TW100-BRV304 User's Guide
Allow VPN pass-
through
If enabled, PCs on the LAN can use VPN software to connect to
remote clients via the Internet connection. The protocols supported
are:
•
IPSec
IPSec protocol is used to establish a secure connection, and is
widely used by VPN (Virtual Private Networking) programs.
•
PPTP
PPTP (Point to Point Tunneling Protocol) is widely used by
VPN (Virtual Private Networking) programs.
•
L2TP
L2TP is a protocol developed by Cisco for VPNs (Virtual Pri-
vate Networks).
Drop fragmented
IP packets
If enabled, fragmented IP packets are discarded, forcing re-
transmission of these packets. In some situations, this could prevent
successful communication.
Normally, this setting should be disabled.
Block TCP Flood
A TCP flood is excessively large number of TCP connection re-
quests. This is usually a DoS (Denial of Service) attack.
This setting should normally be enabled.
Block UDP Flood
A UDP flood is excessively large number of UDP packets. This is
usually a DoS (Denial of Service) attack.
This setting should normally be enabled.
Block non-
standard packets
Abnormal packets are often used by hackers and in DoS attacks, but
may also be generated by mis-configured network devices. (PCs will
normally not generate non-standard packets.)
This setting should normally be enabled.
70
Содержание TW100-BRV304 SHEETS
Страница 1: ......
Страница 2: ......
Страница 27: ...PC Configuration Figure 15 Windows NT4 0 DNS 23...
Страница 63: ...Security Configuration 59...
Страница 149: ...Appendix B Specifications 145...