User's Guide

Chapter 16: Controlling Access to the ER-1000
TR0190 Rev. A1 100
16 Controlling Access to the EL-500
The EL-500 supports the following features for restricting access to it, restricting inter-client
device communication, and shielding client devices from an external network:
Firewall
Client-to-client communication blocking
Gateway firewall
It further supports controlled network access by client devices through MAC address black
lists.
The firewalls are disabled and client-to-client blocking is not possible when
operating in bridge mode.
16.1 Firewall
The EL-500 has a firewall that blocks certain types of traffic destined for the EL-500. This
prevents client devices attached to an EL-500 and devices on the LAN which the EL-500 is
attached to from connecting to it.
The default firewall rules only affect packets destined for the EL-500, and have no
effect on packets forwarded by the device. The firewall should typically be enabled
on all EL-500s since it prevents undesired access them.
By default, the ports listed in Table 12 are set to be allowed for connection to the EL-500.
Function Port(s) Type Protocol
SSH 22 Source & destination TCP
DNS 53 Source & destination UDP
DHCP 67, 68 Destination UDP
HTTP 80 Destination TCP
SNMP 161 Source & destination UDP
HTTPS 443 Destination TCP
HTTP redirect (if splash pages are
enabled)
3060 Destination TCP
Roaming support
7202 – 7205,
7207
Destination UDP
OnRamp 20123 Source & destination UDP
Table 12. Source and destination ports allowed by default
BRIDGE