I
NTRODUCTION
1-4
•
DMZ Host Support
Allows a networked computer to be fully exposed to the Internet.
This function is used when NAT and firewall security prevent an
Internet application from functioning correctly.
•
Security
The Barricade supports security features that deny Internet access to
specified users, or filter all requests for specific services the
administrator does not want to serve. The Barricade’s firewall also
blocks common hacker attacks, including IP Spoofing, Land Attack,
Ping of Death, IP with zero length, Smurf Attack, UDP port
loopback, Snork Attack, TCP null scan, and TCP SYN flooding. WEP
(Wired Equivalent Privacy), SSID, and MAC filtering provide security
over the wireless network.
•
Virtual Private Network (VPN)
The Barricade supports three of the most commonly used VPN
protocols – PPTP, L2TP, and IPSec. These protocols allow remote
users to establish a secure connection to their corporate network. If
your service provider supports VPNs, then these protocols can be
used to create an authenticated and encrypted tunnel for passing
secure data over the Internet (i.e., a traditionally shared data network).
The VPN protocols supported by the Barricade are briefly described
below.
•
Point-to-Point Tunneling Protocol – Provides a secure tunnel for
remote client access to a PPTP security gateway. PPTP includes
provisions for call origination and flow control required by ISPs.
•
L2TP merges the best features of PPTP and L2F. Like PPTP,
L2TP requires that the ISP’s routers support the protocol.
•
IP Security – Provides IP network-layer encryption. IPSec can
support large encryption networks (such as the Internet) by using
digital certificates for device authentication.
Summary of Contents for 7404WBRA
Page 2: ......
Page 10: ...COMPLIANCES vi ...
Page 14: ...TABLE OF CONTENTS x ...
Page 26: ...INSTALLATION 2 8 ...
Page 28: ...CONFIGURING CLIENT PCS 3 2 ...
Page 57: ...WIRELESS 4 29 MAC Address Filtering ...
Page 60: ...CONFIGURING THE BARRICADE 4 32 Virtual Server ...
Page 67: ...FIREWALL 4 39 Access Control ...
Page 69: ...FIREWALL 4 41 Access Control Add PC ...
Page 72: ...CONFIGURING THE BARRICADE 4 44 3 Click OK and then click APPLY to save your settings ...
Page 73: ...FIREWALL 4 45 Intrusion Detection ...
Page 82: ...CONFIGURING THE BARRICADE 4 54 Status ...
Page 90: ...CONFIGURING THE BARRICADE 4 62 ...
Page 114: ...CONFIGURING CLIENT TCP IP 5 24 ...
Page 132: ...CABLES B 6 ...
Page 135: ......