Specifications

Security Settings
49
N150 Wireless ADSL2+ Modem Router DGN1000
How Inbound Rules Differ from Outbound Rules
The following points summarize the differences between inbound rules and outbound rules:
Outbound rules can be used by any computer on your network, although only one
computer can use the
m at a time.
Inbound rules are configured for a single computer on your network.
Outbound rules do not need to know the computers IP address in advance. The IP
a
ddress is captured automatically.
Inbound rules require that you specify the computers IP address during configuration,
a
nd the IP address can never change.
Outbound rules require specific outbound traffic to open the inbound ports, and the
o
utbound ports are closed after a period of no activity.
Inbound Rules are always active and do not need to be made active.
Configure Firewall Rules
The Firewall Rules screen lets you configure custom rules to make exceptions to the default
rules. Exceptions can be based on the service or application, source or destination IP
addresses, and time of day. You can log traffic that matches or does not match the rule and
change the order of rule precedence. See Configure Services on page 54 for information
about services.
All traffic attempting to pass through the firewall is su
bjected to
the rules in the order shown in
the Rules table from the top (highest precedence) to the default rules at the bottom. In some
cases, the order of precedence is important to determine which communications are allowed
into or out of the network.
To configure firewall rules:
1. Select Security >
Firewall Rules to display the following screen:
2. To add an inbound or outbound rule:
For an outbound rule, click Add u
nder Outbound Services.