User guide
23
network.
FIREWALL CONFIGURATION
MAC/IP/PORT FILTERING
MAC/IP/Port filtering restricts connection parameters to limit the risk of intrusion
and defends against a wide array of common hacker attacks. MAC/IP/Port filtering
allows the unit to permit, deny or proxy traffic through its MAC addresses, IP
addresses and ports. The OUTDOOR AP/CPE allows you define a sequential list of
permit or deny filtering rules. This device tests ingress packets against the filter
rules one by one. A packet will be accepted as soon as it matches a permit rule, or
dropped as soon as it matches a deny rule. If no rules match, the packet is either
accepted or dropped depending on the default policy setting.
◆MAC/IP/Port Filtering — Enables or disables MAC/IP/Port Filtering.
(Default: Disable)
◆Default Policy — When MAC/IP/Port Filtering is enabled, the default policy will be
enabled. If you set the default policy to “Dropped”, all incoming packets that don’t
match the rules will be dropped. If the policy is set to "Accepted," all incoming
packets that don't match the rules are accepted. (Default: Dropped)
◆MAC Address — Specifies the MAC address to block or allow traffic from.
◆DIP — Destination IP Address. Specifies the destination IP address to block or
allow traffic from.
◆SIP — Source IP Address. Specifies the source IP address to block or allow traffic
from.
◆Protocol — Specifies the destination port type, TCP, UDP or ICMP.
◆Destination Port Range — Specifies the range of destination port to block traffic
from the specified LAN IP address from reaching.
◆Source Port Range — Specifies the range of source port to block traffic from the
specified LAN IP address from reaching.
◆Action — Specifies if traffic should be accepted or dropped. (Default: Accept)