90
INTERNET ACCESS ROUTER
A.2.2 S
IMULTANEOUS
M
ULTIPLE
A
CCESS TO THE
I
NTERNET
/I
NTRANET
Single IP is designed to support up to twenty concurrent users on the small-
office LAN. You can have more than twenty potential users exist in the small
office LAN, but at any given moment, no more than twenty users should
access the Internet/Intranet via Single IP. Performance may be impaired
when more than twenty concurrent users use the Single IP feature.
A.2.3 IP A
PPLICATIONS
: W
EB
B
ROWSING
, FTP, T
ELNET
, E
, N
EWS
,
AND
O
THERS
Single IP allows the use of any WWW browser, such as Netscape or Mosaic, to
access the World Wide Web. Refer to the list below for some of the types of
Internet and Intranet access supported by Single IP.
• World Wide Web browsing
• FTP client
• News reader
• Telnet client
• Ping (outbound)
Single IP supports any SOCKS-compatible client application (e.g.
Netscape). Access to FTP within Netscape, Gopher access, and access to
secure servers is supported. POP3 clients (e.g. Eudora, Pegasus mail,
Microsoft Exchange) and other e-mail packages and news readers are allowed
access to e-mail servers through Single IP e-mail support.
Single IP allows use of FTP client applications that support the
username@hostname method of firewall crossing. For example: WS_FTP,
CuteFTP and command-line FTP clients. Connection through another
firewall using the same mechanism is also allowed.
Содержание LR0002A-B530
Страница 21: ...22 INTERNET ACCESS ROUTER Figure 4 1 Connecting to the PTT Modem Internet Access Router...
Страница 49: ...50 INTERNET ACCESS ROUTER 8 2 Setup Menu Figure 8 2 Advanced Menu Tree Setup Option...
Страница 58: ...59 INTERNET ACCESS ROUTER 8 2 3 INTERFACE PARAMETERS Figure 8 9 Interface Parameters Menu Tree...
Страница 62: ...63 INTERNET ACCESS ROUTER Figure 8 12 ISDN Options in the Advanced Menu...
Страница 65: ...66 INTERNET ACCESS ROUTER Figure 8 14 Frame Relay options in the Advanced Menu Frame Relay DLCI setting...
Страница 68: ...69 INTERNET ACCESS ROUTER 8 2 4 ACCESS CONTROL SECURITY Figure 8 15 Access Control Security Menu Tree...