ZyXEL Communications P-3202HN-Ba User Manual page 146

802.11n gpon voip iad
Table of Contents

Advertisement

Chapter 12 Firewalls
Table 44 Security > Firewall > Rules (continued)
LABEL
Source IP
Destination IP This drop-down list box displays the destination addresses or ranges of
Service
Action
Schedule
Log
Modify
Order
Apply
Cancel
12.3.1 Configuring Firewall Rules
Refer to
146
DESCRIPTION
This drop-down list box displays the source addresses or ranges of
addresses to which this firewall rule applies. Please note that a blank
source or destination address is equivalent to Any.
addresses to which this firewall rule applies. Please note that a blank
source or destination address is equivalent to Any.
This drop-down list box displays the services to which this firewall rule
applies. See
Appendix F on page 313
This field displays whether the firewall silently discards packets (Drop),
discards packets and sends a TCP reset packet or an ICMP destination-
unreachable message to the sender (Reject) or allows the passage of
packets (Permit).
This field tells you whether a schedule is specified (Yes) or not (No).
This field shows you whether a log is created when packets match this
rule (Yes) or not (No).
Click the Edit icon to go to the screen where you can edit the rule.
Click the Remove icon to delete an existing firewall rule. A window
displays asking you to confirm that you want to delete the firewall rule.
Note that subsequent firewall rules move up by one when you take this
action.
Click the Move icon to display the Move the rule to field. Type a number
in the Move the rule to field and click the Move button to move the rule
to the number that you typed. The ordering of your rules is important as
they are applied in order of their numbering.
Click Apply to save your changes back to the IAD.
Click Cancel to begin configuring this screen afresh.
Section 12.1.2 on page 138
for more information.
for more information.
IAD User's Guide

Advertisement

Table of Contents
loading

Table of Contents