203
BCM50e Integrated Router Configuration - Advanced
Appendix B
Triangle Route
The Ideal Setup
When the firewall is on, your Business Secure Router acts as a secure gateway
between your LAN and the Internet. In an ideal network topology, all incoming
and outgoing network traffic passes through the Business Secure Router to protect
your LAN against attacks.
Figure 113
Ideal Setup
The Triangle Route Problem
You can have more than one connection to the Internet (through one or more
ISPs). If an alternate gateway is on the LAN (and its IP address is in the same
subnet as the Business Secure Router LAN IP address), the triangle route (also
called asymmetrical route) problem can occur. The steps below describe the
triangle route problem.
A traffic route is a path for sending or receiving data packets between two
Ethernet devices. Some companies have more than one alternate route to one or
more ISPs. If the LAN and ISP are in the same subnet, the triangle route problem
can occur. The steps below describe the triangle route problem.
BCM50e Integrated Router
Summary of Contents for BCM50e
Page 18: ...18 Figures N0115789 ...
Page 22: ...22 Tables N0115789 ...
Page 28: ...28 Preface N0115789 ...
Page 38: ...38 Chapter 1 Getting to know your BCM50e Integrated Router N0115789 ...
Page 44: ...44 Chapter 2 Introducing the SMT N0115789 SMT menus at a glance Figure 6 SMT overview ...
Page 60: ...60 Chapter 4 LAN setup N0115789 ...
Page 82: ...82 Chapter 6 Remote Node setup N0115789 ...
Page 86: ...86 Chapter 7 IP Static Route Setup N0115789 ...
Page 114: ...114 Chapter 9 Network Address Translation NAT N0115789 ...
Page 136: ...136 Chapter 11 Filter configuration N0115789 ...
Page 140: ...140 Chapter 12 SNMP Configuration N0115789 ...
Page 144: ...144 Chapter 13 System security N0115789 ...
Page 172: ...172 Chapter 15 Firmware and configuration file maintenance N0115789 ...
Page 186: ...186 Chapter 17 Remote Management N0115789 ...
Page 206: ...206 Appendix B Triangle Route N0115789 ...
Page 226: ...226 Appendix D PPPoE N0115789 ...
Page 232: ...232 Appendix F N0115789 ...
Page 242: ...242 Appendix G IP subnetting N0115789 ...
Page 304: ...304 Appendix K Log descriptions N0115789 ...
Page 306: ...306 Appendix L Brute force password guessing protection N0115789 ...