Security Center - Yeastar Technology TA3210 User Manual

Table of Contents

Advertisement

Security Center

This chapter describes how to secure your TA3210. It is strongly recommended that
users configure firewall and other security options on TA3210 to prevent the attack
fraud and the system failure or calls loss.
Security Center
Alert Settings
AMI Settings
Certificates
Firewall Rules
IP Blacklist
Security Center
All the security settings including Firewall, Service, Port Settings in TA3210 are
displayed in Security Center. Users could rapidly check and configure the relevant
security settings here.
1) Firewall
In the "Firewall" tab, users could check firewall configuration and alert settings, you
can enter the corresponding setting page directly by clicking the button in "Setting"
column.
2) Service
In "Service" tab, you can check AMI/SSH status. For AMI/SSH, you can enter the
corresponding setting page directly by clicking the button in "Setting" column.
Figure 10-1 Security Center -- Firewall
Figure 10-2 Security Center -- Service
TA3210 User Manual
45/66

Advertisement

Table of Contents
loading

Table of Contents