Symbol Technologies AP-5131 Network Router User Manual


 
Configuring Access Point Security
6-33
2. Configure the Settings field as needed to override the settings in the Subnet Access screen
and import firewall rules into the Advanced Subnet Access screen.
3. Configure the Firewall Rules field as required add, insert or delete firewall rules into the
list of advanced rules.
Override Subnet
Access settings
Select this checkbox to enable advanced subnet access rules and
disable existing subnet access rules, port forwarding, and 1 to
many mappings from the system. Only enable advanced subnet
access rules if your configuration requires rules that cannot be
configured within the Subnet Access screen.
Import rules from
Subnet Access
Select this checkbox to import existing access rules (NAT, packet
forwarding, VPN rules etc.) into the Firewall Rules field. This rule
import overrides any existing rules configured in the Advanced
Subnet Access screen. A warning box displays stating the
operation cannot be undone.
Inbound or Outbound Select Inbound or Outbound from the drop-down menu to specify
if a firewall rule is intended for inbound traffic to an interface or
outbound traffic from that interface.
Add Click the Add button to insert a new rule at the bottom of the table.
Click on a row to display a new window with configuration options
for that field.
Insert Click the Insert button to insert a new rule directly above a
selected rule in the table. Clicking on a field in the row displays a
new window with configuration options.
Del (Delete) Click Del to remove the selected rule from the table. The index
numbers for all the rows below the deleted row decrease by 1.
Move Up Clicking the Move Up button moves the selected rule up by one
row in the table. The index numbers for the affected rows adjust to
reflect the new order.
Move Down Clicking the Move Down button moves the selected rule down by
one row in the table. The index numbers for the affected rows
adjust to reflect the new order.
Index The index number determines the order firewall rules are executed.
Rules are executed from the lowest number to the highest number.