Lantronix X300 Series X300 Series User Guide Rev B - Page 164

Traffic Rules, Network > Firewall > Traffic Rules

Page 164 highlights

11: Network Parameters Source MAC Address Source IP Address Source port External IP Address Enable NAT Loopback Extra arguments Description The rule will match incoming traffic from the specified source mac address. The rule will match incoming traffic from the specified source IP address. The rule will match incoming traffic from the specified source port number. Enter the external IP address of the gateway. Enable NAT loopback to allow one machine on the LAN network to access another machine on the LAN through the external IP address of the gateway Passes additional arguments to iptables. Should be used with care. Traffic Rules Network > Firewall > Traffic Rules Traffic rules are security policies that allow or restrict access to specific ports or hosts. Rule actions can be configured to accept, drop, or reject traffic. The following describes good practices for configuring traffic rules.  Block all traffic by default and explicitly enable specific traffic to known services.  Allow specific traffic, using the principle of least privilege.  Specify source IP address. It's okay to specify "any" if the service should be accessible to everyone on the Internet, otherwise, specify the source address.  Specify the destination IP address.  Specify the destination port. The value of the destination port should never be "any". Rule and zone matching The source and destination zones are tied to the target action.  If source and destination are given, the rule matches forwarded traffic.  If only source is given, the rule matches incoming traffic.  If only destination is given, the rule matches outgoing traffic.  If neither source nor destination are given, the rule defaults to an outgoing traffic rule. To view traffic rules, go to Network > Firewall > Traffic Rules. See Table 11-28 for a description. You can also enable or disable the traffic rule from this page view. Parameters Name Match Table 11-28 Firewall Zone Traffic Rules Description Displays the name of the traffic rule. Displays the details of the traffic rule configuration and the conditions in which the rule is applicable. X300 Series IoT Cellular Gateway User Guide 164

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216

11: Network
X300 Series IoT Cellular Gateway User Guide
164
Traffic Rules
Network > Firewall > Traffic Rules
Traffic rules are security policies that allow or restrict access to specific ports or hosts. Rule
actions can be configured to accept, drop, or reject traffic.
The following describes good practices for configuring traffic rules.
Block all traffic by default and explicitly enable specific traffic to known services.
Allow specific traffic, using the principle of least privilege.
Specify source IP address. It’s okay to specify “any” if the service should be accessible to
everyone on the Internet, otherwise, specify the source address.
Specify the destination IP address.
Specify the destination port. The value of the destination port should never be “any”.
Rule and zone matching
The source and destination zones are tied to the target action.
If source and destination are given, the rule matches forwarded traffic.
If only source is given, the rule matches incoming traffic.
If only destination is given, the rule matches outgoing traffic.
If neither source nor destination are given, the rule defaults to an outgoing traffic rule.
To view traffic rules, go to Network > Firewall > Traffic Rules. See
Table 11-28
for a description.
You can also enable or disable the traffic rule from this page view.
Table 11-28
Firewall Zone Traffic Rules
Source MAC Address
The rule will match incoming traffic from the specified source mac
address.
Source IP Address
The rule will match incoming traffic from the specified source IP
address.
Source port
The rule will match incoming traffic from the specified source port
number.
External IP Address
Enter the external IP address of the gateway.
Enable NAT Loopback
Enable NAT loopback to allow one machine on the LAN network to
access another machine on the LAN through the external IP address of
the gateway
Extra arguments
Passes additional arguments to iptables. Should be used with care.
Parameters
Description
Name
Displays the name of the traffic rule.
Match
Displays the details of the traffic rule configuration and the conditions in
which the rule is applicable.
Parameters
Description