ZyXEL LTE5121 User Guide - Page 125

Firewall

Page 125 highlights

CHAPTER 12 Firewall 12.1 Overview Use the LTE Device firewall screens to enable and configure the firewall that protects your LTE Device and network from attacks by hackers on the Internet and control access to it. By default the firewall: • Allows traffic that originates from your LAN computers to go to all other networks. • Blocks traffic that originates on other networks from going to the LAN. The following figure illustrates the default firewall action. User A can initiate an IM (Instant Messaging) session from the LAN to the WAN (1). Return traffic for this session is also allowed (2). However other traffic initiated from the WAN is blocked (3 and 4). Figure 84 Default Firewall Action LAN 1 A 2 WAN 3 4 12.1.1 What You Can Do in this Chapter • Use the General screen to enable or disable the LTE Device's firewall and set the security level (Section 12.2 on page 126). • Use the Services screen to view the configured firewall rules and add, edit or remove a firewall rule (Section 12.3 on page 127). • Use the Access Control screen to view and configure incoming/outgoing filtering rules (Section 12.4 on page 129). • Use the DoS screen to enable or disable Denial of Service (DoS) protection (Section 12.5 on page 131). LTE-5121 User's Guide 125

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234

LTE-5121 User’s Guide
125
C
HAPTER
12
Firewall
12.1
Overview
Use the LTE Device firewall screens to enable and configure the firewall that protects your LTE
Device and network from attacks by hackers on the Internet and control access to it. By default the
firewall:
Allows traffic that originates from your LAN computers to go to all other networks.
Blocks traffic that originates on other networks from going to the LAN.
The following figure illustrates the default firewall action. User
A
can initiate an IM (Instant
Messaging) session from the LAN to the WAN (
1
). Return traffic for this session is also allowed (
2
).
However other traffic initiated from the WAN is blocked (
3
and
4
).
Figure 84
Default Firewall Action
12.1.1
What You Can Do in this Chapter
Use the
General
screen to enable or disable the LTE Device’s firewall and set the security level
(
Section 12.2 on page 126
).
Use the
Services
screen to view the configured firewall rules and add, edit or remove a firewall
rule (
Section 12.3 on page 127
).
Use the
Access Control
screen to view and configure incoming/outgoing filtering rules (
Section
12.4 on page 129
).
Use the
DoS
screen to enable or disable Denial of Service (DoS) protection (
Section 12.5 on
page 131
).
WAN
LAN
3
4
1
2
A