Differences

This shows you the differences between two versions of the page.

firewall:example_3 [2010/11/04 13:39]
tibor
firewall:example_3 [2010/11/04 13:58] (current)
tibor
Line 59: Line 59:
As you can see, we once again needed to check each ruleset to make sure the packets are allowed through, though many rulesets already allow them and does not need to be modified. Actually you only needed to add only one rule (in step 2), the rest was already present. And the modify action of the outgoing rule also helps our incoming packet to get back in and be sent to the correct PC. As you can see, we once again needed to check each ruleset to make sure the packets are allowed through, though many rulesets already allow them and does not need to be modified. Actually you only needed to add only one rule (in step 2), the rest was already present. And the modify action of the outgoing rule also helps our incoming packet to get back in and be sent to the correct PC.
 +
 +===== Entering the rule =====
 +You enter the rule of step 2 above into the "Additional rules" fields of the [[web GUI:security profile]] page:
 +| ET1 | Incoming user | post | proto == tcp && dport == 4044 accept |
 +All other necessary rules are already present in the standard firewall ruleset.
firewall/example_3.1288874346.txt.gz · Last modified: 2010/11/04 13:39 by tibor
CC Attribution-Noncommercial-Share Alike 3.0 Unported
www.chimeric.de Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0