User`s manual

RX3042H User's Manual
Configuring Firewall
67
9.2.2 Reverse NAPT / Virtual Server
Reverse NAPT is also called inbound mapping, port mapping, or
virtual server. Any packet coming to the RX3042H can be relayed
to the internal host based on the protocol, port number and/or IP
address specified in the ACL rule. This is useful when multiple
services are hosted on different internal hosts. Figure 9.2shows that
web server (TCP/80) is hosted on PC A, telnet server (TCP/23) on
PC B, DNS server (UDP/53) on PC C and FTP server (TCP/21) on
PC D. This means that the inbound traffic of these four services will
be directed to respective host hosting these services.
9.3 Firewall Settings (Firewall/NAT ->Settings)
9.3.1 Firewall Options
Table 9.1 lists the firewall options parameters.
Table 9.1. Firewall Options Parameters
Field Description
DoS Check
Check or uncheck this box to enable or disable DoS
check. When DoS check is disabled, the following
functionalities are disabled:
Stateful packet inspection
Skip all DoS attack check
Default NAT
Log Port Probing
Connection attempt to closed ports will be logged if
this option is enabled.
Stealth Mode
If enabled, RX3042H will not respond to remote peerʼs
attempt to connect to the closed TCP/UDP ports.
To configure firewall settings, follow the instructions below:
1. Open the
Firewall Settings
configuration page as shown in
Figure 9.3 by clicking on
Firewall/NAT ->Settings
menu.
2. Check or uncheck individual check box for each firewall option.
3. Click
Apply
to save the settings.
9.3.2 DoS Configuration