MicroNet Technology SP3367A Spoofing, Static IP Addresses, Subnet, Telnet, Transparent bridging

Page 67

multi-bridged environment. When three or more LAN's segments are connected via bridges, a loop can occur. Because a bridge forwards all packets that are not recognized as being local, therefore some packets may circulate for long periods of time, eventually degrading system performance. This algorithm ensures only one path connects any pair of stations, selecting one bridge as the 'root' bridge, with the highest priority one as identifier, from which all paths should radiate.

Spoofing

A method of fooling network end stations into believing that keep alive signals have come from and returned to the host. Polls are received and returned locally at either end.

Static IP Addresses

A static IP address is an IP address permanently assigned to computer in a TCP/IP network. Static IP addresses are usually assigned to networked devices that are consistently accessed by multiple users, such as Server PCs, or printers. If you are using your Router to share your cable or DSL Internet connection, contact your ISP to see if they have assigned your home a static IP address. You will need that address during your Router's configuration.

Subnet

For routing purposes, IP networks can be divided into logical subnets by using a subnet mask. Values below those of the mask are valid addresses on the subnet.

TCP

Transmission Control Protocol - The major transport protocol in the Internet suite of protocols provides reliable, connection-oriented full-duplex streams.

TFTP

Trivial File Transfer Protocol - A simple file transfer protocol (a simplified version of FTP) that is often used to boot diskless workstations and other network devices such as routers over a network (typically a LAN).

Telnet

The virtual terminal protocol in the Internet suite of protocols - Allows users of one host to log into a remote host and act as normal terminal users of that host.

Transparent bridging

The intelligence necessary for making relaying decisions exists in the

66

Image 67
Contents MicronetR FCC Part CE Declaration of conformityFCC Part Page Contents Device Info System Log Adsl Statistics Chapter Overview IntroductionADSL2/2+ Compliance FeaturesATM Protocols Security Bridge ModeRouter Mode Wireless FeaturesEthernet Interface System RequirementsHttp Web-Based Management Checklist InstallationContents description Front LEDs Rear Ports PowerHardware installation Pots Splitter Configuration Adsl over Pots Splitter Configuration1 Router connected through a Pots Splitter 3 Router Connected through a Isdn Splitter Isdn Splitter Configuration Adsl over IsdnConnection Determine connection settingsConnecting the Router to network Relative configuration on PCPage Page Access the Modem Router ConfigurationQuick Setup Page Page Page ATM VC Configuration Interface SetupInternet WAN Configuration Page Page Page Dynamic Routing Dhcp Relay LAN ConfigurationDNS Channel ID Wireless SettingsWireless Security Routing Table Advanced SetupStatic Routing NAT Setting DMZ Setting Virtual Server Adsl Firewall 1 ACL Access ManagementIP Filtering Snmp UPnP Ddns Administration MaintenanceTime Zone Firmware Update System Restart Diagnostic Device Info StatusWAN System Log Adsl Statistics Steps Corrective Action TroubleshootingCannot access the web management Steps Corrective Action Forget my login username and/or password Initialization of the Adsl connection failed Broadband Appendix a GlossaryAddress mask BridgeEncapsulation Dhcp Dynamic Host Configuration ProtocolDownstream rate Dynamic IP AddressesInternet address Hop countHtml browser HttpPPPoE IP addressRouting table Remote serverRoute RouterTelnet SpoofingStatic IP Addresses SubnetVirtual Connection VC UNI signalingStraight-through vs. Crossover Cables LAN Connection Appendix B CablingService Name, Protocol and Port number Appendix C Service / Port