User's Manual

UTT Technologies Chapter 9 Firewall
http://www.uttglobal.com Page 143
Chapter 9 Firewall
This chapter describes how to configure firewall features, including access control,
domain filtering, and attack prevention.
9.1 Access Control
This section describes the Firewall > Access Control page, which includes the Access
Rule List and Access Rule Settings.
9.1.1 Introduction to Access Control
9.1.1.1 The Purpose of Access Control Feature
By flexibly utilizing access control, you can not only assign different Internet access
privileges to different LAN users, but also assign different Internet access privileges to the
same users based on schedules. In practice, you can set appropriate access rules
according to the actual requirements of your organization. Such as, for a school, you can
block the students from accessing game websites; for a family, you can only allow your
children to access the Internet during the specified period of time; for a business, you can
block the Financial Department’s employees from accessing the Internet.
9.1.1.2 The Operation Principle of Access Control
By default, the Wireless Router will forward all the valid packets received by the LAN
interface because no access rule exists. After you have configured some access rules, the
Wireless Router will examine each packet received by the LAN interface to determine
whether to forward or drop it, based on the criteria you specified in the access rules.
More specifically, when receiving a packet initiated from LAN, the Wireless Router will
analyze the packet by extracting its source MAC address, source IP address, destination
IP address, protocol type, port number, content, and the date and time at which the packet
was received, and then compare them with each rule in decreasing order of priority. The