Page 86 / 132
Scroll up to view Page 81 - 85
C
ONFIGURING
THE
BARRICADE
4-42
Note:
We do not recommend modifying the default parameters shown
above.
Click
Save Settings
to proceed, or
Cancel
to change your settings.
Incomplete
TCP/UDP
sessions detect
sensitive time
period
300 msecs Length of time before an incomplete TCP/UDP
session is detected as incomplete.
Maximum
half-open
fragmentation
packet
number from
same host
30
sessions
Maximum number of half-open fragmentation
packets from the same host.
Half-open
fragmentation
detect sensitive
time period
1 sec
Length of time before a half-open fragmentation
session is detected as half-open.
Flooding cracker
block time
300 secs
Length of time from detecting a flood attack to
blocking the attack.
Parameter
Defaults
Description
Page 87 / 132
S
ECURITY
4-43
DMZ
If you have a client PC that cannot run an Internet application properly
from behind the firewall, you can open the client up to unrestricted
two-way Internet access. Enter the IP address of a DMZ (Demilitarized
Zone) host on this screen. Adding a client to the DMZ may expose
your local network to a variety of security risks, so only use this option
as a last resort.
Page 88 / 132
C
ONFIGURING
THE
BARRICADE
4-44
Wireless
The BARRICADE can be quickly configured for roaming clients by
setting the Service Set Identifier (SSID) and channel number. It supports
data encryption and client filtering.
To use the wireless feature, check the
Enable
check box and click
Save
Settings
.
To begin configuring your wireless security settings, click
Wireless
Encryption
.
Page 89 / 132
S
ECURITY
4-45
Wireless Encryption
The BARRICADE can transmit your data securely over a wireless
network. Matching security mechanisms must be set up on your
BARRICADE and your wireless client devices. Select the most suitable
security mechanism from the drop-down list on this screen.
Click
Save Settings
to proceed, or
Cancel
to change your settings.
Parameter
Description
No WEP, No WPA/WPA2
Disables all wireless security. To make it easier to
set up your wireless network, we recommend
enabling this setting initially. By default, wireless
security is disabled.
WEP Only
Once you have your wireless network in place, the
minimum security we recommend is to enable the
legacy security standard, Wired Equivalent Privacy
(WEP). See “WEP” on page 4-47.
WPA/WPA2 Only
For maximum wireless security, you should enable
the WPA/WPA2 option. See “WPA/WPA2” on
page 4-49.
Page 90 / 132
C
ONFIGURING
THE
BARRICADE
4-46
Access Control
For a more secure wireless network you can specify that only certain
wireless clients can connect to the BARRICADE. Up to 32 MAC
addresses can be added to the MAC Filtering Table. When enabled, all
registered MAC addresses are controlled by the Access Rule.
By default, this MAC filtering feature is disabled.