Page 191 / 327 Scroll up to view Page 186 - 190
Chapter 15 USB Service
VMG3926-B10A User’s Guide
191
Figure 105
Network Setting > USB Service > Media Server
The following table describes the labels in this menu.
Table 78
Network Setting > USB Service > Media Server
LABEL
DESCRIPTION
Media Server
Select
Enable
to have the VMG function as a DLNA-compliant media server.
Enable the media server to let (DLNA-compliant) media clients on your network play media
files located in the shares.
Interface
Select an interface on which you want to enable the media server function.
Media Library
Path
Enter the path clients use to access the media files on a USB storage device connected to
the VMG.
Apply
Click
Apply
to save your changes.
Cancel
Click
Cancel
to restore your previously saved settings.
Page 192 / 327
Chapter 15 USB Service
VMG3926-B10A User’s Guide
192
Page 193 / 327
VMG3926-B10A User’s Guide
193
C
HAPTER
16
Firewall
16.1
Overview
This chapter shows you how to enable and configure the VMG’s security settings. Use the firewall to
protect your VMG and network from attacks by hackers on the Internet and control access to it. By
default the firewall:
allows traffic that originates from your LAN computers to go to all other networks.
blocks traffic that originates on other networks from going to the LAN.
The following figure illustrates the default firewall action. User
A
can initiate an IM (Instant
Messaging) session from the LAN to the WAN (1). Return traffic for this session is also allowed (2).
However other traffic initiated from the WAN is blocked (3 and 4).
Figure 106
Default Firewall Action
16.1.1
What You Can Do in this Chapter
Use the
General
screen to configure the security level of the firewall on the VMG (
Section 16.2
on page 194
).
Use the
Protocol
screen to add or remove predefined Internet services and configure firewall
rules (
Section 16.3 on page 195
).
Use the
Access Control
screen to view and configure incoming/outgoing filtering rules (
Section
16.4 on page 197
).
Use the
DoS
screen to activate protection against Denial of Service (DoS) attacks (.
Section 16.5
on page 199
).
WAN
LAN
3
4
1
2
A
Page 194 / 327
Chapter 16 Firewall
VMG3926-B10A User’s Guide
194
16.1.2
What You Need to Know
SYN Attack
A SYN attack floods a targeted system with a series of SYN packets. Each packet causes the
targeted system to issue a SYN-ACK response. While the targeted system waits for the ACK that
follows the SYN-ACK, it queues up all outstanding SYN-ACK responses on a backlog queue. SYN-
ACKs are moved off the queue only when an ACK comes back or when an internal timer terminates
the three-way handshake. Once the queue is full, the system will ignore all incoming SYN requests,
making the system unavailable for legitimate users.
DoS
Denials of Service (DoS) attacks are aimed at devices and networks with a connection to the
Internet. Their goal is not to steal information, but to disable a device or network so users no longer
have access to network resources. The VMG is pre-configured to automatically detect and thwart all
known DoS attacks.
DDoS
A DDoS attack is one in which multiple compromised systems attack a single target, thereby
causing denial of service for users of the targeted system.
LAND Attack
In a LAND attack, hackers flood SYN packets into the network with a spoofed source IP address of
the target system. This makes it appear as if the host computer sent the packets to itself, making
the system unavailable while the target system tries to respond to itself.
Ping of Death
Ping of Death uses a "ping" utility to create and send an IP packet that exceeds the maximum
65,536 bytes of data allowed by the IP specification. This may cause systems to crash, hang or
reboot.
SPI
Stateful Packet Inspection (SPI) tracks each connection crossing the firewall and makes sure it is
valid. Filtering decisions are based not only on rules but also context. For example, traffic from the
WAN may only be allowed to cross the firewall in response to a request from the LAN.
16.2
The Firewall Screen
Use this screen to set the security level of the firewall on the VMG. Firewall rules are grouped based
on the direction of travel of packets to which they apply.
Click
Security > Firewall
to display the
General
screen.
Page 195 / 327
Chapter 16 Firewall
VMG3926-B10A User’s Guide
195
Figure 107
Security > Firewall > General
The following table describes the labels in this screen.
16.3
The Protocol Screen
You can configure customized services and port numbers in the
Protocol
screen. For a
comprehensive list of port numbers and services, visit the IANA (Internet Assigned Number
Authority) website. See
Appendix D on page 309
for some examples.
Click
Security > Firewall > Protocol
to display the following screen.
Figure 108
Security > Firewall > Protocol
Table 79
Security > Firewall > General
LABEL
DESCRIPTION
Firewall
Select
Enable
to activate the firewall feature on the VMG.
Easy
Select
Easy
to allow LAN to WAN and WAN to LAN packet directions.
Medium
Select
Medium
to allow LAN to WAN but deny WAN to LAN packet directions.
High
Select
High
to deny LAN to WAN and WAN to LAN packet directions.
Apply
Click
Apply
to save your changes.
Cancel
Click
Cancel
to restore your previously saved settings.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top