62
C
HAPTER
4: B
ASIC
S
ETTINGS OF THE
F
IREWALL
Subnet Mask
Enter the Subnet mask for your network. This value will be given out by
the DHCP server and will be used by client devices to determine the
extent of your network.
Domain Name
Type the registered domain name for the network in the
Domain Name
box, for example:
3com.com.
If you do not have a Domain Name leave
this blank.
DNS Servers
A DNS Server translates human readable host names into the numeric IP
addresses used by computers to route information to the correct
machine. You can use multiple DNS servers to improve performance and
reliability. To specify these manually select the
Specify Manually
radio box
and type the IP address of the DNS Server(s) in these boxes.
Alternatively, if you are using NAT with DHCP client you can select the
Set
DNS Servers by Internet Firewalls DHCP Client
to have these fields set
automatically
.
Dynamic Ranges
When a client makes a request for an IP address, the Firewall’s DHCP
server leases an address from the Dynamic Ranges.
Prior to offering an address from the Dynamic Range to a requesting
client, the Firewall first verifies that the address is not already in use by
another machine on the LAN.
To create a range of dynamic IP addresses to be assigned to requesting
clients, type the starting number in the
Range Start
box, the ending
address in the
Range End
box and then click
Updat
e.
Allow BootP clients to use range
Click this check box to have Dynamic BootP clients configured when they
boot. Dynamic BootP clients are BootP clients that do not have an IP
address assigned to their MAC address. They are similar to DHCP clients
with the exception that leases are not supported.
DUA1611-0AAA02.book Page 62 Thursday, August 2, 2001 4:01 PM
Содержание 3C16111 - SuperStack 3 Firewall Web Site Filter
Страница 18: ...18 DUA1611 0AAA02 book Page 18 Thursday August 2 2001 4 01 PM ...
Страница 50: ...50 DUA1611 0AAA02 book Page 50 Thursday August 2 2001 4 01 PM ...
Страница 96: ...96 CHAPTER 6 USING THE FIREWALL DIAGNOSTIC TOOLS DUA1611 0AAA02 book Page 96 Thursday August 2 2001 4 01 PM ...
Страница 122: ...122 CHAPTER 8 ADVANCED SETTINGS DUA1611 0AAA02 book Page 122 Thursday August 2 2001 4 01 PM ...
Страница 150: ...150 CHAPTER 10 CONFIGURING HIGH AVAILABILITY DUA1611 0AAA02 book Page 150 Thursday August 2 2001 4 01 PM ...
Страница 152: ...152 DUA1611 0AAA02 book Page 152 Thursday August 2 2001 4 01 PM ...
Страница 166: ...166 CHAPTER 11 ADMINISTRATION AND ADVANCED OPERATIONS DUA1611 0AAA02 book Page 166 Thursday August 2 2001 4 01 PM ...
Страница 174: ...174 DUA1611 0AAA02 book Page 174 Thursday August 2 2001 4 01 PM ...
Страница 178: ...178 CHAPTER 13 TYPES OF ATTACK AND FIREWALL DEFENCES DUA1611 0AAA02 book Page 178 Thursday August 2 2001 4 01 PM ...
Страница 190: ...190 CHAPTER 14 NETWORKING CONCEPTS DUA1611 0AAA02 book Page 190 Thursday August 2 2001 4 01 PM ...
Страница 192: ...192 DUA1611 0AAA02 book Page 192 Thursday August 2 2001 4 01 PM ...
Страница 206: ...206 APPENDIX D TECHNICAL SUPPORT DUA1611 0AAA02 book Page 206 Thursday August 2 2001 4 01 PM ...
Страница 212: ...212 INDEX DUA1611 0AAA02 book Page 212 Thursday August 2 2001 4 01 PM ...
Страница 214: ...DUA1611 0AAA02 book Page 214 Thursday August 2 2001 4 01 PM ...