ZyXEL Prestige 202H Plus ISDN Router 91-003-154001B 用户手册
产品代码
91-003-154001B
P-202H Plus v2 User’s Guide
Chapter 9 Firewall Configuration
104
9.10 Example Firewall Rule
The following Internet firewall rule example allows a hypothetical “MyService” connection
from the Internet.
from the Internet.
1 Click Firewall, then Rule Summary under Internet to Local Network Set.
2 Click a rule number to open the Edit Rule screen.
3 Click Any in the Source Address box and then click SrcDelete.
Reason
This field states the reason for the log; i.e., was the
rule matched, not matched, or was there an attack.
The set and rule coordinates (<X, Y> where X=1,2;
Y=00~10) follow with a simple explanation. There
are two policy sets; set 1 (X = 1) is for LAN to WAN
rules and set 2 (X = 2) for WAN to LAN rules. Y
represents the rule in the set. You can configure up
to 10 rules in any set (Y = 01 to 10). Rule number
00 is the default rule.
not match
<1,01> dest IP
This means this packet does not
<1,01> dest IP
This means this packet does not
match the destination IP
address in set 1, rule 1. Other
reasons (instead of dest IP) are
src IP, dest port, src port and
protocol.
This is a log for a DoS attack.
attack
land, ip spoofing, icmp echo,
land, ip spoofing, icmp echo,
icmp vulnerability, NetBIOS,
smtp illegal command,
traceroute, teardrop, or syn
flood.
Action
This field displays whether the packet was blocked
(i.e., silently discarded), forwarded or neither
(Block, Forward or None). "None" means that no
action is dictated by this rule.
Block, Forward or None
Back
Click Back to return to the previous screen.
Previous Page/
Next Page
Click Previous Page or Next Page to view other pages in your log.
Refresh
Click Refresh to renew the log screen.
Clear
Click Clear to clear all the logs.
Table 29 Firewall > Logs (continued)
LABEL
DESCRIPTION
EXAMPLE