8.In the Source Port field, type the port that is the origin of the traffic. Type ANY if the source port does not matter.
9.From the Action drop‐down list, select the action to perform on the traffic. You can allow the traffic to be accepted, rejected, logged or dropped. Accepted packets are allowed to continue through the firewall. Dropped packets are removed and no further processing is performed on them. Rejected packets are dropped, and an error message is sent to the source of the packet. Logged packets are logged to the system's main log file with the rule's name prepended as an identifier (viewable from the Statistics page). Log rules do not affect the packet's fate.
10.The Direction is locked to OUTGOING while using the Outbound Traffic wizard.
11.From the Protocol drop‐down list, select the protocol of the traffic that is being filtered.
Advanced Settings
The Firewall's Advanced Settings mode allows users to manipulate DNAT, SNAT, and Filter rules directly. DNAT rules can manipulate the destination address and port of a packet; similarly SNAT rules can manipulate the source address and port of a packet.
Filter rules apply an ACCEPT, REJECT, DROP, or LOG action to a packet. DNAT, SNAT, and Filter rules can be associated if they are named the same. This association is recognized within the Port Forwarding and Outbound Traffic wizards accessed from the Normal Settings mode, and allows the associated rules to be viewed and edited as a series.
Setting up static routes
To set up a manually configured mapping of an IP address to a next‐hop destination for data packets:
1.From Firewall, select Static Routes.
2.In the pane that appears, click Add Route.
3.In the Name field, type the name of the route.
4.In the Address field, type the remote network IP address of the remote location.
5.In the Mask field, type the network mask that is assigned on the remote location.
6.In the Gateway field, type the IP address of the routing device that supports the remote IP Network.
7.Click Finish.
Using the Router’s Web Interface | 23 |