User`s guide

Synology DiskStation User's Guide
Based on DSM 3.2
45 Chapter 6: Enhance Internet Security
4 Specify the source IP address in the Source IP section. You can choose to allow or deny access from a
particular source IP using one of the following options:
All: Choose this option to apply the rule to all source IP addresses.
Single host: Choose this option to apply the rule to an IP address.
Subnet: Choose this option to apply the rule to a subnet.
5 Choose Allow or Deny in the Action section to allow or deny the source IP address to access the specified
ports.
Note:
When you combine multiple LAN ports with link aggregation, firewall will apply the rules from the first network
interface, and reserve the rules of the second network interface. For more information about link aggregation, see
"LAN" on Page 19.
1
If your system has multiple network ports connecting to the same subnet, the firewall rules might not work properly.
To change the priorities of rules:
Reorder the rules by dragging any of them up or down. Rules at the top will have higher priorities.
To disable rules:
Uncheck the checkboxes next to the rules.
To delete rules:
Select the rules you want to delete and click Delete.
Automatically Block Suspicious Login Attempts
Auto block allows you to prevent unauthorized login. After enabling the service, an IP address will be blocked if it
has too many failed login attempts. Failed login attempts via SSH, Telnet, rsync, Network Backup, Shared Folder
Sync, FTP, WebDAV, Synology mobile apps, File Station, or DSM will all add up.
Go to Main Menu > Control Panel > Auto Block to manage auto block.
---------
1
Link Aggregation is supported on specific models only.