AudioCodes MP-202 User Manual page 11

Telephone adapter
Hide thumbs Also See for MP-202:
Table of Contents

Advertisement

MP-202 Telephone Adapter
Contents
Figure 10-40: VLAN Interface Screen ................................................................................................. 123
Figure 10-41: Bridge Section of the Screen ........................................................................................ 124
Figure 10-42: VLAN Settings............................................................................................................... 124
Figure 10-43: No IP Address ............................................................................................................... 124
Figure 10-44: Configuring WAN Ethernet............................................................................................ 125
Figure 10-45: System Monitoring ........................................................................................................ 125
Figure 10-46: Testing the Setup.......................................................................................................... 126
Figure 10-47: Testing the Setup.......................................................................................................... 126
Figure 10-48: VoIP and Data on same VLAN ..................................................................................... 127
Figure 10-49: No IP Address ............................................................................................................... 128
Figure 11-1: TR-069 CPE WAN Management Protocol...................................................................... 129
Figure 12-1: Firewall in Action ............................................................................................................. 135
Figure 12-2: General Security Level Settings...................................................................................... 136
Figure 12-3: Access Control ................................................................................................................ 138
Figure 12-4: Add Access Control Rule ................................................................................................ 139
Figure 12-5: Port Forwarding............................................................................................................... 141
Figure 12-6: Add Port Forwarding Rule............................................................................................... 141
Figure 12-7: Add a Specific Protocol................................................................................................... 142
Figure 12-8: Forward to a Specific Port............................................................................................... 142
Figure 12-9: Add a Specific Schedule ................................................................................................. 142
Figure 12-10: Port Forwarding Rule .................................................................................................... 142
Figure 12-11: DMZ Host ...................................................................................................................... 144
Figure 12-12: Port Triggering .............................................................................................................. 145
Figure 12-13: Adding Port Triggering Rules........................................................................................ 146
Figure 12-14: Edit Service Server Ports.............................................................................................. 146
Figure 12-15: Edit Service Server Ports.............................................................................................. 147
Figure 12-16: Edit Service Opened Ports............................................................................................ 147
Figure 12-17: Edit Service Opened Ports............................................................................................ 147
Figure 12-18: New Port Triggering Rule.............................................................................................. 148
Figure 12-19: Website Restrictions ..................................................................................................... 149
Figure 12-20: Restricted Website........................................................................................................ 149
Figure 12-21: Add a Specific Host....................................................................................................... 150
Figure 12-22: Add a Specific Schedule ............................................................................................... 150
Figure 12-23: Advanced Filtering ........................................................................................................ 151
Figure 12-24: Add Advanced Filter...................................................................................................... 152
Figure 12-25: Specify Source Address................................................................................................ 153
Figure 12-26: Specify Protocol ............................................................................................................ 153
Figure 12-27: Set Priority Rule ............................................................................................................ 154
Figure 12-28: Set DSCP Rule ............................................................................................................. 154
Figure 12-29: Security Log .................................................................................................................. 155
Figure 12-30: Security Log Settings .................................................................................................... 156
Figure 13-1: Advanced Settings .......................................................................................................... 161
Figure 13-2: Advanced - About the Gateway ...................................................................................... 165
Figure 13-3: Contents of the Configuration File .................................................................................. 166
Figure 13-4: Load Configuration File................................................................................................... 167
Figure 13-6: Successful Configuration File Loading ........................................................................... 168
Figure 13-7: Reboot After Configuration File Load ............................................................................. 168
Figure 13-8: Load Configuration File................................................................................................... 169
Figure 13-9: Advanced - Restart ........................................................................................................ 171
Figure 13-10: Restore Defaults ........................................................................................................... 171
Figure 13-11: Advanced - Diagnostics ................................................................................................ 172
Figure 13-12: Advanced - Diagnostics - Statistics .............................................................................. 173
Figure 13-13: Advanced - MAC Cloning Settings ............................................................................... 174
Figure 13-14: Regional Settings.......................................................................................................... 175
Figure 13-15: System Settings ............................................................................................................ 177
Figure 13-16: Advanced - SNMP ........................................................................................................ 178
Version 2.6
11
May 1

Advertisement

Table of Contents
loading

Table of Contents