Linksys BEFSX41 manual 135

Page 71

Instant Broadband® Series

Packet - A unit of data routed between an origin and a destination in a network.

Packet Filtering - Discarding unwanted network traffic based on its originat- ing address or range of addresses or its type (e-mail, file transfer, etc.).

Ping (Packet INternet Groper) - An Internet utility used to determine whether a particular IP address is online. It is used to test and debug a network by send- ing out a packet and waiting for a response.

Plug-and-Play- The ability of a computer system to configure expansion boards and other devices automatically without requiring the user to turn off the system during installation.

POP3 (Post Office Protocol 3) - A standard mail server commonly used on the Internet. It provides a message store that holds incoming e-mail until users log on and download it. POP3 is a simple system with little selectivity. All pending messages and attachments are downloaded at the same time. POP3 uses the SMTP messaging protocol.

Port - A pathway into and out of the computer or a network device such as a switch or router. For example, the serial and parallel ports on a personal com- puter are external sockets for plugging in communications lines, modems and printers.

PPPoE (Point to Point Protocol over Ethernet) - PPPoE is a method for the encapsulation of PPP packets over Ethernet frames from the user to the ISP over the Internet. One reason PPPoE is preferred by ISPs is because it provides authentication (username and password) in addition to data transport. A PPPoE session can be initiated by either a client application residing on a PC, or by client firmware residing on a modem or router.

PPTP (Point-to-Point Tunneling Protocol) - A protocol which allows the Point to Point Protocol (PPP) to be tunneled through an IP network. PPTP does not specify any changes to the PPP protocol but rather describes a "tunneling serv- ice" for carrying PPP (a tunneling service is any network service enabled by tunneling protocols such as PPTP, L2F, L2TP, and IPSEC tunnel mode). One example of a tunneling service is secure access from a remote small office net- work to a headquarters corporate intranet via a Virtual Private Network (VPN) that traverses the Internet. However, tunneling services are not restricted to cor- porate environments and may also be used for personal (i.e., non-business) applications.

EtherFast® Cable/DSL Firewall Router with 4-Port Switch/VPN Endpoint

RIP (Routing Information Protocol) - A simple routing protocol that is part of the TCP/IP protocol suite. It determines a route based on the smallest hop count between source and destination. RIP is a distance vector protocol that routine- ly broadcasts routing information to its neighboring routers.

RJ-45(Registered Jack-45) - A connector similar to a telephone connector that holds up to eight wires, used for connecting Ethernet devices.

Router - Protocol-dependent device that connects subnetworks together. Routers are useful in breaking down a very large network into smaller subnet- works; they introduce longer delays and typically have much lower throughput rates than bridges.

Security Association - A group of security settings related to a specific VPN tunnel.

Server - Any computer whose function in a network is to provide user access to files, printing, communications, and other services.

SMTP (Simple Mail Transfer Protocol) - The standard e-mail protocol on the Internet. It is a TCP/IP protocol that defines the message format and the mes- sage transfer agent (MTA), which stores and forwards the mail.

SNMP (Simple Network Management Protocol) - A widely used network monitoring and control protocol. Data is passed from SNMP agents, which are hardware and/or software processes reporting activity in each network device (hub, router, bridge, etc.) to the workstation console used to oversee the net- work. The agents return information contained in a MIB (Management Information Base), which is a data structure that defines what is obtainable from the device and what can be controlled (turned off, on, etc.).

Software - Instructions for the computer. A series of instructions that performs a particular task is called a "program." The two major categories of software are "system software" and "application software." System software is made up of control programs such as the operating system and database management sys- tem (DBMS). Application software is any program that processes data for the user.

SPI (Stateful Packet Inspection) - A firewall technology that monitors the state of the transaction so that it can verify that the destination of an inbound pack- et matches the source of a previous outbound request. It examines not just the headers of the packet, but also the contents, to determine more about the pack-

134

135

Image 71
Contents User Guide Copyright & Trademarks Table of Contents Environmental 139 FeaturesIntroduction IP Addresses An Introduction to LANs and WANsYour Virtual Private Network VPN Network Setup OverviewWhy Do I Need a VPN? Firewall Router to Firewall Router What is a Virtual Private Network?Ports PowerRouter’s Back Panel Modem connection will not work from any other portProceed to Connect the Router WAN and LAN LEDsRouter’s Front Panel LEDs Overview Connecting Your Hardware Together and Booting UpRouter’s hardware installation is now complete Connect the RouterConfiguring Windows 95, 98, and Millennium PCs Configure the PCsConfiguring Windows 2000 PCs Go to Configure the RouterConfiguring Windows XP PCs Configure the Router Enter the Gateway Address Obtain an IP Address AutomaticallyStatic IP Address Advanced Proxies. Click Direct Connection to the InternetRAS PPPoECable/DSL Firewall Router’s Web-based Utility Quick and Easy Router AdministrationSetup Static IP User Name and PasswordWAN IP Firewall IPSec Pass Through Remote UpgradeBlock WAN Request Multicast Pass ThroughVPN Establishing a TunnelLocal Secure Group and Remote Secure Group Remote Security Gateway Key Management AuthenticationEncryption Instant Broadband Series Phase Advanced Settings for Selected IPSec TunnelPassword Other SettingsStatus Dhcp Log Help Filters AdvancedInstant Broadband Series Forwarding UPnP Forwarding Port Triggering Static Routing Dynamic RoutingDMZ Host Address DMZ HostDMZ Port MAC Address Clone Current DMZ HostDdns DynDNS.orgTZO.com Appendix a TroubleshootingCommon Problems and Solutions For Windows 95, 98, and Me For Windows NTFor Windows XP For Windows XP Am not able to access the Router’s web interface Setup Can’t get the Internet game, server, or application to work To start over, I need to set the Router to factory default Need to use port triggering Click the Advanced = Filter tabFrequently Asked Questions TCP/IP is compatible with the Router Appendix B Maximizing VPN Security Step One Create an IPSec Policy IntroductionEnvironment Windows 2000 or Windows XPIP Address Filter List 1 win-routerStep Two Build Filter Lists Figure C-6 Filter List 2 router=winTunnel 1 win-router Step Three Configure Individual Tunnel RulesAccept Respond Using IPSec XYZ12345. ClickString to Protect Negotiate Security Key exchange pre Shared key, as shownTunnel 2 router-win XYZ12345 Action Require Security This string to protectKey Exchange Preshared key,Step Four Assign New IPSec Policy Figure C-24Figure C-28 Step Five Create a Tunnel Through the Web-based UtilityAppendix D Snmp Functions Appendix E How to Ping Your ISP’s E-mail & Web AddressesFigure E-1 TCP/IP installation is now complete Appendix F Installing the TCP/IP ProtocolFor Windows NT, 2000, and XP Figure G-1Figure G-5 Appendix H Glossary 129 131 133 135 137 Environmental Appendix I SpecificationsWeb FTP Site Appendix J Warranty InformationAppendix K Contact Information Sales InformationCopyright 2003 Linksys, All Rights Reserved