Configuring Firewall Settings

Managing the Black List

If data packets are received that violate the firewall settings or any of the IP filter rules, then the source IP address of the offending packets can be blocked from such accesses for a specified period of time. You can enable or disable use of the black list using the settings described above. The source computer remains on the black list for the period of time that you specify.

To view the list of currently blacklisted computers, click [Black List] at the bottom of the [Firewall Configuration] page. The [Firewall Blacklisted Hosts] page appears, as shown in Figure 46.

Figure 46. Firewall Blacklisted Hosts Page

The table displays the following information for each entry.

Field

Description

 

 

Host IP Address

This is the IP address of the computer that sent the

 

packet(s) that caused the violation

 

 

Reason

This is a short description of the type of violation. If the

 

packet violated an IP filter rule, the custom text from the

 

[Log Tag] field will display. (See Creating IP Filter Rules

 

on page 138.)

 

 

IPF Rule ID

If the packet violated an IP filter rule, this field will display

 

the ID assigned to the rule.

 

 

Action(s)

This field displays an icon ( ) you can click on to delete

 

 

the entry from the list, if you want it to be removed prior to

 

its automatic timed expiration.

 

 

134

Page 132
Image 132
SMC Networks SMC7204BRA manual Managing the Black List, ID assigned to the rule, Its automatic timed expiration