Chapter 6 Device Security Settings
Vantage CNM User’s Guide
111
6.1.2 Rule Summary
Use the
Insert
button to add a new rule before an existing rule. Use
Move
to put an existing
rule in a different place.
Select a device, click
Device Operation
in the menu bar and then click
Device Configuration
>
Security
> Firewall > Rule Summary
in the navigation panel.
From, To
Set the firewall’s default actions based on the direction of travel of
packets. Here are some example descriptions of the directions of
travel.
From
LAN To LAN
means packets traveling from a computer on one
LAN subnet to a computer on another LAN subnet on the LAN interface
of the device or the device itself. The device does not apply the firewall
to packets traveling from a LAN computer to another LAN computer on
the same subnet.
From VPN
means traffic that came into the device through a VPN
tunnel and is going to the selected “to” interface. For example,
From
VPN To LAN
specifies the VPN traffic that is going to the LAN. The
device applies the firewall to the traffic after decrypting it.
To VPN
is traffic that comes in through the selected “from” interface
and goes out through any VPN tunnel. For example,
From LAN To
VPN
specifies the traffic that is coming from the LAN and going out
through a VPN tunnel. The device applies the firewall to the traffic
before encrypting it.
From VPN To VPN
means traffic that comes in through a VPN tunnel
and goes out through (another) VPN tunnel or terminates at the device.
This is the case when the device is the hub in a hub-and-spoke VPN.
This is also the case if you allow someone to use a service (like Telnet
or HTTP) through a VPN tunnel to manage the device. The device
applies the firewall to the traffic after decrypting it.
Note: The VPN connection directions apply to the traffic
going to or from the device’s VPN tunnels. They do
not apply to other VPN traffic for which the device is
not one of the gateways (VPN pass-through traffic).
Here are the default actions from which you can select.
Select
Drop
to silently discard the packets without sending a TCP reset
packet or an ICMP destination-unreachable message to the sender.
Select
Reject
to deny the packets and send a TCP reset packet (for a
TCP packet) or an ICMP destination-unreachable message (for a UDP
packet) to the sender.
Select
Permit
to allow the passage of the packets.
The firewall rules for the WAN port with a higher route priority also
apply to the dial backup connection.
Log
Select the check box next to a direction of packet travel to create a log
when the above action is taken for packets that are traveling in that
direction and do not match any of your customized rules.
Apply
Click
Apply
to save your changes back to the device.
Reset
Click this to reset this screen to its last saved values.
Table 40
Device Operation > Device Configuration > Security > Firewall > Default Rule
LABEL
DESCRIPTION
Содержание Centralized Network Management Vantage CNM
Страница 1: ...www zyxel com Vantage CNM Centralized Network Management User s Guide Version 3 0 11 2007 Edition 1...
Страница 2: ......
Страница 24: ...Vantage CNM User s Guide 24...
Страница 30: ...Vantage CNM User s Guide 30...
Страница 33: ...33 PART I Introduction Introducing Vantage CNM 31 GUI Introduction 35...
Страница 34: ...34...
Страница 52: ...52...
Страница 58: ...Chapter 4 Device General Settings Vantage CNM User s Guide 58...
Страница 108: ...Chapter 5 Device Network Settings Vantage CNM User s Guide 108...
Страница 184: ...Chapter 6 Device Security Settings Vantage CNM User s Guide 184...
Страница 207: ...Chapter 7 Device Advanced Settings Vantage CNM User s Guide 207...
Страница 208: ...Chapter 7 Device Advanced Settings Vantage CNM User s Guide 208...
Страница 210: ...Chapter 8 Device Log Vantage CNM User s Guide 210...
Страница 234: ...Chapter 9 Device Configuration Management Vantage CNM User s Guide 234...
Страница 248: ...248...
Страница 264: ...Chapter 14 VPN Monitor Vantage CNM User s Guide 264...
Страница 265: ...265 PART IV Monitor Device Status Monitor 267 Device HA Status Monitor 269 Device Alarm 271...
Страница 266: ...266...
Страница 276: ...Chapter 17 Device Alarm Vantage CNM User s Guide 276...
Страница 277: ...277 PART V Log Report Device Operation Report 279 CNM Logs 291 VRPT 293...
Страница 278: ...278...
Страница 296: ...Chapter 20 VRPT Vantage CNM User s Guide 296...
Страница 298: ...298...
Страница 312: ...Chapter 21 CNM System Setting Vantage CNM User s Guide 312...
Страница 318: ...Chapter 24 Vantage CNM Software Upgrade Vantage CNM User s Guide 318...
Страница 322: ...Chapter 26 About Vantage CNM Vantage CNM User s Guide 322...
Страница 323: ...323 PART VII Account Management Group 325 Account 329...
Страница 324: ...324...
Страница 328: ...Chapter 27 Group Vantage CNM User s Guide 328...
Страница 332: ...Chapter 28 Account Vantage CNM User s Guide 332...
Страница 333: ...333 PART VIII Troubleshooting Troubleshooting 335...
Страница 334: ...334...
Страница 338: ...Chapter 29 Troubleshooting Vantage CNM User s Guide 338...
Страница 340: ...340...
Страница 378: ...Appendix E IP Address Assignment Conflicts Vantage CNM User s Guide 378...
Страница 382: ...Appendix F Common Services Vantage CNM User s Guide 382...
Страница 416: ...Appendix H Open Software Announcements Vantage CNM User s Guide 416...
Страница 424: ...Appendix J Customer Support Vantage CNM User s Guide 424...
Страница 428: ...Index Vantage CNM User s Guide 428...
Страница 429: ...Index Vantage CNM User s Guide 429...
Страница 430: ...Index Vantage CNM User s Guide 430...