User manual
- BaseWall VPN 6000 user manual -
13 Netview
The Netview is the central screen of the BaseWall VPN 6000. It shows all the
networks and computers that the firewall knows something about. From this
screen it is possible to view and change the rights of all these parts on other
parts of this virtual “world”.
13.1 Policies
After selecting a policy. Some parts of the network will change color.
➢ Red: This is the source of the policy.
➢ Green: This is the destination of the policy.
➢ Orange: This is both source and destination of the policy.
A policy handles the traffic initiated by the red part of the network towards the
green part. This is a service of the Green part towards the network. But some
services like a file share on a normal PC are not intended for everybody.
Some policies can span multiple parts of the network like multiple LAN
segments and the Internet. This can reduce the number of necessary policies
needed to allow traffic to multiple parts of the network.
When there is no policy all traffic through the firewall is blocked. But there can
still be traffic through a connection made from the other side. The connection
track software makes it possible to identify an established connection so there
is no need for any rights of the Internet on the LAN but the LAN can still receive
requested web-pages.
13.2 Adding or removing ports
First select the policy of interest. This can be done in a couple of ways:
➢ Select the correct name in the drop-down menu on top of the page. Then
click on the “ports” button.
➢ Click on a network or host and a menu will open. It shows in sub menu's the
policies that affect traffic originated “from” or requested “to” this part of the
network.
➢ Open the “Policy info” screen in the same menu and click on the policy
names there.
Inside the newly opened “Protocols & ports” screen is an overview of protocols
and ports that currently are allowed (or sometimes explicitly denied ports) by
this policy.
To add a protocol insert it's name or protocol number into the field under the
possible existing protocols.
To remove a protocol and deny traffic by this policy click on the protocol name
twice, it will first show red to prevent unintended deletions.
Add port numbers behind “tcp”, “upd” or “icmp” protocols restricts traffic to
only the listed ports. Other protocols don't use ports. When the ports list is
Page 63 / 79