
Chapter 13 Firewall
User
’
s Guide
143
The NBG4115 has one Ethernet WAN port and four Ethernet LAN ports, which are
used to physically separate the network into two areas.The WAN (Wide Area
Network) port attaches to the broadband (cable or DSL) modem to the Internet.
The LAN (Local Area Network) port attaches to a network of computers, which
needs security from the outside world. These computers will have access to
Internet services such as e-mail, FTP and the World Wide Web. However, "inbound
access" is not allowed (by default) unless the remote host is authorized to use a
specific service.
Guidelines For Enhancing Security With Your Firewall
1
Change the default password via Web Configurator.
2
Think about access control before you connect to the network in any way,
including attaching a modem to the port.
3
Limit who can access your router.
4
Don't enable any local service (such as NTP) that you don't use. Any enabled
service could present a potential security risk. A determined hacker might be able
to find creative ways to misuse the enabled services to access the firewall or the
network.
5
For local services that are enabled, protect against misuse. Protect by configuring
the services to communicate only with specific peers, and protect by configuring
rules to block packets for the services at specific interfaces.
6
Protect against IP spoofing by making sure the firewall is active.
7
Keep the firewall in a secured (locked) room.
C
om
pan
y
C
on
fiden
tial
Summary of Contents for NBG-417N
Page 9: ...Contents Overview User s Guide 10 C o m p a n y C o n f i d e n t i a l...
Page 17: ...Table of Contents User s Guide 18 C o m p a n y C o n f i d e n t i a l...
Page 19: ...20 C o m p a n y C o n f i d e n t i a l...
Page 23: ...Chapter 1 Introduction User s Guide 24 C o m p a n y C o n f i d e n t i a l...
Page 25: ...Chapter 2 The WPS Button User s Guide 26 C o m p a n y C o n f i d e n t i a l...
Page 37: ...Chapter 3 The Web Configurator User s Guide 38 C o m p a n y C o n f i d e n t i a l...
Page 53: ...Chapter 4 Connection Wizard User s Guide 54 C o m p a n y C o n f i d e n t i a l...
Page 61: ...Chapter 5 AP Mode User s Guide 62 C o m p a n y C o n f i d e n t i a l...
Page 77: ...Chapter 6 Tutorials User s Guide 78 C o m p a n y C o n f i d e n t i a l...
Page 79: ...80 C o m p a n y C o n f i d e n t i a l...
Page 117: ...Chapter 9 LAN User s Guide 118 C o m p a n y C o n f i d e n t i a l...
Page 123: ...Chapter 10 DHCP Server User s Guide 124 C o m p a n y C o n f i d e n t i a l...
Page 137: ...Chapter 12 DDNS User s Guide 138 C o m p a n y C o n f i d e n t i a l...
Page 138: ...139 PART III Security Firewall 141 Content Filtering 147 C o m p a n y C o n f i d e n t i a l...
Page 139: ...140 C o m p a n y C o n f i d e n t i a l...
Page 145: ...Chapter 13 Firewall User s Guide 146 C o m p a n y C o n f i d e n t i a l...
Page 151: ...152 C o m p a n y C o n f i d e n t i a l...
Page 155: ...Chapter 15 Static Route User s Guide 156 C o m p a n y C o n f i d e n t i a l...
Page 167: ...Chapter 17 Remote Management User s Guide 168 C o m p a n y C o n f i d e n t i a l...
Page 177: ...Chapter 18 UPnP User s Guide 178 C o m p a n y C o n f i d e n t i a l...
Page 179: ...180 C o m p a n y C o n f i d e n t i a l...
Page 185: ...Chapter 19 System User s Guide 186 C o m p a n y C o n f i d e n t i a l...
Page 197: ...Chapter 22 Sys OP Mode User s Guide 198 C o m p a n y C o n f i d e n t i a l...
Page 199: ...Chapter 23 Language User s Guide 200 C o m p a n y C o n f i d e n t i a l...
Page 207: ...Chapter 24 Troubleshooting User s Guide 208 C o m p a n y C o n f i d e n t i a l...
Page 209: ...210 C o m p a n y C o n f i d e n t i a l...
Page 213: ...Appendix A Product Specifications User s Guide 214 C o m p a n y C o n f i d e n t i a l...
Page 279: ...Index User s Guide 280 C o m p a n y C o n f i d e n t i a l...