Firewall UDP/TCP Port

Firewall UDP/TCP Port

Configure TCP or UDP port settings. Port numbers are used by TCP or UDP to identify sending and receiving applications. Some common ports include HTTP (80), TELNET (23) and SMTP (25).

Note: This web page is controlled by the Security Profiles field in the Personal Firewall Basic Configuration page. If a fixed profile (without the word 'Custom' in the name) is selected, this web page is read-only and no configuration change is allowed. The Edit column, "Apply", "Add Rule" and "Purge Table" buttons are removed. If a custom profile is selected, configuration change is allowed on this web page.

Parameters


Parameter Description
UDP/TCP Port Default Action
Inbound action This rule is applied when an inbound packet contains a UDP or TCP port that does not match any rule in the Port rule table.
Outbound action This rule is applied when an outbound packet contains a UDP or TCP port that does not match any rule in the Port rule table.

Parameter Description
UDP/TCP Port Table
Edit Click the icon in the row of the rule that you want to edit. This opens the Rule Edit page where you can edit the fields.
Rule Order The rules by default are sorted by the Rule Order column, which is both the order that the rules have been added and the order that they will be applied. Executing the rules in the order of their creation allows you to add overlapping rules that provide one action for a more generic range of IP addresses or domain names, while having a different action for a more specific IP or domain. For example, if you first create an 'IP Address' table rule to allow address 10.1.1.2 and mask 255.255.255.255, and then create a rule to deny address 10.1.1.0 and mask 255.255.255.0, then the 'IP Address' table will allow traffic to 10.1.1.2 but will block other IP address beginning with 10.1.1.x. Traffic to 10.1.1.2 will not be blocked by the second rule of this table because the first rule already matches it. You can similarly set up the 'Domain Name' table to block a generic domain suffix (like example.com) but allow specific domain names (foo.example.com).

Click on to sort in ascending order.

Click on to sort in descending order.

Remote IP address IP address of the remote machine or subnet.

Click on to sort in ascending order.

Click on to sort in descending order.

To edit this field, click the appropriate on the Edit column.

Remote IP mask IP address mask of the remote machine or subnet.

To edit this field, click the appropriate on the Edit column.

Starting port number First UDP or TCP port in the range.

Click on to sort in ascending order.

Click on to sort in descending order.

To edit this field, click the appropriate on the Edit column.

Ending port number Last UDP or TCP port in the range. The ending port number value should be equal to or greater than the starting port number.

Click on to sort in ascending order.

Click on to sort in descending order.

To edit this field, click the appropriate on the Edit column.

Name User-friendly name associated with the TCP or UDP port range.

Click on to sort in ascending order.

Click on to sort in descending order.

To edit this field, click the appropriate on the Edit column.

Protocol Specifies whether the port protocol is UDP, TCP or both.

Click on to sort in ascending order.

Click on to sort in descending order.

To edit this field, click the appropriate on the Edit column.

Inbound action Specifies inbound action for network connection. The ignore action is useful when you want a 'UDP/TCP Port' rule to apply in only one direction. For example, setting a rule for HTTP (Web) port 80 to deny inbound and ignore outbound will always block Web connections in the inbound direction, but will let a more generic matching rule or the default action determine the action for outbound Web connections.
Outbound action Specifies outbound action for network connection. The ignore action is useful when you want a 'UDP/TCP Port' rule to apply in only one direction. For example, setting a rule for HTTP (Web) port 80 to deny inbound and ignore outbound will always block Web connections in the inbound direction, but will let a more generic matching rule or the default action determine the action for outbound Web connections.

Buttons


Button Description
Apply Apply or submit changes to the corresponding Default Action section or Table section.
Add rule Add a rule to the table using the Add rule page.
Purge Table Remove all rules from the table.