Lantronix X300 Series X300 Series User Guide Rev B - Page 162

General Settings / Inter-Zone Forwarding, Firewall Zones Configuration LAN

Page 162 highlights

11: Network Table 11-25 Firewall Zones Configuration (LAN) Parameters General Settings Description Name Input Enter the name of the zone. Select to accept, reject or drop the inbound traffic to all the configured zones. Output Select to accept, reject or drop the outbound traffic from all the configured zones. Forward Select to accept, reject or drop the forwarded traffic from all the configured zones. Masquerading Check to allow IP Masquerading (NAT). MSS clamping Covered networks Check to allow MSS clamping. Select the network interfaces that must be included in the zone configuration. General Settings / Inter-Zone Forwarding Allow forward to destination zones Select to allow or deny forwarding traffic to the configured destination zone. Allowed forward from source zones Select to allow or deny forwarding traffic from the configured source zone. Advanced Settings Covered devices List of raw network device names attached to this zone Covered subnets List of IP subnets attached to this zone. Restrict to address family Select IP Address family for configuring firewall for LAN zone from available options. Available Options  IPv4  IPv6  IPv4 and IPv6 Restrict Masquerading to given source subnets Enter the source subnet to which the masquerading must be restricted. Restricts Masquerading to given Enter the destination subnet to which the masquerading must be destination subnets restricted. Enable logging on this zone Check to enable logging of all the activities on the Zone. Conntrack Settings Allow "invalid" traffic Select to allow invalid traffic. More specifically, when selected, no rules can be installed that reject forwarded traffic with conntrack state equal to invalid. Disabled by default. Automatic helper assignment Automatically assign conntrack helpers for the zone. Conntrack Settings Extra source arguments Extra arguments passed directly to iptables for source classification rules. Extra destination arguments Extra arguments passed directly to iptables for destination classification rules X300 Series IoT Cellular Gateway User Guide 162

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216

11: Network
X300 Series IoT Cellular Gateway User Guide
162
Table 11-25
Firewall Zones Configuration (LAN)
Parameters
Description
General Settings
Name
Enter the name of the zone.
Input
Select to accept, reject or drop the inbound traffic to all the configured
zones.
Output
Select to accept, reject or drop the outbound traffic from all the
configured zones.
Forward
Select to accept, reject or drop the forwarded traffic from all the
configured zones.
Masquerading
Check to allow IP Masquerading (NAT).
MSS clamping
Check to allow MSS clamping.
Covered networks
Select the network interfaces that must be included in the zone
configuration.
General Settings / Inter-Zone Forwarding
Allow forward to destination
zones
Select to allow or deny forwarding traffic to the configured destination
zone.
Allowed forward from source
zones
Select to allow or deny forwarding traffic from the configured source
zone.
Advanced Settings
Covered devices
List of raw network device names attached to this zone
Covered subnets
List of IP subnets attached to this zone.
Restrict to address family
Select IP Address family for configuring firewall for LAN zone from
available options.
Available Options
IPv4
IPv6
IPv4 and IPv6
Restrict Masquerading to given
source subnets
Enter the source subnet to which the masquerading must be restricted.
Restricts Masquerading to given
destination subnets
Enter the destination subnet to which the masquerading must be
restricted.
Enable logging on this zone
Check to enable logging of all the activities on the Zone.
Conntrack Settings
Allow "invalid" traffic
Select to allow invalid traffic. More specifically, when selected, no rules
can be installed that reject forwarded traffic with conntrack state equal
to invalid.
Disabled by default.
Automatic helper assignment
Automatically assign conntrack helpers for the zone.
Conntrack Settings
Extra source arguments
Extra arguments passed directly to iptables for source classification
rules.
Extra destination arguments
Extra arguments passed directly to iptables for destination
classification rules