Motorola manual Security, Firewall, SBG900 security measures shown in a logical network diagram

Models: SBG900

1 139
Download 139 pages 39.12 Kb
Page 19
Image 19
Security

Overview Installation Troubleshooting Contact FAQ Specifications Glossary License

Configuration: Basic Gateway TCP/IP Wireless USB

Security

The SBG900 provides:

A firewall to protect the SBG900 LAN from undesired attacks over the Internet

For wireless transmissions, data encryption and network access control

Network Address Translation (NAT) provides some security because the IP addresses of SBG900 LAN computers are not visible on the Internet.

This diagram does not necessarily correspond to the network cabling. A full discussion of network security is beyond the scope of this document.

SBG900 security measures shown in a logical network diagram

Internet

SBG900

DMZ computer

Firewall

Wireless Security:

Encryption, MAC access control, or closed network operation SBG900 security measures shown in a logical network diagram

Computer

 

Computer

 

 

 

Wired Ethernet LAN

Computer

Laptop

Wireless LAN

PDA

Firewall

The SBG900 firewall protects the SBG900 LAN from undesired attacks and other intrusions from the Internet. It provides an advanced integrated stateful-inspectionfirewall supporting intrusion detection, session tracking, and denial-of-service attack prevention. The firewall:

Maintains state data for every TCP/IP session on the OSI network and transport layers

Monitors all incoming and outgoing packets, applies the firewall policy to each one, and screens for improper packets and intrusion attempts

Provides comprehensive logging for all:

User authentications

Rejected internal and external connection requests

Session creation and termination

Outside attacks (intrusion detection)

You can configure the firewall filters to set rules for port usage. For information about choosing a predefined firewall policy template, see Setting the Firewall Policy”.

SBG900 User Guide

12

Page 19
Image 19
Motorola SBG900 security measures shown in a logical network diagram, Firewall Wireless Security, Internet