Changing Policy Services
99
DMZ In Checkbox
If you are using the DMZ port on the Firewall access to the protocol is not
permitted from the Internet to the DMZ when this check box is cleared.
When the service is selected, users on the Internet can access all hosts on
the DMZ via that protocol. The default value is enabled. When the
Warning Icon
is displayed to the right of the check box, there is a Custom
Rule in the
Rules
tab section that modifies the behavior of the listed
Network Access Rule.
Public LAN Server Address
A Public LAN Server is a single host on the LAN that is defined to handle
all traffic originating from the Internet to the LAN of a specific protocol,
such as HTTP. Define a Public LAN Server by typing its IP address in the
Public LAN Server
box for that protocol. If a server is not designated for a
certain protocol, type
0.0.0.0
in the box.
Changing NetBIOS
Broadcast Settings
Systems running Microsoft Windows Networking communicate with one
another through NetBIOS broadcast packets. By default, the Firewall
blocks these broadcasts. If you have Windows computers on more than
one port of the Firewall, for example if you are using the Firewall as an
internal security measure you may need to enable
NetBios Broadcast
Passthrough
.
From LAN to DMZ
To enable Windows machines connected to the LAN port to see other
Windows machines connected to the DMZ port in their Network
Neighborhood check this box.
Click the
Update
button to save your changes.
From LAN to WAN
To enable Windows machines connected to the LAN port to see other
Windows machines connected to the WAN port in their Network
Neighborhood check this box.
Click
Update
to save your changes.
NetBIOS passthrough only applies to connections made by using
Windows Networking. You will still be able to see web servers using the
DUA1611-0AAA02.book Page 99 Thursday, August 2, 2001 4:01 PM
Содержание 3C16111 - SuperStack 3 Firewall Web Site Filter
Страница 18: ...18 DUA1611 0AAA02 book Page 18 Thursday August 2 2001 4 01 PM ...
Страница 50: ...50 DUA1611 0AAA02 book Page 50 Thursday August 2 2001 4 01 PM ...
Страница 96: ...96 CHAPTER 6 USING THE FIREWALL DIAGNOSTIC TOOLS DUA1611 0AAA02 book Page 96 Thursday August 2 2001 4 01 PM ...
Страница 122: ...122 CHAPTER 8 ADVANCED SETTINGS DUA1611 0AAA02 book Page 122 Thursday August 2 2001 4 01 PM ...
Страница 150: ...150 CHAPTER 10 CONFIGURING HIGH AVAILABILITY DUA1611 0AAA02 book Page 150 Thursday August 2 2001 4 01 PM ...
Страница 152: ...152 DUA1611 0AAA02 book Page 152 Thursday August 2 2001 4 01 PM ...
Страница 166: ...166 CHAPTER 11 ADMINISTRATION AND ADVANCED OPERATIONS DUA1611 0AAA02 book Page 166 Thursday August 2 2001 4 01 PM ...
Страница 174: ...174 DUA1611 0AAA02 book Page 174 Thursday August 2 2001 4 01 PM ...
Страница 178: ...178 CHAPTER 13 TYPES OF ATTACK AND FIREWALL DEFENCES DUA1611 0AAA02 book Page 178 Thursday August 2 2001 4 01 PM ...
Страница 190: ...190 CHAPTER 14 NETWORKING CONCEPTS DUA1611 0AAA02 book Page 190 Thursday August 2 2001 4 01 PM ...
Страница 192: ...192 DUA1611 0AAA02 book Page 192 Thursday August 2 2001 4 01 PM ...
Страница 206: ...206 APPENDIX D TECHNICAL SUPPORT DUA1611 0AAA02 book Page 206 Thursday August 2 2001 4 01 PM ...
Страница 212: ...212 INDEX DUA1611 0AAA02 book Page 212 Thursday August 2 2001 4 01 PM ...
Страница 214: ...DUA1611 0AAA02 book Page 214 Thursday August 2 2001 4 01 PM ...