User Manual Part 3

Configuring Access Point Security
6-29
Allow or Deny all
protocols, except
Use the drop-down menu to select either Allow or Deny. The
selected setting applies to all protocols except those with enabled
checkboxes and any traffic that is added to the table. For example,
if the adoption rule is to Deny access to all protocols except those
listed, access is allowed only to those selected protocols.
Pre configured Rules The following protocols are preconfigured with the
access point.
To enable a protocol, check the box next to the protocol name.
HTTP - Hypertext Transfer Protocol is the protocol for
transferring files on the Web. HTTP is an application protocol
running on top of the TCP/IP suite of protocols, the
foundation protocols for the Internet. The HTTP protocol uses
TCP port 80.
TELNET - TELNET is the terminal emulation protocol of TCP/
IP. TELNET uses TCP to achieve a virtual connection between
server and client, then negotiates options on both sides of
the connection. TELNET uses TCP port 23.
FTP - File Transfer Protocol (FTP) is an application protocol
using the Internet's TCP/IP protocols. FTP provides an
efficient way to exchange files between computers on the
Internet. FTP uses TCP port 21.
SMTP - Simple Mail Transfer Protocol is a TCP/IP protocol
for sending and receiving email. Due to its limited ability to
queue messages at the receiving end, SMTP is often used
with POP3 or IMAP. SMTP sends the email, and POP3 or
IMAP receives the email. SMTP uses TCP port 25.
POP - Post Office Protocol is a TCP/IP protocol intended to
permit a workstation to dynamically access a maildrop on a
server host. A workstation uses POP3 to retrieve email that
the server is holding for it.
DNS - Domain Name Service protocol searches for
resources using a database distributed among different
name servers.
Add Click Add to create a new table entry.
Del (Delete) Click Del (Delete) to remove a selected list entry.
Name Specify a name for a newly configured protocol.