beautypg.com

ZyXEL Communications Parental Control Gateway HS100/HS100W User Manual

Page 267

background image

HomeSafe User’s Guide

27-4

Filter Configuration

Table 27-1 Abbreviations Used in the Filter Rules Summary Menu

FIELD

DESCRIPTION

M More.

“Y” means there are more rules to check which form a rule chain with the present rule. An
action cannot be taken until the rule chain is complete.

“N” means there are no more rules to check. You can specify an action to be taken i.e.,
forward the packet, drop the packet or check the next rule. For the latter, the next rule is
independent of the rule just checked.

m Action

Matched.

“F” means to forward the packet immediately and skip checking the remaining rules.
“D” means to drop the packet.
“N“ means to check the next rule.

n

Action Not Matched.
“F” means to forward the packet immediately and skip checking the remaining rules.
“D” means to drop the packet.
“N” means to check the next rule.

The protocol dependent filter rules abbreviation are listed as follows:

Table 27-2 Rule Abbreviations Used

ABBREVIATION DESCRIPTION

IP

Pr Protocol

SA Source

Address

SP Source Port number

DA Destination

Address

DP Destination Port number

GEN

Off Offset

Len Length

Refer to the next section for information on configuring the filter rules.

27.2.1 Configuring a Filter Rule

To configure a filter rule, type its number in Menu 21.1.1 - Filter Rules Summary and press
[ENTER] to open menu 21.1.1.1 for the rule.

To speed up filtering, all rules in a filter set must be of the same class, i.e., protocol filters or

generic filters. The class of a filter set is determined by the first rule that you create. When

applying the filter sets to a port, separate menu fields are provided for protocol and device filter

sets. If you include a protocol filter set in a device filter field or vice versa, the HomeSafe will

warn you and will not allow you to save.

27.2.2 Configuring a TCP/IP Filter Rule

This section shows you how to configure a TCP/IP filter rule. TCP/IP rules allow you to base the

rule on the fields in the IP and the upper layer protocol, for example, UDP and TCP headers.