SETTING UP THE FIREWALL
48 MultiConnect
®
rCell 100 MTR-LTE User Guide
5. In the Destination Port field, type the port for which that the packets are destined. Common destination
ports are listed in the Destination Port field's attached drop down list. Type ANY if the destination port
does not matter.
6. In the Source IP field, type the IP address of the device or network that the traffic originates from. Type
ANY if the source address does not matter.
7. In the Source Mask field, type a network mask for the origin of the traffic.
8. In the Source Port field, type the port that is the origin of the traffic. Type ANY if the source port does
not matter.
9. From the Action drop-down list, select the action to perform on the traffic. You can allow the traffic to be
accept, reject, log or drop. Accepted packets are allowed to continue through the firewall. Dropped
packets are removed and no further processing is performed on them. Rejected packets are dropped, and
an error message is sent to the source of the packet. Logged packets are logged to the system's main log
file with the rule's name prepended as an identifier (viewable from the Statistics page). Log rules do not
affect the packet's fate.
10. The Direction field is locked to OUTGOING while using the Outbound Traffic wizard.
11. From the Protocol drop-down list, select the protocol of the traffic that is being filtered. Choose from
TCP, UDP, TCP/UDP or ANY. Type ANY if the protocol does not matter (to accept the default).
12. Click Finish.
13. To save your changes, click Save and Restart.
MAC Filtering
To setup a MAC Filtering rule:
1. Click Add Rule in the MAC Filtering section.
2. Enter a Name for the rule and, optionally, a Description. Click Next.
3. Enter the MAC Address of the destination or source of the packet.
4. Select the action from the drop down list. Choose either ACCEPT, REJECT, DROP, or LOG.
5. Choose the Direction from the drop down list including INCOMING or OUTGOING.
6. Select the Protocol from the drop down list. Choose from TCP/UDP, TCP, UDP or ANY.
7. Click Finish.
8. To save your changes, click Save and Restart.
Advanced Settings
The Firewall's Advanced Settings mode lets you manipulate DNAT, SNAT, and Filter rules directly. DNAT rules can
manipulate the destination address and port of a packet; similarly SNAT rules can manipulate the source address
and port of a packet.
Filter rules apply an ACCEPT, REJECT, DROP, or LOG action to a packet. DNAT, SNAT, and Filter rules can be
associated if they are named the same. This association is recognized within the Port Forwarding and Outbound
Traffic wizards accessed from the Normal Settings mode, and allows the associated rules to be viewed and edited
as a series.
Setting up Static Routes
To set up a manually configured mapping of an IP address to a next-hop destination for data packets:
1. Go to Firewall > Static Routes.
2. In the Static Routes window, click Add Route.