116
C
HAPTER
8: A
DVANCED
S
ETTINGS
Figure 52
Intranet Window
To enable intranet firewalling, it is necessary to identify which machines
are protected against unauthorized access by specifying the IP addresses
of these machines. You can do this in two ways:
■
Inclusively by specifying which machines are members of the segment
with restricted access.
■
Exclusively by specifying which machines are not members of the
segment with the restricted access.
Using the inclusive method, you specify the IP addresses of the machines
which are connected to the Firewall’s LAN port. Use this method in cases
such as a small accounting office in a large LAN, where it may be easier to
identify the small number of machines with restricted access rather than
the larger number of machines on the corporate network.
Using the exclusive method, you specify the IP addresses of the machines
connected to the Firewall’s WAN port. Use this method in cases such as a
large school district with a small student computer lab where it would be
easier to specify the small number of machines on the WAN which are
not protected by the intranet firewall, rather than the larger number of
machines which are.
Typically, it is easier to enter the IP addresses from the smaller number of
machines. Enter these addresses individually, or as a range.
IP addresses for Workstations on the LAN port must have static IP
addresses or use the Internet Firewall as a DHCP server. It is not possible
for them to use a DHCP server connected to the WAN port.
DUA1611-0AAA02.book Page 116 Thursday, August 2, 2001 4:01 PM
Содержание 3C16111 - SuperStack 3 Firewall Web Site Filter
Страница 18: ...18 DUA1611 0AAA02 book Page 18 Thursday August 2 2001 4 01 PM ...
Страница 50: ...50 DUA1611 0AAA02 book Page 50 Thursday August 2 2001 4 01 PM ...
Страница 96: ...96 CHAPTER 6 USING THE FIREWALL DIAGNOSTIC TOOLS DUA1611 0AAA02 book Page 96 Thursday August 2 2001 4 01 PM ...
Страница 122: ...122 CHAPTER 8 ADVANCED SETTINGS DUA1611 0AAA02 book Page 122 Thursday August 2 2001 4 01 PM ...
Страница 150: ...150 CHAPTER 10 CONFIGURING HIGH AVAILABILITY DUA1611 0AAA02 book Page 150 Thursday August 2 2001 4 01 PM ...
Страница 152: ...152 DUA1611 0AAA02 book Page 152 Thursday August 2 2001 4 01 PM ...
Страница 166: ...166 CHAPTER 11 ADMINISTRATION AND ADVANCED OPERATIONS DUA1611 0AAA02 book Page 166 Thursday August 2 2001 4 01 PM ...
Страница 174: ...174 DUA1611 0AAA02 book Page 174 Thursday August 2 2001 4 01 PM ...
Страница 178: ...178 CHAPTER 13 TYPES OF ATTACK AND FIREWALL DEFENCES DUA1611 0AAA02 book Page 178 Thursday August 2 2001 4 01 PM ...
Страница 190: ...190 CHAPTER 14 NETWORKING CONCEPTS DUA1611 0AAA02 book Page 190 Thursday August 2 2001 4 01 PM ...
Страница 192: ...192 DUA1611 0AAA02 book Page 192 Thursday August 2 2001 4 01 PM ...
Страница 206: ...206 APPENDIX D TECHNICAL SUPPORT DUA1611 0AAA02 book Page 206 Thursday August 2 2001 4 01 PM ...
Страница 212: ...212 INDEX DUA1611 0AAA02 book Page 212 Thursday August 2 2001 4 01 PM ...
Страница 214: ...DUA1611 0AAA02 book Page 214 Thursday August 2 2001 4 01 PM ...