Installation manual

© Microhard Systems Inc. 83
4.0 Configuration
Image 4-41: Firewall > Rules
4.6.3 Firewall > Rules
Once the firewall is turned on, rules configuration can be used to define specific rules on how
local and remote devices access different ports and services. MAC List and IP List are used for
general access, and are applied before rules are processed.
Rule Name
The rule name is used to identify the created rule. Each rule must
have a unique name and up to 10 characters can be used.
Values (10 Chars)
characters
Action
The Action is used to define how the rule handles the connection
request.
ACCEPT will allow a connection, while REJECT (error) and DROP
(quietly dropped), will refuse connections.
This is configured based on how the WAN/4G Request and LAN
to WAN/4G Access Control are configured in the previous
menus.
Values (selection)
ACCEPT
DROP
REJECT
Source
Select the zone which is to be the source of the data traffic. WAN
applies to the WAN RJ45 connection, and 4G refers to the
connection to the cellular carrier. The LAN refers to local
connections on the VIP4G (Ethernet/WiFi).
Values
LAN
WAN
4G
None