Page 101 / 211 Scroll up to view Page 96 - 100
101
© 2010 Verizon. All Rights Reserved.
The FiOS Router’s security suite includes
comprehensive and robust security
services: Stateful Packet Inspection, firewall
security, user authentication protocols,
and password protection mechanisms.
These features allow users to connect their
computers to the Internet and without
worrying about security threats.
Page 102 / 211
Configuring Security Settings
6.1
Overview
6
102
© 2010 Verizon. All Rights Reserved.
6.1
Overview
This chapter covers the following security features:
Firewall
- select the security level for the firewall.
Access
Control
- restrict access from the local network to the Internet.
Port
Forwarding
- enable access from the Internet to specified services
provided by computers on the local network.
DMZ
Host
- configure a network host to receive all traffic arriving at the FiOS
Router which does not belong to a known session.
Port
Triggering
- define port triggering entries to dynamically open the
firewall for some protocols or ports.
Remote
Administration
- enable remote configuration of the FiOS Router
from any Internet-accessible computer.
Static
NAT
- allow multiple static NAT IP addresses to be designated to
devices on the network.
Advanced
Filtering
- control the firewall’s settings and rules.
Security
Log
- view and configure the security log.
Page 103 / 211
FiOS Router User Manual
103
© 2010 Verizon. All Rights Reserved.
6.2
Firewall
The FiOS Router’s firewall is the cornerstone of the FiOS Router’s security suite.
It has been exclusively tailored to the needs of the residential/office user and is
pre-configured to provide optimum security.
The firewall provides both the security and flexibility home and office users seek. It
provides a managed, professional level of network security while enabling the safe
use of interactive applications, such as Internet gaming and video-conferencing.
Additional features, including surfing restrictions and access control, can also
be configured locally through the FiOS Router’s GUI, or remotely by a
service provider.
The firewall also supports advanced filtering, designed to allow comprehensive
control over the firewall’s behavior. Specific input and output rules can be
defined, the order of logically similar sets of rules can be controlled, and
distinctions between rules that apply to Internet and local network devices can
be made.
The firewall regulates the flow of data between the local network and the
Internet. Both incoming and outgoing data are inspected and then either
accepted (allowed to pass through the FiOS Router) or rejected (barred from
passing through the FiOS Router) according to a flexible and configurable set of
rules. These rules are designed to prevent unwanted intrusions from the outside,
while allowing local network users access to required Internet services.
The firewall rules specify what types of services available on the Internet can
be accessed from the local network and what types of services available in the
local network can be accessed from the Internet. Each request for a service
the firewall receives, whether originating in the Internet or from a computer in
the local network, is checked against the firewall rules to determine whether
the request should be allowed to pass through the firewall. If the request is
permitted to pass, all subsequent data associated with this request (a “session”)
will also be allowed to pass, regardless of its direction.
Page 104 / 211
Configuring Security Settings
6.2
Firewall
6
104
© 2010 Verizon. All Rights Reserved.
For example, when accessing a website on the Internet, a request is sent out to
the Internet for this site. When the request reaches the FiOS Router, the firewall
identifies the request type and origin (HTTP and a specific computer in the local
network, in this case). Unless the FiOS Router is configured to block requests of
this type from this computer, the firewall allows this request to pass out onto
the Internet. When the website is returned from the web server, the firewall will
associate it with this session and allow it to pass, regardless of whether HTTP
access from the Internet to the local network is blocked or permitted.
Note that it is the origin of the request, not subsequent responses to this
request, which determines whether a session can be established or not.
6.2a
General Screen
The “General” screen is used to configure the FiOS Router’s basic firewall settings.
Page 105 / 211
FiOS Router User Manual
105
© 2010 Verizon. All Rights Reserved.
The FiOS Router features three pre-defined firewall security levels:
Maximum
,
Typical
, and
Minimum
. The table below summarizes the behavior of the FiOS
Router for each of the three security levels.
Security Level
Internet requests
(incoming traffic)
Local network requests
(outgoing traffic)
Maximum
Security
Blocked
- No access
to local network from
Internet, except as
configured in the Port
Forwarding,
DMZ
host, and
Remote Access screens.
Limited
- Only commonly
used services, such as
web browsing and email,
are permitted.
Typical Security
Blocked
- No access
to local network from
Internet, except as
configured in the Port
Forwarding,
DMZ
host, and
Remote Access screens.
Unrestricted
- All
services are permitted,
except as configured in
the Access Control screen.
Minimum
Security
Unrestricted
- Permits
full access from Internet
to local network; all
connection attempts
are permitted.
Unrestricted
- All services
are permitted, except as
configured in the Access
Control screen.
These services include Telnet, FTP, HTTP, HTTPS, DNS, IMAP, POP3 and SMTP.
Note:
Some applications (such as some Internet messengers and peer-to-peer
client applications) tend to use these ports if they cannot connect with their
own default ports. When applying this behavior, these applications will not be
blocked outbound, even at the Maximum Security level.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top