User's Manual

Chapter 12 Firewall
B222s User’s Guide
113
3 Does a rule t hat allows I nt ernet users access t o resources on the LAN creat e a security
vulnerability? For exam ple, if FTP port s (TCP 20, 21) are allowed from the I nt ernet t o t he LAN,
I nt ernet user s m ay be able t o connect t o com put ers wit h running FTP servers.
4 Does t his rule conflict with any existing rules?
Once t hese questions have been answered, adding rules is sim ply a m atter of ent ering the
inform ation int o t he correct fields in t he web configurator screens.