example, 255.255.255.255 means
just point to one host; 255.255.255.0 means point to a network