SVP2000 Business IP Phone User Manual
STEPHEN TECHNOLOGIES CO.,LIMITED
/ 5/F, Building NO.1, TongXin Industry Zone, HengGang, LongGang, Shenzhen, G.D, China, 518115
Tel: +86 755 89352606 /Fax:+86 755 89352612 / Email: [email protected] / Url: www.stephen-tele.com
- 44 -
or network address similar to *.*.*.*
Src Mask
Set the source address’ mask. For example, 255.255.255.255 means just point to one host;
255.255.255.0 means point to a network which network ID is C type.
Des Mask
Set the destination address’ mask. For example, 255.255.255.255 means just point to one host;
255.255.255.0 means point to a network which network ID is C type.
Click the
Add
button
if you want to add a new output rule.
Then enable out access, and click the Apply button.
So when devices execute to ping 192.168.1.118, system will deny the request to send icmp request to 192.168.1.118 for
the out access rule. But if devices ping other devices which network ID is 192.168.1.0, it will be normal.
Click the
Delete
button to delete the selected rule.
4.3.6.3. NAT Config
NAT is abbreviated from Net Address Translation; it’s a protocol responsible for IP address translation. In other word, it is
responsible for transforming IP and port of private network to public, also is the IP address mapping which we usually say.
DMZ config
:
In order to make some intranet equipments support better service for extranet, and make internal network security more
effectively, these equipments open to extranet need be separated from the other equipments not open to extranet by the
corresponding isolation method according to different demands. We can provide the different security level protection in
terms of the different resources by building a DMZ region which can provide the network level protection for the
equipments environment, reduce the risk which is caused by providing service to distrust customer, and is the best position
to put public information
The following chart describes the network access control of DMZ