ZyXEL SBG3300-N Series User Guide - Page 186

Table 77, Label, Description

Page 186 highlights

Chapter 14 Firewall The following table describes the labels in this screen. Table 77 Access Control: Add/Edit LABEL Enable Logging Filter Name DESCRIPTION Select this to turn on the ACL rule. Select this to have the Device log when it performs the ACL rule's selected action on the traffic traveling between the two zones. Enter a descriptive name of up to 16 alphanumeric characters, not including spaces, underscores, and dashes. Order Direction You must enter the filter name to add an ACL rule. This field is read-only if you are editing the ACL rule. Select the order of the ACL rule. Use the From and To drop-down list boxes to select the direction of travel of packets to which to apply this ACL rule. Select from which zone the packets come in and to which zone they are destined. For example, From LAN To WAN means packets traveling from a computer or subnet on the LAN zone to the WAN zone. From Any means traffic coming from the WAN, LAN, WLAN, DMZ, and EXTRA zones (but not the ROUTER zone). To Any (excl. Router) means traffic going to the WAN, LAN, WLAN, DMZ, and EXTRA zones (but not the ROUTER zone). EXTRA is a local zone to use as needed depending on your network topology. Select Source Device Source IP address Select Destination Device Destination IP address IP Type Select Service To ROUTER applies to traffic that destined for the Device. Use this to control which computers can manage the Device. Select the source device to which the ACL rule applies. If you select Specific IP Address, enter the source IP address in the field below. Enter the source IP address. Select the destination device to which the ACL rule applies. If you select Specific IP Address, enter the destiniation IP address in the field below. Enter the destination IP address. Select whether your IP type is IPv4 or IPv6. Select the transport layer protocol that defines your customized port from the drop-down list box. The specific protocol rule sets you add in the Security > Firewall > Service > Add screen display in this list. Protocol If you want to configure a customized protocol, select Specific Service. This field is displayed only when you select Specific Protocol in Select Protocol. Choose the IP port (TCP/UDP, TCP, UDP, ICMP, or ICMPv6) that defines your customized port from the drop-down list box. Custom Source This field is displayed only when you select Specific Protocol in Select Protocol. Port Enter a single port number or the range of port numbers of the source. Custom This field is displayed only when you select Specific Protocol in Select Protocol. Destination Port Enter a single port number or the range of port numbers of the destination. Policy Use the drop-down list box to select whether to discard (DROP), deny and send an ICMP destination-unreachable message to the sender of (REJECT) or allow the passage of (ACCEPT) packets that match this rule. 186 SBG3300-N Series User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315

Chapter 14 Firewall
SBG3300-N Series User’s Guide
186
The following table describes the labels in this screen.
Table 77
Access Control: Add/Edit
LABEL
DESCRIPTION
Enable
Select this to turn on the ACL rule.
Logging
Select this to have the Device log when it performs the ACL rule’s selected action on the
traffic traveling between the two zones.
Filter Name
Enter a descriptive name of up to 16 alphanumeric characters, not including spaces,
underscores, and dashes.
You must enter the filter name to add an ACL rule. This field is read-only if you are editing
the ACL rule.
Order
Select the order of the ACL rule.
Direction
Use the
From
and
To
drop-down list boxes to select the direction of travel of packets to
which to apply this ACL rule. Select from which zone the packets come in and to which zone
they are destined. For example,
From LAN To WAN
means packets traveling from a
computer or subnet on the LAN zone to the WAN zone.
From Any
means traffic coming from the WAN, LAN, WLAN, DMZ, and EXTRA zones (but
not the
ROUTER
zone).
To Any (excl. Router)
means traffic going to the WAN, LAN, WLAN, DMZ, and EXTRA
zones (but not the
ROUTER
zone).
EXTRA
is a local zone to use as needed depending on your network topology.
To ROUTER
applies to traffic that destined for the Device. Use this to control which
computers can manage the Device.
Select Source
Device
Select the source device to which the ACL rule applies. If you select
Specific IP Address
,
enter the source IP address in the field below.
Source IP
address
Enter the source IP address.
Select
Destination
Device
Select the destination device to which the ACL rule applies. If you select
Specific IP
Address
, enter the destiniation IP address in the field below.
Destination IP
address
Enter the destination IP address.
IP Type
Select whether your IP type is
IPv4
or
IPv6
.
Select Service
Select the transport layer protocol that defines your customized port from the drop-down
list box. The specific protocol rule sets you add in the
Security > Firewall > Service >
Add
screen display in this list.
If you want to configure a customized protocol, select
Specific Service
.
Protocol
This field is displayed only when you select
Specific Protocol
in
Select Protocol
.
Choose the IP port (
TCP/UDP
,
TCP
,
UDP
,
ICMP
, or
ICMPv6
) that defines your customized
port from the drop-down list box.
Custom Source
Port
This field is displayed only when you select
Specific Protocol
in
Select Protocol
.
Enter a single port number or the range of port numbers of the source.
Custom
Destination Port
This field is displayed only when you select
Specific Protocol
in
Select Protocol
.
Enter a single port number or the range of port numbers of the destination.
Policy
Use the drop-down list box to select whether to discard (
DROP
), deny and send an ICMP
destination-unreachable message to the sender of (
REJECT
) or allow the passage of
(
ACCEPT
) packets that match this rule.