Log:
Assessments - 0, GPA: 0 ( )

Instruções de Operação Philips, Modelo SNB5600/00

Fabricante : Philips
Arquivo Tamanho: 1.65 mb
Arquivo Nome :
Língua de Ensino: en
Ir para baixar



Facilidade de uso


In other words, depending on the requested service (TCP/UDP port number), the Wireless Router redirects the external service request to the appropriate server (located at another internal IP address). For example, if you set Type/Public Port to TCP/80 (HTTP or web) and the Private IP/Port to 192.168.2.2/80, then all HTTP requests from outside users will be transferred to 192.168.2.2 on port 80. Therefore, by just entering the IP address provided by the ISP, Internet users can access the service they need at the local address to which you redirect them. A list of ports is maintained at the following link : This page displays the current NAPT (Network Address Port Translation) address mappings. 4.8 FIREWALL The Wireless Router’s firewall inspects packets at the application layer, maintains TCP and UDP session information including time-outs and the number of active sessions, and provides the ability to detect and prevent certain types of network attacks. Configuring the Wireless Router Network attacks that deny access to a network device are called Denial-of-Service (DoS) attacks. DoS attacks are aimed at devices and 4.8.3 URL blocking networks with a connection to the Internet. Their goal is not to steal information, but to disable a device or network so users no longer have access to network resources. The Wireless Router firewall function protects against the following DoS attacks : IP Spoofing, Land Attack, Ping of Death, IP with zero length, Smurf Attack, UDP port loopback, Snork Attack, TCP null scan, and TCP SYN flooding. The firewall does not significantly affect system performance, so we advise leaving it enabled to protect your network. Select "Enable" and click the "SAVE SETTINGS" button to open the Firewall submenus. 4.8.1 Access Control Access Control allows users to define the outgoing traffic permitted or not-permitted through the WAN interface. The default is to permit all outgoing traffic. To add the PC to the filtering table : 1-Click "Add PC" on the Access Control screen 2-Define the appropriate settings for client PC services 3-Click "OK" and then click "SAVE SETTINGS" to save your settings 4.8.2 MAC Filter MAC address. The MAC Filtering Table allows the Wireless Router to enter up to 32 MAC addresses that are allowed to access to the WAN port. 1-Click "Yes" to enable, or "No" to disable this function 2-Enter the MAC address in the space provided and click "Save Settings" to confirm The Wireless Router allows the user to block access to web sites by entering either a full URL address or just a keyword. This feature can be used to protect children from accessing violent or pornographic web sites. 4.8.4 Schedule rule You may filter Internet access for local clients based on rules. Each access control rule may be activated at a scheduled time. Define the time schedule on this page, and apply the rule on the Access Control page. 4.8.5 Intrusion detection The Wireless Router can also limit the network access based on the Intrusion Detection Feature Stateful Packet Inspection (SPI) and Anti-DoS firewall protection (Default : Enabled) - The Intrusion Detection Feature of the Wireless Router limits access for incoming traffic at the WAN port. When the SPI feature is turned on, all incoming packets will be blocked except for those types marked in the Stateful Packet Inspection section. Configuring the Wireless Router RIP Defect (Default : Disabled) - If an RIP request packet is not acknowledged to by the router, it will stay in the input queue and not be released. Accumulated packets could cause the input queue to fill, causing severe problems for all protocols. enabling this feature prevents the packets from accumulating. Discard Ping to WAN (Default : Disabled) - Prevent a ping on the Wireless Router’s WAN port from being routed to the network. Scroll down to view more information. Stateful Packet Inspection This is called a "Stateful" packet inspection because it examines the contents of the packet to determine the state of the communications ; i.e., it ensures that the stated destination computer has previously requested the current communication. This is a way of ensuring that all communications are initiated by the recipient computer and are taking place only with sources that are known and trusted from previous interactions. In addition to being more rigorous in their inspection of packets, stateful inspection firewalls also close off ports until connection to the specific port is requested. When particular types of traffic are checked, only the particular type of traffic initiated from the internal LAN will be allowed. For example, if the user only checks "FPT Service" in the Stateful Packet Inspection section, all incoming traffic will be blocked except for FTP connections initiated from the local LAN. Stateful Packet Inspection allows you to select different application types that are using dynamic port numbers. If you wish to use the Stateful ...


Escreva a sua própria avaliação do dispositivo



Mensagem
Seu nome :
Introduza os dois dígitos :
capcha





categorias