Copyright ©ZYCOO All rights reserved. V1.0
71
8.2.7.2
FIREWALL
Firewall Configuration
In this web interface, you can set up firewall to prevent unauthorized Internet users from accessing private
networks connected to the Internet (input rule), or prevent unauthorized private network devices from
accessing the Internet (output rule).
Firewall supports two types of rules: input access rule and output access rule. Each type supports at most 10
items.
Through this web page, you could set up and enable/disable firewall with input/output rules. System could
prevent unauthorized access, or access other networks set in rules for security. Firewall, is also called access list,
is a simple implementation of a Cisco-like access list (firewall). It supports two access lists: one for filtering input
packets, and the other for filtering output packets. Each kind of list could be added 10 items.
We will give you an instance for your reference.
Item
Explanation
Enable Input Rules
Select it to Enable Input Rules.
Enable Output Rules
Select it to Enable Output Rules.
Input / Output
Specify current adding rule by selecting input rule or output rule.
Deny/Permit
Specify current adding rule by selecting Deny rule or Permit rule.
Protocol
Filter protocol type. You can select TCP, UDP, ICMP, or IP.
Port Range
Set the filter Port range.
Src Address
Set source address. It can be single IP address, network address, complete address
0.0.0.0, or network address similar to *.*.*.0.
Des Address
Set the destination address. It can be IP address, network address, complete
address 0.0.0.0, or network address similar to *.*.*.*.
Src Mask
Set the source address’ mask. For example, 255.255.255.255 means just point to
one host; 255.255.255.0 means point to a network which network ID is C type.
Содержание COOFONE-D60
Страница 1: ......
Страница 58: ...Copyright ZYCOO All rights reserved V1 0 54 ...