Asus ITX-220: 9 ConguringFirewallandNAT

9 ConguringFirewallandNAT: Asus ITX-220

iPBX30 User Manual

Chapter 9

9 ConguringFirewallandNAT

The iPBX30 provides built-in firewall/NAT functions, enabling you

to protect the system against denial of service (DoS) attacks and

other types of malicious accesses to your LAN while providing

Internet access sharing at the same time. You can also specify how

to monitor attempted attacks, and who should be automatically

notied.

This chapter describes how to create/modify/delete ACL (Access

Control List) rules to control the data passing through your network.

You will use rewall conguration pages to:

• Congure rewall global and DoS settings

• Create, modify, delete and view ACL rules.

When you define an ACL rule, you instruct the

iPBX30 to examine each data packet it receives to

determine whether it meets criteria set forth in the

rule. The criteria can include the network or internet

protocol it is carrying, the direction in which it is

traveling (for example, from the LAN to the Internet or

vice versa), the IP address of the sending computer,

the destination IP address, and other characteristics

of the packet data.

If the packet matches the criteria established in a

rule, the packet can either be accepted (forwarded

towards its destination), or denied (discarded),

depending on the action specied in the rule.

9.1 Firewall Overview

9.1.1 Stateful Packet Inspection

The stateful packet inspection engine in the iPBX30 maintains a

state table that is used to keep track of connection states of all the

packets passing through the rewall. The rewall will open a “hole”

to allow the packet to pass through if the state of the packet that

belongs to an already established connection matches the state

maintained by the stateful packet inspection engine. Otherwise,

the packet will be dropped. This “hole” will be closed when the

connection session terminates. No configuration is required for

61

Chapter 9

iPBX30 User Manual

stateful packet inspection; it is enabled by default when the rewall

is enabled. Please refer to section 9.3.1 “Firewall to enable or

disable rewall service on the iPBX30.

9.1.2 DoS (Denial of Service) Protection

Both DoS protection and stateful packet inspection provide rst line

of defense for your network. No conguration is required for both

protections on your network as long as rewall is enabled for the

iPBX30. By default, the firewall is enabled at the factory. Please

refer to section 9.3.1 “Firewall ” to enable or disable rewall service

on the iPBX30.

9.1.3 Firewall and Access Control List (ACL)

9.1.3.1 Priority Order of ACL Rule

All ACL rules have a rule ID assigned the smaller the rule ID, the

higher the priority. Firewall monitors the trafc by extracting header

information from the packet and then either drops or forwards the

packet by looking for a match in the ACL rule table based on the

header information.

The ACL rule checking starts from the rule with the smallest rule ID

until a match is found or all the ACL rules are examined. If no match

is found, the packet is dropped; otherwise, the packet is either

dropped or forwarded based on the action dened in the matched

ACL rule.

9.1.3.2 Tracking Connection State

The stateful packet inspection engine in the firewall keeps track

of the state, or progress, of a network connection. By storing

information about each connection in a state table, iPBX30 is able

to quickly determine if a packet passing through the rewall belongs

to an already established connection. If it does, it is passed through

the rewall without going through ACL rule evaluation.

For example, an ACL rule allows outbound ICMP packet from

192.168.1.1 to 192.168.2.1. When 192.168.1.1 send an ICMP echo

62

iPBX30 User Manual

Chapter 9

request (i.e. a ping packet) to 192.168.2.1, 192.168.2.1 will send an

ICMP echo reply to 192.168.1.1. In the iPBX30, you don’t need to

create another inbound ACL rule because stateful packet inspection

engine will remember the connection state and allows the ICMP

echo reply to pass through the rewall.

9.1.4 Default ACL Rules

The iPBX30 supports two types of access rules:

ACL Rules: for controlling all access to the computers on the

LAN and DMZ and for controlling access to external networks

for hosts on the LAN and DMZ.

• Self-Access Rules: for controlling access to the IPBX30 itself.

Default Access Rules

All trafc from external hosts to the hosts on the LAN and DMZ is

denied.

All traffic originated from the LAN is forwarded to the external

network using NAT.

WARNING: It is not necessary to remove the default

ACL rule from the ACL rule table! It is better to create

higher priority ACL rules to override the default rule.

9.2 NAT Overview

Network Address Translation allows use of a single device, such

as the iPBX30, to act as an agent between the Internet (public

network) and a local (private) network. This means that a NAT

IP address can represent an entire group of computers to any

entity outside a network. Network Address Translation (NAT) is

a mechanism for conserving registered IP addresses in large

networks and simplifying IP addressing management tasks.

Because of the translation of IP addresses, NAT also conceals

true network address from privy eyes and provide a certain degree

security to the local network.

The NAT modes supported are static NAT, dynamic NAT, NAPT,

reverse static NAT and reverse NAPT.

63

Chapter 9

iPBX30 User Manual

9.2.1 NAPT (Network Address and Port Translation)

or PAT (Port Address Translation)

Also called IP Masquerading, this feature maps many internal

hosts to one globally valid Internet address. The mapping contains

a pool of network ports to be used for translation. Every packet

is translated with the globally valid Internet address and the port

number is translated with an un-used port from the pool of network

ports. The gure below shows that all the hosts on the local network

gain access to the Internet by mapping to only one globally valid

IP address and different port numbers from a free pool of network

ports.

64

iPBX30 User Manual

Chapter 9

Figure 9.1 NAPT – Map Any Internal PCs to a Single Global IP Address

Figure 9.2 Reverse NAPT Relayed Incoming Packets to the

Internal Host Base on the Protocol, Port Number or IP Address

65

Chapter 9

iPBX30 User Manual

9.2.2 Reverse NAPT / Virtual Server

Reverse NAPT is also called inbound mapping, port mapping, or

virtual server. Any packet coming to the iPBX30 can be relayed

to the internal host based on the protocol, port number and/or IP

address specified in the ACL rule. This is useful when multiple

services are hosted on different internal hosts. Web server (TCP/80)

is hosted on PC A, telnet server (TCP/23) on PC B, DNS server

(UDP/53) on PC C and FTP server (TCP/21) on PC D. This means

that the inbound traffic of these four services will be directed to

respective host hosting these services.

9.3 Firewall Settings (Firewall/NAT ->Settings)

9.3.1 Firewall Options

The table below lists the rewall options parameters.

Table 9.1. Firewall Options Parameters

Field Description

DoS Check Check or uncheck this box to enable or disable DoS

check. When DoS check is disabled, the following

functionalities are disabled:

Stateful packet inspection

Skip all DoS attack check

Default NAT

Log Port Probing Connection attempt to closed ports will be logged if

this option is enabled.

Stealth Mode If enabled, iPBX30 will not respond to remote peer’s

attempt to connect to the closed TCP/UDP ports.

To congure rewall settings, follow the instructions below:

1. Click on

Firewall/NAT ->Settings

menu to open the

Firewall

Settings

conguration page.

2. Check or uncheck individual check box for each rewall option.

3. Click

Apply

to save the settings.

66

iPBX30 User Manual

Chapter 9

9.3.2 DoSConguration

The iPBX30 has an Attack Defense Engine that protects internal

networks from Denial of Service (DoS) attacks such as SYN

flooding, IP smurfing, LAND, Ping of Death and all re-assembly

attacks. It can drop ICMP redirects and IP loose/strict source routing

packets. For example, a security device with the iPBX30 Firewall

provides protection from “WinNuke”, a widely used program to

remotely crash unprotected Windows systems in the Internet. The

iPBX30 Firewall also provides protection from a variety of common

Internet attacks such as IP Spoofing, Ping of Death, Land Attack,

and Reassembly attacks.

9.3.2.1 DoSProtectionCongurationParameters

The table below provides explanation for each type of DoS attacks.

You may check or uncheck the check box to enable or disable the

protection for each type DoS attacks.

Table 9.2. DoS Attack Denition

Field Description

I P S o u r c e

Intruder uses “source routing” in order to break into the

Route

target system.

IP Spoong Spoong is the creation of TCP/IP packets using somebody

else’s IP address. IP spoofing is an integral part of many

network attacks that do not need to see responses.

Land Attacker sends out packets to the system with the same

source and destination IP address being that of the target

system and causes the target system trying to resolve an

infinite series of connections to itself. This can cause the

target system to slow down drastically.

Ping of Death An attacker sends out larger than 64KB packets to cause

certain operating system to crash.

Smurf An attacker issues ICMP echo requests to some broadcast

addresses. Each datagram has a spoofed IP source address

to be that of a real target-host. Most of the addressed hosts

will respond with an ICMP echo reply, but not to the real

initiating host, instead all replies carry the IP address of the

previously spoofed host as their current destination and

cause the victim host or network to slow down drastically.

67

Chapter 9

iPBX30 User Manual

Field Description

S Y N / I C M P /

Check or un-check this option to enable or disable the

UDP Flooding

logging for SYN/ICMP/UDPooding attacks. These attacks

involve sending lots of TCP SYN/ICMP/UDP to a host in a

very short period. iPBX30 will not drop the ooding packets

to avoid affecting the normal trafc.

T C P X M A S /

A hacker may be scanning your system by sending these

NULL/ FIN Scan

specially formatted packets to see what services are

available. Sometimes this is done in preparation for a

future attack, or sometimes it is done to see if your system

might have a service, which is susceptible to attack.

XMAS scan:

A TCP packet has been seen with a

sequence number of zero and the FIN, URG, and PUSH

bits are all set.

NULL scan:

A TCP packet has been seen with a

sequence number of zero and all control bits are set to

zero.

FIN scan:

A hacker is scanning the target system using

a stealthmethod. The goal of the hacker is to nd out if

they can connect to the system without really connecting

using the “FIN” scanning. It attempts to close a non-

existent connection on the server. Either way, it is an error,

but systems sometimes respond with different error results

depending upon whether the desired service is available or

not.

Re-assembly In the teardrop attack, the attacker’s IP puts a confusing

offset value in the second or later fragment. If the receiving

operating system does not have a plan for this situation, it

can cause the system to crash.

WinNUKE Check or un-check this option to enable or disable

protection against Winnuke attacks. Some older versions

of the Microsoft Windows OS are vulnerable to this attack.

If the computers in the LAN are not updated with recent

versions/patches, you are advised to enable this protection

by checking this check box.

68

iPBX30 User Manual

Chapter 9

9.3.2.2 ConguringDoSSettings

To congure DoS settings, follow the instructions below:

1. Click on

Firewall / NAT ->Settings

menu to open the Firewall

General conguration page.

2. Check or uncheck individual check box for each type DoS

protection.

3. Click

Apply

to save the settings.

Figure 9.3. Firewall General Conguration Page

9.4 ACLRuleCongurationParameters

9.4.1 ACLRuleCongurationParameters

The table below describes the configuration parameters firewall

inbound, outbound and self-access ACL rules.

69

Chapter 9

iPBX30 User Manual

Table 9.3. ACL Rule Conguration Parameters

Field Description

Trafc Direction

select from the available option in the drop-

down list to congure the ACL.

For dual-WAN conguration, two options are available – LAN ->WAN and

WAN ->LAN.

For WAN + DMZ configuration, six options are available LAN ->WAN,

WAN ->LAN, LAN ->DMZ, DMZ->LAN, WAN ->DMZ and DMZ ->WAN.

ID

Add New

Click on this option to add a new ACL rule.

Rule Number

Select a rule from the drop-down list, to modify its

settings.

Move to

This option allows you to set a priority for this rule. The iPBX30 Firewall acts

on packets based on the priority of the rules. Set a priority by specifying a

number for its position in the list of rules:

1 (First)

This number marks the highest priority.

Other

Select other numbers to indicate the priority you wish to

numbers

assign to the rule.

Log

Check this box to enable loggingfor this ACL rule; otherwise, keep it

unchecked.

Action

Allow

Select this button to congure the rule as an allow rule.

This rule when bound to the Firewall will allow matching

packets to pass through.

Deny

Select this button to congure the rule as a deny rule.

This rule when bound to the Firewall will not allow

matching packets to pass through.

Route to

keep the setting to “AUTO” unless packets are routed to specic interface.

Available options include AUTO, eth1 (WAN1), eth2 (WAN2), PPP1 (WAN1-

unnumbered), PPP1 (WAN2-unnumbered), PPP3 (WAN1-PPPoE1), PPP4

(WAN1-PPPoE2), PPP5 (WAN2-PPPoE1), PPP6 (WAN2-PPPoE2). If WAN

interface is set to DMZ mode, only AUTO, eth1, PPP1/3/4 are available.

These options are selectable from the drop-down list. If AUTO is selected,

the router will route the packets based on the information in the routing

table.

70

iPBX30 User Manual

Chapter 9

Field Description

NAT

None

Select this option if you don’t intend to use NAT in this

ACL rule.

IP Address

Select this option to specify the source IP address for

outgoing trafc. This option is called.

Auto

iPBX30 automatically uses the IP address of the

interface as the source IP address for outgoing trafc. It

is recommended that you select this option if NAT is to

be used for outgoing trafc.

Source

This option allows you to set the source network to which this rule

should apply. Use the drop-down list to select an option:

Any

This option allows you to apply this rule to all the

computers in the source network, such as those on the

Internet for the inbound trafc or all the computers in the

local network for outbound trafc.

IP Address

This option allows you to specify an IP address on which

this rule will be applied.

IP Address

Specify the appropriate network address

Subnet

This option allows you to include all the computers that

are connected in an IP subnet. When this option is

selected, the following elds become available:

Field Description

Address

Enter the appropriate IP address.

Mask

Enter the corresponding subnet mask.

MAC Address

This option allows you to specify a MAC address on

which this rule will be applied.

MAC

Enter the desired MAC address.

Destination

This option allows you to set the destination network to which

this rule should apply. Use the drop-down list to select one of the

following options:

Any

This option allows you to apply this rule to all the

computers in the local network for inbound trafc or any

computer in the Internet for outbound trafc.

71

Chapter 9

iPBX30 User Manual

IP Address,

Select any of these options and enter details as

Subnet

described in the Source IP section above.

Service

Select a service, from the drop-down list, to which this rule

should apply. If the desired service is not listed, click on the

Edit button to create a new service.

Time

Select a time slot during which this rule should apply.

Enable

Check this box if you want to activate the ACL rule at the

time specied. Uncheck this box to make the rule active

at all times

Date and Time

Chck the desired dates and time for this ACL rule.

Table 9.4. Service Conguration Parameters

Field Description

Service Name

Enter a distinctive name identifying the new service.

Protocol

Select a protocol type from the drop-down list. Available options are All,

TCP, UDP, ICMP, IGMP, AH ESP and TCP/UDP.

Port

This option allows you to specify the port number(s) used by the device.

Use the drop-down list to select one of the following options:

Any

Select this option if the service is used to designate an

arbitary application.

Single

Select this option if the service uses a specific port

number.

Port Number

Enter the port number

Range

Select this option if the service uses a range of ports.

The followingelds become available for entry when this

option is selected.

Start Port

Enter the starting value of the port range

End Port

Enter the ending value of the port range

72

iPBX30 User Manual

Chapter 9

Field Description

This option allows you to select the ICMP message type for the service. The

supported ICMP message types are:

Any (default)

• 0: Echo reply

• 1: Type 1

• 2: Type 2

• 3: Dst unreach: destination unreachable

• 4: Src quench: source quench

• 5: Redirect

• 6: Type 6

• 7: Type 7

• 8: Echo req:

• 9: Router advertisement

• 10: Router solicitation

• 11: Time exceed: time exceeded

• 12: Parameter problem

• 13: Timestamp request

• 14: Timestamp reply

• 15: Info request: information request

• 16: Info reply: information reply

• 17: Addr mask req: address mask request

• 18: Addr mask reply: address mask reply

9.5 ConguringACLRules–(Firewall->ACL)

By creating ACL rules in the ACL configuration page, you can

perform access control (allow or deny) to both the trusted and un-

trusted networks.

Options in this conguration page allow you to:

Add a rule, and set parameters for it

• Modify an existing rule

• Delete an existing rule

• View congured ACL rules

73

Chapter 9

iPBX30 User Manual

Figure 9.4. ACL Conguration Page

9.5.1 Add an ACL Rule

To add an ACL rule, follow the instructions below:

1. Click

Firewall/NAT ->ACL

menu to open the ACL Rule

conguration page.

2. Select an option from the

Traffic Direction

drop-down list. For

example, if you want to create an ACL to lter trafc originated from

LAN and destined to WAN, then choose

LAN ->WAN

option.

3. Select

Add New

from the “ID” drop-down list.

4. Set desired action (Allow or Deny) from the

Action

drop-down list.

5. Select from the

Route To

drop-down list if you intend to direct

the trafc to a specic interface. Choose AUTO if you want to

have the iPBX30 to route the trafc automatically.

6. Choose NAT type and enter the required information for the

selected NAT type.

74

iPBX30 User Manual

Chapter 9

7. Make changes to any or all of the following fields: source/

destination IP, service, time and log.

8. Assign a priority for this rule by selecting a number from the

Move to

drop-down list. Note that the number indicates the

priority of the rule with 1 being the highest. Higher priority rules

will be examined prior to the lower priority rules by the rewall.

9. Click on the

Add

button to create the new ACL rule. The new

ACL rule will then be displayed in the inbound access control list

table at the bottom half of the Inbound ACL Conguration page.

The gure below illustrates how to create a rule to deny outbound

HTTP trafc originated from the host w/ IP address 192.168.1.129.

Figure 9.5. ACL Conguration Example

Figure 9.6. Sample ACL List Table

75

Chapter 9

iPBX30 User Manual

9.5.2 Modify an ACL Rule

To modify an ACL rule, follow the instructions below:

1.Click

Firewall/NAT ->ACL

menu to open the ACL Rule

Conguration page.

2. Click on the icon of the rule to be modied in the inbound

ACL table or select the rule number from the

ID

drop-down list.

3. Make desired changes to any or all of the following elds: action,

source/destination IP, service, time and log.

4. Click on the

Modify

button to modify this ACL rule. The new

settings for this ACL rule will then be displayed in the access

control list table at the bottom half of the ACL Configuration

page.

9.5.3 Delete an ACL Rule

To delete an ACL rule, click on the icon in front of the rule to be

deleted.

9.5.4 Display ACL Rules

To see existing ACL rules, just open the ACL Rule Configuration

page by clicking

Firewall/NAT ->ACL

menu and then select a trafc

direction from the T

rafc Direction

drop-down list.

9.6 ConguringSelf-AccessACLRules

–(Firewall/NAT ->Self-Access ACL)

Self-Access rules control access to/from the iPBX30 itself. You may

use Self-Access Rule Conguration page to:

Add a Self-Access rule

• Modify an existing Self-Access rule

• Delete an existing Self-Access rule

• View existing Self-Access rules

76

iPBX30 User Manual

Chapter 9

Figure 9.7. Self-Access ACL Conguration Page

9.6.1 Add a Self-Access Rule

To add a Self-Access rule, follow the instructions below:

1. Click

Firewall/NAT ->Self-Access ACL

menu to open the Self-

Access Rule Conguration page.

2. Select “

Add New

” from the “ID” drop-down list.

3. Set desired action (Allow or Deny) from the

Action

drop-down list.

4. Assign a priority for this rule by selecting a number from the

Move to

drop-down list. Note that the number indicates the

priority of the rule with 1 being the highest. Higher priority rules

will be examined prior to the lower priority rules by the rewall.

5. Make desired changes to any or all of the following fields:

source/destination IP, service, time and log.

6. Click on the "

Add

" button to create the new Self-Access

rule. The new rule will then be displayed in the Existing Self-

Access ACL list table at the bottom half of the Self-Access ACL

conguration page.

77

Chapter 9

iPBX30 User Manual

Example

The gure below shows a sample self-access ACL conguration to

allow HTTP trafc from any one to iPBX30.

Figure 9.8. Self-Access ACL Conguration Example

9.6.2 Modify a Self-Access Rule

To modify a Self-Access rule, follow the instructions below:

1. Click

Firewall/NAT ->Self-Access ACL

menu to open the Self-

Access ACL conguration page.

2. Click on the icon of the Self-Access rule to be modied in the

Existing Self-Access ACL

table or select the Self-Access ACL

from the

ID

drop-down list.

3. Make desired changes to any or all of the following elds: action,

source/destination IP, service, time and log.

4. Click on the "

Modify

" button to save the changes. The new

settings for this Self-Access rule will then be displayed in the

Existing Self-Access ACL table located at the bottom half of the

Self-Access ACL conguration page.

9.6.3 Delete a Self-Access Rule

To delete a Self-Access rule, click on the icon of the rule to be

deleted.

78

iPBX30 User Manual

Chapter 9

9.6.4 ViewConguredSelf-AccessRules

To see existing Self-Access Rules, just open the Self-Access ACL

configuration page by clicking

Firewall/NAT ->Self-Access ACL

menu.

9.7 CongureVirtualServer

Virtual server allows you to congure up to ten public servers (such

as a Web, E-mail, FTP server and etc.) accessible by external

users of the Internet. Each service is provided by a dedicated

server configured with a fixed IP Address. Although the internal

service addresses are not directly accessible to the external users

the router is able to identify the service requested by the service

port number and redirects the request to the appropriate internal

server.

Note: iPBX30 supports only one server of any

particular type at a time.

Figure 9.9. Virtual Server Conguration Page

9.7.1 VirtualServerCongurationParameters

The table below describes the conguration parameters available

for virtual server conguration.

79

Chapter 9

iPBX30 User Manual

Table 9.5. Virtual Server Conguration Parameters

Setting Description

ID

Add New

Click on this option to add a new virtual server.

Number

Select the ID of a virtual server from the drop-down list to

modify its settings.

Move to

This option allows you to set a priority for virtual server rule check. NAT

does the IP and/or port mapping based on the priority of the rules. Set a

priority by specifying a number for its position in the list of rules

1 (First)

This number marks the highest priority.

Other

Select other numbers to indicate the priority you wish to

numbers

assign to the rule.

Destination

This option allows you to set the destination network to which this rule

should apply. Use the drop-down list to select one of the following options:

IP Address

Enter the IP address of the virtual server if the virtual

server has a known public IP address.

Interface

Use the IP address of the selected interface as the

destination IP address. Available options are:

eth1 (WAN1)

eth2 (WAN2)

ppp1 (WAN1 unnumbered)

ppp2 (WAN2 unnumbered)

ppp3 (WAN1 PPPoE 1)

ppp4 (WAN1 PPPoE 2)

ppp5 (WAN2 PPPoE 1)

ppp6 (WAN2 PPPoE 2)

Service

Select a service, from the drop-down list, to which this rule

should apply. If the desired service is not listed, click on

the

Edit

button to create a new service.

Redirect IP

Enter the IP address of the computer (usually a server in

your LAN) that you want the incoming trafc to be directed.

For example, if IP address of the web server on your LAN

is 192.168.1.28, please enter 192.168.1.28 here.

80

iPBX30 User Manual

Chapter 9

Setting Description

Redirect

Select a service, from the drop-down list, to which this rule

Service

should apply. If the desired service is not listed, click on

the "

Edit

" button to create a new service.

Bypass ACL

Check this option if you do not want firewall to perform

access control on this virtual server. This means that

the virtual server allows anyone to access the service

provided. If you want to control who has access to this

virtual server, un-check this option and create a proper

ACL rule to control access to the virtual server.

Table 9.6. Port Numbers for Popular Applications

Application Service Port Numbers

AOE II (Server) 2300-2400

AUTH 113

Baldurs Gate II 2300-2400

Battle Isle 3004-3004

Counter Strike 27005-27015

Cu See Me 7648-7648, 56800, 24032

Diablo II 4000-4000

DNS UDP 53-53

FTP TCP 21-21

FTP TCP 20(ALG)-21

GOPHER TCP 70-70

HTTP TCP 80-80

THHP8080 TCP 8080-80880

HTTPS TCP 443-443

I-phone 5.0 TCP/UDP 22555-22555

ISAKMP UDP 500-500

mirc 66011-700

MSN Messenger 1863 ALG

Need for Speed 5 9400-9400

Netmeeting Audio TCPP 1731-1731

Netmeeting Call TCP 1720-1720

Netmeeting Conference UDP 495000-49700

Netmeeting File Transfer TCP 1503--1503

81

Chapter 9

iPBX30 User Manual

Application Service Port Numbers

Netmeeting or VoIP 1503-1503, 1720(ALG)

NEWS TCP 119-119

PC Anywhere TCP 5631

PC Anywhere TCP 5631, UDP 5632

POP3 TCP 110-110

Powwow Chat 13233-13233

Red Alert II 1234-1237

SMTP TCP 25-25

Sudden Strike 2300-2400

TELNET TCP 23-23

Win VNC UDP 5800-5800

9.7.2 Virtual Server Example 1 – Web Server

The gure below shows illustrates the network topology for the web

server deployment. This web server provides HTTP service using

TCP port 8080.

Figure 9.10. Virtual Server Deployment Topology

Following describes the procedure to setup the web server.

1. Click the

Firewall/NAT ->Virtual Server

menu to open the

Virtual Server conguration page.

2. Select destination IP type and service type.

82

iPBX30 User Manual

Chapter 9

Figure 9.11. Virtual Server Example 1 – Web Server

3. Enter the IP address of the web server, which is 192.168.1.28,

in

Redirect IP

eld.

4. Since the web server is not using the standard TCP port, which

is 80, for providing the http service, a new service type must

be created for http service using TCP port 80. Click on the

Edit

button on the redirect service eld to create a new service type.

In the popped up Service conguration page, enter the service

name, protocol and port number and then click on the

Add to

list

to create the new service type, HTTP_8080. Finally, click

the

Save & Exit

button to save the new service.

Figure 9.12. Adding a New Service

83

Chapter 9

iPBX30 User Manual

5. Select the service, HTTP_8080, from the Redirect Service drop-

down list.

6. Click

Add

to save the virtual server settings.

9.7.3 Virtual Server Example 2 – FTP Server

This FTP server provides FTP service using standard FTP port.

Following describes the procedure to setup the FTP server.

1. Click the

Firewall/NAT ->Virtual Server

menu to open the

Virtual Server conguration page.

2. Enter the needed information.

3. Click

Add

to save the virtual server settings.

Figure 9.13. Virtual Server Example 2 – FTP Server

9.7.4 Virtual Server Example 3 – FTP Server with

Access Control

This example is similar to the previous example described in

section 9.7.3 but with access control dictated by the firewall ACL

rule. In this example, we want to limit the FTP server access to a

network, 168.192.128.0.

The following describes the procedure to setup such a FTP service.

84

iPBX30 User Manual

Chapter 9

1. Create an FTP virtual server.

a) Click the

Firewall/NAT ->Virtual Server

menu to open the

Virtual Server Conguration.

b) Enter the needed information.

c) Make sure that

Bypass ACL

box is unchecked.

d) Click

Add

to save the virtual server settings.

Figure 9.14. Virtual Server Example 3 – FTP Server

2. Create an ACL rule to control access to the FTP server.

a) Click

Firewall ->ACL

menu to open the ACL Rule conguration

page.

b) Select

WAN ->LAN

option from the

Trafc Direction

drop-down

list.

c) Select

Add New

from the

ID

drop-down list.

d) Select

Allow

from the

Action

drop-down list.

e) Select

Subnet

from the

Source Type

drop-down list.

f) Enter the

168.192.128.0

and

255.255.255.0

for the

Source

Address

and

Mask

elds respectively.

g) Select

FTP

from the

Service Type

drop-down list.

h) Assign a priority for this rule by selecting a number from the

Move to

drop-down list. Note that the number indicates the

priority of the rule with 1 being the highest. Higher priority rules

85

Chapter 9

iPBX30 User Manual

will be examined prior to the lower priority rules by the rewall.

i) Click on the

Add

button to create the new ACL rule.

Figure 9.15. Firewall ACL for Virtual Server Example 3 FTP Server

9.8 ConguringSpecialApplication

Some applications use multiple TCP/UDP ports to transmit data.

Due to NAT, these applications cannot work with the router. Special

Application setting allows some of these applications to work

properly.

Note: Only one PC can use one particular special

application at a time.

9.8.1 SpecialApplicationCongurationParameters

The table below describes the conguration parameters available

for virtual server conguration.

86

iPBX30 User Manual

Chapter 9

Table 9.7. Special Application Conguration Parameters

Setting Description

Enabled Check this box to activate the policy.

Trigger Protocol Select the protocol type from the drop-down list. The

available options are TCP, UDP and TCP/UDP.

Outgoing (Trigger)

The port range this application uses when it sends

Port

outbound packets. The outgoing port numbers act

as the trigger. When the router detects the outgoing

packets with these port numbers, it will allow the

corresponding inbound packets with the incoming port

numbers specied in the

Incoming Port Range

eld to

pass through the router.

Incoming Protocol The protocol that the corresponding inbound packet

used. The available options are TCP, UDP and TCP/

UDP.

Incoming Port The port range that the corresponding inbound packet

used. The port range is indicated by a pair of numbers w/

a dash separating the numbers, e.g. 100-200. Multiple

port ranges is separated by a comma, e.g. 100-200,

700-800.

Comment You may enter a description for the application here, e.g.

a name identifying the application.

Table 9.8. Port Numbers for Popular Applications

Application Outgoing Port

Incoming Port Range

Number

Battle.net 6112 6112

DialPad 7175 51200, 51201, 51210

ICU II 2019 2000-2038, 2050-2051,

2069, 2085, 3010-3030

MSN Gaming Zone 47624 2300-2400, 28800-29000

PC to Phone 12053 12120, 12122, 150-24220

Quick Time 4 554 6970-6999

wowcall 8000 4000-4020

Yahoo Messenger 5050 5000-5101

87

Chapter 9

iPBX30 User Manual

9.8.2 Special Application Example

Figure 9.16. Special Application Conguration Page

Following describes the procedure to setup a special application for

MSN Gaming Zone.

1. Click the

Firewall/NAT ->Special Application

menu to open the

Special Application conguration page.

2. Check

Enabled

checkbox.

3. Select

TCP/UDP

from the trigger protocol drop-down list. If you

are not sure whether the application uses TCP or UDP protocol,

you may select TCP/UDP in this eld.

4. Enter outgoing port range, in this case: 47624 ~ 47624.

5. Select

TCP/UDP

from the incoming protocol drop-down list.

If you are not sure whether the application uses TCP or UDP

protocol, you may select TCP/UDP in this eld.

6. Enter incoming port range, in this case: 2300-2400 and

28800-29000

7. In the

Comment

eld, enter the name identifying this application,

which is MSN Gaming Zone in this instance.

8. Click

Apply

to save the settings.

88