Operation Manual
2 Default Policy: default if accepted.
3 Source IP Address: Enter in the source IP address of the computers that you
want the policy to apply to. If it is only a single computer that you want the policy
applied to, then enter the IP address of that computer in the Start Source IP and
leave the End Source IP blank.
4 Port Range: Enter in the source port range of the TCP/UDP ports that you want
the policy to apply to. If it is only a single port that you want the policy applied to, then
enter the port number in the Start Port field and leave the End Port field blank. If you
want to use all the ports, you can leave the port range empty.
5 Dest IP Address: Enter in the dest IP address of the computers that you want the
policy to apply to. If it is only a single computer that you want the policy applied to,
then enter the IP address of that computer in the Start Source IP and leave the End
Source IP blank.
6 Port Range: Enter in the dest port range of the TCP/UDP ports that you want the
policy to apply to. If it is only a single port that you want the policy applied to, then
enter the port number in the Start Port field and leave the End Port field blank. If you
want to use all the ports, you can leave the port range empty.
7 Protocol: Select the protocol type to allow or deny certain types of IP addresses.
8 Action: you can select drop or accept the IP and port you set above access to
internet.
9 Comment: you can write some word for comment.
4.5.3 MAC Filtering
1 MAC Filtering: Select Disable if you do not want to use MAC filters. Or else
select another if you want to use MAC filter.
2 MAC Address: fill the MAC address you want to drop. Only if you don’t select
MAC Filtering disable.
3 Comment: fill some word you want to comment.
In the below of the page, you will see the current MAC filtering rules in system you
set. You can delete some rules if you want on clicking Delete selected button when
you have selected.
25