WAN to LAN Access Rules

This pages allows you to define WAN-to-LAN network access rules which evaluate the network traffic's source IP address, destination IP address, and communication port to decide if it's allowed to pass through the firewall.

By default, the stateful packet inspection module of this router blocks all traffic to the LAN that originates from the Internet. The behavior is defined by the default stateful packet inspection enabled in the router:

Forward all sessions originating from the LAN to the Internet (Pleaes refer to the “LAN-to-WAN Access Rules” at System Setup Firewall LAN-to-WAN Access Rules).

Discard all sessions originating from the Internet to the LAN.

Additional access rules may be defined to extend or overwrite the default rules.

Note

The ability to define network access rules is a very powerful management tool. Using a custom rule, it's possible to disable all firewall protection, creating holes in the firewall, or block all access to the Internet. Use with extreme caution when creating or deleting network access rules.

Network access rules will not disable protection from Denial of Service (DoS) attacks, such as SYN Flood, Ping of Death, Port Scan, etc. However, it's possible to create vulnerabilities to attacks that exploit vulnerabilities in applications.

Machine Status

This page display the Current Status of the VoIP router.

Dynamic DNS Setting

This section allows you to set up advanced features in this router. During the design stage, we have given much thought to making this router as convenient and easy to use as possible. However, some more advanced knowledge about TCP/IP might still be required.

Dynamic DNS: Each time the WAN address is changed, DDNS service will automatically update it to dyndns.org. You can register your account at :http://www.dyndns.org

32