Firewall
Dlink DRO-210i User Guide 39
Protocol Select from this drop-down menu the application. This is the
equivalent of entering the correct Transport Type and the port
number corresponding to a given application.
Port Range Enter the range of port numbers for which the current policy
rules will be applied. If you have only one port number to
enter, enter it in both fields.
Direction This is the direction (Inbound) of network traffic for which the
current policy entry will be applied.
After entering all the information press the Apply button and the Service Permitted
Rule table will now be displayed at the bottom of the page. Press the Delete button to
delete the corresponding entry.
IP Permitted Rules
In Service Permitted Rule table, click the icon under I P Permitted Rule column to
configure Permitted IP Rules.
Add Permitted IP Rule
Service Displays the Protocol and Port for wh ich Permitted IP Rule is
being configured.
Source IP Select Any or IP Range. If IP Range is selected, the
administrator can specify a range of IP addresses that the IP
filter policy will be applied to. If you have only one IP address
that you want to filter, enter this address in both the From and
To fields.
Destination IP Select Any or IP Range. If IP Range is selected, the
administrator can specify a range of IP addresses that the IP
filter policy will be applied to. If you have only one IP address
that you want to filter, enter this address in both the From and
To fields.
Status Select Enable or Disable to activate or deactivate the
configured entry.
After entering all the information press the Apply button and the Permitted IP Table
will now be displayed at the bottom of the page. Press View button for viewing and
Delete button for deleting the corresponding entry.
7.1.4 Outbound Policies
The traffic flowing from Trusted to UnTrusted network is the Outbound traffic. By
default, all network traffic which flows from Trusted network to UnTrusted network is
allowed. Port Filter rules can be added to block specific traffic.
Web UI