
90
Packet Filter
Packet ltering enables you to congure your router to block specic internal / external users (IP
address) from Internet access, or disable specic service requests (Port number) to / from the
Internet. This conguration program allows you to set up different lter rules for different users
based on their IP addresses or their network Port number. The relationship among all lters is “or”
operation, which means that the router checks these different lter rules one by one, starting from
the rst rule. As long as one of the rules is satised, the specied action will be taken.
Rule Name: User dened description for entry identication. The maximum name length is 32
characters, and then can choose an application that they want from the listbox.
Internal IP Address / External IP Address: This is the Address-Filter used to allow or block trafc
to/rom particular IP address(es). Input the range you want to lter out. If you leave these four elds
empty or enter 0.0.0.0, it means any IP address.
Protocol: Specify the packet type (TCP, UDP, TCP/UDP) that the rule applies to. Select TCP if
you wish to search for the connection-based application service on the remote server using the
port number. Or select UDP if you want to search for the connectionless application service on the
remote server using the port number.
Action: If a packet matches this lter rule, forward (allows the packets to pass) or drop (disallow
the packets to pass) this packet.
Internal Port: This Port or Port Range denes the ports allowed to be used by the Remote/WAN
to connect to the application. Default is set the range from 1 to 65535. It is recommended that this
option be congured by an advanced user.
External Port: This is the Port or Port Range that denes the application.
Direction: Determine whether the rule is for outgoing packets or for incoming packets.
Time Schedule: It is self-dened time period. You may specify a time schedule for your
prioritization policy. For setup and detail, refer to Time Schedule section.
Log: Check the checking box if you wish to generate logs when the ler rule is applied to a packet.
Comentarios a estos manuales