Chapter 5 – Using the RouteFinder's Web Management Software
Multi-Tech Systems, Inc. RouteFinder RF825/RF825-AP User Guide (Document Number S000422B)
64
Packet Filters > Packet Filter Rules
Important Note about the Order of Rules:
The order of the rules in the table is essential for the correct functioning of the firewall. By clicking the
Move
button, the order of execution can be changed. In front of rule to be moved, enter the line number
that indicates where the rule should be placed. Confirm by clicking
OK
.
By default, new rules are created at the end of the table.
From (Host/Networks)
Select the host/network from which the information packet must originate for the filter rule to match.
The
Any
option, which matches all IP addresses regardless of whether they are officially assigned or
private addresses, may also be specified. The networks/host must be pre-defined in the Networks
section. Example:
network1
or
host1
or
Any
Services
Select the service that is to be matched with the filter rule. These services must be pre-defined in the
Services section. The default entry Any selects all combinations of protocols and parameters (e.g.,
ports). Example:
SMTP, ANY
To (Host/Networks)
Select the host/networks to which the packet is to be sent in order for the filter rule to match. The
Any
option, which matches all IP addresses regardless of whether they are officially assigned or private
addresses, may also be specified. The networks/host must be pre-defined in the Networks section.
Example:
network2
, or
host 2
or
Any
Action
Select the action that packet filter executes if the rule matches any traffic traversing the RouteFinder
firewall. There are four types of actions:
•
Accept –
Allows/accepts all packets that match this rule.
•
Reject –
Blocks all packets that match this rule. The host sending the packet will be informed
that the packet has been rejected.
•
Drop –
Drops all packets that match this rule, but the host is not informed. It will appear to
the host that the destination address is not responding; in other words, it is a silent drop.
•
Log –
Packets matching the rule will be logged. Source address, destination address, and
service will be logged. The logged messages are routed to the Remote Syslog Server if
enabled in the Administration section.