Specifications
3-8 WS2000 Wireless Switch System Reference Guide
3.3.2 The Access Exception Area
In the lower half of the screen, the access is controlled by specific rules that control the protocols that are
allowed or denied between the two subnets or the subnet and the WAN. All rules are added to the exception
table. The Allow or Deny menu item applies to all entries in the table. There are two ways to add entries
(access rules) to the table. The first is by checking the check boxes for specific protocols (on the left). The
second is by adding rules for specific port numbers by clicking the Add button and filling in the necessary
information. A combination of the two methods can be used to add multiple entries to the table.
You can allow or deny communication through specific protocols using the following process:
1. Click in a cell of the table that represents the subnet-to-subnet (or subnet-to-WAN) relationship to define.
All access rules (if any are defined) appear in the table in the lower-half of the screen.
2. Use the pull-down menu above the list to Allow or Deny all the entries specified in the exception table.
You cannot allow some protocols (or ports) and deny others.
3. Enable or disable logging of firewall access by using the Enable logging check box. When enabled, a log
entry is created every time a packet is denied by the action “Deny”. A log entry is created once per
session for packets that match the firewall rules when the action is “Allow”.
4. From the list of check boxes on the left side, select those protocols to allow or deny. The protocols are
automatically added to the table with the relevant Name, Transport, Start Port, and End Port information.
The available protocols are shown in the table below.
You can make changes to the information automatically filled into the table; however, note that
changes in the selected transport type can change the port numbers that can be specified in the
table.
5. To add an access rule for a protocol, port, or transport other than the ones available from the check boxes
on the left, click the Add button. An empty row is added to the table.
Protocol
Transport,
Port Used
Description
HTTP TCP, 80 Hypertext Transfer Protocol (HTTP) is the protocol for transferring files on the World
Wide Web. HTTP is an application protocol that runs on top of the TCP/IP suite of
protocols, the foundation protocols for the Internet.
TELNET TCP, 23 TELNET is the terminal emulation protocol of TCP/IP. TELNET uses TCP to achieve a
virtual connection between server and client, then negotiates options on both sides of
the connection.
FTP TCP, 21 File Transfer Protocol (FTP) is an application protocol that uses the Internet’s TCP/IP
protocols. FTP provides a simple and efficient way to exchange files between
computers on the Internet.
SMTP TCP, 25 Simple Mail Transfer Protocol (SMTP) is a TCP/IP protocol used for sending and
receiving email. Due to its limited ability to queue messages at the receiving end,
SMTP is often used with POP3 or IMAP. SMTP sends the email, and then POP3 or IMAP
receives the email.
POP TCP, 109:110 Post Office Protocol (POP3) is a TCP/IP protocol intended to permit a workstation to
dynamically access a maildrop on a server host. A workstation uses POP3 to retrieve
email that the server is holding for it.
DNS TCP+UDP, 53 Domain Name Service (DNS) protocol searches for resources using a database that is
distributed among different name servers.