SVP2000 Business IP Phone User Manual
STEPHEN TECHNOLOGIES CO.,LIMITED
/ 5/F, Building NO.1, TongXin Industry Zone, HengGang, LongGang, Shenzhen, G.D, China, 518115
Tel: +86 755 89352606 /Fax:+86 755 89352612 / Email: [email protected] / Url: www.stephen-tele.com
- 43 -
Firewall Configuration
In this web interface, you can set up firewall to prevent unauthorized Internet users from accessing private networks
connected to the Internet (input rule), or prevent unauthorized private network devices from accessing the Internet
(output rule).
Firewall supports two types of rules: input access rule and output access rule. Each type supports at most 10 items.
Through this web page, you could set up and enable/disable firewall with input/output rules. System could prevent
unauthorized access, or access other networks set in rules for security. Firewall, is also called access list, is a simple
implementation of a Cisco-like access list (firewall). It supports two access lists: one for filtering input packets, and the
other for filtering output packets. Each kind of list could be added 10 items.
We will give you an instance for your reference.
Field name
explanation
In access enable
Select it to Enable in_ access rule
out access enable
Select it to Enable out_ access rule
Input/Output
Specify current adding rule by selecting input rule or output rule.
Deny/Permit
Specify current adding rule by selecting Deny rule or Permit rule.
Protocol Type
Filter protocol type. You can select TCP, UDP, ICMP, or IP.
Port Range
Set the filter Port range
Src Addr
Set source address. It can be single IP address, network address, complete address 0.0.0.0, or
network address similar to *.*.*.0
Des Addr
Set the destination address. It can be IP address, network address, complete address 0.0.0.0,