Add An Outbound Acl Rule - Asus SL6000 Setup Instructions

Hide thumbs Also See for SL6000:
Table of Contents

Advertisement

Chapter 5. Configuring Firewall/NAT Settings
Begin
End
Destination Port
Any
Single, Range
Service
NAT
Log
VPN
5.4.2

Add an Outbound ACL Rule

48
Solwise Asus SL6000 ADSL Ethernet Router User's Guide
is selected.
Enter the starting port number of the range
Enter the ending port number of the range
Select this option if you want this rule to apply to all
applications with an arbitrary destination port
number.
Select any of these and enter details as described
in the Source Port section above.
This option allows you to select any of the pre-
configured services (selectable from the drop-
down list) instead of the destination port. The
following are examples of services:
BATTLE-NET, PC-ANYWHERE, FINGER,
DIABLO-II, L2TP, H323GK, CUSEEME, MSN-
ZONE, ILS, ICQ_2002, ICQ_2000, MSN, AOL,
RPC, RTSP7070, RTSP554, QUAKE, N2P, PPTP,
MSG2, MSG1, IRC, IKE, H323, IMAP4, HTTPS,
DNS, SNMP, NNTP, POP3, SMTP, HTTP, FTP,
TELNET.
Note: service is a combination of protocol and port
number. They appear here after you add them in
the "Firewall Service" configuration page.
Select "Enable" radio button to enable the use of
NAT; otherwise; select "Disable"
Select "Enable" radio button to enable logging for
this ACL rule; otherwise, select "Disable".
This option allows you to select the check box if
this policy corresponds to VPN policy.
To add an outbound ACL rule, follow the instructions below:
1. Log into Configuration Manager as admin, click the Firewall
menu, and then click
Outbound ACL
Outbound ACL Configuration page displays, as shown above.
Note that when you open the Outbound ACL Configuration page, a
list of existing ACL rules are also displayed in the lower half of the
configuration page such as those shown above.
2. Select "Add New" from the "ID" drop-down list.
3. Set desired action (Allow or Deny) from the "Action" drop-down
list.
4. Make changes to any or all of the following fields:
source/destination IP, source/destination port, protocol, port
mapping, log, and VPN. Please see Table above for explanation of
these fields.
5. Assign a priority for this rule by selecting a number from the
"Move to" drop-down list. Note that the number indicates the priority
of the rule with 1 being the highest. Higher priority rules will be
examined prior to the lower priority rules by the firewall.
submenu. The Firewall

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents