Page 56 / 123 Scroll up to view Page 51 - 55
51
Chapter 6
Configuring Security Settings
Medium
If
Medium
is selected in the “Firewall Security Level” screen, the services listed at
the bottom of the screen (
HTTP
,
DNS
,
FTP
,
IMAP
v
3
,
SMTP
,
POP3
,
NNTP
,
IPSEC IKE
,
IPSEC ESP
,
HTTPS
, and
IMAP
) are the only ones allowed to pass through the firewall.
All other services will be blocked. These settings can be modified to customize the
firewall settings.
When finished with this screen, click
Apply
to save the changes.
Downloaded from
www.Manualslib.com
manuals search engine
Page 57 / 123
52
Action
tec 54 Mbps Wireless DSL Gateway User Manual
Low
If
Low
is selected in the “Firewall Security Level” screen, the services listed at
the bottom of the screen (
NETBIOS-SSN
,
DNS
,
EPMAP
,
PROFILE
,
NETBIOS-NS
,
NETBIOS-DGM
,
MICROSOFT-DS
,
SNMP
,
LDAP
, and
MICROSOFT-GC
,) can be
denied access through the firewall. Click in the appropriate check box to allow or
deny access for a particular service (check mark in the check box to deny; blank
check box to allow). All services not listed are allowed access.
Downloaded from
www.Manualslib.com
manuals search engine
Page 58 / 123
53
Chapter 6
Configuring Security Settings
Off
If
Off
is selected in the “Firewall Security Level” screen, firewall filtering is based
solely on the basic
NAT
firewall.
Note
: See Appendix F, “Service Acronyms,” for a description of
the services listed in the Firewall Security Level screens.
Applications
Selecting
Applications
in the Security screen generates the “Applications” screen.
Downloaded from
www.Manualslib.com
manuals search engine
Page 59 / 123
54
Action
tec 54 Mbps Wireless DSL Gateway User Manual
This screen allows certain programs to bypass the Gateway’s built-in firewall,
allowing access to parts of the network (for hosting a Web or ftp server, for exam-
ple). To use, select the name of a computer on the network from the “
PC Name
drop-down list, then click
Add
. Next, select a “Category” by clicking the appropri-
ate radio button. In the “Available Rules” list box, select a game, application, server,
etc., then click
Add>>
. The selected item appears in the “Applied Rules” list box.
Repeat for each item needed
To remove an item from the Applied Rules list, highlight it, then click
Remove
.
To view an item’s rules (forwarded ports, etc.), highlight it, then click
View Rule.
When finished with this screen, click
Apply
to save the changes.
Rule Management
To create a custom set of rules, click the “User” radio button, then click
New
. The
“Rule Management” screen appears.
In this screen, the user can create a custom set of rules for a game or application
not listed in the Applications screen. Enter the “Rule Name,” “Protocol,” “Port
Start,” “Port End,” and “Port Map” in the appropriate text boxes, then click
Apply
.
The rules are summarized at the bottom of the screen, and the rule set will appear
in the Applications screen after clicking
Back
.
Downloaded from
www.Manualslib.com
manuals search engine
Page 60 / 123
55
Chapter 6
Configuring Security Settings
DMZ Hosting
Selecting
DMZ
Hosting
in the “Security” screen generates the “
DMZ
Hosting”
screen. To use
DMZ
hosting, select the computer on the network to be used as a
DMZ
host in the “
DMZ
Host
PC
Name” drop-down menu, then click
On
.
DMZ
hosting is used to support online gaming and Internet conferencing services.
These programs usually require multiple open ports, making the network acces-
sible from the Internet.
DMZ
hosting symbolically places the
DMZ
host computer
outside of the Gateway’s network. Access to the network resources while
DMZ
hosting is active is blocked.
Action
tec recommends activating
DMZ
hosting only as
long as necessary.
When finished with this screen, click
Apply
to save the changes.
M
Warning
:
The
DMZ
Host computer will be vulnerable to com-
puter hackers on the Internet while in
DMZ
mode.
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top