A
PPLICATIONS
1-4
•
DMZ Host Support
Allows a networked computer to be fully exposed to the Internet.
This function is used when NAT and firewall security prevent an
Internet application from functioning correctly.
•
Security
The Barricade supports security features that deny Internet access to
specified users, or filter all requests for specific services that the
administrator does not want to serve. The Barricade’s firewall also
blocks common hacker attacks, including IP Spoofing, Land Attack,
Ping of Death, IP with zero length, Smurf Attack, UDP port
loopback, Snork Attack, TCP null scan, and TCP SYN flooding.
WPA/WPA2, IEEE802.1x, WEP, SSID, and MAC filtering provide
security over the wireless network.
•
Virtual Private Network (VPN Pass-through)
The Barricade supports three of the most commonly used VPN
protocols – PPTP, L2TP, and IPSec. These VPN protocols are
transparent pass-through. The protocols supported by the Barricade
are briefly described below.
•
Point-to-Point Tunneling Protocol – Provides a secure tunnel for
remote client access to a PPTP security gateway. PPTP includes
provisions for call origination and flow control required by ISPs.
•
L2TP merges the best features of PPTP and L2F – Like PPTP,
L2TP requires that the ISP’s routers support the protocol.
•
IP Security – Provides IP network-layer encryption. IPSec can
support large encryption networks (such as the Internet) by using
digital certificates for device authentication.
Содержание Barricade SMCWBR14S-N2
Страница 1: ...SMCWBR14S N2 Barricade N Draft 11n Wireless 4 port Broadband Router...
Страница 34: ...INSTALLATION 2 8...
Страница 52: ...CONFIGURING YOUR MACINTOSH COMPUTER 3 18...
Страница 91: ...WIRELESS 4 39 Manual For client devices without WPS manually configure the device as displayed on the screen...
Страница 122: ...CONFIGURING THE BARRICADE 4 70...
Страница 128: ...TROUBLESHOOTING A 6...
Страница 136: ...SMCWBR11 G SMCWBR14S N2...