06.03.2015 Views

iPECS SBG-1000 User Manual

iPECS SBG-1000 User Manual

iPECS SBG-1000 User Manual

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>iPECS</strong> <strong>SBG</strong>-<strong>1000</strong> <strong>User</strong> <strong>Manual</strong> (DATA Features)<br />

intrusions from the outside, while allowing home users access to the Internet services that they<br />

require.<br />

The firewall rules specify what types of services available on the Internet may be accessed from<br />

the home network and what types of services available in the home network may be accessed<br />

from the Internet. Each request for a service that the firewall receives, whether originating from the<br />

Internet or from a computer in the home network, is checked against the set of firewall rules to<br />

determine whether the request should be allowed to pass through the firewall. If the request is<br />

permitted to pass, then all subsequent data associated with this request (a “session”) will also be<br />

allowed to pass, regardless of its direction.<br />

For example, when you point your browser to a Web page, a request is sent to the Internet for<br />

retrieving and loading this page. When this request reaches <strong>iPECS</strong> <strong>SBG</strong>-<strong>1000</strong>, its firewall identifies<br />

the request’s type and origin. In the Web browsing example, HTTP is the request’s type, and your<br />

PC is its origin. Unless you have configured <strong>iPECS</strong> <strong>SBG</strong>-<strong>1000</strong>’s Access Control feature to block<br />

requests of this type originating from your PC, the firewall will allow this request to pass out onto<br />

the Internet (for more on configuring <strong>iPECS</strong> <strong>SBG</strong>-<strong>1000</strong>’s Access Control, refer to Section 5.2.2).<br />

When the Web page is returned from the Web server, the firewall associates it with the current<br />

connection and allows it to pass, regardless of whether HTTP access from the Internet to your<br />

home network is blocked or permitted. It is the origin of the request, not the subsequent responses<br />

to this request, that determines whether a connection can be established or not.<br />

5.2.2 Controlling Your Network’s Access to Internet Services<br />

You may want to block specific computers within the home network (or even the whole network)<br />

from accessing certain services available on the Internet. For example, you may want to prohibit<br />

one computer from browsing the Web, another computer from transferring files using FTP, and the<br />

whole network from accessing email (by blocking the outgoing requests to POP3 servers on the<br />

Internet). The ‘Access Control’ screen enables you to apply restrictions on the types of connection<br />

requests that may pass from the home network out to the Internet, and to block the corresponding<br />

network traffic in both directions. In addition, this screen can be used for allowing access to<br />

specific services when the ‘Maximum’ security is applied (as described in Section 5.2.1).<br />

To block access to a service available on the Internet:<br />

1. Click the ‘Access Control’ link under the ‘Firewall’ menu item. The ‘Access Control’ screen<br />

appears.<br />

Figure 5.4 Access Control<br />

2. Click the ‘New Entry’ link. The ‘Add Access Control Rule’ screen appears.<br />

37

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!