Atlantis Land A02-RA ME01 ユーザーズマニュアル

ページ / 59
Atlantis Land I-STORM ADSL ROUTER   
30 
Active: Choose “Yes” to enable the rule, or choose “No” to disable the rule. 
Packet Type: Specify the packet type (TCP, UDP, ICMP or any) that the rule will be applied to. 
Select TCP if you want to scope for the connection-based application service on the remote 
server using the port number. Or select UDP if you want to scope for the connectionless 
application service on the remote server using the port number. 
Log: Choose “Yes” if you want to generate logs when the filer rule is applied to a packet. 
Action When Matched: If any packet matches this filter rule, forward or drop this packet. 
Source IP Address: Enter the incoming or outgoing packet’s source IP address. 
Source IP Mask: Enter the incoming or outgoing packet’s source IP Subnet Mask. 
Source Port: Check the TCP or UDP packet’s source port number(s). 
Destination IP Address: Enter the incoming or outgoing packet’s destination IP address. 
Destination IP Mask: Enter the incoming or outgoing packet’s destination IP Subnet Mask. 
Destination Port: Check the TCP or UDP packet’s destination port number(s). 
 
If the DHCP server option is enabled, you have to be very careful in assigning the IP 
addresses of filtered private IP range in order to avoid conflicts. Because you do not 
know which PC in LAN is assigned to which IP address. The easy way is that the 
filtered IP address is assigned to the specific PC that you do not want this PC to 
access outside resource such as Internet. You configure the filtered IP address 
manually to this PC, but it is still in the same subnet with the router. 
Block Hacker Attack 
 
The I-STORM ADSL ROUTER  can automatically detect and block the DoS (Denial of 
Service) attack if user enables this function. This kind of attack is not to achieve the confidential 
data of this network; instead, it aims to crush specific equipment or the entire network. If this 
happens, the users will not be able to access the network resources. There are nine hacker 
patterns implemented in total, including