31
Log
Click to enable log and the log about access control will be
recorded in the system.
Disable
Description
Convenient for recording parameters of access control
N/A
3.4.3 Filtering
Configuration of mapping rules is generally used to disable access to network settings.
From navigation tree, select "Firewall>>Filtering" menu, then enter “Filtering” page.
Table 3-4-3 Firewall - Filtering Parameters
Filtering
Function description: Set settings of firewall related to filtering and generally set forbidden
URL.
Parameters
Description
Default
Enable
Click to enable filtering
Enable
URL
Set URL that needs to be filtered
N/A
Action
Select accept/block
Accept
Log
Click to write log and the log about filtering will be recorded in
the system.
Disable
Description
Record the meanings of various parameters of filtering
N/A
3.4.4 Port Mapping
Port mapping is also called virtual server. Setting of port mapping can enable the host of extranet
to access to specific port of host corresponding to IP address of intranet.
To configure port mapping, go into the navigation tree, select "Firewall >> Port Mapping", then
enter “Port Mapping” page.
Table 3-4-4 Firewall - Port Mapping Parameters
Port Mapping (at most 50 port mappings can be set)
Function description: Configure parameters of port mapping.
Parameters
Description
Default
Enable
Check to enable port mapping.
Enable
Protocol
Select TCP/UDP/ICMP
TCP
Source address
Set source address of port mapping
0.0.0.0/0
Service Port
Set service port number of port mapping
8080
Internal Address
Set external address of port mapping
N/A
Internal Port
Set internal address of port mapping
8080
Log
Click to enable log and the log about port mapping will
be recorded in the system.
Disable