P a g e | 63
UCM630X Series User Manual
Version 1.0.2.25
Table 14: Firewall Rule Settings
Specify the Firewall rule name to identify the firewall rule.
Select the action for the Firewall to perform.
ACCEPT
REJECT
DROP
Select the traffic type.
IN
If selected, users will need specify the network interface "LAN" or "WAN"
(for UCM630X) for the incoming traffic.
OUT
Select the service type.
FTP
SSH
Telnet
TFTP
HTTP
LDAP
Custom
If "Custom" is selected, users will need specify Source (IP and port),
Destination (IP and port) and Protocol (TCP, UDP or Both) for the service.
Please note if the source or the destination field is left blank, it will be used
as "Anywhere".
Save the change and click on "Apply" button. Then submit the configuration by clicking on "Apply Changes" on
the upper right of the web page. The new rule will be listed at the bottom of the page with sequence number,
rule name, action, protocol, type, source, destination, and operation. More operations below:
Click on to edit the rule.
Click on to delete the rule.
Dynamic Defense
Dynamic defense is supported on the UCM630X series. It can blacklist hosts dynamically when the LAN mode
is set to "Route" under Web GUISystem SettingsNetwork SettingsBasic Settings page. If enabled, the
traffic coming into the UCM630X can be monitored, which helps prevent massive connection attempts or brute
force attacks to the device. The blacklist can be created and updated by the UCM630X firewall, which will then
be displayed in the web page. Please refer to the following table for dynamic defense options on the UCM630X.