Tripp Lite B097048INT Owners Manual for B093- B097- and B098-Series Console Se - Page 101

Firewall Rules

Page 101 highlights

5. Firewall, Failover and OOB Access 5.8.4 Firewall Rules Firewall rules can be used to block or allow traffic through an interface based on port number, the source and/or destination IP address (range), the direction (ingress or egress) and the protocol. This can be used to allow custom on-box services, or block traffic based on policy. To set up a firewall rule: • Navigate to the System: Firewall page and click on the Firewall Rules tab. Note: Prior to firmware version 3.4, this tab was labeled Port Rules and fewer firewall rules could be configured. • Click New Firewall Rule. • Fill in the following fields: Name Name the rule. This name should describe the firewall rule policy being implemented (e.g., block ftp, Allow Tony). Interface Select the interface the firewall rule will be applied to (i.e. Any, Dial-Out/Cellular, VPN, Network Interface, Dial-in etc). Port Range Specify the Port or range of Ports (e.g. 1000 - 1500) the rule will apply to. This may be left blank. Source MAC Address Specify the source MAC address to be matched. This may be left blank. MAC addresses use the format XX:XX:XX:XX:XX:XX, where XX are hex digits. Source Address Range Specify the source IP address (or address range) to match. IP address ranges use the format ip/ netmask (where netmask is in bits 1-32). This may be left blank. Destination Range Specify the destination IP address/range to match. IP address ranges use the format ip/netmask (where netmask is in bits 1-32). This may be left blank. 101

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288

101
5. Firewall, Failover and OOB Access
5.8.4 Firewall Rules
Firewall rules can be used to block or allow traffic through an interface based on port number, the source and/or destination IP
address (range), the direction (ingress or egress) and the protocol. This can be used to allow custom on-box services, or block
traffic based on policy.
To set up a firewall rule:
• Navigate to the
System: Firewall
page and click on the
Firewall Rules
tab.
Note:
Prior to firmware version 3.4, this tab was labeled Port Rules and fewer firewall rules could be configured.
• Click
New Firewall Rule
.
• Fill in the following fields:
Name
Name the rule. This name should describe the firewall rule policy being implemented (e.g.,
block
ftp, Allow Tony
).
Interface
Select the interface the firewall rule will be applied to (i.e.
Any, Dial-Out/Cellular, VPN, Network
Interface, Dial-in
etc).
Port Range
Specify the Port or range of Ports (e.g. 1000 – 1500) the rule will apply to. This may be left blank.
Source MAC Address
Specify the source MAC address to be matched. This may be left blank. MAC addresses use the
format XX:XX:XX:XX:XX:XX, where XX are hex digits.
Source Address Range
Specify the source IP address (or address range) to match. IP address ranges use the format ip/
netmask (where netmask is in bits 1-32). This may be left blank.
Destination Range
Specify the destination IP address/range to match. IP address ranges use the format ip/netmask
(where netmask is in bits 1-32). This may be left blank.