
WR3000 4-Port Wireless DSL/Cable Router
®
95
12.5 Enabling Firewall - Continued
The following table describes the labels in this screen.
Select this check box to activate the fi rewall. The WR3000 Wireless Router performs access
Select this check box to activate the fi rewall. The WR3000 Wireless Router performs access
control and protects against Denial of Service (DoS) attacks when the fi rewall is activated.
To log packets related to fi rewall rules, make sure that
To log packets related to fi rewall rules, make sure that
packets to log. Choose from:
packets to log. Choose from:
(blocked LAN to WAN services appear in the
To log packets related to fi rewall rules, make sure that
To log packets related to fi rewall rules, make sure that
and WAN to WAN/Prestige packets to log. Choose from: •
and WAN to WAN/Prestige packets to log. Choose from: •
Allow one specifi c computer full access to all blocked resources.
Allow one specifi c computer full access to all blocked resources.
Allow one specifi c computer full access to all blocked resources.
Allow one specifi c computer full access to all blocked resources.
You can allow a specifi c computer to access all Internet resources without restriction.
You can allow a specifi c computer to access all Internet resources without restriction.
Enter the IP address of the trusted computer in this fi eld.
to save your changes back to the WR3000 Wireless Router.
to begin confi guring this screen afresh.
to begin confi guring this screen afresh.
Make sure this check box is selected to have the firewall protect your LAN from Denial of Service (DoS) attacks.
ic originating from the LAN is forwarded unless you block certain services in the Services screen. All
AN packets are considered alerts
blocked LAN-to-WAN packets are considered alerts blocked LAN-to-W
ic originating from the W
AN is blocked unless you configure port forwarding rules, One-to-One
ic originating from the WAN is blocked unless you configure port forwarding rules, One-to-Oneic originating from the W
mapping rules, Many-One-to-One mapping rules and/or allow remote management. Forwarded
packets are not considered alerts
trusted computer has full access to all blocked resources. 0.0.0.0 means there is no trusted comput
A trusted computer has full access to all blocked resources. 0.0.0.0 means there is no trusted computA