Справочник Пользователя для PROLINK Huricane 9200/S
Table of Contents
7
Adding NAT Rules............................................................. 125
The NAPT rule: Translating between private
and public IP addresses ......................................... 125
The RDR rule: Allowing external access to a
LAN computer ......................................................... 127
The Basic rule: Performing 1:1 translations.............. 130
The Filter rule: Configuring a Basic rule with
additional criteria ..................................................... 131
The Bimap rule: Performing two-way
translations .............................................................. 133
The Pass rule: Allowing specific addresses to
pass through untranslated...................................... 134
13
Configuring Firewall Settings .............................135
Configuring Global Firewall Settings ................................ 135
Managing the Blacklist ...................................................... 138
14
Configuring Filters and Blocking Protocols ......139
Configuring IP Filters ......................................................... 140
Viewing Your IP Filter Configuration ......................... 140
Configuring IP Filter Global Settings ......................... 141
Creating IP Filter Rules .............................................. 142
IP filter rule examples................................................. 147
Viewing IP Filter Statistics.......................................... 148
Managing Current IP Filter Sessions ........................ 148
Configuring Bridge Filters.................................................. 150
Configuring Global Bridge Filter Settings.................. 150
Adding Bridge Filter Rules ......................................... 151
Bridge Filter Rule Example ........................................ 155
Editing and Deleting Rules and Subrules ................. 156
Viewing Rule Statistics............................................... 156
Blocking Protocols ............................................................. 157
#
$ %
& '
(
"
%
About Part 5 ....................................................................... 160
15
Managing Access to the Configuration Program
...............................................................................161