In order for these protocols to work through NAT or a
firewall, either the application has to know about an
address/port number combination that allows
incoming packets, or the NAT has to monitor the
control traffic and open up port mappings (firewall
pinhole) dynamically as required. Legitimate
application data can thus be passed through the
security checks of the firewall or NAT that would have
otherwise restricted the traffic for not meeting its
limited filter criteria.
Usually allowing client applications to use dynamic
ephemeral TCP/ UDP ports to communicate with the
known ports used by the server applications, even
though a firewall-configuration may allow only a
limited number of known ports. In the absence of an
ALG, either the ports would get blocked or the
network administrator would need to explicitly open
up a large number of ports in the firewall; rendering
the network vulnerable to attacks on those ports.
Содержание 3G611R+
Страница 1: ......
Страница 6: ...APPENDIX TROUBLESHOOTING 100 APPENDIX REGULATORY INFORMATION 106...
Страница 19: ......
Страница 23: ...3 If you enter the correct user name and password the screen will be the next one...