HOW IT WORKS
The default behavior is blocked access.
The settings are Name, Method, Source, Service, Auth, Service, Destination, and priority.
The name field refers to the naming convention of the rule itself for easy reference and identification.
The Method field of the rule is compared to the method of the gateway on which the packets appear. Therefore, one particular IP packet can match different rules as it (through failover) is forwarded down the Internet gateway list.
The other fields of the rule are compared to information contained inside the IP packet.
- SOURCE COMPUTER
The Source computer field can be used to limit the rule to a specific onboard computer. It is compared directly to the originating computer of the IP packet (through the source field of the IP header), and they must be identical for the rule to match.
A blank Source computer field will match any packet and refers to all available LAN networks onboard.
- AUTH (AUTHENTICATION)
Adding authentication to a rule indicates that a valid Connection Suite user within the selected account group has to login in order for it to work.
If no specific user group is selected, this signifies that a valid Connection suite account within all available user groups has to login in order for the rule to work. This will be reflected as "All" under the Auth column.
The Service field is used to restrict a rule to a particular Service. A Service is a technical term for the combination of an Internet Protocol (most commonly TCP and UDP) and port number(s)/range.
The service indicated by the packet must match the Service in the rule configuration for a packet to match a rule. A blank Service setting will accept any packet and allow access to all available ports.
The Destination IP mask field is used to restrict the rule to packets with a specific Internet destination. In the header of every IP packet is a destination field. This field indicates which computer on the Internet the packet is destined for. Network Control checks this field against the Destination IP settings to see if the rule matches.
The Destination IP settings can include a list of network masks in the format x.x.x.x/xx (see figure below). A rule is considered matching if the packet's destination field matches any of the masks specified in the setting. A blank field accepts any packet and allows all destination traffic to pass through.
Also, for otherwise equal rules, the term "more specific" is extended into the Destination IP setting. The most specific rule is the one that matches the most bits (from left to right) with the IP packet's destination (longest matching rule)
Each rule ends in a Priority setting with the following values: High, Medium, Low, or Block.
Note: The bandwidth priority for each rule will be applied based on the following setting under the Setup tab.