Version 6.4  131  March 2012 
SIP User's Manual   11. Security 
11  Security 
This section describes the VoIP security-related configuration. 
 
11.1  Configuring Firewall Settings 
The device provides an internal firewall, allowing you (the security administrator) to define 
network traffic filtering rules. You can add up to 50 ordered firewall rules.  
The access list provides the following firewall rules: 
  Block traffic from known malicious sources 
  Only allow traffic from known friendly sources, and block all others 
  Mix allowed and blocked network sources 
  Limit traffic to a pre-defined rate (blocking the excess) 
  Limit traffic to specific protocols, and specific port ranges on the device 
For each packet received on the network interface, the table is scanned from the top down 
until a matching rule is found. This rule can either deny (block) or permit (allow) the packet. 
Once a rule in the table is located, subsequent rules further down the table are ignored. If 
the end of the table is reached without a match, the packet is accepted. For more 
information on the internal firewall, refer to the Product Reference Manual. 
 
 
Notes:  
•  It is recommended to add a rule at the end of your table that blocks all 
traffic and add firewall rules above it (in the table) that allow traffic (with 
bandwidth limitations). To block all traffic, the following must be set: 
- IP address to 0.0.0.0 
- Prefix length of 0 (implies the rule can match any IP address)  
- Local port range 0-65535 
- Protocol "Any" 
- Action Upon Match "block" 
•  You can also configure the firewall settings using the ini file table 
parameter AccessList (see 'Security Parameters' on page 568). 
 
  To add firewall rules: 
1.  Open the Firewall Settings page (Configuration  tab > VoIP  menu > Security 
submenu > Firewall Settings). 
Figure  11-1: Firewall Settings Page 
 
2.  In the 'Add' field, enter the index of the access rule that you want to add, and then 
click Add; a new firewall rule index appears in the table. 
3.  Configure the firewall rule's parameters according to the table below.