Справочник Пользователя для ZyXEL 202H 91-003-194003B
Модели
91-003-194003B
P-202H Plus v2 User’s Guide
231
Chapter 24 Enabling the Firewall
Figure 133 Menu 21.2 Firewall Setup
Note: Use the web configurator or the command interpreter to configure the firewall
rules.
24.3.1 Viewing the Firewall Log
In menu 21, enter 3 to view the firewall log. An example of a firewall log is shown next.
Figure 134 Example Firewall Log
Menu 21.2 - Firewall Setup
The firewall protects against Denial of Service (DoS) attacks when
it is active. The default Policy sets
it is active. The default Policy sets
1. allow all sessions originating from the LAN to the WAN and
2. deny all sessions originating from the WAN to the LAN
2. deny all sessions originating from the WAN to the LAN
You may define additional Policy rules or modify existing ones but
please exercise extreme caution in doing so
please exercise extreme caution in doing so
Active: Yes
LAN-to-WAN Set Name: ACL Default Set
WAN-to-LAN Set Name: ACL Default Set
WAN-to-LAN Set Name: ACL Default Set
Please configure the Firewall function through web configurator
Press ENTER to Confirm or ESC to Cancel:
# Time Packet Information Reason
Action
1|Jan 01 00 |From:192.168.1.1 To:192.168.1.33 |default policy
|forward
| 01:39:21 |ICMP type:00003 code:00001 |<0,00> |
2|Jan 01 00 |From:192.168.1.1 To:192.168.1.33 |default policy
|forward
| 01:39:27 |ICMP type:00003 code:00001 |<0,00> |
3|Jan 01 00 |From:192.168.1.33 To:172.17.2.5 |default policy
|forward | 01:39:36 |UDP src port:01087 dest port:00161 |<1,00> |
4|Jan 01 00 |From:192.168.1.1 To:192.168.1.33 |default policy
|forward
| 01:39:36 |ICMP type:00003 code:00001 |<0,00> |
5|Jan 01 00 |From:192.168.1.1 To:192.168.1.33 |default policy
|forward
| 01:39:42 |ICMP type:00003 code:00001 |<0,00> |
6|Jan 01 00 |From:192.168.1.1 To:192.168.1.33 |default policy
|forward | 01:39:48 |ICMP type:00003 code:00001 |<0,00> |
7|Jan 01 00 |From:192.168.1.1 To:192.168.1.33 |default policy
|forward | 01:39:54 |ICMP type:00003 code:00001 |<0,00> |
Clear Firewall Log (y/n):
Action
1|Jan 01 00 |From:192.168.1.1 To:192.168.1.33 |default policy
|forward
| 01:39:21 |ICMP type:00003 code:00001 |<0,00> |
2|Jan 01 00 |From:192.168.1.1 To:192.168.1.33 |default policy
|forward
| 01:39:27 |ICMP type:00003 code:00001 |<0,00> |
3|Jan 01 00 |From:192.168.1.33 To:172.17.2.5 |default policy
|forward | 01:39:36 |UDP src port:01087 dest port:00161 |<1,00> |
4|Jan 01 00 |From:192.168.1.1 To:192.168.1.33 |default policy
|forward
| 01:39:36 |ICMP type:00003 code:00001 |<0,00> |
5|Jan 01 00 |From:192.168.1.1 To:192.168.1.33 |default policy
|forward
| 01:39:42 |ICMP type:00003 code:00001 |<0,00> |
6|Jan 01 00 |From:192.168.1.1 To:192.168.1.33 |default policy
|forward | 01:39:48 |ICMP type:00003 code:00001 |<0,00> |
7|Jan 01 00 |From:192.168.1.1 To:192.168.1.33 |default policy
|forward | 01:39:54 |ICMP type:00003 code:00001 |<0,00> |
Clear Firewall Log (y/n):