
TB200/400 User Manual
16/39
•
Trusted Certificate
This certificate is a CA certificate. When selecting “TLS Verify Client” as “Yes”,
you should upload a CA. The relevant IPPBX should also have this certificate.
•
Gateway Certificate
This certificate is server certificate. No matter selecting “TLS Verify Client”
as “Yes” or “No”, you should upload this certificate to TB200/400. If IPPBX
enables “TLS Verify server”, you should also upload this certificate on IPPBX.
3.2.2 Firewall Rules
Figure 3-5 Firewall Rules
1) General Settings
Table 3-4 Description of Firewall General Settings
Items
Description
Enable Firewall
Enable the firewall to protect the device. You should reboot the device
to make the firewall run.
Disable Ping
Enable this item to drop net ping from remote hosts.
Drop All
When you enable “Drop All” feature, the system will drop all packets or
connection from other hosts if there are no other rules defined. To avoid
locking the devices, at least one “TCP” accept common rule must be
created for port used for SSH access, port used for HTTP access and
port sued for CGI access.