Page 16 / 112 Scroll up to view Page 11 - 15
F
EATURES
AND
B
ENEFITS
1-2
Features and Benefits
Internet connection to xDSL or Cable modem via a 10/100 Mbps
WAN port
Internet connection to ISDN TA or PSTN modem via an RS-232
console port
Local network connection via 10/100 Mbps Ethernet ports
Built-in Print Server for any client attached to the LAN
DHCP for dynamic IP configuration, and DNS for domain name
mapping
Firewall with client privileges, hacker prevention, and NAT
NAT also enables multi-user access with a single-user account,
and virtual server functionality (providing protected access to
Internet services such as Web, FTP, mail and Telnet)
Virtual Private Network support using PPTP, L2TP or IPSec
pass-through
User-definable application sensing tunnel supports applications
requiring multiple connections
Supports CHAP authentication protocol for dial-up
identification
Supports PPP dial-out connection
Easy setup through a Web browser on any operating system
that supports TCP/IP
Compatible with all popular Internet applications
Downloaded from
www.Manualslib.com
manuals search engine
Page 17 / 112
I
NTRODUCTION
1-3
Applications
Many advanced applications are provided by the Barricade, such as:
LAN Access
The Barricade provides connectivity to 10/100 Mbps devices,
making it easy to create a network in small offices or homes.
Internet Access
This device supports Internet access through an xDSL, Cable,
ISDN or PSTN connection. Since many DSL providers use
PPPoE to establish communications with end users, the
Barricade includes a built-in client for this protocol,
eliminating the need to install this service on your computer.
Shared IP Address
The Barricade provides Internet access for up to 253 users
with a shared IP address. Using only one ISP account, multiple
users on your network can browse the Web at the same time.
Virtual Server
If you have a fixed IP address, you can set up the Barricade to
act as a virtual host for network address translation. Remote
users access various services at your site using a constant IP
address. Then, depending on the requested service (or port
number), the Barricade can route the request to the
appropriate server (at another internal IP address). This
secures your network from direct attack by hackers, and
provides more flexible management by allowing you to
change internal IP addresses without affecting outside access
to your network.
Downloaded from
www.Manualslib.com
manuals search engine
Page 18 / 112
A
PPLICATIONS
1-4
User-Definable Application Sensing Tunnel
You can define special applications that require multiple
connections such as Internet gaming, videoconferencing, and
Internet telephony. The Barricade can then sense the
application type and open a multi-port tunnel for it.
DMZ Host Support
Allows a networked computer to be fully exposed to the
Internet. This function is used when the special application
sensing tunnel feature is insufficient to allow an application to
function correctly.
Security
The Barricade supports security features that can deny Internet
access to specified users, or filter all requests for specific
services the administrator does not want to serve. The
Barricade’s firewall can also block common hacker attacks,
including IP Spoofing, Land Attack, Ping of Death, IP with
zero length, Smurf Attack, UDP port loopback, Snork Attack,
TCP null scan, and TCP SYN flooding.
Virtual Private Network
The Barricade supports three of the most commonly used VPN
protocols – PPTP, L2TP and IPSec. These protocols allow
remote users to establish a secure connection to their
corporate network. If your service provider supports VPNs,
then any of these protocols can be used to create an
authenticated and encrypted tunnel for passing secure data
over the Internet (i.e., a traditionally shared data network).
The VPN protocols supported by the Barricade are briefly
described below.
Downloaded from
www.Manualslib.com
manuals search engine
Page 19 / 112
I
NTRODUCTION
1-5
Point-to-Point Tunneling Protocol – Provides a secure
tunnel for remote client access to a PPTP security gateway.
PPTP includes provisions for call origination and flow
control required by ISPs.
Layer Two Tunneling Protocol – Includes most of the
features provided by PPTP, but has less overhead and is
more suited for managed networks.
IP Security – Provides IP network-layer encryption. IPSec
can support large encryption networks (such as the
Internet) by using digital certificates for device
authentication.
Downloaded from
www.Manualslib.com
manuals search engine
Page 20 / 112
A
PPLICATIONS
1-6
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top