Figure 3-159: Added Access List Rules - AudioCodes Mediant 800 MSBG User Manual

Multi-service business gateway
Hide thumbs Also See for Mediant 800 MSBG:
Table of Contents

Advertisement

SIP User's Manual
c.
Configure the 'Operation' parameters to define the action that the rule performs:
d.
Select the 'Log Packets Matched by This Rule' check box to log the first packet
from a connection that was matched by this rule.
e.
From the 'Schedule' drop-down list, select the time during which the rule is active.
By default, the rule is always active. However, you can configure scheduler rules
by selecting 'User Defined', and then defining the day and time period during
which the rule is active. Once a scheduler rule(s) is defined, the 'Schedule' drop-
down list allows you to choose an available rule (for adding user-defined
schedule rules, see ''Configuring Scheduler Rules'' on page 285).
4.
Click OK to save your changes; the Access Lists table re-appears, displaying the
defined rules under the Access List Rule ID:
The order of the rules appearing under a specific Access List name represents both
the order in which they are defined and the sequence by which they are applied. You
can change this order, by using the Move Up
5.
Assign the Access List rule ID to the required LAN or WAN interface (see ''Configuring
Advanced Filtering'').
Version 6.2
DSCP: Select this check box to display two DSCP fields, which enable you
to specify a hexadecimal DSCP value and its mask assigned to the packets
matching the priority rule.
Priority: Select this check box to display a drop-down list in which you can
select a priority level assigned to the packets matching the priority rule.
Permit Established: Allow access to packets that match the criteria defined.
The data transfer session is handled using Stateful Packet Inspection (SPI),
meaning that other packets matching this rule are automatically allowed
access.
Permit: Allow access to packets that match the criteria defined, without
keeping track of the data transfer session state.
Deny: Deny access to packets that match the source and destination IP
addresses and service ports defined above.

Figure 3-159: Added Access List Rules

and Move Down
251
3. Web-Based Management
icons.
February 2011

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents