SMC Networks SMC7908VoWBRA manual DMZ Host Support, Security, Virtual Private Network VPN

Models: SMC7908VoWBRA

1 137
Download 137 pages 45.48 Kb
Page 16
Image 16

INTRODUCTION

DMZ Host Support

Allows a networked computer to be fully exposed to the Internet. This function is used when NAT and firewall security prevent an Internet application from functioning correctly.

Security

The Barricade supports security features that deny Internet access to specified users, or filter all requests for specific services that the administrator does not want to serve. The Barricade’s firewall also blocks common hacker attacks, including IP Spoofing, Land Attack, Ping of Death, IP with zero length, Smurf Attack, UDP port loopback, Snork Attack, TCP null scan, and TCP SYN flooding.

Virtual Private Network (VPN)

The Barricade supports three of the most commonly used VPN protocols — PPTP, L2TP, and IPSec. These protocols allow remote users to establish a secure connection to their corporate network. If your service provider supports VPNs, then these protocols can be used to create an authenticated and encrypted tunnel for passing secure data over the Internet (i.e., a traditionally shared data network). The VPN protocols supported by the Barricade are briefly described below.

Point-to-Point Tunneling Protocol — Provides a secure tunnel for remote client access to a PPTP security gateway. PPTP includes provisions for call origination and flow control required by ISPs.

L2TP merges the best features of PPTP and L2F — Like PPTP, L2TP requires that the ISP’s routers support the protocol.

IP Security — Provides IP network-layer encryption. IPSec can support large encryption networks (such as the Internet) by using digital certificates for device authentication.

1-4

Page 16
Image 16
SMC Networks SMC7908VoWBRA manual DMZ Host Support, Security, Virtual Private Network VPN