Netopia R7200 Network Router User Manual


 
Security 14-19
Basic Firewall is suitable for a LAN containing only client hosts that want to access servers on the WAN, but not
for a LAN containing servers providing services to clients on the WAN. Basic Firewall’s general strategy is to
explicitly forward WAN-originated TCP and UDP traffic to ports greater than 1023. Ports lower than 1024 are the
service origination ports for various Internet services such as FTP, Telnet, and the World Wide Web (WWW).
A more complicated filter set would be required to provide WAN access to a LAN-based server. See the next
section, “Possible modifications,” for ways to allow remote hosts to use services provided by servers on the
LAN.
Possible modifications
You can modify the sample filter set Basic Firewall to allow incoming traffic using the examples below. These
modifications are not intended to be combined. Each modification is to be the only one used with Basic Firewall.
The results of combining filter set modifications can be difficult to predict. It is recommended that you take
special care if you are making more than one modification to the sample filter set.
Trusted host. To allow unlimited access by a trusted remote host with the IP address a.b.c.d (corresponding to
a numbered IP address such as 163.176.8.243), insert the following input filter ahead of the current input
filter 1:
Enabled: Yes
Forward: Yes
Source IP Address: a.b.c.d
Source IP Address Mask: 255.255.255.255
Dest. IP Address: 0.0.0.0
Dest. IP Address Mask: 0.0.0.0
Protocol Type: 0
Trusted subnet. To allow unlimited access by a trusted remote subnet with subnet address a.b.c.d
(corresponding to a numbered IP address such as 163.176.8.0) and subnet mask e.f.g.h (corresponding to a
numbered IP mask such as 255.255.255.0), insert the following input filter ahead of the current input filter 1:
Enabled: Yes
Forward: Yes
Source IP Address: a.b.c.d
Source IP Address Mask: e.f.g.h
Dest. IP Address: 0.0.0.0
Dest. IP Address Mask: 0.0.0.0
Protocol Type: 0