Chapter 12 Firewall
B222s User’s Guide
113
3
Does a rule that allows Internet users access to resources on the LAN create a security
vulnerability? For example, if FTP ports (TCP 20, 21) are allowed from the Internet to the LAN,
Internet users may be able to connect to computers with running FTP servers.
4
Does this rule conflict with any existing rules?
Once these questions have been answered, adding rules is simply a matter of entering the
information into the correct fields in the web configurator screens.
Summary of Contents for B222s
Page 4: ...Contents Overview B222s User s Guide 4 ...
Page 12: ...Table of Contents B222s User s Guide 12 ...
Page 13: ...13 PART I User s Guide ...
Page 14: ...14 ...
Page 28: ...28 ...
Page 78: ...Chapter 7 Routing B222s User s Guide 78 ...
Page 82: ...Chapter 8 DNS Route B222s User s Guide 82 ...
Page 102: ...Chapter 10 Network Address Translation NAT B222s User s Guide 102 ...
Page 114: ...Chapter 12 Firewall B222s User s Guide 114 ...
Page 120: ...Chapter 14 Parental Control B222s User s Guide 120 ...
Page 125: ...Chapter 15 VoIP B222s User s Guide 125 ...
Page 144: ...Chapter 15 VoIP B222s User s Guide 144 ...
Page 154: ...Chapter 17 Traffic Status B222s User s Guide 154 ...
Page 156: ...Chapter 18 User Account B222s User s Guide 156 ...
Page 170: ...Chapter 24 Backup Restore B222s User s Guide 170 ...
Page 172: ...Chapter 25 Diagnostic B222s User s Guide 172 ...
Page 218: ...Appendix B Setting Up Your Computer s IP Address B222s User s Guide 218 ...
Page 228: ...Appendix C Pop up Windows JavaScript and Java Permissions B222s User s Guide 228 ...
Page 252: ...Appendix E Common Services B222s User s Guide 252 ...