Configuring Firewall Settings

 

 

 

 

 

 

 

 

they are initiated.

 

 

 

 

 

 

 

 

 

 

 

 

Max Single Host

 

Sets the percentage of concurrent IP sessions

 

 

Conn.:

 

that can originate from a single computer. This

 

 

 

 

percentage should take into account the number

 

 

 

 

of hosts on the LAN.

 

 

 

 

 

 

 

 

 

 

 

 

Log Destination:

 

Specifies how attempted violations of the firewall

 

 

 

 

settings will be tracked. Records of such events

 

 

 

 

can be sent out via Ethernet to be handled by a

 

 

 

 

system utility Ethernet to (Trace) or can be e-

 

 

 

 

mailed to specified administrators.

 

 

 

 

 

 

 

 

 

 

 

 

E-Mail ID of Admin

 

Specifies the e-mail address(es) of the

 

 

1/2/3:

 

administrator(s) who should receive notices of

 

 

 

 

any attempted firewall violations. Type the

 

 

 

 

address(es) in standard internet e-mail address

 

 

 

 

format, e.g. j.smith@onecompany.xom

 

 

 

 

The e-mail message will contain the time of the

 

 

 

 

violation, the source address of the computer

 

 

 

 

responsible for the violation, the destination IP

 

 

 

 

address, the protocol being used, the source and

 

 

 

 

destination ports, and the number of violations

 

 

 

 

occurring the previous 30 minutes. If the ICMP

 

 

 

 

protocol were being used, then instead of the

 

 

 

 

source and destination ports, the e-mail will

 

 

 

 

report the ICMP code and type.

 

 

 

 

 

 

 

 

 

 

 

3.Click the Submit button.

4.Select Admin > Commit & Reboot and click the Commit button to save your changes to permanent storage.

11.2Configuring IP Filters

When you define an IP filter rule and enable the feature, you instruct the HM210dp/di to examine each data packet it receives to determine whether it meets criteria set forth in the rule. The criteria can include the size of the packet, the network or internet protocol it is carrying, the direction in which it is traveling (for example from the LAN to the Internet or vice versa), the IP address of the sending computer, the destination IP address, and other characteristics of the packet data.

If the packet matches the criteria established in a rule, the packet can either be accepted (forwarded towards its destination) or denied (discarded) depending on the action specified in the rule.

80

EN/LZT 108 6492 R2 - October 2003

Page 88
Image 88
Garmin HM210DP/DI manual Configuring IP Filters, Conn