A SERVICE OF

logo

Table of Contents
7
Adding NAT Rules............................................................. 125
The NAPT rule: Translating between private
and public IP addresses.........................................125
The RDR rule: Allowing external access to a
LAN computer ......................................................... 127
The Basic rule: Performing 1:1 translations.............. 130
The Filter rule: Configuring a Basic rule with
additional criteria..................................................... 131
The Bimap rule: Performing two-way
translations ..............................................................133
The Pass rule: Allowing specific addresses to
pass through untranslated......................................134
13 Configuring Firewall Settings .............................135
Configuring Global Firewall Settings................................ 135
Managing the Blacklist ......................................................138
14 Configuring Filters and Blocking Protocols ......139
Configuring IP Filters......................................................... 140
Viewing Your IP Filter Configuration......................... 140
Configuring IP Filter Global Settings.........................141
Creating IP Filter Rules..............................................142
IP filter rule examples................................................. 147
Viewing IP Filter Statistics.......................................... 148
Managing Current IP Filter Sessions ........................148
Configuring Bridge Filters.................................................. 150
Configuring Global Bridge Filter Settings.................. 150
Adding Bridge Filter Rules.........................................151
Bridge Filter Rule Example........................................155
Editing and Deleting Rules and Subrules................. 156
Viewing Rule Statistics...............................................156
Blocking Protocols............................................................. 157
#
$% &'("%

About Part 5 .......................................................................160
15 Managing Access to the Configuration Program
...............................................................................161