ZyXEL Communications NBG5615 User Manual page 159

Simultaneous dual-band wireless n750 media router
Hide thumbs Also See for NBG5615:
Table of Contents

Advertisement

Table 64 Security > Firewall > Services (continued)
LABEL
Source IP Address Enter the IP address of the computer that initializes traffic for the application or service.
Protocol
Dest Port Range
Source Port
Range
Add Rule
Firewall Rule
#
Service Name
MAC address
Dest IP
Source IP
Protocol
Dest Port Range
Source Port
Range
Action
Delete
Cancel
See
Appendix C on page 249
NBG5615 User's Guide
DESCRIPTION
The NBG5615 applies the firewall rule to traffic initiating from this computer.
Select the protocol (TCP, UDP or ICMP) used to transport the packets for which you want
to apply the firewall rule.
Enter the port number/range of the destination that define the traffic type, for example
TCP port 80 defines web traffic.
Enter the port number/range of the source that define the traffic type, for example TCP
port 80 defines web traffic.
Click Add to save the firewall rule.
This is your firewall rule number. The ordering of your rules is important as rules are
applied in turn.
This is a name that identifies or describes the firewall rule.
This is the MAC address of the computer for which the firewall rule applies.
This is the IP address of the computer to which traffic for the application or service is
entering.
This is the IP address of the computer from which traffic for the application or service is
initialized.
This is the protocol (TCP, UDP or ICMP) used to transport the packets for which you want
to apply the firewall rule.
This is the port number/range of the destination that define the traffic type, for example
TCP port 80 defines web traffic.
This is the port number/range of the source that define the traffic type, for example TCP
port 80 defines web traffic.
DROP - Traffic matching the conditions of the firewall rule are stopped.
Click Delete to remove the firewall rule.
Click Cancel to start configuring this screen again.
for commonly used services and port numbers.
Chapter 18 Firewall
159

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents