Nov 26

When you use the Virtual Server, Port Forwarding, or Remote Administration features to open specific ports to traffic from the Internet, you could be increasing the exposure of your LAN to cyberattacks from the Internet.

In these cases, you can use Inbound Filters to limit that exposure by specifying the IP addresses of internet hosts that you trust to access your LAN through the ports that you have opened. You might, for example, only allow access to a game server on your home LAN from the computers of friends whom you have invited to play the games on that server.

Inbound Filters can be used for limiting access to a server on your network to a system or group of systems. Filter rules can be used with Virtual Server, Gaming, or Remote Administration features. Each filter can be used for several functions; for example a “Game Clan” filter might allow all of the members of a particular gaming group to play several different games for which gaming entries have been created. At the same time an “Admin” filter might only allows systems from your office network to access the WAN admin pages and an FTP server you use at home. If you add an IP address to a filter, the change is effected in all of the places where the filter is used.

Below is a list of each option with a description of its use:

DIR-868L-Inbound-Filter

Add/Edit Inbound Filter Rule
Here you can add entries to the Inbound Filter Rules List below, or edit existing entries.

Name
Enter a name for the rule that is meaningful to you.

Action
The rule can either Allow or Deny messages.

Source IP Range
Define the ranges of Internet addresses this rule applies to. For a single IP address, enter the same address in both the Start and End boxes. Up to eight ranges can be entered. The Enable checkbox allows you to turn on or off specific entries in the list of ranges.

Save
Saves the new or edited Inbound Filter Rule in the following list. When finished updating the Inbound Filter Rules List, you must still click the Save Settings button at the top of the page to make the changes effective and permanent.

Inbound Filter Rules List
The section lists the current Inbound Filter Rules. An Inbound Filter Rule can be changed by clicking the Edit icon, or deleted by clicking the Delete icon. When you click the Edit icon, the item is highlighted, and the “Edit Inbound Filter Rule” section is activated for editing.

In addition to the filters listed here, two predefined filters are available wherever inbound filters can be applied:

Allow All
Permit any WAN user to access the related capability.

Deny All
Prevent all WAN users from accessing the related capability. (LAN users are not affected by Inbound Filter Rules.)

Tags: , , ,

Aug 25

To allow traffic from the Internet to your local network, you will need to open up ports or the router will block the request.

Because our routers use NAT (Network Address Translation), you can only open a specific port or ports to one computer at a time. For example: If you have 2 web servers on your network, you cannot open port 80 to both computers. You will need to configure 1 of the web servers to use port 81 (or any other non-80 port). Now you can open port 80 to the first computer and then open port 81 to the other computer.

Step 1: Open your web browser and type in the IP address of the router (192.168.0.1 by default)and hit Enter.

dlink-forward1

Step 2: Enter the username (admin) and password (blank by default), and then click Log In.

Step 3: Click on the Advanced tab along the top and then click on Port Forwarding on the left-hand side.

dlink-forward2

Step 4: Next to IP Address, enter the IP address of the computer, or select your computer from the drop down box and click the arrow (<<) button.

dlink-forward3

Step 5: Enter a Name for your Port Forwarding entry.

dlink-forward4

Note: The Application Name drop down menu contains a list of predefined server types. If you select one of the predefined server types, click the arrow button next to the drop down menu to fill out the corresponding field. This will also fill in the TCP Port and UDP Port. If you choose this option, skip to Step 7.

Step 6: Enter the port information under TCP Port and/or UDP Port.

dlink-forward5

Note: This feature allows you to open a range of TCP and/or UDP ports to a computer on your network. Separate multiple port entries by a comma (,) (Ex. 88,3074), and a dash (-) for a range of port entries (Ex. 1500-4999) . To open a single port using this feature, simply enter the same number in both the TCP and UDP fields.

Choose the Schedule from the drop down menu.

dlink-forward6

Note: This will be the schedule of time when the Port Forwarding Rule will be active. Schedules can be defined on the Tools>Schedules page.

Step 8: Next to that, choose the Inbound Filter from the drop down menu and select a filter that controls access as needed for this rule. If you do not see the filter you need in the list of filters, go to the Advanced>Inbound Filter screen and create a new filter.

Note: The Inbound Filter option is an advanced method of controlling data received from the Internet. With this feature you can configure inbound data filtering rules that control data based on an IP address range. Inbound Filters can be used for limiting access to a server on your network to a system or group of systems.

Step 9: Click the check box to activate the entry.

dlink-forward7

Step 10: Click Save Settings at the top to save your changes.

dlink-forward8

Tags: , , ,

Aug 25

When you use the Virtual Server, Port Forwarding, or Remote Administration features to open specific ports to traffic from the Internet, you could be increasing the exposure of your LAN to cyberattacks from the Internet.

In these cases, you can use Inbound Filters to limit that exposure by specifying the IP addresses of internet hosts that you trust to access your LAN through the ports that you have opened. You might, for example, only allow access to a game server on your home LAN from the computers of friends whom you have invited to play the games on that server.

Inbound Filters can be used for limiting access to a server on your network to a system or group of systems. Filter rules can be used with Virtual Server, Gaming, or Remote Administration features. Each filter can be used for several functions; for example a “Game Clan” filter might allow all of the members of a particular gaming group to play several different games for which gaming entries have been created. At the same time an “Admin” filter might only allows systems from your office network to access the WAN admin pages and an FTP server you use at home. If you add an IP address to a filter, the change is effected in all of the places where the filter is used.

Add/Edit Inbound Filter Rule

Here you can add entries to the Inbound Filter Rules List below, or edit existing entries.

Name

Enter a name for the rule that is meaningful to you.

Action

The rule can either Allow or Deny messages.

Source IP Range

Define the ranges of Internet addresses this rule applies to. For a single IP address, enter the same address in both the Start and End boxes. Up to eight ranges can be entered. The Enable checkbox allows you to turn on or off specific entries in the list of ranges.

Save
Saves the new or edited Inbound Filter Rule in the following list. When finished updating the Inbound Filter Rules List, you must still click the Save Settings button at the top of the page to make the changes effective and permanent.

Inbound Filter Rules List

The section lists the current Inbound Filter Rules. An Inbound Filter Rule can be changed by clicking the Edit icon, or deleted by clicking the Delete icon. When you click the Edit icon, the item is highlighted, and the “Edit Inbound Filter Rule” section is activated for editing.

In addition to the filters listed here, two predefined filters are available wherever inbound filters can be applied:

Allow All

Permit any WAN user to access the related capability.

Deny All

Prevent all WAN users from accessing the related capability. (LAN users are not affected by Inbound Filter Rules.)

Tags: , ,

css.php