A
PPLICATIONS
1-6
Router can route the request to the appropriate server (at another
internal IP address). This secures your network from direct attack by
hackers, and provides more flexible management by allowing you to
change internal IP addresses without affecting outside access to your
network.
•
DMZ Host Support
Allows a networked computer to be fully exposed to the Internet.
This function is used when NAT and firewall security prevent an
Internet application from functioning correctly.
•
Security
The VoIP Router supports security features that deny Internet access
to specified users, or filter all requests for specific services that the
administrator does not want to serve. The VoIP Router’s firewall also
blocks common hacker attacks, including IP Spoofing, Land Attack,
Ping of Death, IP with zero length, Smurf Attack, UDP port
loopback, Snork Attack, TCP null scan, and TCP SYN flooding.
•
Virtual Private Network (VPN Pass-through)
The VoIP Router supports three of the most commonly used VPN
protocols – PPTP, L2TP, and IPSec. The VPN protocols supported
by the VoIP Router are briefly described below.
•
Point-to-Point Tunneling Protocol – Provides a secure tunnel for
remote client access to a PPTP security gateway. PPTP includes
provisions for call origination and flow control required by ISPs.
•
L2TP merges the best features of PPTP and L2F – Like PPTP,
L2TP requires that the ISP’s routers support the protocol.
•
IP Security – Provides IP network-layer encryption. IPSec can
support large encryption networks (such as the Internet) by using
digital certificates for device authentication.
Summary of Contents for ARV3515J-A-GP
Page 1: ...ARV3515J A GP March 2005 150000007300J VoIP ADSL Router SIP DRAFT ...
Page 2: ......
Page 42: ...CONFIGURING YOUR MACINTOSH COMPUTER 3 18 ...
Page 97: ...ADSL 4 55 Status The Status page displays ADSL status information ...
Page 128: ...TROUBLESHOOTING A 4 ...
Page 141: ......
Page 142: ...Model Number ARV3515J A GP 150000007300J E032005 R01 F1 0 ...