User`s guide

Chapter 17 Firewall
NBG6616 User’s Guide
135
See Appendix C on page 228 for commonly used services and port numbers.
Source IP Address Enter the IP address of the computer that initializes traffic for the application or service.
The NBG6616 applies the firewall rule to traffic initiating from this computer.
Protocol Select the protocol (TCP, UDP or ICMP) used to transport the packets for which you want
to apply the firewall rule.
Dest Port Range Enter the port number/range of the destination that define the traffic type, for example
TCP port 80 defines web traffic.
Source Port
Range
Enter the port number/range of the source that define the traffic type, for example TCP
port 80 defines web traffic.
Add Rule Click Add to save the firewall rule.
Firewall Rule
# This is your firewall rule number. The ordering of your rules is important as rules are
applied in turn.
Service Name This is a name that identifies or describes the firewall rule.
MAC address This is the MAC address of the computer for which the firewall rule applies.
Dest IP This is the IP address of the computer to which traffic for the application or service is
entering.
Source IP This is the IP address of the computer from which traffic for the application or service is
initialized.
Protocol This is the protocol (TCP, UDP or ICMP) used to transport the packets for which you want
to apply the firewall rule.
Dest Port Range This is the port number/range of the destination that define the traffic type, for example
TCP port 80 defines web traffic.
Source Port
Range
This is the port number/range of the source that define the traffic type, for example TCP
port 80 defines web traffic.
Action DROP - Traffic matching the conditions of the firewall rule are stopped.
Delete Click Delete to remove the firewall rule.
Cancel Click Cancel to start configuring this screen again.
Table 58 Security > Firewall > Services (continued)
LABEL DESCRIPTION