TG100 User Guide
67/75
6. Enter the IP address and subnet mask in the IP field. For example, enter
192.168.5.0/255.255.255.0.
7. (Optional) Enter the MAC address of the target device.
The format of the MAC address XX:XX:XX:XX:XX:XX. X means 0-9 or A-F in hex,
the A-F are not case sensitive.
8. Choose the rule Action.
Accept: Accept the access from remote hosts.
Drop: Drop the access from remote hosts.
Ignore: Ignore the access.
9. Click Save and Apply Changes.
Enable Firewall Function
Procedure
1. Navigate to System > Security Center > Firewall Rules, select the checkbox of
Enable Firewall.
2. Click Save and Apply Changes.
The web page will prompt you that the firewall is enabled.
Block Pings through Your TG Gateway
By default, users can use the ping command from other devices to check if the TG
gateway is alive. You can block the pings to place your TG gateway in a more secure
environment.
Procedure
1. Navigate to System > Security Center > Firewall Rules, select the checkbox of