ZyXEL VMG3927-B50B User Guide - Page 196

Access Control: Add/Edit

Page 196 highlights

Chapter 16 Firewall The following table describes the labels in this screen. Table 80 Access Control: Add/Edit LABEL DESCRIPTION Filter Name Enter a descriptive name of up to 16 alphanumeric characters, not including spaces, underscores, and dashes. Order Select Source Device Source IP Address Select Destination Device Destination IP Address IP Type Select Service You must enter the filter name to add an ACL rule. This field is read-only if you are editing the ACL rule. Select the order of the ACL rule. Select the source device to which the ACL rule applies. If you select Specific IP Address, enter the source IP address in the field below. Enter the source IP address. Select the destination device to which the ACL rule applies. If you select Specific IP Address, enter the destiniation IP address in the field below. Enter the destination IP address. Select whether your IP type is IPv4 or IPv6. Select the transport layer protocol that defines your customized port from the drop-down list box. Protocol If you want to configure a customized protocol, select Specific Service. This field is displayed only when you select Specific Protocol in Select Protocol. Custom Source Port Custom Destination Port Policy Direction Enable Rate Limit Choose the IP port (TCP/UDP, TCP, UDP, ICMP, or ICMPv6) that defines your customized port from the drop-down list box. This field is displayed only when you select Specific Protocol in Select Protocol. Enter a single port number or the range of port numbers of the source. This field is displayed only when you select Specific Protocol in Select Protocol. Enter a single port number or the range of port numbers of the destination. Use the drop-down list box to select whether to discard (DROP), deny and send an ICMP destination-unreachable message to the sender of (REJECT) or allow the passage of (ACCEPT) packets that match this rule. Use the drop-down list box to select the direction of traffic to which this rule applies. Select this check box to set a limit on the upstream/downstream transmission rate for the specified protocol. Scheduler Rules Apply Cancel Specify how many packets per minute or second the transmission rate is. Select a schedule rule for this ACL rule form the drop-down list box. You can configure a new schedule rule by click Add New Rule. This will bring you to the Security > Scheduler Rules screen. Click Apply to save your changes. Click Cancel to exit this screen without saving. 16.5 DoS DoS (Denial of Service) attacks can flood your Internet connection with invalid packets and connection requests, using so much bandwidth and so many resources that Internet access becomes unavailable. VMG4927-B50A / VMG9827-B50A / VMG3927-B50B User's Guide 196

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337

Chapter 16 Firewall
VMG4927-B50A / VMG9827-B50A / VMG3927-B50B User’s Guide
196
The following table describes the labels in this screen.
16.5
DoS
DoS (Denial of Service) attacks can flood your Internet connection with invalid packets and connection
requests, using so much bandwidth and so many resources that Internet access becomes unavailable.
Table 80
Access Control: Add/Edit
LABEL
DESCRIPTION
Filter Name
Enter a descriptive name of up to 16 alphanumeric characters, not including spaces,
underscores, and dashes.
You must enter the filter name to add an ACL rule. This field is read-only if you are editing the
ACL rule.
Order
Select the order of the ACL rule.
Select Source
Device
Select the source device to which the ACL rule applies. If you select
Specific IP Address
, enter
the source IP address in the field below.
Source IP
Address
Enter the source IP address.
Select
Destination
Device
Select the destination device to which the ACL rule applies. If you select
Specific IP Address
,
enter the destiniation IP address in the field below.
Destination IP
Address
Enter the destination IP address.
IP Type
Select whether your IP type is
IPv4
or
IPv6
.
Select Service
Select the transport layer protocol that defines your customized port from the drop-down list
box.
If you want to configure a customized protocol, select
Specific Service
.
Protocol
This field is displayed only when you select
Specific Protocol
in
Select Protocol
.
Choose the IP port (
TCP/UDP
,
TCP
,
UDP
,
ICMP
, or
ICMPv6
) that defines your customized port from
the drop-down list box.
Custom Source
Port
This field is displayed only when you select
Specific Protocol
in
Select Protocol
.
Enter a single port number or the range of port numbers of the source.
Custom
Destination Port
This field is displayed only when you select
Specific Protocol
in
Select Protocol
.
Enter a single port number or the range of port numbers of the destination.
Policy
Use the drop-down list box to select whether to discard (
DROP
), deny and send an ICMP
destination-unreachable message to the sender of (
REJECT
) or allow the passage of (
ACCEPT
)
packets that match this rule.
Direction
Use the drop-down list box to select the direction of traffic to which this rule applies.
Enable Rate
Limit
Select this check box to set a limit on the upstream/downstream transmission rate for the
specified protocol.
Specify how many packets per minute or second the transmission rate is.
Scheduler Rules
Select a schedule rule for this ACL rule form the drop-down list box. You can configure a new
schedule rule by click
Add New Rule
. This will bring you to the
Security > Scheduler Rules
screen.
Apply
Click
Apply
to save your changes.
Cancel
Click
Cancel
to exit this screen without saving.