|
Фрагмент инструкции
Once the VoIP server configuration settings have been implemented, open a browser and enter gateway.2wire.net. Click the Voice Network tab. The View Voice Network page displays. You can view the status of your VoIP line(s) in the Status at a Glance section. Note: To comply with Australian standards, local ports shall not be connected via shared building cabling. Firewall Tab This chapter describes the 2Wire gateway firewall features, and provides detailed instructions on how to modify the firewall settings. Firewall Features The 2Wire gateway has a professional-grade firewall to help prevent unauthorized users from accessing your local network. The 2Wire gateway firewall includes the following features: Stateful packet inspection. Blocks common Denial of Service attacks (such as SYN/FIN flooding or Smurf), and detects and logs TCP and UDP port scans. Stateless packet inspection. Filters specific NetBios traffic, suspicious packets and IP fragments; blocks packets sent from the private network to the Internet that have spoofed IP addresses. Network Address Translation (NAT). Translates a local network’s IP address to an external address maintained by the 2Wire gateway, effectively “hiding” the existence of a home network to the Internet. The 2Wire gateway then uses this external address to communicate with the Internet on behalf of devices connected to the local network. Port Address Translation (PAT). A function provided by some routers which allows hosts on a LAN to communicate with the rest of a network (such as the Internet) without revealing their own private IP address. All outbound packets have their IP address translated to the router’s external IP address. Replies come back to the router, which then translates them back into the private IP address of the original host for final delivery. During PAT, each computer on the LAN is translated to the same IP address, but with a different port number assignment. Inbound and outbound port blocking. Blocks common inbound and outbound protocol types from passing information to or receiving information from the Internet. Firewall Tab Viewing Your Firewall Summary The Firewall Summary page provides summary information and links to the most commonly used security- related features of your system. To access the Firewall Summary page: • Open a Web browser and access the gateway user interface by entering • Click the Firewall tab to open the View Firewall Summary page. Figure 15. View Firewall Summary Page The Firewall Settings panel displays the Current Settings for your firewall. • Default. Unsolicited inbound traffic is not allowed to pass through the firewall. • Custom. Applications are associated with computers on your network. An access list shows the computers (Devices) on your network and the names of the Allowed Applications for each computer. When you allow application traffic, external users on the Internet can have limited access to your home network. This access might be required to allow some programs (such as game servers or instant messaging software) to operate properly. For example, a remote game player on the Internet might need to contact the game server program that you have installed on your home network in order to play against you. Normally, the firewall blocks this communication. By changing the firewall settings, this communication is permitted to pass through a “pinhole” in the firewall. This function may be referred to as “port-mapping” or “port-forwarding” in your software program documentation. Firewall Tab Click VIEW DETAILS to access the Firewall Details page, which shows a list of all the devices that have applications configured in the firewall and the details of these configurations. Figure 16. View Firewall Details Page If you have the Firewall Monitor enhanced service, the Firewall Monitor panel shows a brief summary of the number of attacks that were blocked for the current day and week. Click VIEW DETAILS to access the Monitor the Firewall page. Hosting an Application When you host an application on your network for Internet users to access, you must configure the 2Wire gateway firewall to pass through specific application data to a selected computer. To host an application: • Open a Web browser and access the gateway user interface by entering • Click the Firewall tab. Firewall Tab • Click the Firewall Settings link under the tab to open the Edit Firewall Settings page. Figure 17. Edit Firewall Settings Page 1. From the Select a computer pull-down menu, select the computer that you wish to host the application. 2. Click the Allow individual application(s) radio button. 3. In the Applications panel, select an application. 4. Click the ADD > button. The application you selected now appears in the Hosted Applications pane. 5. Click DONE. Firewall Tab To stop hosting an application: 1. In the Hosted Applications panel, select the application you wish to stop hosting. 2. ...
Эта инструкция также подходит к моделям:Сетевое оборудование - Gateway None (2.69 mb)
Сетевое оборудование - Gateway None (2.69 mb)
Сетевое оборудование - Gateway None (2.69 mb)
Сетевое оборудование - Gateway None (2.69 mb)