Security Configuration

Data

For each rule, the following data is shown:

 

Name - The name you assigned to the rule.

 

Source - The traffic covered by this rule, defined by the source IP

 

address. If the IP address is followed by ... this indicates there is

 

range of IP addresses, rather than a single address.

 

Destination - The traffic covered by this rule, defined by destina-

 

tion IP address. If the IP address is followed by ... this indicates

 

there is range of IP addresses, rather than a single address.

 

Action - Action will be "Forward" or "Block"

 

 

Add

To add a new rule, click the "Add" button, and complete the resulting

 

screen. See the following section for more details.

Edit

To Edit or modify an existing rule, select it and click the "Edit" button.

 

 

Move

There are 2 ways to change the order of rules

 

∙ Use the up and down indicators on the right to move the selected

 

rule. You must confirm your changes by clicking "OK". If you

 

change your mind before clicking "OK", click "Cancel" to reverse

 

your changes.

 

∙ Click "Move" to directly specify a new location for the selected

 

rule.

 

 

Delete

To delete an existing rule, select it and click the "Delete" button.

 

 

View Log

Clicking the "View Log" button will open a new window and display

 

the Firewall log.

System Rules

Clicking the "System Rules" button will open a new window and

 

display the default firewall rules currently applied by the system. These

 

rules cannot be edited, but any rules you create will take precedence

 

over the default rules.

 

 

61