Page 66 / 149 Scroll up to view Page 61 - 65
DISCUS™ Multiplay Wireless VoIP AG
(C) (2006) Pirelli Broadband Solutions S.p.A. All Rights Reserved. Proprietary Use Pursuant to Cover Page Instructions.
60
OGU 930500105-A1
Network Connections Section
FIGURE 18.
WAN DSL >> General Panel
WAN DSL >> SETTINGS
From the WAN DSL Settings panel, it is possible to set the Line Mode.
FIGURE 19.
WAN DSL >> Settings Panel
Page 67 / 149
Security Section
(C) (2006) Pirelli Broadband Solutions S.p.A. All Rights Reserved. Proprietary Use Pursuant to Cover Page Instructions.
61
OGU 930500105-A1
Security
Section
This chapter will describe the
Security Section
accessible from the
Home Page
of the
DISCUS™ Multiplay Wireless VoIP AG
.
The Router's gateway security suite includes comprehensive and
robust security services: Stateful Packet Inspection Firewall, user
authentication protocols and password protection mechanisms.
These features together allow users to connect their computers to the
Internet and simultaneously be protected from the security threats of
the Internet.
The firewall has been exclusively tailored to the needs of the residen-
tial/office user and has been pre-configured to provide optimum
security.
The Router's firewall provides both the security and flexibility that
home and office users seek. It provides a managed, professional
level of network security while enabling the safe use of interactive
applications, such as Internet gaming and video-conferencing.
Additional features, including surfing restrictions and access control,
can also be easily configured locally by the user through a user-
friendly Web-based interface, or remotely by a service provider.
Be aware that any configuration changes could compromise your con-
nectivity.
Page 68 / 149
DISCUS™ Multiplay Wireless VoIP AG
(C) (2006) Pirelli Broadband Solutions S.p.A. All Rights Reserved. Proprietary Use Pursuant to Cover Page Instructions.
62
OGU 930500105-A1
Security Section
The Router firewall supports advanced filtering, designed to allow comprehen-
sive control over the Firewall’s behavior. You can define specific input and out-
put rules, control the order of logically similar sets of rules and make a
distinction between rules that apply to WAN and LAN network devices.
GENERAL
Use the 'General' screen to configure the gateway's basic security settings.
The firewall regulates the flow of data between the home network and the
Internet. Both incoming and outgoing data are inspected and then either
accepted (allowed to pass through the Router) or rejected (barred from pass-
ing through the Router) according to a flexible and configurable set of rules.
These rules are designed to prevent unwanted intrusions from the outside,
while allowing home users access to the Internet services that they require.
The firewall rules specify what types of services available on the Internet may
be accessed from the home network and what types of services available in
the home network may be accessed from the Internet. Each request for a ser-
vice that the firewall receives, whether originating in the Internet or from a
computer in the home network, is checked against the set of firewall rules to
determine whether the request should be allowed to pass through the firewall.
If the request is permitted to pass, then all subsequent data associated with
this request (a “session”) will also be allowed to pass, regardless of its direc-
tion.
For example, when you point your Web browser to a Web page on the Inter-
net, a request is sent out to the Internet for this page. When the request
reaches the Router the firewall will identify the request type and origin - HTTP
and a specific PC in your home network, in this case. Unless you have config-
ured access control to block requests of this type from this computer, the fire-
wall will allow this request to pass out onto the Internet. When the Web page is
returned from the Web server the firewall will associate it with this session and
allow it to pass, regardless of whether HTTP access from the Internet to the
home network is blocked or permitted.
The important thing to note here is that it is the origin of the request, not sub-
sequent responses to this request, that determines whether a session can be
established or not. You may choose from among three pre-defined security
levels for the Router: Minimum, Typical, and Maximum (the default setting).
The table below summarizes the behavior of the Router for each of the three
security levels.
Page 69 / 149
DISCUS™ Multiplay Wireless VoIP AG
(C) (2006) Pirelli Broadband Solutions S.p.A. All Rights Reserved. Proprietary Use Pursuant to Cover Page Instructions.
63
OGU 930500105-A1
Security Section
FIGURE 1.
Security General panel
TABLE 1.
Security Levels
Security Level
Requests Originating in
the WAN (Incoming
Traffic)
Requests Originating in the
LAN (Outgoing Traffic)
Maximum Security
(Default)
Blocked: no access to
home network from Inter-
net, except as configured
in the Port Forwarding,
DMZ host and Remote
Access screens
Limited: by default, only com-
monly-used services, such as Web
browsing and e-mail, are permit-
ted
Typical Security
Blocked: no access to
home network from Inter-
net, except as configured
in the Port Forwarding,
DMZ host and Remote
Access screens
Unrestricted: all services are per-
mitted, except as configured in
the Access Control screen
Minimum Security
Unrestricted: permits full
access from Internet to
home network; all con-
nection attempts permit-
ted.
Unrestricted: all services are per-
mitted, except as configured in
the Access Control screen
Page 70 / 149
DISCUS™ Multiplay Wireless VoIP AG
(C) (2006) Pirelli Broadband Solutions S.p.A. All Rights Reserved. Proprietary Use Pursuant to Cover Page Instructions.
64
OGU 930500105-A1
Security Section
ACCESS CONTROL
You may want to block specific computers within the home network (or even the
whole network) from accessing certain services on the Internet. For example,
you may want to prohibit one computer from surfing the Web, another computer
from transferring files using FTP, and the whole network from receiving incoming
e-mail.
Access Control defines restrictions on the types of requests that may pass from
the home network out to the Internet, and thus may block traffic flowing in both
directions. It can also be used for allowing specific services when maximum
security is configured. In the e-mail example given above, you may prevent com-
puters in the home network from receiving e-mail by blocking their outgoing
requests to POP3 servers on the Internet.
There are numerous services you should consider blocking, such as popular
game and file sharing servers. For example, if you want to make sure that your
employees do not put your business at risk from illegally traded copyright files,
you may want to block several popular P2P and file sharing applications.
FIGURE 2.
Access Control panel
To allow or restrict services:
1.
Select the 'Access Control' tab in the 'Security' management screen. The
'Access Control' screen will appear.
2.
Click the 'New Entry' link. The 'Add Access Control Rule' screen will appear
3.
The Address combo-box provides you the ability to specify the computer or
group of computers for which you would like to apply the access control rule.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top