Outdoor Router P-380
Users Guide
Figure 25 – Specifying a new rule
Target
– this implementation of firewall control supports two types of rules – ACCEPT and DROP.
The appropriate policy defines what to do if the data packet received matches the rule.
Source IP Address
– source IP address, leave field empty to specify as “any”.
Source Netmask
– source subnet.
Source port(s)
– can be specified in two ways: “All” or a given port range.
Destination IP Address
– specified the same as Source IP.
Destination Netmask
– specified the same as source net mask.
Destination port(s)
– specified the same as Source port.
Network protocol
– network protocol which the rule affects. Can be specified as one of
TCP/UDP/ICMP or “any”.
When using the masquerading function of the P-380, IP addresses used in the LAN are
not visible to the external world or WAN. Please check if packet filters needs to be
specified with destination in masked subnets.
Note: When defining rules, avoid DENY type rules using “any” as the address space,
which can cause inadvertently loss of web management connection (e.g., deny traffic
from any to any IP address).
6.5.2 ACL (Access Control List)
In the ACL Settings page you can restrict access to the P-380. Access control is based on the
networks devices’ MAC address and is individually controlled for the wireless and Ethernet networks.
Gemtek Systems
Page 32
Содержание P-380
Страница 2: ......
Страница 4: ...Outdoor Router P 380 Users Guide Gemtek Systems Page 4...
Страница 6: ...Outdoor Router P 380 Users Guide 10 INDEX 66 Gemtek Systems Page 6...
Страница 67: ...Outdoor Router P 380 Users Guide Gemtek Systems Page 67...