27: Configuring firewall
_______________________________________________________________________________________________________
_____________________________________________________________________________________________________
© Virtual Access 2017
GW1000 Series User Manual
Issue: 1.9 Page 253 of 350
27.2.5 Custom rules
Iptables rules can be defined here. Custom rules are applied after all other rules are
applied. Consult official iptables documentation for exact syntax and details.
Figure 132: The custom rules page
Specifies the traffic source zone, must refer to one of the defined zone names.
Match incoming traffic from the specified source IP address.
Match incoming traffic from the specified mac address.
Match incoming traffic originating from the given source port or port range on the client host if
tcp or udp is specified as protocol.
Match incoming traffic using the given protocol. Can be one of tcp, udp, tcpudp, udplite, icmp,
esp, ah, sctp, or all or it can be a numeric value, representing one of these protocols or a
different one. A protocol name from /etc/protocols is also allowed. The number 0 is equivalent
to all.
Specifies the traffic destination zone, must refer to one of the defined zone names. If specified,
the rule applies to forwarded traffic else it is treated as input rule.
Match incoming traffic directed to the specified destination IP address.
Match incoming traffic directed at the given destination port or port range on this host if tcp or
udp is specified as protocol.
Firewall action (ACCEPT, REJECT, DROP) for matched traffic.
Protocol family (ipv4, ipv6 or any) to generate iptables rules for.
Maximum average matching rate; specified as a number, with an optional /second, /minute,
/hour or /day suffix. Example3/hour.
Maximum initial number of packets to match; this number gets recharged by one every time
the limit specified above is not reached, up to this number.
Extra arguments to pass to iptables, this is mainly useful to specify additional match options,
like -m policy --dir in for IPSec.
Table 89: Information table for custom rules commands