4 outbound policies – D-Link DRO-210i User Manual

Page 39

Advertising
background image

Firewall

Dlink DRO-210i User Guide

39

Protocol

Select from this drop-down menu the application. This is the
equivalent of entering the correct Transport Type and the port
number corresponding to a given application.

Port Range

Enter the range of port numbers for which the current policy
rules will be applied. If you have only one port number to
enter, enter it in both fields.

Direction

This is the direction (Inbound) of network traffic for which the
current policy entry will be applied.


After entering all the information press the Apply button and the Service Permitted
Rule
table will now be displayed at the bottom of the page. Press the Delete button to
delete the corresponding entry.

IP Permitted Rules

In Service Permitted Rule table, click the icon under IP Permitted Rule column to
configure Permitted IP Rules.

Add Permitted IP Rule

Service

Displays the Protocol and Port for which Permitted IP Rule is
being configured.

Source IP

Select Any or IP Range. If IP Range is selected, the
administrator can specify a range of IP addresses that the IP
filter policy will be applied to. If you have only one IP address
that you want to filter, enter this address in both the From and
To fields.

Destination IP

Select Any or IP Range. If IP Range is selected, the
administrator can specify a range of IP addresses that the IP
filter policy will be applied to. If you have only one IP address
that you want to filter, enter this address in both the From and
To fields.

Status

Select Enable or Disable to activate or deactivate the
configured entry.


After entering all the information press the Apply button and the Permitted IP Table
will now be displayed at the bottom of the page. Press View button for viewing and
Delete button for deleting the corresponding entry.

7.1.4 Outbound Policies


The traffic flowing from Trusted to UnTrusted network is the Outbound traffic. By
default, all network traffic which flows from Trusted network to UnTrusted network is
allowed. Port Filter rules can be added to block specific traffic.

Web UI

Advertising