Synology DiskStation User's Guide

Based on DSM 3.1

4Specify the source IP address in the Source IP section. You can choose to allow or deny access from a particular source IP using one of the following options:

All: Choose this option to apply the rule to all source IP addresses.

Single host: Choose this option to apply the rule to an IP address.

Subnet: Choose this option to apply the rule to a subnet.

5Choose Allow or Deny in the Action section to allow or deny the source IP address to access the specified ports.

Note:

When you combine multiple LAN ports with link aggregation, firewall will apply the rules from the first network interface, and reserve the rules of the second network interface. For more information about link aggregation, see "LAN" on Page 30.1

If your system has multiple network ports connecting to the same subnet, the firewall rules might not work properly.

To change the priorities of rules:

Reorder the rules by dragging any of them up or down. Rules at the top will have higher priorities.

To disable rules:

Uncheck the checkboxes next to the rules.

To delete rules:

Select the rules you want to delete and click Delete.

65

Automatically Block Suspicious Login Attempts

Auto block allows you to prevent unauthorized login via SSH, Telnet, rsync, FTP, mobile devices, File Station, and the management UI. After enabling the service, an IP address will be blocked automatically if it has too many failed login attempts.

Go to Main Menu > Control Panel > Auto Block to use the auto block function.

---------

1Link Aggregation is supported on specific models only.

Chapter 6: Enhance Internet Security

Page 65
Image 65
Synology DS411SLIM Automatically Block Suspicious Login Attempts, To change the priorities of rules, To disable rules