30
Click to enable log and the log about access control will be
recorded in the system.
Convenient for recording parameters of access control
3.4.3 Filtering
Configuration of mapping rules is generally used to disable access to network settings.
From navigation tree, select "Firewall>>Filtering" menu, then enter “Filtering” page.
Table 3-4-3 Firewall - Filtering Parameters
Function description: Set settings of firewall related to filtering and generally set forbidden
URL.
Click to enable filtering
Set URL that needs to be filtered
Click to write log and the log about filtering will be recorded in
the system.
Record the meanings of various parameters of filtering
3.4.4 Port Mapping
Port mapping is also called virtual server. Setting of port mapping can enable the host of extranet
to access to specific port of host corresponding to IP address of intranet.
To configure port mapping, go into the navigation tree, select "Firewall >> Port Mapping", then
enter “Port Mapping” page.
Table 3-4-4 Firewall - Port Mapping Parameters
Port Mapping (at most 50 port mappings can be set)
Function description: Configure parameters of port mapping.
Check to enable port mapping.
Set source address of port mapping
Set service port number of port mapping
Set external address of port mapping
Set internal address of port mapping
Click to enable log and the log about port mapping will
be recorded in the system.