Page 171 / 296 Scroll up to view Page 166 - 170
Chapter 17 Remote Management
NBG334W User’s Guide
171
17.3
Telnet
You can configure your NBG334W for remote Telnet access as shown next. The administrator
uses Telnet from a computer on a remote network to access the NBG334W.
Figure 93
Telnet Configuration on a TCP/IP Network
17.4
Telnet Screen
To change your NBG334W’s Telnet settings, click
Management
>
Remote MGMT
>
Telnet
.
The following screen displays.
Figure 94
Management > Remote MGMT > Telnet
Secured Client IP
Address
A secured client is a “trusted” computer that is allowed to communicate with the
NBG334W using this service.
Select
All
to allow any computer to access the NBG334W using this service.
Choose
Selected
to just allow the computer with the IP address that you specify to
access the NBG334W using this service.
Apply
Click
Apply
to save your customized settings and exit this screen.
Reset
Click
Reset
to begin configuring this screen afresh.
LABEL
DESCRIPTION
Page 172 / 296
Chapter 17 Remote Management
NBG334W User’s Guide
172
The following table describes the labels in this screen.
17.5
FTP Screen
You can upload and download the NBG334W’s firmware and configuration files using FTP,
please see the chapter on firmware and configuration file maintenance
for details. To use this
feature, your computer must have an FTP client.
To change your NBG334W’s FTP settings, click
Management
>
Remote MGMT
>
FTP
.
The screen appears as shown.
Figure 95
Management > Remote MGMT > FTP
The following table describes the labels in this screen.
Table 70
Management > Remote MGMT > Telnet
LABEL
DESCRIPTION
Server Port
You may change the server port number for a service if needed, however you must
use the same port number in order to use that service for remote management.
Server Access
Select the interface(s) through which a computer may access the NBG334W using
this service.
Secured Client
IP Address
A secured client is a “trusted” computer that is allowed to communicate with the
NBG334W using this service.
Select
All
to allow any computer to access the NBG334W using this service.
Choose
Selected
to just allow the computer with the IP address that you specify to
access the NBG334W using this service.
Apply
Click
Apply
to save your customized settings and exit this screen.
Reset
Click
Reset
to begin configuring this screen afresh.
Table 71
Management > Remote MGMT > FTP
LABEL
DESCRIPTION
Server Port
You may change the server port number for a service if needed, however you must
use the same port number in order to use that service for remote management.
Server Access
Select the interface(s) through which a computer may access the NBG334W using
this service.
Secured Client IP
Address
A secured client is a “trusted” computer that is allowed to communicate with the
NBG334W using this service.
Select
All
to allow any computer to access the NBG334W using this service.
Choose
Selected
to just allow the computer with the IP address that you specify to
access the NBG334W using this service.
Page 173 / 296
Chapter 17 Remote Management
NBG334W User’s Guide
173
17.6
DNS Screen
Use DNS (Domain Name System) to map a domain name to its corresponding IP address and
vice versa. Refer to the chapter on Wizard Setup for background information.
To change your NBG334W’s DNS settings, click
Management
>
Remote MGMT
>
DNS
.
The screen appears as shown.
Figure 96
Management > Remote MGMT > DNS
The following table describes the labels in this screen.
Apply
Click
Apply
to save your customized settings and exit this screen.
Reset
Click
Reset
to begin configuring this screen afresh.
Table 71
Management > Remote MGMT > FTP
LABEL
DESCRIPTION
Table 72
Management > Remote MGMT > DNS
LABEL
DESCRIPTION
Server Port
The DNS service port number is 53 and cannot be changed here.
Server Access
Select the interface(s) through which a computer may send DNS queries to the
NBG334W.
Secured Client IP
Address
A secured client is a “trusted” computer that is allowed to send DNS queries to the
NBG334W.
Select
All
to allow any computer to send DNS queries to the NBG334W.
Choose
Selected
to just allow the computer with the IP address that you specify to
send DNS queries to the NBG334W.
Apply
Click
Apply
to save your customized settings and exit this screen.
Reset
Click
Reset
to begin configuring this screen afresh.
Page 174 / 296
Chapter 17 Remote Management
NBG334W User’s Guide
174
Page 175 / 296
NBG334W User’s Guide
175
C
HAPTER
18
Universal Plug-and-Play (UPnP)
This chapter introduces the UPnP feature in the web configurator.
18.1
Introducing Universal Plug and Play
Universal Plug and Play (UPnP) is a distributed, open networking standard that uses TCP/IP
for simple peer-to-peer network connectivity between devices. A UPnP device can
dynamically join a network, obtain an IP address, convey its capabilities and learn about other
devices on the network. In turn, a device can leave a network smoothly and automatically
when it is no longer in use.
See
Section 18.3 on page 176
for configuration instructions.
18.1.1
How do I know if I'm using UPnP?
UPnP hardware is identified as an icon in the Network Connections folder (Windows XP).
Each UPnP compatible device installed on your network will appear as a separate icon.
Selecting the icon of a UPnP device will allow you to access the information and properties of
that device.
18.1.2
NAT Traversal
UPnP NAT traversal automates the process of allowing an application to operate through NAT.
UPnP network devices can automatically configure network addressing, announce their
presence in the network to other UPnP devices and enable exchange of simple product and
service descriptions. NAT traversal allows the following:
Dynamic port mapping
Learning public IP addresses
Assigning lease times to mappings
Windows Messenger is an example of an application that supports NAT traversal and UPnP.
See the NAT chapter for more information on NAT.
18.1.3
Cautions with UPnP
The automated nature of NAT traversal applications in establishing their own services and
opening firewall ports may present network security issues. Network information and
configuration may also be obtained and modified by users in some network environments.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top