EasyManua.ls Logo

Cradlepoint CBA850 - Firewall Policies and Forwarding; Filter Policies

Cradlepoint CBA850
62 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
©2015 Cradlepoint. All Rights Reserved. | +1.855.813.3385 | cradlepoint.com
40
User Manual / CBA850
11/5/15
FILTER POLICIES
A Filter Policy is a one-way lter applied to initialized network trac owing from one zone to another. A
Filter Policy needs to be assigned to a Forwarding for it to take eect. Filter Policies can either be Added,
Edited, or Removed.
Default Allow All is a precongured policy to
allow all trac initialized from one zone to ow
to another zone. The state of the connection is
tracked to allow responses to traverse the zones
back to the source. LAN to WAN forwardings use
this policy by default. The policy can be removed or
altered to lter the trac ow.
Default Deny All is a precongured policy to deny
all trac initialized from one zone to be blocked
to another zone. WAN to LAN forwardings use this
policy by default. The policy can be removed or
altered to lter the trac ow.
Click Add to create a new lter policy, or select an
existing policy and click Edit to open the lter policy
editor.
Name: Create a name meaningful to you.
Action: Choose either Allow or Deny. This is the action taken by the rewall if none of the lter policy rules
match the trac being ltered.
Log: When checked, every rule in the policy will log matching packets as if the rule’s Log option had been
selected.
Click Add to create a new rule for this lter policy, or select an existing rule and click Edit to open the Rule
Editor.
Name: Create a rule name meaningful to you.
Action: Choose either Allow or Deny. This is the
action taken by the rewall if the rule criteria
match the trac being ltered.
Log: When checked, each packet matching this lter
rule will be logged in the System Log.
IP Version: Select the IP version to match.
Enter match criteria under Source, Destination,
Protocols and Application Sets.
Source: Select dened identities or enter
individual criteria for the appropriate Host, Port
and MAC address columns to match the source
of the trac.
Host: Enter an IP address or select a host
identity.
Port: Enter a port, port range, or select a port identity.
MAC: Enter a MAC address or select a MAC address identity.
Destination: Select dened identities or enter individual criteria for the appropriate Host, Port and
MAC address columns to match the destination of the trac. See Source for the column denitions.
Protocols: Select protocols (such as TCP, UDP, GRE, etc) from the dened list or enter a numeric code
for other protocols to match trac of that protocol.
Application Sets: Select the dened application set or sets to match trac related to those sets.

Related product manuals