Chengdu Ebyte Electronic Technology Co,;Ltd
E880-IR01 user manual
Copyright ©2012–2019
,
Chengdu Ebyte Electronic Technology Co,;Ltd
34
As shown in the figure below, it represents the policy that all target addresses or protocols follow wan_1_4g_2, that
is, the wired network data is preferentially used. When the wired Ethernet fails or there is no data flow, flow is obtained
from the 4G interface. When the first rule is not satisfied, the next one is matched, otherwise it will be ignored.
If the current policy type meets the needs of users, users need to click the edit button in the above figure,
default_rule rule, and modify the corresponding policy.
4.4.7 Firewall
In the Network-> Firewall option, set the related settings of network security and communication rules, as shown in
the figure below.