LTE CPE B2368 User's
Guide
10 Firewall
Issue 01
Copyright © Huawei Technologies Co., Ltd.
85
10.6.1 Tips to strengthen security firewall
Step 1
Change the default password to access the web configuration interface.
Step 1
Change the default password to access the web configuration interface.
step 2
Before you connect to a network, think about access control.
step 2
Before you connect to a network, think about access control.
step 3
Restrict access to your LTE modem.
step 3
Restrict access to your LTE modem.
step 4
Do not enable any of the local services that do not plan to use (eg. Telnet or FTP).
step 4
Do not enable any of the local services that do not plan to use (eg. Telnet or FTP).
Each active service may pose a potential safety hazard. A determined hacker can find a way to exploit active
service access to your network.
step 5
Active local services protect against misuse. Protect them so that to allow communication only
step 5
Active local services protect against misuse. Protect them so that to allow communication only
some peer protocols and set rules to block packets for the services at specific interfaces.
step 6
Keep the firewall in a secure (locked) room.
step 6
Keep the firewall in a secure (locked) room.
---- End
10.6.2 Other safety tips
NOTE
Incorrect firewall settings can lead to blockage harmless stream or vice versa pose a security risk to the LTE modem
and your network. When creating or deleting firewall rules caution. Always test the rules created.
Before creating exceptions or rules consider the following:
Step 1
This rule does not prevent users on the LAN to access important resources on the Internet?
Step 1
This rule does not prevent users on the LAN to access important resources on the Internet?
For example, if you block access to IRC - not connected to the network users who require this service?
For example, if you block access to IRC - not connected to the network users who require this service?
For example, if you block access to IRC - not connected to the network users who require this service?
step 2
It is not possible to rule better adapted to the purpose? It glycol example, according to the rules of access
step 2
It is not possible to rule better adapted to the purpose? It glycol example, according to the rules of access
IRC is blocked for all users, you can not access some of them permit?
step 3
It does not constitute a rule that allows Internet users to access resources in the local
step 3
It does not constitute a rule that allows Internet users to access resources in the local
network security risk? For example, if open FTP ports (TCP 20, 21) for Internet traffic to the local network, it
may be that Internet users will be able to connect to computers running FTP servers.
step 4
Not newly created rule conflicts with an existing?
step 4
Not newly created rule conflicts with an existing?
---- End
Once the answer to the above questions is a simple matter of adding rules to fill the relevant fields in
the web interface.