Motorola SBG900 manual Port Triggering, Wireless Security

Models: SBG900

1 130
Download 130 pages 40.66 Kb
Page 19
Image 19
Port Triggering

Overview Installation Troubleshooting Contact FAQ Specifications Glossary License

Configuration: Basic Gateway TCP/IP Wireless USB

DMZ

Ade-militarized zone (DMZ) is one or more computers logically located outside the firewall between an SBG900 LAN and the Internet. A DMZ prevents direct access by outside users to private data.

For example, you can set up a web server on a DMZ computer to enable outside users to access your website without exposing confidential data on your network.

A DMZ can also be useful to play interactive games that may have a problem running through a firewall. You can leave a computer used for gaming only exposed to the Internet while protecting the rest of your network. For more information, see Gaming Configuration Guidelines.

Port Triggering

When you run a PC application that accesses the Internet, it typically initiates communications with a computer on the Internet. In some applications, especially gaming, the computer on the Internet also initiates communications with your PC. Because NAT does not normally allow these incoming connections to occur, the SBG900 supports port triggering.

The SBG900 is preconfigured with port triggering for common applications. You can also configure additional port triggers if needed on the Gateway > PORT TRIGGERS — custom Page.

Wireless Security

Because wireless LAN signals are transmitted using radio signals, it may be possible for your neighbor or someone else you do not want accessing your wireless LAN. You need to limit access to only the intended persons. To prevent unauthorized eavesdropping of data transmitted over the wireless LAN, you must enable wireless security. The default SBG900 settings provide no security for transmitted data.

The SBG900 enables you to use the following wireless security measures:

Restrict access to computers having the same unique network name as the SBG900

Encrypt data transmitted over the wireless interface by configuring a Wired Equivalency Privacy (WEP) key on the SBG900 and wireless LAN clients (stations)

Define a MAC access control list to restrict wireless LAN access to clients based on the MAC address.

If you disable ESSID broadcasting to enable closed network operation, the SBG900 does not transmit the network name (ESSID). This provides additional protection because only wireless stations configured with your network name can communicate with the SBG900. Closed network operation is an enhancement of the IEEE 802.11b standard.

For information about configuring a wireless security, see Setting Up the Wireless LAN”.

X

13

SBG900 User Guide

Home Print Exit

Page 19
Image 19
Motorola SBG900 manual Port Triggering, Wireless Security