Packet Filtering Packet Filter Rules for the SnapGear SG565Router Sceenshot

Back to the SnapGear SG565



Screenshots from PortForward.com


SG565 - Packet Filter Rules Network Setup Network Setup DHCP Server Web Cache Shares QoS Traffic Shaping SIP Firewall Incoming Access Definitions Packet Filtering NAT Connection Tracking Intrusion Detection Access Control Antivirus Antispam VPN PPTP VPN Client PPTP VPN Server L2TP VPN Client L2TP VPN Server IPSec Port Tunnels System Date and Time Backup/Restore Users Management Diagnostics Advanced Help and Support Copyright (C) 1999-2008 Secure Computing Corp. All rights reserved. Packet Filter Rules Packet Filter Rules Custom Firewall Rules Custom IPv6 Firewall Rules Packet Filter Rules " type=hidden name=obj$0> " type=hidden name=obj$1> " type=hidden name=obj$2> " type=hidden name=obj$3> " type=hidden name=obj$4> " type=hidden name=obj$5> " type=hidden name=obj$6> " type=hidden name=obj$7> " type=hidden name=obj$8> Packet Filter Rules can accept, reject or drop packets based on the addresses, services, and/or interfaces. The first matching rule will determine the action for the network traffic, so the order of the rules is important. Descriptive Name Action Type Incoming Interface Outgoing Interface Source Address Destination Address Services Drop Windows Networking Drop Forward Any Any Internet interface Any Any Windows Networking Drop RFC1918 Incoming Drop Forward Any Internet interface Any RFC1918 Any Any Drop RFC1918 Outgoing Drop Forward Any Any Internet interface Any RFC1918 Any Eclipse FTP Site Accept Forward Any Any Any 192.168.2.85 FTP tcp 25 Drop Forward Any LAN interface Any Any Any tcp/25 SMTP DROP higher Drop Forward Any LAN interface Any Upper 81 Any tcp/25 SMTP DROP lower Drop Forward Any LAN interface Any Lower 79 Any tcp/25 Eclipse Security Cameras Accept Forward Any Any Any Any tcp/7000 Eclipse Security Cameras Accept Forward Any Any Any 192.168.2.39 tcp/7000  
Home > Screenshots > SnapGear > SG565 > Packet Filtering Packet Filter Rules