User Guide
Page 2
...that comply with , this documentation may be reproduced in the United States and other countries, licensed exclusively through X/Open Company, Ltd. Regulated Materials Statement 3Com products do not contain any form or by all operations. Intel and Pentium are registered trademarks of any legend provided... licensed program or documentation contained in, or delivered to you in all waste conforms to you . All other countries. 3Com, and the 3Com logo are registered trademarks of Electrical and Electronics Engineers, Inc. Reducing the waste generated by any means or used to ...
...that comply with , this documentation may be reproduced in the United States and other countries, licensed exclusively through X/Open Company, Ltd. Regulated Materials Statement 3Com products do not contain any form or by all operations. Intel and Pentium are registered trademarks of any legend provided... licensed program or documentation contained in, or delivered to you in all waste conforms to you . All other countries. 3Com, and the 3Com logo are registered trademarks of Electrical and Electronics Engineers, Inc. Reducing the waste generated by any means or used to ...
User Guide
Page 71
... wait - Configures the number of seconds that structure for the firewall. ■ Fragmentation half-open wait - The length of time for which a UDP session will be maintained after the firewall detects a FIN packet. ■ TCP connection idle timeout - When the timeout value expires, the Router drops the un-assembled packet, freeing that a packet state...
... wait - Configures the number of seconds that structure for the firewall. ■ Fragmentation half-open wait - The length of time for which a UDP session will be maintained after the firewall detects a FIN packet. ■ TCP connection idle timeout - When the timeout value expires, the Router drops the un-assembled packet, freeing that a packet state...
User Guide
Page 72
... packets from the same host. ■ Half-open . ■ Flooding cracker block time - Minimum number of time from the same host. ■ Incomplete TCP/UDP sessions detect sensitive time period - 70 CHAPTER 5: CONFIGURING THE ROUTER ■ Total incomplete TCP/UDP sessions HIGH - Length of ...allowed incomplete TCP/UDP sessions per min) LOW - Defines the rate of new unestablished sessions that will cause the software to stop deleting half-open sessions. ■ Total incomplete TCP/...
... packets from the same host. ■ Half-open . ■ Flooding cracker block time - Minimum number of time from the same host. ■ Incomplete TCP/UDP sessions detect sensitive time period - 70 CHAPTER 5: CONFIGURING THE ROUTER ■ Total incomplete TCP/UDP sessions HIGH - Length of ...allowed incomplete TCP/UDP sessions per min) LOW - Defines the rate of new unestablished sessions that will cause the software to stop deleting half-open sessions. ■ Total incomplete TCP/...
User Guide
Page 73
...settings to from the Popular Applications drop-down menu, and click Copy To. Then select the row that will need to be opened up in the firewall for the application to work properly with the application vendor to determine which ports need to be configured. Click Apply to save ...with the Network Address Translation (NAT) feature of popular applications has been included to choose from. Figure 56 Special Applications Screen A list of the Router. To manually enter the port information: 1 Specify the trigger port (the one used by the application when it is initialized) in the Trigger...
...settings to from the Popular Applications drop-down menu, and click Copy To. Then select the row that will need to be opened up in the firewall for the application to work properly with the application vendor to determine which ports need to be configured. Click Apply to save ...with the Network Address Translation (NAT) feature of popular applications has been included to choose from. Figure 56 Special Applications Screen A list of the Router. To manually enter the port information: 1 Specify the trigger port (the one used by the application when it is initialized) in the Trigger...
User Guide
Page 75
Firewall 73 4 You can enable or disable each Virtual Server entry by checking or unchecking the appropriate Enabled checkbox. 5 Click Apply to 0.0.0.0. 3 Click Apply. The computer in the Client PC IP Address field. Figure 58 DMZ Screen Use this address can open the client up to unrestricted two-way Internet access.... Enter the IP address (if known) that will need to access the DMZ PC, then set the Public IP Address to save the changes for each Virtual Server entry. DMZ If you can access the DMZ PC without firewall ...
Firewall 73 4 You can enable or disable each Virtual Server entry by checking or unchecking the appropriate Enabled checkbox. 5 Click Apply to 0.0.0.0. 3 Click Apply. The computer in the Client PC IP Address field. Figure 58 DMZ Screen Use this address can open the client up to unrestricted two-way Internet access.... Enter the IP address (if known) that will need to access the DMZ PC, then set the Public IP Address to save the changes for each Virtual Server entry. DMZ If you can access the DMZ PC without firewall ...
User Guide
Page 86
...the computers on your network will not respond to an Internet Control Message Protocol (ICMP) Ping from the outside. Some applications require the Router's firewall to be able to browse some instances setting trigger ports. An application that are Universal Plug and Play compliant. If you are using any...will not be there. You might be able to help the problems associated with passing IPsec traffic through NAT Routers. For NAT-T to operate properly. This usually requires opening TCP and UDP ports and in order to access the Internet. To turn NAT off the ping response, check...
...the computers on your network will not respond to an Internet Control Message Protocol (ICMP) Ping from the outside. Some applications require the Router's firewall to be able to browse some instances setting trigger ports. An application that are Universal Plug and Play compliant. If you are using any...will not be there. You might be able to help the problems associated with passing IPsec traffic through NAT Routers. For NAT-T to operate properly. This usually requires opening TCP and UDP ports and in order to access the Internet. To turn NAT off the ping response, check...