EasyManua.ls Logo

Robustel R5020 - Page 86

Robustel R5020
178 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Robustel R5020 User Guide
RT_UG_R5020_v.1.0.2 Mar. 17, 2023 86/167
Filtering
Item
Description
Default
Enable Local SSH Access
Click the toggle button to enable/disable this option. When enabled,
the LAN user can access the router locally via SSH.
ON
Enable Remote Telnet Access
Click the toggle button to enable/disable this option. When enabled,
the Internet user can access the router remotely via Telnet.
OFF
Enable Local Telnet Access
Click the toggle button to enable/disable this option. When enabled,
the LAN user can access the router locally via Telnet.
ON
Enable Remote HTTP Access
Click the toggle button to enable/disable this option. When enabled,
the Internet user can access the router remotely via HTTP.
OFF
Enable Local HTTP Access
Click the toggle button to enable/disable this option. When enabled,
the LAN user can access the router locally via HTTP.
ON
Enable Remote HTTPS Access
Click the toggle button to enable/disable this option. When enabled,
the Internet user can access the router remotely via HTTPS.
ON
Enable Remote Ping Respond
Click the toggle button to enable/disable this option. When enabled,
the router will reply to the Ping requests from other hosts on the
Internet.
ON
Enable DOS Defending
Click the toggle button to enable/disable this option. When enabled,
the router will defend the DOS. Dos attack is an attempt to make a
machine or network resource unavailable to its intended users.
ON
Enable Console
Click the toggle button to enable/disable this option. When enabled,
the user can access the router via Console.
ON
Enable the vpn_nat traversal
Click the toggle button to enable/disable this option. When enabled,
the router automatically modifies the IP address of the VPN header
received by WAN/WWAN to the IP address of the device under LAN
port and sends it out.
OFF
Whitelist Rules
Item
Description
Default
Index
Indicate the ordinal of the list.
--
Description
Enter a description for this whitelist rule.
Null
Source Address
Defines if access is allowed from one or a range of IP addresses which
are defined by Source IP Address, or every IP addresses.
Null
Filtering Rules
Index
Indicate the ordinal of the list.
--
Description
Enter a description for this filtering rule.
Null
Source Address
Defines if access is allowed from one or a range of IP addresses which
are defined by Source IP Address, or every IP addresses.
Null
Source Port
Specify an access originator and enter its source port.
Null
Source MAC
Enter the MAC address of the defined source IP address.
Null
Target Address
Defines if access is allowed to one or a range of IP addresses which are
defined by Target IP Address, or every IP addresses.
Null
Target Port
Enter the target port which the access originator wants to access.
Null
Protocol
Select from “All”, “TCP”, “UDP”, “ICMP” or “TCP-UDP”.
Note: It is recommended that you choose “All” if you don’t know
which protocol of your application to use.
All

Related product manuals