Page 86 / 131 Scroll up to view Page 81 - 85
C
ONFIGURATION
PARAMETERS
4-51
RIP sends routing-update messages at regular intervals and when the
network topology changes. When a router receives a routing update that
includes changes to an entry, it updates its routing table to reflect the new
route. RIP routers maintain only the best route to a destination. After
updating its routing table, the router immediately begins transmitting
routing updates to inform other network routers of the change.
Poison Reverse
A method for preventing loops that would cause
endless retransmission of data traffic.
Authentication Required
None: No authentication.
Password: A password authentication key is
included in the packet. If this does not match
what is expected, the packet will be discarded.
This method provides very little security as it
is possible to learn the authentication key by
watching RIP packets.
MD5: An algorithm that is used to verify data
integrity through the creation of a 128-bit
message digest from data input (which may
be a message of any length) that is claimed to
be as unique to that specific data as a
fingerprint is to a specific individual.
Authentication Code
Password or MD5 Authentication key.
Parameter
Description
Page 87 / 131
C
ONFIGURING
THE
B
ARRICADE
4-52
Routing Table
Parameter
Description
Flags
Indicates the route status:
C = Direct connection on the same subnet.
S = Static route.
R = RIP (Routing Information Protocol) assigned route.
I = ICMP (Internet Control Message Protocol) Redirect route.
Network
Address
Destination IP address.
Netmask
The subnetwork associated with the destination.
This is a template that identifies the address bits in the destination
address used for routing to specific subnets. Each bit that
corresponds to a “1” is part of the subnet mask number; each bit
that corresponds to “0” is part of the host number.
Gateway
The IP address of the router at the next hop to which frames are
forwarded.
Interface
The local interface through which the next hop of this route is
reached.
Metric
When a router receives a routing update that contains a new or
changed destination network entry, the router adds 1 to the metric
value indicated in the update and enters the network in the routing
table.
Page 88 / 131
C
ONFIGURATION
PARAMETERS
4-53
Firewall
The Barricade Router’s firewall inspects packets at the application layer,
maintains TCP and UDP session information including time-outs and the
number of active sessions, and provides the ability to detect and prevent
certain types of network attacks.
Network attacks that deny access to a network device are called
Denial-of-Service (DoS) attacks. DoS attacks are aimed at devices and
networks with a connection to the Internet. Their goal is not to steal
information, but to disable a device or network so users no longer have
access to network resources.
The Barricade protects against the following DoS attacks: IP Spoofing,
Land Attack, Ping of Death, IP with zero length, Smurf Attack, UDP port
loopback, Snork Attack, TCP null scan, and TCP SYN flooding.
(For details see page 4-60.)
The firewall does not significantly affect system performance, so we advise
enabling the function to protect your network.
Select
Enable
and click the
SAVE SETTINGS
button.
Page 89 / 131
C
ONFIGURING
THE
B
ARRICADE
4-54
Access Control
Access Control allows users to define the outgoing traffic permitted or
not-permitted through the WAN interface. The default is to permit all
outgoing traffic.
Parameter
Description
Enable Filtering
Function
Enable or Disable Access control function.
Normal Filtering
Table
Displays descriptive list of filtering rules defined.
Page 90 / 131
C
ONFIGURATION
PARAMETERS
4-55
To create a new access control rule:
1.
Click
Add PC
on the Access Control screen. The Access Control Add
PC screen will appear.
2.
Define the appropriate rule settings for client PC services.
3.
Click
OK
and then click
SAVE SETTINGS
to save your settings.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top