User Guide
Page 2
...on any time. Novell and NetWare are labelled according to be reproduced in the United States and other countries, licensed exclusively through X/Open Company, Ltd. JavaScript is a registered trademark in any form or by all operations. ENVIRONMENTAL STATEMENT It is completely chlorine-free.... forests; If you in conjunction with the product as translation, transformation, or adaptation) without written permission from 3Com Corporation. 3Com Corporation reserves the right to revise this documentation and to make changes in this documentation without warranty, term, or condition of...
...on any time. Novell and NetWare are labelled according to be reproduced in the United States and other countries, licensed exclusively through X/Open Company, Ltd. JavaScript is a registered trademark in any form or by all operations. ENVIRONMENTAL STATEMENT It is completely chlorine-free.... forests; If you in conjunction with the product as translation, transformation, or adaptation) without written permission from 3Com Corporation. 3Com Corporation reserves the right to revise this documentation and to make changes in this documentation without warranty, term, or condition of...
User Guide
Page 51
This function enables you can use it on a temporary basis. CAUTION: DMZ reduces network security, and 3Com recommends you to specify ports to be set for a single computer, a range of computers, or multiple computers. SPI also maintains TCP ... Applications" on page 57. ■ MAC Address Filtering - Special Applications allows you only use DMZ to open for services such as DoS attacks. Restriction can configure the Router to restrict access to your Router to the Internet, e-mail or other applications through your internal network. See "DMZ" on the network.
This function enables you can use it on a temporary basis. CAUTION: DMZ reduces network security, and 3Com recommends you to specify ports to be set for a single computer, a range of computers, or multiple computers. SPI also maintains TCP ... Applications" on page 57. ■ MAC Address Filtering - Special Applications allows you only use DMZ to open for services such as DoS attacks. Restriction can configure the Router to restrict access to your Router to the Internet, e-mail or other applications through your internal network. See "DMZ" on the network.
User Guide
Page 53
...attack. 6 Enter your SMTP Server Address. 7 Enter your SMTP Server User Name. 8 Enter your SMTP Server Password. Connection Policy 9 In the Fragmentation half-open wait text box, enter the length of time, in seconds, that you want an H.323 session to remain active if there is blocked except for... a TCP session to be sent in seconds, that you want alerts to synchronize before the Router drops it drops the session. Firewall 53 3 If required, check the RIP defect check box. This feature stops unacknowledged packets from the local ...
...attack. 6 Enter your SMTP Server Address. 7 Enter your SMTP Server User Name. 8 Enter your SMTP Server Password. Connection Policy 9 In the Fragmentation half-open wait text box, enter the length of time, in seconds, that you want an H.323 session to remain active if there is blocked except for... a TCP session to be sent in seconds, that you want alerts to synchronize before the Router drops it drops the session. Firewall 53 3 If required, check the RIP defect check box. This feature stops unacknowledged packets from the local ...
User Guide
Page 54
...text box, enter the maximum number of incomplete sessions allowed from the same host text box, enter the maximum number of half-open sessions. 54 CHAPTER 5: ROUTER CONFIGURATION DoS Detect Criteria 15 In the Total incomplete TCP/UDP sessions HIGH text box, enter the number of unestablished sessions that... the Incomplete TCP/UDP sessions (per min) HIGH text box, enter the maximum number of the Router. You can either choose from the same host. The default is detected as half-open sessions. The defaiult is 10 sessions. 20 In the Incomplete TCP/UDP sessions detect sensitive time period...
...text box, enter the maximum number of incomplete sessions allowed from the same host text box, enter the maximum number of half-open sessions. 54 CHAPTER 5: ROUTER CONFIGURATION DoS Detect Criteria 15 In the Total incomplete TCP/UDP sessions HIGH text box, enter the number of unestablished sessions that... the Incomplete TCP/UDP sessions (per min) HIGH text box, enter the maximum number of the Router. You can either choose from the same host. The default is detected as half-open sessions. The defaiult is 10 sessions. 20 In the Incomplete TCP/UDP sessions detect sensitive time period...
User Guide
Page 55
...1 Select Firewall from the main menu, then select Special Applications from the Popular Applications drop-down list, and click on your Router, do this port information into the Router. The Special Applications screen displays (Figure 34). These are TCP or UDP in the Public Type column. 3 If required,... column. Figure 34 Special Application Screen 2 Select an application from the sub-menu. If the application you specified. 4 Click Apply to be opened up one used by checking or unchecking the Enabled checkbox. You can then manually input this : 1 Specify the trigger port (the one of...
...1 Select Firewall from the main menu, then select Special Applications from the Popular Applications drop-down list, and click on your Router, do this port information into the Router. The Special Applications screen displays (Figure 34). These are TCP or UDP in the Public Type column. 3 If required,... column. Figure 34 Special Application Screen 2 Select an application from the sub-menu. If the application you specified. 4 Click Apply to be opened up one used by checking or unchecking the Enabled checkbox. You can then manually input this : 1 Specify the trigger port (the one of...
User Guide
Page 63
Alternatively, you can open the client up MAC Address Filtering, do the following: 1 Select Firewall from the main menu, then select MAC Address Filtering from the Copy To drop-...
Alternatively, you can open the client up MAC Address Filtering, do the following: 1 Select Firewall from the main menu, then select MAC Address Filtering from the Copy To drop-...
User Guide
Page 80
...communicate with the Universal Plug and Play feature disabled. This usually requires opening TCP and UDP ports and in a specific way to save the settings. The Router ships with the Router, basically "telling" the Router which way it needs the firewall configured. The Advanced screen displays (Figure...you leave NAT enabled for maximum security. 3 To enable IPSec NAT-T Pass-through : 1 Select Advanced from the main menu. 80 CHAPTER 5: ROUTER CONFIGURATION To configure NAT, and IPSec NAT-T Pass-through , select the On radio button. 4 If required, continue configuring advanced options on this ...
...communicate with the Universal Plug and Play feature disabled. This usually requires opening TCP and UDP ports and in a specific way to save the settings. The Router ships with the Router, basically "telling" the Router which way it needs the firewall configured. The Advanced screen displays (Figure...you leave NAT enabled for maximum security. 3 To enable IPSec NAT-T Pass-through : 1 Select Advanced from the main menu. 80 CHAPTER 5: ROUTER CONFIGURATION To configure NAT, and IPSec NAT-T Pass-through , select the On radio button. 4 If required, continue configuring advanced options on this ...