Solved

Can I whitelist IP addresses on the verizon version of Actiontec GT784WNV router

Posted on 2014-01-30
2
819 Views
Last Modified: 2014-01-31
I am trying to do this remotely, but afraid I may lock myself out : )

We have a phone system and ports forwarded to the phone box. But we are getting hit from hackers.  the manufacturer is saying to whitelist just their IP addresses.

I am new to firewalls.

a) is this something this model can do?
b) how can I do that?

right now under firewall, it's set to nat only.  they have other choices of low medium and high.  once it's turned on to low, NAT stays on and I can add IPs to a white list?

think this is something I can do remotely or better to be on site so I don't lock myself out ?
0
Comment
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 15

Accepted Solution

by:
Robert Sutton Jr earned 500 total points
ID: 39823058
You can do this remotely. You may want to add your working Ip address from your remote location 1st so you don't get locked out for some odd reason. Typically, those units are Ip#1, Ip#2, Ip#3, etc... And everything else is filtered and dropped. However, understand that the "whitelist" is considered your SAFE list. The way your question was worded it kind of sounded like you were going to whitelist the hacker Ip's? Do not do that.  Only whitelist the Ip addr. that you know and trust to achieve you goal. Everything else will get filtered.
0
 

Author Closing Comment

by:BeGentleWithMe-INeedHelp
ID: 39825078
thanks!
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
Shadow IT is coming out of the shadows as more businesses are choosing cloud-based applications. It is now a multi-cloud world for most organizations. Simultaneously, most businesses have yet to consolidate with one cloud provider or define an offic…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

729 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question