Chapter 10 Firewall
LTE6100 User’s Guide
70
10.1.2 What You Need to Know
DoS
Denials of Service (DoS) attacks are aimed at devices and networks with a connection to the
Internet. Their goal is not to steal information, but to disable a device or network so users no longer
have access to network resources. The LTE Device is pre-configured to automatically detect and
thwart all known DoS attacks.
Firewall
The LTE Device’s firewall feature physically separates the LAN and the WAN and acts as a secure
gateway for all data passing between the networks.
It is designed to protect against Denial of Service (DoS) attacks when activated. The LTE Device's
purpose is to allow a private Local Area Network (LAN) to be securely connected to the Internet.
The LTE Device can be used to prevent theft, destruction and modification of data, as well as log
events, which may be important to the security of your network.
The LTE Device is installed between the LAN and a broadband modem connecting to the Internet.
This allows it to act as a secure gateway for all data passing between the Internet and the LAN.
The LTE Device has one Ethernet WAN port and four Ethernet LAN ports, which are used to
physically separate the network into two areas.The WAN (Wide Area Network) port attaches to the
broadband (cable or DSL) modem to the Internet.
The LAN (Local Area Network) port attaches to a network of computers, which needs security from
the outside world. These computers will have access to Internet services such as e-mail, FTP and
the World Wide Web. However, "inbound access" is not allowed (by default) unless the remote host
is authorized to use a specific service.
ICMP
Internet Control Message Protocol (ICMP) is a message control and error-reporting protocol
between a host server and a gateway to the Internet. ICMP uses Internet Protocol (IP) datagrams,
but the messages are processed by the TCP/IP software and directly apparent to the application
user.
Finding Out More
See
for advanced technical information on firewall.
Summary of Contents for LTE6100
Page 4: ...Contents Overview LTE6100 User s Guide 4...
Page 11: ...11 PART I User s Guide...
Page 12: ...12...
Page 16: ...Chapter 1 Introduction LTE6100 User s Guide 16...
Page 24: ...24...
Page 30: ...Chapter 3 Connection Status and System Info LTE6100 User s Guide 30...
Page 38: ...Chapter 4 Broadband LTE6100 User s Guide 38...
Page 48: ...Chapter 6 Routing LTE6100 User s Guide 48...
Page 66: ...Chapter 8 Network Address Translation NAT LTE6100 User s Guide 66...
Page 78: ...Chapter 10 Firewall LTE6100 User s Guide 78...
Page 84: ...Chapter 12 Parental Control LTE6100 User s Guide 84...
Page 104: ...Chapter 15 Traffic Status LTE6100 User s Guide 104...
Page 106: ...Chapter 16 User Account LTE6100 User s Guide 106...
Page 120: ...Chapter 22 Backup Restore LTE6100 User s Guide 120...
Page 122: ...Chapter 23 Diagnostic LTE6100 User s Guide 122...
Page 166: ...Appendix B Setting Up Your Computer s IP Address LTE6100 User s Guide 166...
Page 176: ...Appendix C Pop up Windows JavaScript and Java Permissions LTE6100 User s Guide 176...
Page 180: ...Appendix D Common Services LTE6100 User s Guide 180...
Page 184: ...Appendix E Legal Information LTE6100 User s Guide 184...
Page 188: ...Index LTE6100 User s Guide 188...
Page 189: ...Index LTE6100 User s Guide 189...