Base Unit Settings
168 Helpline Tel. No.: U.K. 0844 844 3898
*1 When direction is WiL, Source IP ‘local’ is Invalid. When direction is LiW,
Destination IP ‘local’ is invalid.
5Click [Restart].
LThe base unit automatically restarts and the Top Menu is displayed.
Important:
LThe packet filtering is NOT executed for the DMZ host.
Note:
LTo edit the setting:
1Click the desired entry number in step 3.
2Edit the items in the Packet Filtering Setting page.
3Click [Save].
4Click [Restart].
LTo delete the setting:
1Click the desired entry number in step 3.
2Click [Delete] in the Packet Filtering Setting page.
3Click [OK] in the confirmation dialogue box.
4Click [Restart].
LAs the default security policy, outgoing packets initiated from the computer on your LAN
to the Internet are allowed, but other packets are denied.
LSecurity functions are executed in the following order:
– Easy security (Attack detection)
– Packet filtering
– Easy security (except for Attack detection)
LThis feature is not available in AP (Bridge) mode.
[Destination Port] LEnter the packet destination IP address/netmask to be
filtered.
LThe entry is the same as the Source Port.
[Protocol] LSelect the protocol to be used from TCP/UDP/TCP&UDP/
ESP/GRE/ICMP. If you want to set all protocols, select “*”.
[Log Output] LSet whether to display the temporarily saved packet
information on the “Packet Filtering Log:” (page 193).
Setting Description
WP1050E.book Page 168 Thursday, March 29, 2007 11:31 AM