User's Manual
13
Security
This section describes the VoIP security-related configuration.
13.1
Configuring Firewall Settings
The Firewall table lets you configure up to 500 firewall rules, which define network traffic
filtering rules (access list) for incoming traffic. The access list offers the following firewall
possibilities:
Block traffic from known malicious sources
Allow traffic only from known "friendly" sources, and block all other traffic
Mix allowed and blocked network sources
Limit traffic to a user-defined rate (blocking the excess)
Limit traffic to specific protocols, and specific port ranges on the device
For each packet received on the network interface, the device searches the table from top
to bottom until the first matching rule is found. The matched rule can permit (allow) or deny
(block) the packet. Once a rule in the table is located, subsequent rules further down the
table are ignored. If the end of the table is reached without a match, the packet is
accepted.
Version 7.2
165
13. Security
Mediant 4000 SBC