Nucom R5000UNv2 Firewall

This is the Firewall screen from the Nucom R5000UNv2 router.



Keywords on The Nucom R5000UNv2 Firewall Screenshot

The following words were detected on the Nucom R5000UNv2 Firewall screenshot.

Firewall Table name interface type defaultaction bytes pkts RemoteAccess WAN In Drop 33244 530 Firewall's Rule Table enabled IPVersion PacketLength DSCP/TC Protocol Action RejectType IcmpType TCP Flags origIPAddress origMask/ prefixLength origPortRange destIPAddress destMask/ prefixLength destPortRange bytes pkts enabled 4     TCP Permit     255.255.255.240   80:80 0 0 enabled 4     TCP Permit     255.255.255.240   23:23 0 0 enabled 4     TCP Permit     255.255.255.248   80:80 0 0 enabled 4     TCP Permit     255.255.255.248   23:23 0 0 Firewall a Firewall have a number of Rule which define the behive of match item name: interface LAN WAN WAN/LAN pppoe_0_8_60/ppp0 pppoa_0_8_64/pppoa1 pppoa_0_8_48/pppoa2 pppoa_0_8_35/pppoa3 pppoe_0_0_35/ppp4 mobile/ppp3g0 eth0 eth1 eth2 eth3 wl0 wl0.1 wl0.2 wl0.3 type In Out defaultaction Permit Drop Firewall Rule a Firewall have a number of Rule which define the behive of match item Notes: PacketLength indicates the sum of IP header and payload length; when Protocol is 'ICMP' or 'ICMPv6',one of IcmpType to be selected; when Action is 'Reject',one of RejectType to be selected; Only when Protocol is 'TCP',may RejectType select 'tcp-reset'; Enabled IP Version 4 6 PacketLength(FROME:TO) TC(0~255) DSCP   Auto Marking default AF13(001110) AF12(001100) AF11(001010) CS1(001000) AF23(010110) AF22(010100) AF21(010010) CS2(010000) AF33(011110) AF32(011100) AF31(011010) CS3(011000) AF43(100110) AF42(100100) AF41(100010) CS4(100000) EF(101110) CS5(101000) CS6(110000) CS7(111000) Protocol UDP TCP ICMP UDP TCP ICMPv6 Action Permit Drop Reject RejectType icmp-net-unreachable icmp-host-unreachable icmp-port-unreachable icmp-proto-unreachable icmp-net-prohibited icmp-host-prohibited icmp-admin-prohibited tcp-reset icmpv6-no-route-to-destination icmpv6-administratively-prohibited icmpv6-address-unreachable icmpv6-port-unreachable icmpv6-source-address-failed icmpv6-reject-route-to-destination tcp-reset IcmpType any echo-reply destination-unreachable network-unreachable host-unreachable protocol-unreachable port-unreachable fragmentation-needed source-route-failed network-unknown host-unknown network-prohibited host-prohibited TOS-network-unreachable TOS-host-unreachable communication-prohibited host-precedence-violation precedence-cutoff source-quench redirect network-redirect host-redirect TOS-network-redirect TOS-host-redirect echo-request router-advertisement router-solicitation time-exceeded ttl-zero-during-transit ttl-zero-during-reassembly parameter-problem ip-header-bad required-option-missing timestamp-request timestamp-reply address-mask-request address-mask-reply destination-unreachable no-route-to-destination administratively-prohibited beyond-scope-of-source-address address-unreachable port-unreachable source-address-failed reject-route-to-destination error-source-routing-header packet-too-big time-exceeded hop-limit-exceeded fragment-reassembly-time-exceeded parameter-problem erroneous-header-field unrecognized-next-header-type unrecognized-ipv6-option echo-request echo-reply multicast-listener-query multicast-listener-report multicast-listener-done router-solicitation router-advertisement neighbor-solicitation neighbor-advertisement redirect-message router-renumbering router-renumbering-command router-renumbering-result sequence-number-reset node-information-query node-information-response inverse-neighbor-discovery-solicitation inverse-neighbor-discovery-advertisement version2-multicast-listener-report multicast-router-advertisement multicast-router-solicitation multicast-router-termination TCP Flags SYN ACK FIN RST URG PSH origIPAddress: origMask/prefixLength origStartPort origEndPort destIPAddress: destMask/prefixLength destStartPort destEndPort