Internet Access Policy

The Internet Access Policy screen allows you to block or allow specific kinds of Internet applications and traffic such as Internet access, designated services, websites, and inbound traffic during specific days and times.

Access Policy – Access can be managed by a policy by using the settings on this screen to establish an access policy. Selecting a policy from the drop-down menu will display that policy’s settings. To delete a policy, select that policy’s number and click the Delete This Policy button. To view all the policies, click the Summary button.

Policy Table – On the Summary screen, the policies are listed with the following information: No., Policy Name, Access, Days, Time, and status (Enabled). To enable a policy, click the Enabled checkbox. To delete a policy, click its Delete button. Click the Save Settings button to save your changes, or click the Cancel Changes button to cancel your changes. To return to the Internet Access Policy screen, click the Close button.

Status – Policies are disabled by default. To enable a policy, select the policy number from the drop-down menu. And click the radio button beside Enabled.

To create a policy:

Select a number from the Access Policy drop-down menu.

Enter a Policy Name.

Enable this policy by checking the Enabled.

Click the Edit List button to select the PCs to be affected by the policy. The List of PCs screen will appear. You can select a PC by MAC address or IP address. You can also enter a range of IP addresses if you want this policy to affect a group of PCs.

Select Deny or Allow to block or allow Internet access for the PCs you listed on the screen.

Decide the days and times you want this policy to be enforced. Select the individual days during which the policy will be in effect, or select Everyday.

Enter a range of hours and minutes during which the policy will be in effect, or select 24 Hours.

To block websites with specific URL addresses, enter URL address in a separate field next to Website Blocking.

To block websites using specific keywords, enter each keyword in a separate field next to Website Blocking.

To filter access to various services over the Internet, choose the access to be blocked such as FTP or Telnet. Up to three kinds of access methods can be blocked per each policy.

From the Applications list, select the applications to be blocked. Then click the >> (move right) button to move it to the Blocked List. To remove an application from the Blocked List, select it and click the << (move left) button.

To add an application to block or to edit a service’s settings, enter the application’s name and its range in the Port Range fields, select its protocol from the Protocol drop-down menu. Then click the Add button.

To modify a service, select it from the Application list. Then click the Delete button.

Click the Save Settings button to save the policy’s settings.

Copyright  IPitomy Communication, LLC

26

0007VRF

Page 31
Image 31
Aastra Telecom 1000 manual Copyright  IPitomy Communication, LLC 0007VRF

1000 specifications

Aastra Telecom 1000 is a versatile and robust communication solution designed for small to medium-sized businesses. This telephone system is renowned for its reliability, versatility, and ease of use. One of its main features is its modular design, allowing businesses to scale and customize the system according to their specific needs. This adaptability makes it an excellent investment for growing organizations that require flexibility in their communication system.

The Aastra Telecom 1000 employs advanced digital technology that enhances voice clarity and reduces overall signal interference. This clarity is vital for maintaining effective communication within a corporate environment, ensuring that crucial information is transmitted without misunderstanding. Furthermore, the system supports numerous extensions, making it easy for companies to connect multiple users and departments seamlessly.

Among its many features, the Aastra Telecom 1000 includes capabilities such as voicemail support, call forwarding, and conference calling. The voicemail function allows users to retrieve messages at their convenience, ensuring important communications are not missed. Call forwarding ensures that calls can be directed to the appropriate parties, even if they are not present at their desk, thereby enhancing customer service and responsiveness. The inclusion of conference calling enables multiple users to participate in discussions, fostering teamwork and collaboration among remote teams.

Another key aspect of the Aastra Telecom 1000 is its compatibility with various communication protocols, including Voice over IP (VoIP). This compatibility allows businesses to integrate modern internet-based calling solutions that can lead to significant cost savings on long-distance calls. Moreover, the system can interface with existing IT infrastructure, simplifying its deployment in businesses already using digital communication platforms.

Security is also a significant consideration with the Aastra Telecom 1000. The system adheres to industry-standard security measures to protect sensitive communication from external threats. In addition, the user-friendly interface ensures that employees can use the system without extensive training, promoting streamlined operations and quick adoption of the technology.

Overall, the Aastra Telecom 1000 represents an ideal solution for businesses looking for a reliable, feature-rich telephone system that can adapt to their evolving communication needs. With its robust capabilities, scalability, and integration options, it stands out as a preferred choice for companies seeking to enhance their internal and external communications efficiently.