23
network.
F
IREWALL
C
ONFIGURATION
MAC/IP/P
ORT
F
ILTERING
MAC/IP/Port filtering restricts connection parameters to limit the risk of intrusion
and defends against a wide array of common hacker attacks. MAC/IP/Port filtering
allows the unit to permit, deny or proxy traffic through its MAC addresses, IP
addresses and ports. The OUTDOOR AP/CPE allows you define a sequential list of
permit or deny filtering rules. This device tests ingress packets against the filter
rules one by one. A packet will be accepted as soon as it matches a permit rule, or
dropped as soon as it matches a deny rule. If no rules match, the packet is either
accepted or dropped depending on the default policy setting.
◆
MAC/IP/Port Filtering
— Enables or disables MAC/IP/Port Filtering.
(Default: Disable)
◆
Default Policy
— When MAC/IP/Port Filtering is enabled, the default policy will be
enabled. If you set the default policy to “Dropped”, all incoming packets that don’t
match the rules will be dropped. If the policy is set to "Accepted," all incoming
packets that don't match the rules are accepted. (Default: Dropped)
◆
MAC Address
— Specifies the MAC address to block or allow traffic from.
◆
DIP
— Specifies the destination IP address to block or allow traffic from.
◆
SIP
— Specifies the source IP address to block or allow traffic from.
◆
Protocol
— Specifies the destination port type, TCP, UDP or ICMP.
◆
Destination Port Range
— Specifies the range of destination port to block traffic
from the specified LAN IP address from reaching.
◆
Source Port Range
— Specifies the range of source port to block traffic from the
specified LAN IP address from reaching.
◆
Action
— Specifies if traffic should be accepted or dropped. (Default: Accept)
◆
Comment
— Enter a useful comment to help identify the filtering rules.
◆
Current Filtering rules
— The Current Filter Table displays the configured IP