Eminent EM4218 Скачать руководство пользователя страница 17

 

 

17 | 

EMINENT ADVANCED MANUAL

 

NAT enables you to share a single public IP address with several computers in your 
network. NAT ensures the computers in your network can use the Internet without any 
problems but users on the Internet will not have access to the computers in your 
network. You will understand that NAT also offers a certain level of security partly due 
to the fact that private IP addresses are not visible on the Internet. 
Fortunately, most routers currently use NAT. 

Security for your computer and your network 

A firewall can be a software- or a hardware solution placed, as it were, between the 
internal network and the outside world. Firewalls generally control incoming and 
outgoing data. Firewalls can be adjusted to stop or allow certain information from the 
Internet. Firewalls can also be adjusted to stop or allow requests from outside. Rules 
or policies are used to adjust firewalls. These state what a firewall must stop or allow 
and thus form a sort of filter. 
 
Most routers have various firewall functions. The big advantage of a firewall in a router 
(hardware solution) is that an attack from outside is averted before reaching your 
network. If you wish to use a software firewall, you could for example, use the firewall 
built into Windows XP Service Pack 2. There are better alternatives such as the free 
ZoneAlarm and the commercial packages from Norman, Norton, Panda and McAfee. 
These commercial packages also offer protection against viruses if required. 

Making a computer available for Internet 
users in your network 

The DMZ or DeMilitarized Zone is the zone between the outside world – the Internet – 
and the secure internal network. The computer placed within the DMZ is accessible 
via the Internet. This is in contrast to the computers that are outside the DMZ and are 
therefore secure. The DMZ is therefore also often used for servers that host websites. 
Websites must after all always be accessible via the Internet. A computer is also often 
placed within the DMZ if one plays a lot of online games. It is however advisable when 
you place a computer in the DMZ to fit a software firewall (such as the free 
ZoneAlarm). This is because the firewall opens all ports of the router for a computer 
within the DMZ. There is therefore no restriction on data transmission while this is 
however desirable in some situations. 
 
Just like the DMZ function, Virtual Server enables you to make a computer, set up for 
example, as an FTP- or a web server, accessible from the Internet. You can state 
which ports in the firewall must be opened when using a Virtual Server. This is also 
the most important difference with the DMZ: when you place a computer in the DMZ, 
all ports are opened for the respective computer. If you use Virtual Server, you can 
open only the ports important for the respective computer. 
 

Содержание EM4218

Страница 1: ...EM4218 wSURF Wireless ADSL2 2 Modem On page 12 you will find the Eminent Advanced Manual for networking settings and information about home networking...

Страница 2: ...Connecting the EM4218 4 4 2 Configuring the EM4218 for a connection to the Internet 5 4 3 Configuration for PPP providers 5 4 4 Configuration for DHCP providers 6 4 5 Configuration for other provider...

Страница 3: ...arties other than Eminent 2 0 Introduction Congratulations on your purchase of this high quality Eminent product This product has undergone extensive testing by Eminents technical experts Should you e...

Страница 4: ...1 Turn off your computer 2 Connect the EM4218 to a power outlet using the supplied power adapter 3 Connect the telephone cable to the ADSL port of the EM4218 4 Connect the other side of the telephone...

Страница 5: ...eld For instance Netherlands 3 Select your Internet provider in the ISP field 4 Click Next 5 Enter your ADSL username in the Username field Have I got a proper network connection Turn on the computer...

Страница 6: ...ter the settings given to you by the provider 4 Click Add 5 Click Save upper right corner 6 Click Ok to reboot the wSURF 5 0 Securing the wireless network To avoid having uninvited guests probing your...

Страница 7: ...ctly 5 10 13 or 26 characters long depending on the other key settings 8 Write down the chosen password 9 Click Submit 10 Click Save upper right corner to save the settings 6 0 Control your Internet c...

Страница 8: ...r to save the settings 14 You have now specified which network devices are allowed to connect to your network 7 0 WDS extend the range of the network The WDS function is primarily useful to increase t...

Страница 9: ...eld is case sensitive 7 Click Log In 8 The router will display a welcome screen 9 Click Advanced 10 Click Wireless 11 Click Setting 12 Set Mode to WDS 13 Click Submit 14 Click Ok 15 Click WDS in the u...

Страница 10: ...a cabled connection not wireless When the cabled connection is working properly you can setup the wireless connection as explained in this manual Q How do I reset the EM4218 A You can reset the modem...

Страница 11: ...nstance 3 9 Click Submit 10 Click Save 11 Click Ok 9 0 Service and support This users manual has been carefully written by Eminent s technical experts If you have problems installing or using the prod...

Страница 12: ...f ip addresses 16 Translating ip adresses and domain names 16 Using a single ip address for your entire network 16 Security for your computer and your network 17 Making a computer available for Intern...

Страница 13: ...n cooperation with a number of satisfied Eminent users If you would like a certain option to be included in the Eminent Advanced Manual or you have suggestions or tips regarding the Eminent Advanced M...

Страница 14: ...desktop 2 Choose Properties 3 Right click Local area connection 4 Choose Properties 5 Select Internet protocol TCP IP 6 Click Properties 7 Select Obtain an IP Address automatically 8 Select Obtain a...

Страница 15: ...lick Next 16 Check Automatically detect proxy server 17 Click Next 18 Click No 19 Click Next 20 Click Complete 21 Close all Windows that are currently open 22 Restart your PC Configuring Internet Expl...

Страница 16: ...p adresses and domain names IP addresses are far from user friendly Domain names are however easier to remember and use The process of translating a domain name into an address that is understandable...

Страница 17: ...ives such as the free ZoneAlarm and the commercial packages from Norman Norton Panda and McAfee These commercial packages also offer protection against viruses if required Making a computer available...

Страница 18: ...s you to prevent one or more computers in your network from accessing the Internet Parental Control often consists of several functions such as URL Blocking This function blocks websites by way of so...

Страница 19: ...network while at home A VPN connection is actually nothing more than a highly secure tunnel which makes a connection with another computer or network via the Internet Data sent via a VPN and received...

Страница 20: ...network by systematically providing all wireless appliance products with the same key WPA is a form of security encoding the wireless signal from your wireless router or modem so the data cannot be s...

Страница 21: ...called Range Extender if you wish to expand your network using WDS or Bridging This is an appliance largely similar to an Access Point The advantage of using a Range Extender rather than a second rout...

Страница 22: ...Key words Catchwords 18 MAC address 19 Name resolution 16 NAT Network Address Translation 16 Online games 17 Operating system 18 Package filter Packet inspection 18 Packet inspection 18 Parental Contr...

Страница 23: ...Declaration of Conformity concerning your product by sending an e mail message to info eminent online com You can also send a letter to Eminent Computer Supplies P O Box 276 6160 AG Geleen The Nether...

Отзывы: