User guide

23
network.
FIREWALL CONFIGURATION
MAC/IP/PORT FILTERING
MAC/IP/Port filtering restricts connection parameters to limit the risk of intrusion
and defends against a wide array of common hacker attacks. MAC/IP/Port filtering
allows the unit to permit, deny or proxy traffic through its MAC addresses, IP
addresses and ports. The OUTDOOR AP/CPE allows you define a sequential list of
permit or deny filtering rules. This device tests ingress packets against the filter
rules one by one. A packet will be accepted as soon as it matches a permit rule, or
dropped as soon as it matches a deny rule. If no rules match, the packet is either
accepted or dropped depending on the default policy setting.
MAC/IP/Port Filtering Enables or disables MAC/IP/Port Filtering.
(Default: Disable)
Default Policy When MAC/IP/Port Filtering is enabled, the default policy will be
enabled. If you set the default policy to “Dropped”, all incoming packets that don’t
match the rules will be dropped. If the policy is set to "Accepted," all incoming
packets that don't match the rules are accepted. (Default: Dropped)
MAC Address Specifies the MAC address to block or allow traffic from.
DIP Destination IP Address. Specifies the destination IP address to block or
allow traffic from.
SIP Source IP Address. Specifies the source IP address to block or allow traffic
from.
Protocol Specifies the destination port type, TCP, UDP or ICMP.
Destination Port Range Specifies the range of destination port to block traffic
from the specified LAN IP address from reaching.
Source Port Range Specifies the range of source port to block traffic from the
specified LAN IP address from reaching.
Action Specifies if traffic should be accepted or dropped. (Default: Accept)