ZyXEL NBG6716 User Guide - Page 147

Table 58, Label, Description

Page 147 highlights

Chapter 17 Firewall Table 58 Security > Firewall > Services (continued) LABEL DESCRIPTION Source IP Address Enter the IP address of the computer that initializes traffic for the application or service. Protocol Dest Port Range Source Port Range Add Rule Firewall Rule # Service Name MAC address Dest IP Source IP Protocol Dest Port Range Source Port Range Action Delete Cancel The NBG6716 applies the firewall rule to traffic initiating from this computer. Select the protocol (TCP, UDP or ICMP) used to transport the packets for which you want to apply the firewall rule. Enter the port number/range of the destination that define the traffic type, for example TCP port 80 defines web traffic. Enter the port number/range of the source that define the traffic type, for example TCP port 80 defines web traffic. Click Add to save the firewall rule. This is your firewall rule number. The ordering of your rules is important as rules are applied in turn. This is a name that identifies or describes the firewall rule. This is the MAC address of the computer for which the firewall rule applies. This is the IP address of the computer to which traffic for the application or service is entering. This is the IP address of the computer from which traffic for the application or service is initialized. This is the protocol (TCP, UDP or ICMP) used to transport the packets for which you want to apply the firewall rule. This is the port number/range of the destination that define the traffic type, for example TCP port 80 defines web traffic. This is the port number/range of the source that define the traffic type, for example TCP port 80 defines web traffic. DROP - Traffic matching the conditions of the firewall rule are stopped. Click Delete to remove the firewall rule. Click Cancel to start configuring this screen again. See Appendix C on page 237 for commonly used services and port numbers. NBG6716 User's Guide 147

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250

Chapter 17 Firewall
NBG6716 User’s Guide
147
See
Appendix C on page 237
for commonly used services and port numbers.
Source IP Address
Enter the IP address of the computer that initializes traffic for the application or service.
The NBG6716 applies the firewall rule to traffic initiating from this computer.
Protocol
Select the protocol (
TCP
,
UDP
or
ICMP
) used to transport the packets for which you want
to apply the firewall rule.
Dest Port Range
Enter the port number/range of the destination that define the traffic type, for example
TCP port 80 defines web traffic.
Source Port
Range
Enter the port number/range of the source that define the traffic type, for example TCP
port 80 defines web traffic.
Add Rule
Click
Add
to save the firewall rule.
Firewall Rule
#
This is your firewall rule number. The ordering of your rules is important as rules are
applied in turn.
Service Name
This is a name that identifies or describes the firewall rule.
MAC address
This is the MAC address of the computer for which the firewall rule applies.
Dest IP
This is the IP address of the computer to which traffic for the application or service is
entering.
Source IP
This is the IP address of the computer from which traffic for the application or service is
initialized.
Protocol
This is the protocol (
TCP
,
UDP
or
ICMP
) used to transport the packets for which you want
to apply the firewall rule.
Dest Port Range
This is the port number/range of the destination that define the traffic type, for example
TCP port 80 defines web traffic.
Source Port
Range
This is the port number/range of the source that define the traffic type, for example TCP
port 80 defines web traffic.
Action
DROP
- Traffic matching the conditions of the firewall rule are stopped.
Delete
Click
Delete
to remove the firewall rule.
Cancel
Click
Cancel
to start configuring this screen again.
Table 58
Security > Firewall > Services (continued)
LABEL
DESCRIPTION