QuFirewall is a firewall management application for your QNAP device. Integrating a powerful and easy-to-use profile system, QuFirewall lets you control and review connections to your device.
This process walks you through the process of configuring QuFirewall. These steps are only required the first time you start QuFirewall.
- Open QuFirewall.
The Get Started wizard opens.
- Review the feature integration information.
- Click Next.
- Select a Firewall Profile.
Profile | Description |
Basic protection | Allows access only to the regional domains specified during the next step. |
Include subnets only | Allows access only to local network sources. |
Restricted security | Allows access to frequently used service ports from devices on the local network or regional domains. |
- Click Next.
- Select the region where the device is located.
- Click Next.
- Optional: Select Enable firewall.
- Click Finish.
QuFirewall finishes the initialization process.
- Open QuFirewall.
- Click
. A confirmation window opens.
- Click Yes.
QuFirewall enables the firewall.
This screen controls the creation and configuration of profiles for QuFirewall. Profiles specify which connections are blocked based on a range of criteria. By default, QuFirewall offers several Firewall Profiles to get you started.
- Open QuFirewall.
- Click Firewall Profiles.
- Click .
The Create Profile window opens.
- Specify a profile name.
Note: Requirements:
-
Length: 1-32 characters
-
Valid characters: A-Z, a-z, 0-9
-
Valid special characters: Space ( ), Hyphen (-), Underscore (_)
- Optional: Configure the global rules.
Note: Every profile automatically adds two global rules that are configured from QTS. QNAP recommends prioritizing these rules higher than any other custom rules to ensure proper functionality.
Rule | Description |
Application | This rule automatically allows specific applications. View the application information by clicking . |
IP Access Protection | This rule automatically blocks client IP addresses after too many failed login attempts within a specified time period. View the IP address information by clicking . Configure this rule by going to . |
- Optional: Add new rules.
- Click Add Rule.
The Add Rule window opens.
- Configure the rule.
Setting | User Action |
Permission | Specify whether this rule allows or blocks matching connections. |
Interface | Specify the network interface to monitor for connections. |
Source | Specify the connection source for this rule. -
Selecting Any applies this rule to all connections. -
Selecting IP allows you to apply the rule to connections from a single IP, a specific subnet, or every IP within a specific range. -
Selecting Region applies this rule to every connection from one or more specified countries. Note: You can specify up to 14 regions. |
Protocol | Specify the IP protocol type for this rule. |
Port | Specify the service port for this rule. This field is only available if the TCP or UDP protocol is selected. Note: -
Ports must be between 1 - 65535 -
This field can have up to 15 ports. -
Separate multiple ports with commas (,). -
Use hyphens (-) without a space to indicate a port range. |
- Click Apply.
QuFirewall adds the rule.
- Click Apply.
A confirmation window opens.
- Click Yes.
QuFirewall creates the profile.
- Open QuFirewall.
- Click Firewall Profiles.
- Click .
A file explorer window opens.
- Identify an existing firewall profile on your local device.
- Click Open.
The Import Profile window opens.
- Specify a profile name.
Note: Requirements:
-
Length: 1-32 characters
-
Valid characters: A-Z, a-z, 0-9
-
Valid special characters: Space ( ), Hyphen (-), Underscore (_)
- Optional: Configure the global rules.
Note: Every profile automatically adds two global rules that are configured from QTS. QNAP recommends prioritizing these rules higher than any other custom rules to ensure proper functionality.
Rule | Description |
Application | This rule automatically allows specific applications. View the application information by clicking . |
IP Access Protection | This rule automatically blocks client IP addresses after too many failed login attempts within a specified time period. View the IP address information by clicking . Configure this rule by going to . |
- Optional: Add new rules.
- Click Add Rule.
The Add Rule window opens.
- Configure the rule.
Setting | User Action |
Permission | Specify whether this rule allows or blocks matching connections. |
Interface | Specify the network interface to monitor for connections. |
Source | Specify the connection source for this rule. -
Selecting Any applies this rule to all connections. -
Selecting IP allows you to apply the rule to connections from a single IP, a specific subnet, or every IP within a specific range. -
Selecting Region applies this rule to every connection from one or more specified countries. Note: You can specify up to 14 regions. |
Protocol | Specify the IP protocol type for this rule. |
Port | Specify the service port for this rule. This field is only available if the TCP or UDP protocol is selected. Note: -
Ports must be between 1 - 65535 -
This field can have up to 15 ports. -
Separate multiple ports with commas (,). -
Use hyphens (-) without a space to indicate a port range. |
- Click Apply.
QuFirewall adds the rule.
- Click Apply.
A confirmation window opens.
- Click Yes.
QuFirewall imports the profile.
- Open QuFirewall.
- Click Firewall Profiles.
- Identify an existing profile.
- Under Action, click
. The Edit Profile window opens.
- Specify a profile name.
Note: Requirements:
-
Length: 1-32 characters
-
Valid characters: A-Z, a-z, 0-9
-
Valid special characters: Space ( ), Hyphen (-), Underscore (_)
- Optional: Configure the global rules.
Note: Every profile automatically adds two global rules that are configured from QTS. QNAP recommends prioritizing these rules higher than any other custom rules to ensure proper functionality.
Rule | Description |
Application | This rule automatically allows specific applications. View the application information by clicking . |
IP Access Protection | This rule automatically blocks client IP addresses after too many failed login attempts within a specified time period. View the IP address information by clicking . Configure this rule by going to . |
- Optional: Add new rules.
- Click Add Rule.
The Add Rule window opens.
- Configure the rule.
Setting | User Action |
Permission | Specify whether this rule allows or blocks matching connections. |
Interface | Specify the network interface to monitor for connections. |
Source | Specify the connection source for this rule. -
Selecting Any applies this rule to all connections. -
Selecting IP allows you to apply the rule to connections from a single IP, a specific subnet, or every IP within a specific range. -
Selecting Region applies this rule to every connection from one or more specified countries. Note: You can specify up to 14 regions. |
Protocol | Specify the IP protocol type for this rule. |
Port | Specify the service port for this rule. This field is only available if the TCP or UDP protocol is selected. Note: -
Ports must be between 1 - 65535 -
This field can have up to 15 ports. -
Separate multiple ports with commas (,). -
Use hyphens (-) without a space to indicate a port range. |
- Click Apply.
QuFirewall adds the rule.
- Click Apply.
A confirmation window opens.
- Click Yes.
QuFirewall saves the profile.
- Open QuFirewall.
- Click Firewall Profiles.
- Identify an existing profile.
- Under Action, click .
The Duplicate Profile window opens.
- Specify a profile name.
Note: Requirements:
-
Length: 1-32 characters
-
Valid characters: A-Z, a-z, 0-9
-
Valid special characters: Space ( ), Hyphen (-), Underscore (_)
- Optional: Configure the global rules.
Note: Every profile automatically adds two global rules that are configured from QTS. QNAP recommends prioritizing these rules higher than any other custom rules to ensure proper functionality.
Rule | Description |
Application | This rule automatically allows specific applications. View the application information by clicking . |
IP Access Protection | This rule automatically blocks client IP addresses after too many failed login attempts within a specified time period. View the IP address information by clicking . Configure this rule by going to . |
- Optional: Add new rules.
- Click Add Rule.
The Add Rule window opens.
- Configure the rule.
Setting | User Action |
Permission | Specify whether this rule allows or blocks matching connections. |
Interface | Specify the network interface to monitor for connections. |
Source | Specify the connection source for this rule. -
Selecting Any applies this rule to all connections. -
Selecting IP allows you to apply the rule to connections from a single IP, a specific subnet, or every IP within a specific range. -
Selecting Region applies this rule to every connection from one or more specified countries. Note: You can specify up to 14 regions. |
Protocol | Specify the IP protocol type for this rule. |
Port | Specify the service port for this rule. This field is only available if the TCP or UDP protocol is selected. Note: -
Ports must be between 1 - 65535 -
This field can have up to 15 ports. -
Separate multiple ports with commas (,). -
Use hyphens (-) without a space to indicate a port range. |
- Click Apply.
QuFirewall adds the rule.
- Click Apply.
A confirmation window opens.
- Click Yes.
QuFirewall duplicates the profile.
- Open QuFirewall.
- Click Firewall Profiles.
- Identify an existing profile.
- Under Action, click .
QuFirewall prepares the file for download.
- Open QuFirewall.
- Click Firewall Profiles.
- Identify an existing profile.
- Under Action, click .
A confirmation window opens.
- Click Delete.
QuFirewall deletes the profile.
This screen displays previously logged firewall events.
- Open QuFirewall.
- Click Firewall Events.
- Click Filter.
- Specify the filter criteria.
Criteria | User Action |
Day Period | Specify a date range for the filtered events. |
Time Period | Specify a time period for the filtered events. |
Interface | Specify the network interface connected to the filtered events. |
Port | Specify the service port connected to the filtered events. |
Source | Specify the connection source of the filtered event. |
- Click Search.
QuFirewall filters the firewall events.
- Open QuFirewall.
- Click Firewall Events.
- Click Export.
A confirmation window opens.
- Click Save.
QuFirewall prepares the file for download.
This screen allows you to capture all the denied packets during a specified duration of time. After capturing the packets, you can download a text file and inspect the involved sources, protocols, and ports.
- Open QuFirewall.
- Click Capture Events.
- Optional: Specify a duration.
Note: The duration must be between 10 seconds and 30 minutes.
- Click Start Packet Capture.
QuFirewall begins listening for denied packets.
- Wait for the specified duration.
Tip: Click Stop to stop the capture process early.
- Click Save.
QuFirewall prepares the file for download.
This screen provides access to configuration options for QuFirewall.
The GeoIP database identifies the geographic location of a connecting device.
- Open QuFirewall.
- Click .
The Settings window opens.
- Go to GeoIP Update.
- Select when to update the GeoIP database.
Option | Description |
Do not check for GeoIP database update automatically | QuFirewall does not automatically check for GeoIP database updates. |
Remind me when checking a new GeoIP database | QuFirewall sends a notification when opening the application if an update to the GeoIP database is available. |
Automatically update the GeoIP database | QuFirewall automatically updates the GeoIP database when an update is available. |
- Click Apply.
QuFirewall saves the settings.
- Open QuFirewall.
- Click .
The Settings window opens.
- Go to Firewall Events.
- Configure the settings.
Setting | User Action |
Storage Limitation | Specify the number of days to store firewall events. |
Event Logging Frequency | Specify how often to log the number of event occurrences. |
Alert Messages | Specify the alert message threshold number. After crossing this threshold, QuFirewall registers a warning in the system log. |
- Click Apply.
QuFirewall saves the settings.
From here you can create and configure notification rules triggered by certain events.