Operation Manual
Table Of Contents
- VMG4825-B10A
- User’s Guide
- Introducing the VMG
- The Web Configurator
- Quick Start
- Tutorials
- 4.1 Overview
- 4.2 Setting Up an ADSL PPPoE Connection
- 4.3 Setting Up a Secure Wireless Network
- 4.4 Setting Up Multiple Wireless Groups
- 4.5 Configuring Static Route for Routing to Another Network
- 4.6 Configuring QoS Queue and Class Setup
- 4.7 Access the VMG Using DDNS
- 4.8 Configuring the MAC Address Filter
- 4.9 Access Your Shared Files From a Computer
- Technical Reference
- Network Map and Status Screens
- Broadband
- Wireless
- Home Networking
- Routing
- Quality of Service (QoS)
- Network Address Translation (NAT)
- Dynamic DNS Setup
- VLAN Group
- Interface Grouping
- USB Service
- Firewall
- MAC Filter
- Parental Control
- Scheduler Rule
- Certificates
- Log
- Traffic Status
- ARP Table
- Routing Table
- Multicast Status
- xDSL Statistics
- System
- User Account
- Remote Management
- SNMP
- Time Settings
- E-mail Notification
- Log Setting
- Firmware Upgrade
- Backup/Restore
- Diagnostic
- Troubleshooting
- Appendices

VMG4825-B10A User’s Guide
184
CHAPTER 16
Firewall
16.1 Overview
This chapter shows you how to enable and configure the VMG’s security settings. Use the firewall to
protect your VMG and network from attacks by hackers on the Internet and control access to it. By
default the firewall:
• allows traffic that originates from your LAN computers to go to all other networks.
• blocks traffic that originates on other networks from going to the LAN.
The following figure illustrates the default firewall action. User A can initiate an IM (Instant
Messaging) session from the LAN to the WAN (1). Return traffic for this session is also allowed (2).
However other traffic initiated from the WAN is blocked (3 and 4).
Figure 104 Default Firewall Action
16.1.1 What You Can Do in this Chapter
•Use the General screen to configure the security level of the firewall on the VMG (Section 16.2
on page 185).
•Use the Protocol screen to add or remove predefined Internet services and configure firewall
rules (Section 16.3 on page 186).
•Use the Access Control screen to view and configure incoming/outgoing filtering rules (Section
16.4 on page 188).
•Use the DoS screen to activate protection against Denial of Service (DoS) attacks (.Section 16.5
on page 190).
WAN
LAN
3
4
1
2
A