EasyManua.ls Logo

Microhard Systems VIP4G - Page 123

Microhard Systems VIP4G
207 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
© Microhard Systems Inc. 123
4.0 Configuration
WAN Request
When Blocked the VIP4G will block all requests from devices on the WAN
unless specified otherwise in the Access Rules, MAC List, IP List
configurations. Access to ports 80 (HTTP) and 443 (HTTPS-if enabled), is
still available unless disabled in the WAN Remote Management option.
Values
Block / Allow
LAN to WAN Access Control
Allows or Blocks traffic from the LAN accessing the WAN unless specified
otherwise using the Access Rules, MAC, and IP List configuration.
Values
Block / Allow
4G Request
When Blocked all requests from devices on the 4G (Wireless Carrier) side
will be blocked, unless specified otherwise in the Access Rules, MAC List,
IP List configurations. Access to ports 80 (HTTP) and 443 (HTTPS-if
enabled), is still available unless disabled in the 4G Remote Management
option.
Values
Block / Allow
LAN to 4G Access Control
Allows or Blocks traffic from the LAN accessing the 4G connection unless
specified otherwise using the Access Rules, MAC, and IP List
configuration.
Values
Block / Allow
Anti-Spoof
The Anti-Spoof protection is to create some firewall rules assigned to the
external interface (WAN & 4G/Cellular) of the firewall that examines the
source address of all packets crossing that interface coming from outside.
If the address belongs to the internal network or the firewall itself, the
packet is dropped.
Values
Enable / Disable
When 4G is set to ‘Allow’
the modem is open to
anyone, this is not
recommended as it may
impact data usage from
unwanted sources.
Packet Normalization
Packet Normalization is the normalization of packets so there are no
ambiguities in interpretation by the ultimate destination of the packet. The
scrub directive also reassembled fragmented packets, protecting some
operating systems from some forms of attack, and drops TCP packets that
have invalid flag combinations.
Values
Enable / Disable

Table of Contents

Related product manuals