Delete an inbound acl rule, Display existing inbound acl rules, Configuring outbound acl rules – Asus RX3041H User Manual

Page 73: Add an outbound acl rule, 5 configuring outbound acl rules

Advertising
background image

RX3041H User’s Manual

Chapter 9. Configuring Firewall/NAT Settings

59

2. Click on the

icon of the rule to be modified in the inbound ACL table or select the rule number

from the “ID” drop-down list.

3. Make desired changes to any or all of the following fields: action, source/destination IP,

source/destination port, protocol, port mapping, time ranges, application filtering, and log. Please
see Table 9.1 for explanation of these fields.

4. Click on the

button to modify this ACL rule. The new settings for this ACL rule will then be

displayed in the inbound access control list table at the bottom half of the Inbound ACL
configuration page.

9.4.3 Delete

an

Inbound ACL Rule

To delete an inbound ACL rule, click on the in front of the rule to be deleted or follow the instructions below:

1. Open the Inbound ACL Rule Configuration Page by clicking on the Firewall

Î Inbound ACL

menu.

2. Click on the

icon of the rule to be deleted in the inbound ACL table or select the rule number

from the “ID” drop-down list.

3. Click on the

button to delete this ACL rule. Note that the ACL rule deleted will be

removed from the ACL rule table located at the bottom half of the same configuration page.

9.4.4 Display

Existing Inbound ACL Rules

To see existing inbound ACL rules, just open the Inbound ACL Rule configuration page by clicking on the
Firewall

Î Inbound ACL menu.

9.5 Configuring Outbound ACL Rules

Outbound ACL rules allow you to control (allow or deny) Internet or external network access for computers on
your LAN.

9.5.1 Add

an

Outbound ACL Rule

To add an outbound ACL rule, follow the instructions below:

1. Open the Outbound ACL Rule configuration page by clicking on the

Firewall

Î Outbound ACL menu.

2. Select

Add New” from the “ID” drop-down list.

3. Set desired action (Allow or Deny) from the “Action” drop-down list.

4. Make changes to any or all of the following fields: source/destination IP,

source/destination port, protocol, NAT, time ranges, application filtering,
and log. Please see Table 9.1 for explanation of these fields. Figure 9.9
illustrates how to create a rule to deny outbound HTTP traffic for a host w/ IP address
192.168.1.15.

Advertising