Skip to content

1. Introduction

ENOS Firewall is a cyber security management system based on Linux iptables, providing comprehensive network access control and security protection for routers.

Network Zone Management

  • LAN Zone: Free communication between intranet devices
  • WAN Zone: Extranet access control, default to block active connections
  • DMZ Zone: Isolated Server Zone

Port Control

  • Port Open: Allow specific services to provide external access
  • Port Forwarding: Forward extranet requests to intranet devices
  • Port Blocking: Prevent Unnecessary Network Services

Traffic forwarding

  • NAT Translation: Internal network devices share an extranet IP to access the Internet
  • Traffic forwarding rules: Control data flow between different network zones

2. Configuration steps

Basic Area Configuration

The regional configuration page is divided into global settings and zone settings.

Global settings are the fundamental behavior of the firewall system, equivalent to the 'fallback rules' of the firewall, and are used when there are no matching rules.

Zone settings are refined controls for specific network interfaces divided by zones. 'Masquerading' can be regarded as one-way NAT.

The gray zone ACCEPT in the regional settings refers to any region.

Click EDIT to perform detailed configuration on the zone, including interface zone settings, forwarding rule settings, etc.

Recommended default settings

3. Port Forwarding

1. Name

  • Recommended to fill in: Descriptive Name

Example:

  • "NAS Access"
  • "Camera Monitoring"
  • "Game Server"
  • "Remote Desktop"

2. Protocol

TCP: Web pages, file transfer, remote desktop, etc.

UDP: Games, video streaming, DNS, etc.

TCP + UDP: Services that require both protocols simultaneously.

3. Source zone (Source Area)

Default Selection: wan (extranet)

Meaning: Allows access from which network area

4. External Port

Function: Port Number used for extranet access

Example:

  • 8080 (Common Web Port) - 3389 (Windows Remote Desktop) - 22 (SSH) - 21 (FTP)

5. Destination zone (Target Area)

Default Selection: lan (intranet)

Meaning: Forward to which network area

6. Internal IP Address

Fill in: Internal IP of the target device

Example:

  • 192.168.1.100 (NAS device) - 192.168.1.50 (surveillance camera) - 192.168.1.10 (game console)

7. Internal port

Fill in: The port actually used by the target device

can be the same as or different from the External port

4. Actual Configuration Example 1

Example: Open NAS Access

Requirement: Allow the extranet to access the Web interface of the intranet NAS through port 8080

Access Method: http://WAN IP:8080

Traffic Rules

Traffic Rules is the most flexible feature in the ENOS system firewall, which can precisely control the flow of data packets between different network zones.

⚠️ Warning

It is not recommended to make any modifications to the rules set by the system default settings to avoid creating new issues.

Traffic rules are matched according to the priority from top to bottom, and the priority can be adjusted by dragging the button in the illustration.

Add a new rule

Click the ADD button on the page to open the new rule page.

Basic Information

Name: Rule name (it is recommended to use a descriptive name)

Action: Data processing method (drop/accept/reject/don't track, etc.)

Match Condition

Protocol: Protocol type (TCP/UDP/ICMP/ ALL , etc.)

Source zone: Source network zone

Source address : source IP address or network segment

Source port: source port

Destination zone: target network area

Destination address : Destination IP Address or network segment

Destination port: destination port

5. Actual Configuration Example 2

Example 1: Prohibit specific devices from accessing the Internet

NAT Rules

NAT Rules (Network Address Translation Rules) are one of the advanced features in a firewall, which allow you to precisely control the source IP Address used for outbound and forwarded traffic.

Functions of NAT

FunctionExplanationApplication Scenarios
Address ConversionConverting Internal IP to Public IPBasic internet needs
Port ConversionModify the source port numberAvoid port conflicts
Load BalancingAssign different outbound IPsMulti-WAN Environment
Traffic CamouflageModify source addressSpecial Network Requirements

Configuration Instructions

Name
Specify a descriptive name for the rule
Protocol
TCP/UDP/ICMP/Any (All Protocols)
Outbound zone
From which network area does the traffic exit
Source address
Match traffic from a specific source IP Address
Destination address
Match traffic accessing a specific target
Action
SNAT
Rewrite to the specified IP/Port
MASQUERADE
Automatically use the IP address of the export interface
ACCEPT
Do not perform address translation
Rewrite IP address
Specify a new source IP Address

6. Actual Configuration Example 3

Example: Source Address Spoofing

Requirement: Make the device at 192.168.1.100 appear to be going out from the WAN port IP Address