Detailed instructions for use are in the User's Guide.
[. . . ] 30, 2003
Copyright Information
No part of this manual, including the products and software described in it, may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means, except documentation kept by the purchaser for backup purposes, without the express written permission of ASUSTeK COMPUTER INC. ASUS PROVIDES THIS MANUAL "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OR CONDITIONS OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL ASUS, ITS DIRECTORS, OFFICERS, EMPLOYEES OR AGENTS BE LIABLE FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES (INCLUDING DAMAGES FOR LOSS OF PROFITS, LOSS OF BUSINESS, LOSS OF USE OR DATA, INTERRUPTION OF BUSINESS AND THE LIKE), EVEN IF ASUS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES ARISING FROM ANY DEFECT OR ERROR IN THIS MANUAL OR PRODUCT. Product warranty or service will not be extended if: (1) the product is repaired, modified or altered, unless such repair, modification of alteration is authorized in writing by ASUS; or (2) the serial number of the product is defaced or missing. [. . . ] Use the drop-down list to select one of the following options: Any Single Port Number Range Select this option if you want this rule to apply to all applications with an arbitrary source port number. This option allows you to apply this rule to an application with a specific source port number. Enter the source port number Select this option if you want this rule to apply to applications with this port range. The following fields become available for entry when this option is selected. Begin End Enter the starting port number of the range Enter the ending port number of the range
Destination Port This option allows you to set the destination port to which this rule should apply. Use the drop-down list to select one of the following options: Any Single, Range Service Select this option if you want this rule to apply to all applications with an arbitrary destination port number. Select any of these and enter details as described in the Source Port section above. This option allows you to select any of the pre-configured services (selectable from the drop-down list) instead of the destination port. The following are examples of services: BATTLE-NET, PC-ANYWHERE, FINGER, DIABLO-II, L2TP, H323GK, CUSEEME, MSN-ZONE, ILS, ICQ_2002, ICQ_2000, MSN, AOL, RPC, RTSP7070, RTSP554, QUAKE, N2P, PPTP, MSG2, MSG1, IRC, IKE, H323, IMAP4, HTTPS, DNS, SNMP, NNTP, POP3, SMTP, HTTP, FTP, TELNET. They appear here after you add them in the "Firewall Service" configuration page. Protocol This option allows you to select protocol type from a drop-down list. Note that if you select "service" for the destination port, this option will not be available. NAT This option allows you to select the type of NAT for the inbound traffic. None IP Address Select this option if you don't intend to use NAT in this inbound ACL rule. Select this option to specify the IP address of the computer (usually a server in your LAN) that you want the incoming traffic to be directed. Select this option to associate a pre-configured NAT pool to the rule. Note that only reverse static NAT and reverse NAPT pool can be used to
NAT Pool
51
Chapter 9. Configuring Firewall/NAT Settings
Internet Security Router User's Manual
Field
Description associate with an inbound ACL rule.
Time Ranges Select a pre-configured time range during which the rule is active. Application Filtering This option allows you to select pre-configured FTP, HTTP, RPC and/or SMTP application filters from the drop-down list. Log Click on the "Enable" or "Disable" radio button to enable or disable logging for this ACL rule. VPN Click on the "Enable" radio button if you want the traffic to go through VPN; otherwise, click on the "Disable" radio button.
9. 3. 2
Access Inbound ACL Rule Configuration Page (Firewall è Inbound ACL)
Log into Configuration Manager as admin, click the Firewall menu, and then click the Inbound ACL submenu. The Firewall Inbound ACL Configuration page displays, as shown in Figure 9. 7. [. . . ] While HTTP (the web protocol) and FTP only allow you to download files from a remote computer, Telnet allows you to log into and use a computer from a remote location. Trivial File Transfer Protocol A protocol for file transfers, TFTP is easier to use than File Transfer Protocol (FTP) but not as capable or secure. Time To Live A field in an IP packet that limits the life span of that packet. Originally meant as a time duration, the TTL is usually represented instead as a maximum hop count; each router that receives a packet decrements this field by one. [. . . ]