User`s guide
Chapter 17 Firewall
NBG5715 User’s Guide
123
See Appendix F on page 247 for commonly used services and port numbers.
Source IP Address Enter the IP address of the computer that initializes traffic for the application or
service.
The NBG5715 applies the firewall rule to traffic initiating from this computer.
Protocol Select the protocol (ALL,TCP, UDP or BOTH) used to transport the packets for
which you want to apply the firewall rule.
Dest Port Range Enter the port number/range of the destination that define the traffic type, for
example TCP port 80 defines web traffic.
Source Port
Range
Enter the port number/range of the source that define the traffic type, for
example TCP port 80 defines web traffic.
Add Rule Click Add to save the firewall rule.
Firewall Rule
# This is your firewall rule number. The ordering of your rules is important as rules
are applied in turn.
Service Name This is a name that identifies or describes the firewall rule.
MAC address This is the MAC address of the computer for which the firewall rule applies.
Dest IP This is the IP address of the computer to which traffic for the application or
service is entering.
Source IP This is the IP address of the computer from which traffic for the application or
service is initialized.
Protocol This is the protocol (ALL,TCP, UDP or BOTH) used to transport the packets for
which you want to apply the firewall rule.
Dest Port Range This is the port number/range of the destination that define the traffic type, for
example TCP port 80 defines web traffic.
Source Port
Range
This is the port number/range of the source that define the traffic type, for
example TCP port 80 defines web traffic.
Action DROP - Traffic matching the conditions of the firewall rule are stopped.
Delete Click Delete to remove the firewall rule.
Reset Click Reset to start configuring this screen again.
Table 52 Security > Firewall > Services (continued)
LABEL DESCRIPTION