Chapter 5: FN10 FiltersPage 5-10Fast Network 10 User GuideWhen adding or modifying a filter, you must enter both a Source RangeStart value and a Source Range End value. For example:Source Range: [NA] (InRange/OutRange/NA)>inrangeSource Range Start: [00:00:00:00:00:00] >08:00:20:00:00:00Source Range End: [00:00:00:00:00:00] >00:40:60:0a:10:3eSource Range Mask: [ff:ff:ff:ff:ff:ff] >ff:ff:ff:00:00:00To filter on a single address, be sure to enter the same address in both theSource Range Start: and Source Range End: fields.5.3 USING FILTERS FOR SECURITY PURPOSESThe various types of security restrictions that can be implemented usingfilters include:• Restricting access to a network segment – you can configure a filter toprevent any traffic from being forwarded to a specific networksegment.• Restricting access to specific stations – you can use filters to restrictaccess to specific stations on the network.• Preventing access by unauthorized users – you can use filters to restrictindividual workstations from accessing other network devices.For each example shown below, the situation is described first, and theobjective to be accomplished is explained. Then, how the objective couldbe accomplished using the FN10 is explained in general terms. In theseexamples, single letters are used to represent MAC-layer addresses.Actual MAC addresses consist of a string of numbers, (22:14:15:4:5:6).Example 1: Restricting Access to a Network SegmentThe objective in this example is to restrict access for security reasons.Workstations on one network segment (subnet) are to be restrictedentirely from access to devices on an adjoining subnet.In this example, there are three subnets connected by a centrally locatedFN10 (see Figure 5-1). The subnets are referred to as Manufacturing,Engineering, and Accounting.