ZyXEL ARMOR G1 User Guide - Page 128

IPv6 Firewall-Add Rule Screen, Settings, Firewall, IPv6 Firewall, Add Rule, LABEL, DESCRIPTION

Page 128 highlights

Chapter 12 Security The following table describes the labels in this screen. Table 44 Settings > Firewall > IPv6 Firewall LABEL DESCRIPTION Configuration Simple Security Rule Status Action Select Enable to enabled simple security on your NBG6818. Select Enable to enabled rule status on your NBG6818. Select DROP to silently discard the packets which meet the firewall rules. The others are accepted. Firewall Rule No. Service Name MAC Address Dest IP Address Source IP Address Dest Port Range Source Port Range Protocol Actions Select ACCEPT to allow the passage of the packets which meet the firewall rules. The others are blocked. This is your firewall rule number. The ordering of your rules is important as rules are applied in turn. This is a name that identifies or describes the firewall rule. This is the MAC address of the computer for which the firewall rule applies. This is the IP address of the computer to which traffic for the application or service is entering. This is the IP address of the computer to which traffic for the application or service is initialized. This is the port number/range of the destination that defines the traffic type, for example TCP port 80 defines web traffic. This is the port number/range of the source that defines the traffic type, for example TCP port 80 defines web traffic. This is the protocol (TCP, UDP or ICMPv6) used to transport the packets for which you want to apply the firewall rule. Click to remove the firewall rule. Apply Cancel Click to edit the firewall rule. Click Apply to save the settings. Click Cancel to restore your previously saved settings. 12.3.1 IPv6 Firewall-Add Rule Screen Use this screen to configure IPv4 firewall rule. Click Settings > Firewall > IPv6 Firewall > Add Rule to open the following screen. NBG6818 User's Guide 128

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183

Chapter 12 Security
NBG6818 User’s Guide
128
The following table describes the labels in this screen.
12.3.1
IPv6 Firewall-Add Rule Screen
Use this screen to configure IPv4 firewall rule. Click
Settings
>
Firewall
>
IPv6 Firewall
>
Add Rule
to open
the following screen.
Table 44
Settings > Firewall > IPv6 Firewall
LABEL
DESCRIPTION
Configuration
Simple Security
Select
Enable
to enabled simple security on your NBG6818.
Rule Status
Select
Enable
to enabled rule status on your NBG6818.
Action
Select
DROP
to silently discard the packets which meet the firewall rules. The others are
accepted.
Select
ACCEPT
to allow the passage of the packets which meet the firewall rules. The others
are blocked.
Firewall Rule
No.
This is your firewall rule number. The ordering of your rules is important as rules are applied in
turn.
Service Name
This is a name that identifies or describes the firewall rule.
MAC Address
This is the MAC address of the computer for which the firewall rule applies.
Dest IP Address
This is the IP address of the computer to which traffic for the application or service is
entering.
Source IP Address
This is the IP address of the computer to which traffic for the application or service is
initialized.
Dest Port Range
This is the port number/range of the destination that defines the traffic type, for example
TCP port 80 defines web traffic.
Source Port Range
This is the port number/range of the source that defines the traffic type, for example TCP
port 80 defines web traffic.
Protocol
This is the protocol (
TCP
,
UDP
or
ICMPv6
) used to transport the packets for which you want to
apply the firewall rule.
Actions
Click
to remove the firewall rule.
Click
to edit the firewall rule.
Apply
Click
Apply
to save the settings.
Cancel
Click
Cancel
to restore your previously saved settings.