User Manual
Figure 2-41
Brute Force Login Prevention (Lockout IP Addresses) Interface
Table 2-36 Brute Force Login Prevention (Lockout IP Addresses) Information
Name
IP address
Date
Services
You may perform the following maintenance operation:
Delete
2.7.4 ACL-based Traffic Filtering
Access Control List (ACL) based filtering provides predictable traffic filtering. You can configure
filtering rules to allow or deny receiving packets from specified IP addresses to certain ports on the device.
For example, if a remote host (with the IP address x.x.x.x) allowed to connect to a certain service using
port X, create an ACCEPT rule to allow traffic from IP x.x.x.x destined to port X on TGW.
After login, choose Security > Static defense to go to the configuration interface.
Figure 2-42
Static Defense Configuration Interface
Table 2-37 Static Defense Configuration Parameters
Name
Accept/Block
Local port
84
Description
Indicates a locked IP address.
Indicates the date when an IP address is locked.
Indicates the login method of the locked IP address (Web or SSH).
Remove the IP address from the locked list.
:
Description
Specify whether to receive or block data packets when the specified conditions are matched
(source IP address, local port, protocol).
Specify the local port range of the device for receiving data packets.
Range is 0 to 65535.
T G W S IP -F X S /F S O G a te w a y S e rie s
Tadiran Telecom
Need help?
Do you have a question about the aeonix TGW4 and is the answer not in the manual?
Questions and answers