Port Filtering-Inbound - Sierra Wireless AirLink RV50 Series User Manual

Hide thumbs Also See for AirLink RV50 Series:
Table of Contents

Advertisement

Field
DMZ Host IP
DMZ Host IP in use
Rev 1 Dec. 17
Description
This field only appears if Manual is selected for the DMZ Enabled field. It is the IP address
of the private mode host that should be used as the DMZ.
IP address of the host to which inbound unsolicited packets are sent
When the device passes the Network IP to the configured public host, the DMZ IP in Use
displays the public IP.
Example of configuring the DMZ on an Ethernet connected device:
1. In the DMZ Host Enabled field, select Manual.
2. Enter 192.168.13.100 for the DMZ IP.
3. Select Ethernet as the Default Interface.
An unsolicited data request coming in to the AirLink gateway on any port is
forwarded to the LAN device, 192.168.13.100, at the same port.
Note: The DMZ settings are independent of the number of Port Forward entries and can
be used with port forwarding to pass anything not forwarded to specific ports.
Port Filtering—Inbound
Port Filtering
Inbound restricts unsolicited access to the AirLink gateway and all
LAN-connected devices.
You can enable Port Filtering to either block or allow specified ports. When
enabled, all ports not matching the rule are allowed or blocked depending on the
mode.
You can configure Port Filtering either on individual ports or for a range of ports.
Click Add More for each port filtering rule you want to add.
Note: Inbound restrictions do not apply to responses to outbound data requests. To restrict
outbound access, you need to set the applicable outbound filter.
Figure 7-8: ACEmanager: Security > Port Filtering - Inbound
159
Security Configuration
41111088

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents