Port Blocking

Port Blocking

Port blocking is a way of preventing users on the LAN from connecting with devices on the WAN via specific services, protocols or applications. It achieves this by permitting or denying traffic from the LAN to pass to the WAN, based on the target port.

Managed Services is the end result of Port Blocking.  Managed Services allows you to manage specific services on your network.  Furthermore, Managed Services filtering is used to block certain outbound traffic that is directed from a computer or device on the internal network to a specific destination port or port range. In the list of trusted devices, a device entered in the list is excluded from the filtering defined in the service filter table.

Use this screen to configure Port Blocking.  You can turn port blocking on or off and configure new and existing Port blocking rules.  These can be managed all day, specific says, or specific times.

Click Security > Port Blocking. The following screen displays.

The following table describes the labels in this screen.

Managed Services
Application Name
Protocol
Port Range
Managed Weekdays
Managed Time
Status
Operation
Add Managed Service
Save
Trusted Device
Trusted Device List
Application Name
IP Address
Status
Operation
Add Trusted Device
Use this field to turn port blocking on or off.
• Enable to turn port blocking on.
• Disable to turn port blocking off.
This displays the name you assigned to the blocking rule when you created it.
This field displays the protocol or protocols to which this rule applies:
• Transmission Control Protocol (TCP)
• User Datagram Protocol (UDP)
This displays the start and end port for which this blocking rule applies.
This displays the days of the week on which this rule applies.
This displays the start (From) and end (To) of the time period during which this rule applies, on the specified Managed Weekdays.
This displays whether the blocking rule is currently Enabled or Disabled.
Use this field to Edit or Delete the Port Blocking Rule for this device.
Click l to Edit the Rule.
Click to Delete the Rule.
Click this to add a new port blocking rule.
Click this to save your changes to the fields in this screen.
Use this field to turn the Trusted Device Rule on or off.
• Enable to turn Trusted Device Rule on.
• Disable to turn Trusted Device Rule off.
This displays the list of Trusted Devices that you have created.
This displays the arbitrary name of each trusted device you configured.
This displays the LAN IP address of each trusted device.
This displays whether the device is currently trusted (Enabled) or untrusted (Disabled).
Use this field to Edit or Delete the Trusted Device Rule for this device.
Click to Edit the Rule.
Click to Delete the Rule.
Click this to create a new trusted device rule.

Add Managed Service

Managed Services allows you to block the certain applications by blocking its service ports; the function also allows you to block the services by schedule.

Managed Services filtering is used to block certain outbound traffic that is directed from a computer or device on the internal network to a specific destination port or port range. If the filter rule is enabled, users can press the “Add Managed Service” link to add a managed service filter rule. A pop-up window is displayed.

To add a new port blocking rule, click Add Managed Service in the Security > Port Blocking screen.

To edit an existing port blocking rule, locate the rule in the Security > Port Blocking screen and click its  button to Edit.

To delete an existing port blocking rule, locate the rule in the Security > Port Blocking screen and click its    button to Delete it.

 

NOTE: Ensure that Port Blocking is Enabled in the Security > Port Blocking screen in order to add or edit port blocking rules.

The following table describes the labels in the Add Managed Services screen.

Rule Status
Application Name
Protocol
Port Range
Manage All Day
Managed Weekdays
Selected Time
Use this field to define whether the trusted device rule should be active or not.
• Enable to activate the trusted device rule.
• Disable to deactivate the trusted device rule.
Enter a name for the application for which you want to create the rule.
NOTE: This name is arbitrary, and does not affect functionality in any way.
Use this field to specify whether the ARIA3411 should filter via:
• Transmission Control Protocol (TCP)
• User Datagram Protocol (UDP)
• Both TCP and UDP (TCP/UDP).
NOTE: If in doubt, leave this field at its default
Use these fields to specify the start and end port for which this filtering rule applies. These are the ports to which traffic will be blocked.
Enter the start port number in the first field, and the end port number in the second field.
To specify only a single port, enter its number in both fields.
Use this field to specify whether the filtering rule should apply on all days of the week, at all times, or whether the rule should be applied only at certain times.
Enable to apply the rule at all times.
Disable to apply the rule only at certain times.
Additional fields display, allowing you to specify the times at which the rule should be applied.
Use the Managed Weekdays fields to specify the days on which the rule should be applied.
A red background indicates that the rule will be applied (traffic will be blocked), and a green background indicates that the rule will not be applied (traffic will not be blocked).
Click a day to toggle the rule on or off for the relevant day.
Use the Selected Time fields to specify the period during which the rule should be applied.
Enter the start time using twenty-four-hour notation, and enter the end time.
Click this to save your changes to the fields in this screen.

Add Trusted Device

Trusted devices are those to which Managed Services rules are not applied.

To add a new trusted device rule, click Add Trusted Device in the Security > Port Blocking screen.

To edit an existing trusted device rule, locate the rule in the Security > Port Blocking screen and click its  button to Edit.

To delete an existing trusted device rule, locate the rule in the Security > Port Blocking screen and click its    button to Delete it.

The following screen displays.

Rule Status
Host Name
Local IP Address
Save
Use this field to define whether the trusted device rule should be active or not.
Enable to activate the trusted device rule.
Disable to deactivate the trusted device rule.
Enter a name to identify the device.
Enter the local IP address of the device.
Click this to save your changes to the fields in this screen.
Was this article helpful?

Related Articles

Need Support?

Can't find the answer you're looking for?
Contact Support

Let me know when the OS2210 is available?