INSTAR Deutschland GmbHINSTAR Deutschland GmbH

IN-Route P52 - Firewall



Web User Interface

Device Filter

Overview

In this and the following articles we will talk about the IN-Route P52 web user interface (webUI). To access the interface, please charge your router, switch it into WiFi mode and connect to it´s WiFi network. For more details please follow the instructions for the Router Login. To follow this article, please make sure that your router´s webUI is switched to the Advanced Mode - the Simple Mode will not contain all the options we are covering here. Please be also aware that what we are doing here can be considered an advanced configuration. In most cases you will be fine just following the First Steps Configuration discussed earlier. So, are you up to some advanced routing terminologies and exciting features? Then lets go!

IN-Route P52 Portable Router

Do you want to block a device on the IN-Route Network from accessing the internet? Or do you want to block all devices but a few selected ones? You have come to the right place! Define the default behaviour as either allow or drop traffic...

IN-Route P52 Portable Router

... then add all the information about the device you either want to block or allow, depending on your firewall default behavior, and a port range for the communication.

The firewalls IP/Device Filter allows you to block TCP and UDP traffic coming from a specific IP address inside your local network to a specific address. You can use this function to block a specific client on your network from accessing a certain webserver. The Destination IP Address is the IP address of the server you want to block. You can use the command “nslookup” in your command line tool to resolve the IP address from a web address. The Source MAC and IP Address belong to the wireless client you want to block. For regular web traffic choose the protocol TCP and the web port 80 to block - both as source and destination port. For a blocking rule the Default Packet Rule has to be set to “Accept” and the Action rule to “Drop Packet”. The rule in the example above, on the other hand, would block all traffic from the client 192.168.169.254 except traffic directed to the web server 188.40.105.141 via the ports 33333, 33334, 33335, 33336, 33337, 33338 and 33339.