ZyXEL Communications LTE3301-M209 User Manual page 107

4g lte indoor router
Table of Contents

Advertisement

The following table describes the labels in this screen.
Table 49 Security > Firewall > Services
LABEL
DESCRIPTION
ICMP
Internet Control Message Protocol is a message control and error-reporting protocol between
a host server and a gateway to the Internet. ICMP uses Internet Protocol (IP) datagrams, but
the messages are processed by the TCP/IP software and directly apparent to the application
user.
Respond to Ping
The Zyxel Device will not respond to any incoming Ping requests when Disable is selected.
on
Select LAN to reply to incoming LAN Ping requests. Select WAN to reply to incoming WAN Ping
requests. Otherwise select LAN&WAN to reply to all incoming LAN and WAN Ping requests.
Apply
Click Apply to save the settings.
WAN Stealth Mode
Enable WAN
Select this check box to silently discard the matched packets without sending a TCP reset
Stealth Mode
packet or an ICMP destination-unreachable message to the sender.
Apply
Click Apply to save the settings.
Enable Firewall Rule
Enable Firewall
Select this check box to activate the firewall rules that you define (see Add Firewall Rule
Rule
below).
Apply
Click Apply to save the settings.
Add Firewall Rule
Service Name
Enter a name that identifies or describes the firewall rule.
MAC Address
Enter the MAC address of the computer for which the firewall rule applies.
Dest IP Address
Enter the IP address of the computer to which traffic for the application or service is entering.
The Zyxel Device applies the firewall rule to traffic initiating from this computer.
Source IP Address
Enter the IP address of the computer that initializes traffic for the application or service.
The Zyxel Device applies the firewall rule to traffic initiating from this computer.
Protocol
Select the protocol (TCP, UDP or ICMP) used to transport the packets for which you want to
apply the firewall rule.
Dest Port Range
Enter the port number/range of the destination that define the traffic type, for example TCP
port 80 defines web traffic.
Source Port Range
Enter the port number/range of the source that define the traffic type, for example TCP port
80 defines web traffic.
Add Rule
Click Add to save the firewall rule.
Firewall Rule
#
This is your firewall rule number. The ordering of your rules is important as rules are applied in
turn.
Service Name
This is a name that identifies or describes the firewall rule.
MAC address
This is the MAC address of the computer for which the firewall rule applies.
Dest IP
This is the IP address of the computer to which traffic for the application or service is entering.
Source IP
This is the IP address of the computer from which traffic for the application or service is
initialized.
Protocol
This is the protocol (TCP, UDP or ICMP) used to transport the packets for which you want to
apply the firewall rule.
Dest Port Range
This is the port number/range of the destination that define the traffic type, for example TCP
port 80 defines web traffic.
Source Port Range
This is the port number/range of the source that define the traffic type, for example TCP port
80 defines web traffic.
Chapter 14 Firewall
LTE3301-M209 User's Guide
107

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents