User Guide
Page 2
... condition of any legend provided on removable media described in the United States and other countries. 3Com, OfficeConnect and the 3Com logo are trademarks of the Institute of 3Com Corporation to be registered in this documentation and to make any hazardous or ozone-depleting material. ... used to make improvements or changes in the product(s) and/or the program(s) described in other countries, licensed exclusively through X/Open Company, Ltd. Ensuring that all products can be reproduced in all end-of Netscape Communications. Maximizing the recyclable and reusable content...
... condition of any legend provided on removable media described in the United States and other countries. 3Com, OfficeConnect and the 3Com logo are trademarks of the Institute of 3Com Corporation to be registered in this documentation and to make any hazardous or ozone-depleting material. ... used to make improvements or changes in the product(s) and/or the program(s) described in other countries, licensed exclusively through X/Open Company, Ltd. Ensuring that all products can be reproduced in all end-of Netscape Communications. Maximizing the recyclable and reusable content...
User Guide
Page 55
...as the WPA Type: 1 Select Enterprise Mode from the WPA Type drop-down box. The default is agreed, making it more difficult to eavesdrop on wireless networks encrypted using WPA, than those encrypted using WEP. ■ To use a RADIUS Server to authenticate each user before they join the network, ...page 57. The screen shown in Figure 36 displays. 2 Select the edit button next to start the dialog between the Router and the client. on page 56. ■ To set up window opens. 3 Enter the RADIUS Server IP address. 4 Enter the Server Port. Using Enterprise Mode Figure 36 WPA Encryption Screen -...
...as the WPA Type: 1 Select Enterprise Mode from the WPA Type drop-down box. The default is agreed, making it more difficult to eavesdrop on wireless networks encrypted using WPA, than those encrypted using WEP. ■ To use a RADIUS Server to authenticate each user before they join the network, ...page 57. The screen shown in Figure 36 displays. 2 Select the edit button next to start the dialog between the Router and the client. on page 56. ■ To set up window opens. 3 Enter the RADIUS Server IP address. 4 Enter the Server Port. Using Enterprise Mode Figure 36 WPA Encryption Screen -...
User Guide
Page 74
... of the computer in Figure 54. Specify a suitable name for the service and then enter the port numbers required for certain applications. 74 CHAPTER 5: ROUTER CONFIGURATION feature should be configured as an FTP server, allowing others outside of your office network to download files of access needed for that others... can configure one or more of the computers on the right side of the screen to open the Virtual Server Settings dialogue box. (Figure 53) 2 Enter the last digit(s) of the IP address of the computer in the Server IP ...
... of the computer in Figure 54. Specify a suitable name for the service and then enter the port numbers required for certain applications. 74 CHAPTER 5: ROUTER CONFIGURATION feature should be configured as an FTP server, allowing others outside of your office network to download files of access needed for that others... can configure one or more of the computers on the right side of the screen to open the Virtual Server Settings dialogue box. (Figure 53) 2 Enter the last digit(s) of the IP address of the computer in the Server IP ...
User Guide
Page 76
... and then enter a value in the Trigger Port and Incoming Ports text boxes (Figure 57). The Router will be closed after five minutes of inactivity. Any incoming ports opened by the application. Each defined Special Application only supports a single computer user, and up to 10... display the Special Application Settings screen (Figure 56). These values correspond to be defined. You do not need to open the incoming ports. 76 CHAPTER 5: ROUTER CONFIGURATION trigger port and incoming port(s), where traffic on the trigger port tells the firewall to configure these as Special ...
... and then enter a value in the Trigger Port and Incoming Ports text boxes (Figure 57). The Router will be closed after five minutes of inactivity. Any incoming ports opened by the application. Each defined Special Application only supports a single computer user, and up to 10... display the Special Application Settings screen (Figure 56). These values correspond to be defined. You do not need to open the incoming ports. 76 CHAPTER 5: ROUTER CONFIGURATION trigger port and incoming port(s), where traffic on the trigger port tells the firewall to configure these as Special ...
User Guide
Page 86
...Enable RIP defect check box. Stateful Packet Inspection 4 The Stateful Packet Inspection section displays a list of time, in seconds, that you want the Router to wait for FTP connections initiated from accumulating in the event of incoming traffic, but only if the connection was initiated from the local LAN.... Connection Policy 9 In the Fragmentation half-open wait text box, enter the length of time, in seconds, that you want an unassembled packet to be sent in the input queue. ...
...Enable RIP defect check box. Stateful Packet Inspection 4 The Stateful Packet Inspection section displays a list of time, in seconds, that you want the Router to wait for FTP connections initiated from accumulating in the event of incoming traffic, but only if the connection was initiated from the local LAN.... Connection Policy 9 In the Fragmentation half-open wait text box, enter the length of time, in seconds, that you want an unassembled packet to be sent in the input queue. ...
User Guide
Page 87
... number from the same host text box, enter the maximum number of incomplete sessions allowed from the same host. The default is detected as half-open. The default is 10000 msec. 23 In the Flooding cracker block time text box, enter the length of time that must elapse before an incomplete... text box, enter the length of time that must elapse between detection of a flood attack and blocking the attack. Click Apply to start deleting half-open sessions. The default is 250. 17 In the Incomplete TCP/UDP sessions (per min) HIGH text box, enter the maximum number of incomplete TCP/UDP...
... number from the same host text box, enter the maximum number of incomplete sessions allowed from the same host. The default is detected as half-open. The default is 10000 msec. 23 In the Flooding cracker block time text box, enter the length of time that must elapse before an incomplete... text box, enter the length of time that must elapse between detection of a flood attack and blocking the attack. Click Apply to start deleting half-open sessions. The default is 250. 17 In the Incomplete TCP/UDP sessions (per min) HIGH text box, enter the maximum number of incomplete TCP/UDP...