Specifications

Examples of IP Filter Profiles
72 AVM Access Server – 5 AVM Access Server Concepts and Functional Principles
Inactive Telnet connection set-up Accept Activate this rule if you want
to allow Telnet access to
your computers (for remote
administration of UNIX
computers, for example).
Inactive SSH connection set-up Accept Activate this rule if you want
to allow SSH (Secure Shell)
access to your computers
(for remote administration of
UNIX computers, for
example).
Inactive NetBIOS Drop This ensures that local
Windows resources (shared
drives, printers etc.) are not
accessible from outside.
Active All packets Drop All packets that have not
been accepted or dropped
above this point are treated
as intrusion attempts. These
may be tunnelled packets
(i.e. IP-over-IP encapsulated
packets), or routing
protocols, such as OSPF or
EGP packets. These packets
would also be dropped by
the filter profile’s default
action, of course. This rule is
nonetheless included so
that you can activate its log
option if you want to trace an
attack on your firewall.
Status Service/Source/Destination Action Remarks