Network 
E220 Series Cellular Router User Guide    149 
Parameters  Description 
Static IPv4 Routes 
Name  Enter the name of the zone. 
Input  Select to accept or reject the inbound traffic to all the configured 
zones. 
Output  Select to accept or reject the outbound traffic from all the configured 
zones. 
Forward  Select to accept or reject the forwarded traffic from all the configured 
zones. 
Masquerading  Check to allow IP Masquerading.  
MSS clamping  Check to allow MSS clamping. 
Covered network  Select the network interfaces that must be included in the zone 
configuration.  
Inter-Zone Forwarding 
Allow forward to destination 
zones 
Select to allow or deny forwarding traffic to the configured 
destination zone. 
Allowed forward from source 
zones 
Select to allow or deny forwarding traffic from the configured source 
zone. 
Table 10.9-2: General Configuration for Firewall Zone (LAN) 
Concept of zone based Firewall 
A zone section groups one or more interfaces and serves as source or destination for forwarding, 
rules, and redirects. Masquerading (NAT) of outgoing traffic is controlled on a per zone basis. Note 
that masquerading is defined in the outgoing interface.  
•  INPUT rules for a zone describe what happens to traffic trying to reach the router itself through 
an interface in that zone. 
•  OUTPUT rules for a zone describe what happens to traffic originating from the router itself going 
through an interface in that zone. 
•  FORWARD rules for a zone describe what happens to traffic passing between different 
interfaces in that zone. 
 
 
By default, there are 2 zones which are already created in the Router, Viz LAN Zone and WAN Zone. 
All traffic from LAN to WAN has no restrictions but all incoming traffic on WAN side is blocked unless a 
port forwarding rule is set or unless a particular port is opened.  
 
Drop vs Reject 
DROP 
•  less information is exposed 
•  less attack surface 
•  client software may not cope well with it (hangs until connection times out) 
•  may complicate network debugging (where was traffic dropped and why) 
REJECT 
•  may expose information (like the ip at which traffic was actually blocked) 
•  client software can recover faster from rejected connection attempts 
•  network debugging easier (routing and firewall issues clearly distinguishable)