Chapter 14 Firewall
LTE3302-M432 & LTE3312-M432 User’s Guide
115
See Appendix B on page 183 for commonly used services and port numbers.
Black List / White
List
Select Deny those match the following rules. to block access to the MAC addresses in the list
and allow access to other URLs.
Select Allow those match the following rules. to allow access to the MAC addresses in the list
and block access to other URLs.
Apply Click Apply to save the settings.
Add Firewall Rule
Service Name Enter a name that identifies or describes the firewall rule.
MAC Address Enter the MAC address of the computer for which the firewall rule applies.
Dest IP Address Enter the IP address of the computer to which traffic for the application or service is entering.
The LTE Device applies the firewall rule to traffic initiating from this computer.
Source IP Address Enter the IP address of the computer that initializes traffic for the application or service.
The LTE Device applies the firewall rule to traffic initiating from this computer.
Protocol Select the protocol (TCP, UDP or ICMP) used to transport the packets for which you want to
apply the firewall rule.
Dest Port Range Enter the port number/range of the destination that define the traffic type, for example TCP
port 80 defines web traffic.
Source Port Range Enter the port number/range of the source that define the traffic type, for example TCP port
80 defines web traffic.
Add Rule Click Add to save the firewall rule.
Firewall Rule
# This is your firewall rule number. The ordering of your rules is important as rules are applied in
turn.
Service Name This is a name that identifies or describes the firewall rule.
MAC address This is the MAC address of the computer for which the firewall rule applies.
Dest IP This is the IP address of the computer to which traffic for the application or service is entering.
Source IP This is the IP address of the computer from which traffic for the application or service is
initialized.
Protocol This is the protocol (TCP, UDP or ICMP) used to transport the packets for which you want to
apply the firewall rule.
Dest Port Range This is the port number/range of the destination that define the traffic type, for example TCP
port 80 defines web traffic.
Source Port Range This is the port number/range of the source that define the traffic type, for example TCP port
80 defines web traffic.
Action DROP - Traffic matching the conditions of the firewall rule are stopped.
Delete Click Delete to remove the firewall rule.
Table 51 Configuration > Security > Firewall > Services (continued)
LABEL DESCRIPTION