Solved

Linksys RV082 Firewall Access Rule and port forwarding

Posted on 2008-10-28
3
1,742 Views
Last Modified: 2013-11-22
I'm attempting to restrict SMTP traffic to only accept from Trend Micro's IP Range, as we use their hosted A/V, Spam service.  
I set up a firewall access rule to accept SMTP sourced from  limited to Trend Micro's IP Range


How do I test the firewall restrictions once implemented?

My experience with this is quite limited so please be specific.  Thanks in Advance!
0
Comment
Question by:bigsleeper
  • 2
3 Comments
 
LVL 79

Accepted Solution

by:
lrmoore earned 500 total points
ID: 22913046
Have someone try to telnet to your public ip, port 25. If they can't get anything, and email is still coming in, then your rules are working properly.
0
 

Author Closing Comment

by:bigsleeper
ID: 31510824
Thanks!
0
 

Author Comment

by:bigsleeper
ID: 22918960
Success. An external Telnet attempt fails when the firewall rules are enabled and succeeds when disabled, all the while, inbound from trend flows in as expected.  I was concerned as I have read posts stating the this router would give port forwarding priority over firewall rules, effectively ignoring them for port forwarded traffic.  But testing with telnet before and after enabling of firewall rules prove that the router is accurately applying the rules before forwarding.
Thanks for solution!
0

Featured Post

Free Tool: Postgres Monitoring System

A PHP and Perl based system to collect and display usage statistics from PostgreSQL databases.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

HOW TO REMOTELY CLEAN MEROND.O WITH ESET SILENTLY PROBLEM       If you have the fortunate luck to contract the Merond.O virus on your network, it can be quite troublesome to remove as it propagates to network shares on your network. In my case, the …
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question