Version 6.2
249
February 2011
SIP User's Manual
3. Web-Based Management
5.
Configure the 'Operation' group parameters to define the operation that will be applied
to the IP addresses matching the criteria defined above. The operations available are
NAT or NAPT:
•
NAT:
The NAT address into which the original IP address is translated. The drop-
down list displays all of your available NAT addresses/ranges, from which you
can select an entry. If you want to add a single address or a sub-range from the
given pool/range, select the 'User Defined' option to add a new Network Object
representing the new host (see ''Configuring Network Objects'' on page
•
NAPT:
The NAPT address into which the original IP address is translated. The
drop-down list displays all of your available NAPT addresses/ranges, from which
you can select an entry. If you want to add a single address or a sub-range from
the given pool/range, select 'User Defined' to add a new Network Object
representing the new host (see ''Configuring Network Objects'' on page
Enter a single port or select 'Range' to enter a range of ports.
6.
Select the 'Log Packets Matched by This Rule' check box to log the first packet from a
connection that was matched by this rule.
7.
From the 'Schedule' drop-down list, select the time during which the rule is active. By
default, the rule is always active. However, you can configure scheduler rules by
selecting 'User Defined', and then defining the day and time period during which the
rule is active. Once a scheduler rule(s) is defined, the 'Schedule' drop-down list allows
you to choose an available rule (for adding user-defined schedule rules, see
''Configuring Scheduler Rules'' on page
3.3.3.3.8 Configuring the Access List
The Access list is designed to allow comprehensive control over the firewall's behavior.
You can define specific set of rules for ingress (inbound) and egress (outbound) traffic and
control the order of logically similar sets of rules. These rules can later be assigned to the
device's LAN and/or WAN interfaces (see ''Configuring Advanced Filtering'').
Note:
Only one Access List group can be assigned to an interface. Therefore,
ensure that your Access List group includes all the required rules that you
want to later assign to a specific interface.
¾
To configure Access List rules:
1.
Open the
Access Lists
table (
Configuration
tab >
Data
menu >
Firewall and ACL
submenu >
Access List
); the following appears:
Figure
3-156: Access Lists Table
Summary of Contents for Mediant 800 MSBG
Page 2: ......
Page 366: ...SIP User s Manual 366 Document LTRT 12804 Mediant 800 MSBG Reader s Notes ...
Page 372: ...SIP User s Manual 372 Document LTRT 12804 Mediant 800 MSBG Reader s Notes ...
Page 390: ...SIP User s Manual 390 Document LTRT 12804 Mediant 800 MSBG Reader s Notes ...
Page 404: ...SIP User s Manual 404 Document LTRT 12804 Mediant 800 MSBG Reader s Notes ...
Page 616: ...SIP User s Manual 616 Document LTRT 12804 Mediant 800 MSBG Reader s Notes ...
Page 636: ...SIP User s Manual 636 Document LTRT 12804 Mediant 800 MSBG Reader s Notes ...
Page 652: ...SIP User s Manual 652 Document LTRT 12804 Mediant 800 MSBG Reader s Notes ...
Page 886: ...SIP User s Manual 886 Document LTRT 12804 Mediant 800 MSBG Reader s Notes ...