Top Global USA. ----MB6800 User Guide
3.4.4.2 Access rules
Figure 3-34
Access Rules
Function Summary
Access Rules is one of the most important functions of MB6800’s firewall. Access Rules
utilize stateful package filter technology. All the access rules in firewall are set here.
Detailed Configurations
The access rules of the firewall in MB6800 have many access rule items. You can
maintain these rules with the operations of: Add, Delete, Move up, Move down, Apply.
z
Default Policy:
Factory default rules;
z
Enable Checkbox:
You can enable or disable a rule by checking or unchecking
this checkbox;
z
Move up, Move down:
The sequence of the rules in the list is very important for
the firewall. When the firewall deals with a data packet, it will check the rules
from top to bottom sequentially and execute the first rule which matches the
character of this packet. So please pay attention to the sequence when you are
using multiple rules;
z
Apply Change:
Click the
Apply Change
button to validate the change
immediately. No reboot is required here;
z
Add:
Click the
Add
button, a pop-up window for inputting an access rule will
appear:
- 50 -