SMC Networks SMC2804WBR38 manual Firewall, Access Control

Page 60

Configuring the Wireless Barricade g Router

For a full list of ports and the services that run on them, see www.iana.org/assignments/port-numbers.

Firewall

The Router firewall can provide access control of connected client PCs, block common hacker attacks, including IP Spoofing, Land Attack, Ping of Death, IP with zero length, Smurf Attack, UDP port loopback, Snork Attack, TCP null scan, and TCP SYN flooding. The firewall does not significantly affect system performance, so we advise leaving it enabled to protect your network users.

Access Control

Using this option allows you to specify different privileges based on IP address for the client PCs.

Note: Click on Add PC and define the appropriate settings for client PC services (as shown in the following screen).

50

Image 60
Contents C 2 8 0 4 W B R Page Page Copyright FCC Class B FCC RF Radiation Exposure StatementEC Conformance Declaration Class B Line ±1kV, AC/DC Line to Earth ±2kVSafety Compliance Industry Canada Class BAustralia AS/NZS 3548 1995 Class B Underwriters Laboratories Compliance StatementWichtige Sicherheitshinweise Germany Table of Contents Table of Contents About the Wireless Barricade G Router LED IndicatorsFeatures and Benefits Installing the Wireless Barricade G Router Package ContentsHardware Description Hardware Description System Requirements Basic Installation Procedure Connect the SystemPower on Connect the power adapter to the Router Connect the System Making the Wlan Connections Attach the Wireless Barricade g Router to the Internet Making the WAN Connection Connecting the Power AdapterInstalling TCP/IP Windows 95/98/MEInstalling TCP/IP WindowsConfiguring Client TCP/IP Setting Up TCP/IP Configuring Your Computer in Windows 95/98/MeConfiguring Client TCP/IP Obtain IP Settings from Your Wireless Barricade g Router Configuring Your Computer in Windows NT Setting Up TCP/IP Configuring Your Computer in Windows Configuring Your Computer in Windows XP Configuring a Macintosh Computer Manual IP Configuration Verifying Your TCP/IP Connection Pinging 192.168.2.1 with 32 bytes of data Request timed out Configuring the Wireless Barricade G Router Browser ConfigurationDisable Proxy Connection Internet Explorer 5 or aboveInternet Explorer For Macintosh Netscape 4 or above Making Configuration Changes Navigating the Web Browser InterfaceSetup Wizard Time ZoneBroadband Type Cable ModemFixed-IP xDSL PPPoEAdvanced Setup Menu DescriptionSystem Time ZonePassword Settings WAN Dynamic IP Point-to-Point Over Ethernet PPPoE Point-to-Point Tunneling Protocol Pptp Static IP Address DNS LAN Wireless Channel and SsidEncryption Advanced Setup Configuring the Wireless Barricade g Router Network Address Translation NAT Address MappingVirtual Server Special Applications Access Control FirewallAdvanced Setup MAC Filtering Table URL Blocking Schedule Rule Intrusion Detection SPI and Anti-DoS firewall protection Default Enabled RIP Defect Default Enabled If an RIP request packet isDiscard Ping from WAN Default Disabled When hackers attempt to enter your network, we can alert Parameter Defaults Description DoS Criteria and Port Scan CriteriaDMZ Ddns Dynamic DNS Settings UPnP Universal Plug and Play Setting Tools Configuration Tools ToolsTools Firmware Upgrade Tools Reset Status Section DescriptionTroubleshooting Verify your connection to the RouterAm getting an IP Address that starts with Have another IP Address displayed10/100 LED does not light after a connection is made Advanced Features Indicator PanelDimensions WeightInput Power Power ConsumptionTemperature SafetyPage For Technical SUPPORT, Call