Security
The five input filters and one output filter that make up Basic Firewall are shown in the table below.
Setting | Input filter 1 | Input filter 2 | Input filter 3 | Input filter 4 |
| Input filter 5 | Output filter |
| 1 | ||||||
|
|
|
|
|
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Enabled | Yes | Yes | Yes | Yes |
| Yes | Yes |
|
|
|
|
|
|
|
|
Forward | No | No | Yes | Yes |
| Yes | Yes |
|
|
|
|
|
|
|
|
Source IP | 0.0.0.0 | 0.0.0.0 | 0.0.0.0 | 0.0.0.0 |
| 0.0.0.0 | 0.0.0.0 |
address |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Source IP | 0.0.0.0 | 0.0.0.0 | 0.0.0.0 | 0.0.0.0 |
| 0.0.0.0 | 0.0.0.0 |
address mask |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Dest. IP | 0.0.0.0 | 0.0.0.0 | 0.0.0.0 | 0.0.0.0 |
| 0.0.0.0 | 0.0.0.0 |
address |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Dest. IP | 0.0.0.0 | 0.0.0.0 | 0.0.0.0 | 0.0.0.0 |
| 0.0.0.0 | 0.0.0.0 |
address mask |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Protocol type | TCP | TCP | ICMP | TCP |
| UDP | 0 |
|
|
|
|
|
|
|
|
Source port | No Com- | No Com- | N/A | No Com- |
| No Com- | N/A |
comparison | pare | pare |
| pare |
| pare |
|
|
|
|
|
|
|
|
|
Source port ID | 0 | 0 | N/A | 0 |
| 0 | N/A |
|
|
|
|
|
|
|
|
Dest. port | Equal | Equal | N/A | Greater |
| Greater | N/A |
comparison |
|
|
| Than |
| Than |
|
|
|
|
|
|
|
|
|
Dest. port ID | 2000 | 6000 | N/A | 1023 |
| 1023 | N/A |
|
|
|
|
|
|
|
|
Basic Firewall’s filters play the following roles.
Input filters 1 and 2: These block
Input filter 3: This filter explicitly passes all
Input filters 4 and 5: These filters pass all TCP and UDP traffic, respectively, when the destination port is greater than 1023. This type of traffic generally does not allow a remote host to connect to the LAN using one of the potentially intrusive Internet services, such as Telnet, FTP, and WWW.
Output filter 1: This filter passes all outgoing traffic to make sure that no outgoing connections from the LAN are blocked.