27: Configuring firewall 
_______________________________________________________________________________________________________ 
_____________________________________________________________________________________________________ 
© Virtual Access 2017 
GW1000 Series User Manual 
Issue: 1.9    Page 253 of 350 
27.2.5  Custom rules 
Iptables rules can be defined here. Custom rules are applied after all other rules are 
applied. Consult official iptables documentation for exact syntax and details. 
 
Figure 132: The custom rules page 
Specifies the traffic source zone, must refer to one of the defined zone names. 
Match incoming traffic from the specified source IP address. 
Match incoming traffic from the specified mac address. 
Match incoming traffic originating from the given source port or port range on the client host if 
tcp or udp is specified as protocol. 
Match incoming traffic using the given protocol. Can be one of tcp, udp, tcpudp, udplite, icmp, 
esp, ah, sctp, or all or it can be a numeric value, representing one of these protocols or a 
different one. A protocol name from /etc/protocols is also allowed. The number 0 is equivalent 
to all. 
Specifies the traffic destination zone, must refer to one of the defined zone names. If specified, 
the rule applies to forwarded traffic else it is treated as input rule. 
Match incoming traffic directed to the specified destination IP address. 
Match incoming traffic directed at the given destination port or port range on this host if tcp or 
udp is specified as protocol. 
Firewall action (ACCEPT, REJECT, DROP) for matched traffic. 
Protocol family (ipv4, ipv6 or any) to generate iptables rules for. 
Maximum average matching rate; specified as a number, with an optional /second, /minute, 
/hour or /day suffix. Example3/hour. 
Maximum initial number of packets to match; this number gets recharged by one every time 
the limit specified above is not reached, up to this number. 
Extra arguments to pass to iptables, this is mainly useful to specify additional match options, 
like -m policy --dir in for IPSec. 
Table 89: Information table for custom rules commands