Network Router - Wireless Network Device User Manual
Table Of Contents
- Introduction
- Getting Started
- Configuring the V2IU 4350
- Configuration Guide For IP Centrex Applications
- Configuration Guide For Station Side IP PBX Applications
- Configuration Guide For Trunk Side IP PBX Applications
- Configuration Guide For Hosted Video Applications
- Configuration Guide For Enterprise Video Applications
- System Configuration
- Read-only User
- Subinterfaces
- ToS Byte Setting
- H.323 Configuration
- Forwarding Rules
- Peering Proxy
- Clients List Lock
- H.323 Activity Monitor
- VoIP Configuration
- Data Networking Configuration
- Traffic Management Configuration
- System Diagnostics
- Saving and Restoring the V2IU 4350 Configuration
- Upgrading the V2IU 4350
- Appendix
- Regulatory Notices

User Manual V
2
IU 4350 Converged Network Appliance
3 - 68
If a given packet does not match any of the configured rules, it is dropped.
1. Select Firewall.
2. Enter the desired Advanced Settings using the table above as a guide.
3. Select Submit.
Remove Advanced Setting Entries
To remove an advanced firewall setting simply highlight the value in the entry
box and delete it using the keyboard.
1. Select Firewall.
2. Highlight the entry to be deleted in the Advanced Settings list and press
the Delete key on your keyboard.
3. Press Submit.
Traffic Management Configuration
Traffic management is required to ensure high quality voice and video calls
when voice, video, and data traffic share the same WAN link. Voice and video
traffic must be prioritized for transmission over data traffic to meet the
stringent jitter, latency and packet loss requirements for high quality voice and
video. The 4350:
• Automatically prioritizes voice and video traffic over data traffic to ensure
high quality voice and video calls.
• Maximizes WAN link utilization by allowing data traffic to burst up to full
line rate in the absence of voice and video calls.
Allow Hostwise
UDP (IP-Port)
Allows all traffic matching
the specified UDP port
numbers and the
specified source IP
addresses
*Multiple entries are separated by a space
*Port are specified using a - character. For example:
192.168.3.1-23 for Telnet.
*Port ranges are specified using a : character. For
example: 192.168.3.1-23:50 means port 23 through 50
*Classful IP addresses are assumed by default. For
example: 192.168.3.1 uses a class c mask. Subnets can
be specified using the / notation. E.g. 192.168.3.1/24