Page 71 / 75 Scroll up to view Page 66 - 70
EtherFast
®
Cable/DSL Firewall Router with 4-Port Switch/VPN Endpoint
RIP
(
R
outing
I
nformation
P
rotocol) - A simple routing protocol that is part of
the TCP/IP protocol suite. It determines a route based on the smallest hop count
between source and destination. RIP is a distance vector protocol that routine-
ly broadcasts routing information to its neighboring routers.
RJ-45
(
R
egistered
J
ack-
45
) - A connector similar to a telephone connector that
holds up to eight wires, used for connecting Ethernet devices.
Router
- Protocol-dependent device that connects subnetworks together.
Routers are useful in breaking down a very large network into smaller subnet-
works; they introduce longer delays and typically have much lower throughput
rates than bridges.
Security Association
- A group of security settings related to a specific VPN
tunnel.
Server
- Any computer whose function in a network is to provide user access
to files, printing, communications, and other services.
SMTP
(
S
imple
M
ail
T
ransfer
P
rotocol)
- The standard e-mail protocol on the
Internet. It is a TCP/IP protocol that defines the message format and the mes-
sage transfer agent (MTA), which stores and forwards the mail.
SNMP
(
S
imple
N
etwork
M
anagement
P
rotocol)
- A widely used network
monitoring and control protocol. Data is passed from SNMP agents, which are
hardware and/or software processes reporting activity in each network device
(hub, router, bridge, etc.) to the workstation console used to oversee the net-
work. The agents return information contained in a MIB (Management
Information Base), which is a data structure that defines what is obtainable
from the device and what can be controlled (turned off, on, etc.).
Software
- Instructions for the computer. A series of instructions that performs
a particular task is called a "program." The two major categories of software are
"system software" and "application software." System software is made up of
control programs such as the operating system and database management sys-
tem (DBMS). Application software is any program that processes data for the
user.
SPI
(
S
tateful
P
acket
I
nspection) - A firewall technology that monitors the state
of the transaction so that it can verify that the destination of an inbound pack-
et matches the source of a previous outbound request. It examines not just the
headers of the packet, but also the contents, to determine more about the pack-
135
Instant Broadband
®
Series
Packet
- A unit of data routed between an origin and a destination in a network.
Packet Filtering
- Discarding unwanted network traffic based on its originat-
ing address or range of addresses or its type (e-mail, file transfer, etc.).
Ping
(
P
acket
IN
ternet
G
roper) - An Internet utility used to determine whether
a particular IP address is online. It is used to test and debug a network by send-
ing out a packet and waiting for a response.
Plug-and-Play
- The ability of a computer system to configure expansion
boards and other devices automatically without requiring the user to turn off
the system during installation.
POP3
(
P
ost
O
ffice
P
rotocol
3
) - A standard mail server commonly used on the
Internet. It provides a message store that holds incoming e-mail until users log
on and download it. POP3 is a simple system with little selectivity. All pending
messages and attachments are downloaded at the same time. POP3 uses the
SMTP messaging protocol.
Port
- A pathway into and out of the computer or a network device such as a
switch or router. For example, the serial and parallel ports on a personal com-
puter are external sockets for plugging in communications lines, modems and
printers.
PPPoE
(
P
oint to
P
oint
P
rotocol
o
ver
E
thernet) - PPPoE is a method for the
encapsulation of PPP packets over Ethernet frames from the user to the ISP
over the Internet.
One reason PPPoE is preferred by ISPs is because it provides
authentication (username and password) in addition to data transport.
A PPPoE
session can be initiated by either a client application residing on a PC, or by
client firmware residing on a modem or router.
PPTP
(
P
oint-to-
P
oint
T
unneling
P
rotocol) - A protocol which allows the Point
to Point Protocol (PPP) to be tunneled through an IP network. PPTP does not
specify any changes to the PPP protocol but rather describes a "tunneling serv-
ice" for carrying PPP (a tunneling service is any network service enabled by
tunneling protocols such as PPTP, L2F, L2TP, and IPSEC tunnel mode). One
example of a tunneling service is secure access from a remote small office net-
work to a headquarters corporate intranet via a Virtual Private Network (VPN)
that traverses the Internet. However, tunneling services are not restricted to cor-
porate environments and may also be used for personal (i.e., non-business)
applications.
134
Downloaded from
www.Manualslib.com
manuals search engine
Page 72 / 75
EtherFast
®
Cable/DSL Firewall Router with 4-Port Switch/VPN Endpoint
TFTP
(
T
rivial
F
ile
T
ransfer
P
rotocol) - A version of the TCP/IP FTP protocol
that has no directory or password capability.
Throughput
- The amount of data moved successfully from one place to
another in a given time period.
UDP
(
U
ser
D
atagram
P
rotocol) - A method (protocol) used along with the IP
(Internet Protocol) to send data in the form of message units (datagram)
between network devices over a LAN or WAN. While IP takes care of handling
the actual delivery of the data (routing), UDP takes care of keeping track of the
individual units of data (called packets) that a message is divided into for effi-
cient delivery over the network. UDP is known as a "connection-less" protocol
due to NOT requiring the receiver of a packet to return an acknowledgment of
receipt to the sender of the packet (as opposed to TCP).
Upgrade
- To replace existing software or firmware with a newer version.
Upload
- To transmit a file over a network. In a communications session,
upload means transmit, download means receive.
URL
(
U
niform
R
esource
L
ocator) - The address that defines the route to a file
on the Web or any other Internet facility. URLs are typed into the browser to
access Web pages, and URLs are embedded within the pages themselves to pro-
vide the hypertext links to other pages.
VPN
(
V
irtual
P
rivate
N
etwork) - A technique that allows two or more LANs to
be extended over public communication channels by creating private commu-
nication subchannels (tunnels).
Effectively, these LANs can use a WAN as a
single large "virtually private" LAN.
This removes the need to use leased lines
for WAN communications through secure use of a publicly available WAN
(such as the Internet).
Examples of VPN technology are: PPTP (Point to Point
Tunneling Protocol), L2TP (Layer 2 Tunneling Protocol), and IPSec (Internet
Protocol Security).
VPN end point
- VPN end point capability within a router provides the ability
to initiate a VPN tunnel to some other location that supports either a VPN client
or has VPN end point capability.
WAN
(
W
ide
A
rea
N
etwork)- A communications network that covers a rela-
tively large geographic area, consisting of two or more LANs.
Broadband com-
munication over the WAN is often through public networks such as the tele-
137
Instant Broadband
®
Series
et than just its source and destination information. It is called "stateful" because
verifies that the stated destination computer has previously requested the cur-
rent communication. In this way, it verifies that all communications are initiat-
ed by the recipient computer and are taking place only with sources that are
known and trusted from previous interactions. In addition to being a more rig-
orous inspection, stateful packet inspection closes off ports until connection to
the specific port is requested. This allows an added layer of protection from the
threat of port scanning.
Static IP Address
- A permanent IP address that is assigned to a node in an IP
or a TCP/IP network.
Static Routing
- Forwarding data in a network via a fixed path. Static routing
cannot adjust to changing line conditions as can dynamic routing.
Subnet Mask
- The method used for splitting IP networks into a series of sub-
groups, or subnets. The mask is a binary pattern that is matched up with the IP
address to turn part of the host ID address field into a field for subnets.
Switch
- 1. A data switch connects computing devices to host computers,
allowing a large number of devices to share a limited number of ports. 2. A
device for making, breaking, or changing the connections in an electrical cir-
cuit.
TCP
(
T
ransmission
C
ontrol
P
rotocol) - A method (protocol) used along with
the IP (Internet Protocol) to send data in the form of message units (datagram)
between network devices over a LAN or WAN. While IP takes care of handling
the actual delivery of the data (routing), TCP takes care of keeping track of the
individual units of data (called packets) that a message is divided into for effi-
cient delivery over the network. TCP is known as a "connection oriented" pro-
tocol due to requiring the receiver of a packet to return an acknowledgment of
receipt to the sender of the packet resulting in transmission control.
TCP/IP
(
T
ransmission
C
ontrol
P
rotocol/
I
nternet
P
rotocol) - The basic com-
munication language or set of protocols for communications over a network
(developed specifically for the Internet).
TCP/IP defines a suite or group of
protocols and not only TCP and IP.
Telnet
- A terminal emulation protocol commonly used on the Internet and
TCP/IP-based networks. It allows a user at a terminal or computer to log onto
a remote device and run a program.
136
Downloaded from
www.Manualslib.com
manuals search engine
Page 73 / 75
EtherFast
®
Cable/DSL Firewall Router with 4-Port Switch/VPN Endpoint
139
Appendix I: Specifications
Model Number
BEFSX41
Standards
IEEE 802.3, IEEE 802.3u
Protocol
CSMA/CD
Ports
WAN:
One 10/100 RJ-45 Port
LAN:
Four 10/100 RJ-45 Ports (One with DMZ
Functionality)
Cabling Type
UTP Category 5 or Better
Topology
Star
Speed (Mbps)
WAN:
10/100 (Half Duplex)
20/200 (Full Duplex)
LAN:
10/100 (Half Duplex)
20/200 (Full Duplex)
LED Indicators
Power, Diag, DMZ
WAN:
Link/Act, Full/Col, 10/100
LAN:
Link/Act, Full/Col, 10/100
Dimensions
7.31" x 1.88" x 6.16"
(186 mm x 48 mm x 154 mm)
Unit Weight
13.6 oz. (0.38 kg)
Power Input
12 V AC, 1000 mA
Certifications
FCC Class B, CE Mark
Operating Temp.
0°C to 40°C (32°F to 104°F)
Storage Temp.
-20°C to 70°C (-4°F to 158°F)
Operating Humidity
10% to 85%, Non-Condensing
Storage Humidity
5% to 90%, Non-Condensing
Environmental
Instant Broadband
®
Series
phone (DSL) or cable systems, or through leased lines or satellites.
In its most
basic definition, the Internet could be considered a WAN.
WINIPCFG
- Configuration utility based on the Win32 API for querying,
defining and managing IP addresses within a network.
A commonly used util-
ity for configuring networks with static IP addresses.
138
Downloaded from
www.Manualslib.com
manuals search engine
Page 74 / 75
EtherFast
®
Cable/DSL Firewall Router with 4-Port Switch/VPN Endpoint
Appendix K: Contact Information
For help with the installation or operation of the EtherFast Cable/DSL Firewall
Router, contact Linksys Technical Support at one of the phone numbers or
Internet addresses below.
Sales Information
800-546-5797 (LINKSYS)
Technical Support
800-326-7114
RMA (Return Merchandise
Authorization) Issues
www.linksys.com (or call 949-271-5461)
Fax
949-265-6655
Email
Web
FTP Site
ftp.linksys.com
141
Instant Broadband
®
Series
140
Appendix J: Warranty Information
BE SURE TO HAVE YOUR PROOF OF PURCHASE AND A BARCODE
FROM THE PRODUCT'S PACKAGING ON HAND WHEN CALLING.
RETURN REQUESTS CANNOT BE PROCESSED WITHOUT PROOF OF
PURCHASE.
IN NO EVENT SHALL LINKSYS’S LIABILITY EXCEED THE PRICE
PAID FOR THE PRODUCT FROM DIRECT, INDIRECT, SPECIAL, INCI-
DENTAL, OR CONSEQUENTIAL DAMAGES RESULTING FROM THE
USE OF THE PRODUCT, ITS ACCOMPANYING SOFTWARE, OR ITS
DOCUMENTATION. LINKSYS DOES NOT OFFER REFUNDS FOR ANY
PRODUCT.
LINKSYS OFFERS CROSS SHIPMENTS, A FASTER PROCESS FOR PRO-
CESSING AND RECEIVING YOUR REPLACEMENT.
LINKSYS PAYS
FOR UPS GROUND ONLY. ALL CUSTOMERS LOCATED OUTSIDE OF
THE UNITED STATES OF AMERICA AND CANADA SHALL BE HELD
RESPONSIBLE FOR SHIPPING AND HANDLING CHARGES. PLEASE
CALL LINKSYS FOR MORE DETAILS.
Downloaded from
www.Manualslib.com
manuals search engine
Page 75 / 75
© Copyright 2003 Linksys, All Rights Reserved.
www.linksys.com
Downloaded from
www.Manualslib.com
manuals search engine

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top