35
Chapter 5: Setting Up and Configuring the Router
Firewall Tab - Access Rules
10/100/1000 4-Port VPN Router
Firewall Tab - Access Rules
Network Access Rules evaluate the network traffic's Source IP address, Destination IP address, and IP protocol
type to decide if the IP traffic is allowed to pass through the firewall.
Use extreme caution when creating or deleting Network Access Rules, keeping in mind not to disable all firewall
protection or block all access to the Internet. Custom rules can be created to override Default Rules, but there are
four default rules that will be always active, and custom rules cannot override these six rules. These are:
* HTTP service from LAN side to RV0041 is always allowed.
* DHCP service from LAN side is always allowed.
* DNS service from LAN side is always allowed.
* Ping service from LAN side to RV0041 is always allowed.
* All traffic from the LAN to the WAN is allowed.
* All traffic from the WAN to the LAN is denied.
Jump to
: Select from this pull-down menu which page of Rules you wish to display.
Entries Per Page
: From this pull-down menu, you can select how many entries will be displayed per page.
The Network Access Rules are broken into a table, with these features:
Priority
: This shows, from the number of Rules entered, the order of Rules having higher or lower priority.
Enable
: Enable or disable Rules by clicking on the corresponding box.
Action
: Allow or Deny traffic to or from specific network or Internet destinations.
Service
: This shows the services on your network to which this Rule will apply?
Source Interface
: This shows to which port this rule applies.
Source
: Displays the source of the traffic affected by the Rule. For instance, if the source of the traffic is on your
network, this will display
LAN
.
Any
means that the traffic can originate from any source.
Destination
: Displays the destination of the traffic affected by the Rule. For instance, if the destination of the
traffic is your network, this will display LAN. Any means that the traffic can go to any destination.
Figure 5-34: Firewall Tab - Access Rules