User's Manual
UTT Technologies Chapter 12 Security
http://www.uttglobal.com Page 324
12.3 Firewall
This section describes the Security > Firewall page, which includes the Access Control
List and ACL Settings subpages.
The access control rules that you have created will be listed in the Access Control List.
Note that by default the rules are listed in reverse chronological order of creation, and it
allows you to manually move a rule to a different position in the list.
12.3.1 Introduction to Access Control
12.3.1.1 The Purpose of Access Control Feature
The development of Internet has brought some side effects, such as the emergence of
gambling, pornography, and other illegal websites which are contrary to the state laws and
regulations;
broadband network provide fast surfing to the Internet users, while fast
spreading worms cause great threat to the Internet users. So if an organization wants to
access the Internet, it needs specific Internet access rules. Such as, a government
organization wants to block the civil servants from accessing stock websites, using IM
messenger applications; a business wants to block the employees from accessing game
websites and other services which are unrelated to work during working time; parents
want to control their children¶s online time; an network administrator wants to block the
worms and hacker attacks.
To achieve these purposes, we develop and implement access control feature on the Device.
By utilizing access control feature flexibly, you can not only assign different Internet
access privileges to different LAN users, but also assign different Internet access
privileges to the same users based on schedules. In practice, you can set appropriate
access control rules according to the actual requirements of your organization. Such as,
for a school, you can block the students to access game websites; for a family, you can
only allow your children to access the Internet during the specified period of time; for a
business, you can block the Financial Department¶s employees from accessing the
Internet.
12.3.1.2 The Operation Principle of Access Control
By default, as no access control rule exists on the Device, the Device will forward all the