User Manual
Table Of Contents
- ARMOR G5
 - User’s Guide
- Introduction
 - Wizard
 - The Web Configurator
 - NBG7815 Modes
 - Standard Mode
 - Bridge Mode
 - Tutorials
- 7.1 Overview
 - 7.2 Run a Speed Test
 - 7.3 Configure the NBG7815’s WiFi Networks
 - 7.4 Enable or Disable a WiFi Network
 - 7.5 Add Clients to a Profile
 - 7.6 Set a Profile’s WiFi Schedule
 - 7.7 Pause or Resume Internet Access on a Profile
 - 7.8 Turn on or off the NBG7815’s LED (Light)
 - 7.9 Change Your NBG7815 Operating Mode
 - 7.10 Configure a Port Forwarding Rule
 
 
 - Technical Reference
- Applications
 - WAN
 - Wireless LAN
 - LAN
 - Security
 - System
 - Troubleshooting
 - Customer Support
 - Setting Up Your Computer’s IP Address
 - Common Services
 - Legal Information
 - Index
 
 
Chapter 12 Security
NBG7815 User’s Guide
128
Figure 72 Settings > Firewall > IPv4 Firewall 
The following table describes the labels in this screen.
Table 42 Settings > Firewall > IPv4 Firewall 
LABEL DESCRIPTION
ICMP Internet Control Message Protocol is a message control and error-reporting protocol between 
a host server and a gateway to the Internet. ICMP uses Internet Protocol (IP) datagrams, but 
the messages are processed by the TCP/IP software and directly apparent to the application 
user. 
Respond to Ping 
on
The NBG7815 will not respond to any incoming Ping requests when None is selected. Select 
LAN to reply to incoming LAN Ping requests. Select WAN to reply to incoming WAN Ping 
requests. Otherwise select LAN&WAN to reply to all incoming LAN and WAN Ping requests. 
Firewall Setup
Enable Firewall Select Enable to activate the firewall. The NBG7815 performs access control and protects 
against Denial of Service (DoS) attacks when the firewall is activated.
Enable Firewall Rule
Filter Rule Select Enable to activate the firewall rules that you define (see Add Firewall Rule below).
Actions Select Drop to silently discard the packets which meet the firewall rules. The others are 
accepted.
Select Accept to allow the passage of the packets which meet the firewall rules. The others 
are blocked.
Firewall Rule
No. This is your firewall rule number. The ordering of your rules is important as rules are applied in 
turn. 
Service Name This is a name that identifies or describes the firewall rule.
MAC address This is the MAC address of the computer for which the firewall rule applies.










