Packet Filtering Custom IPv6 Firewall Rules for the SnapGear SG565Router Sceenshot

Back to the SnapGear SG565



Screenshots from PortForward.com


SG565 - Custom IPv6 Firewall Rules Network Setup Network Setup DHCP Server Web Cache Shares QoS Traffic Shaping SIP Firewall Incoming Access Definitions Packet Filtering NAT Connection Tracking Intrusion Detection Access Control Antivirus Antispam VPN PPTP VPN Client PPTP VPN Server L2TP VPN Client L2TP VPN Server IPSec Port Tunnels System Date and Time Backup/Restore Users Management Diagnostics Advanced Help and Support Copyright (C) 1999-2008 Secure Computing Corp. All rights reserved. Custom IPv6 Firewall Rules Packet Filter Rules Custom Firewall Rules Custom IPv6 Firewall Rules Custom IPv6 Firewall Rules IPv6 is Disabled . Below are the SnapGear unit's custom firewall rules. Custom firewall rules are instead of built-in rules   Packet Filter Rules Chain INPUT (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source destination Chain FORWARD (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source destination Chain OUTPUT (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source destination Packet Mangle Rules Chain PREROUTING (policy ACCEPT 0 packets, 0 bytes) pkts bytes target prot opt in out source destination Chain INPUT (policy ACCEPT 0 packets, 0 bytes) pkts bytes target prot opt in out source destination Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) pkts bytes target prot opt in out source destination Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) pkts bytes target prot opt in out source destination Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes) pkts bytes target prot opt in out source destination
Home > Screenshots > SnapGear > SG565 > Packet Filtering Custom IPv6 Firewall Rules