Table 12-1: Behavior For The Three Security Levels - AudioCodes MP-202 User Manual

Telephone adapter
Hide thumbs Also See for MP-202:
Table of Contents

Advertisement

MP-202 Telephone Adapter
For example, when you point your Web browser to a Web page on the Internet, a request
is sent out to the Internet for this page. When the request reaches the MP-202, the firewall
will identify the request type and origin--HTTP and a specific PC in your home network, in
this case. Unless you have configured access control to block requests of this type from
this computer, the firewall will allow this request to pass out onto the Internet (refer to
''WAN PPPoE'' on page
returned from the Web server the firewall will associate it with this session and allow it to
pass, regardless of whether HTTP access from the Internet to the home network is blocked
or permitted.
Note that it is the origin of the request, not subsequent responses to this request, that
determines whether a session can be established or not.
You can choose from among three pre-defined security levels for the MP-202: Minimum,
Typical, and Maximum (the default setting). The table below summarizes the behavior of
the MP-202 for each of the three security levels.
Security Level
Maximum
Blocked: No access to home network
Security
from Internet, except as configured in
(Default)
the Local Servers, DMZ host and
Remote Access screens
Typical Security Blocked: No access to home network
from Internet, except as configured in
the Local Servers, DMZ host and
Remote Access screens
Unrestricted: Permits full access from
Minimum
Security
Internet to home network; all connection
attempts permitted.
These services include Telnet, FTP, HTTP, HTTPS, DNS, IMAP, POP3 and SMTP.
The list of allowed services at 'Maximum Security' mode can be edited in the screen''
'Access Contro''l on page 138'.
Some applications (such as some Internet messengers and Peer-To-Peer client
applications) tend to use these ports if they cannot connect with their own default ports.
When applying this behaviour, these applications will not be blocked outbound, even at
Maximum Security Level.
Version 2.6
82
for more on setting access controls). When the Web page is

Table 12-1: Behavior for the Three Security Levels

Requests Originating
in the WAN
(Incoming Traffic)
Limited: Only commonly- used services,
such as Web- browsing and e-mail, are
permitted
Unrestricted: All services are permitted,
except as configured in the Access
Control screen
Unrestricted: All services are permitted,
except as configured in the Access
Control screen
137
12. Security
Requests
Originating
in the LAN
(Outgoing Traffic)
May 1

Advertisement

Table of Contents
loading

Table of Contents