CHAPTER 1 Introduction
Description of Capabilities
◆Easy setup through a Web browser on any operating system that supports TCP/IP.
◆Compatible with all popular Internet applications.
In addition, the Gateway Router offers full network management capabilities through an
APPLICATIONS Many advanced networking features are provided by the Barricade:
◆Wired LAN — The Barricade provides connectivity to wired 10/100 Mbps devices, making it easy to create a network in small offices or homes.
◆Internet Access — This device supports Internet access through a WAN connection. Since many DSL providers use PPPoE to establish communications with end users, the Barricade includes
◆Shared IP Address — The Barricade provides Internet access for up to 253 users via a single shared IP address. Using only one ISP account, multiple users on your network can browse the Web at the same time.
◆Virtual Server — If you have a fixed IP address, you can set the Barricade to act as a virtual host for network address translation. Remote users access various services at your site using a constant IP address. Then, depending on the requested service (or port number), the Barricade can route the request to the appropriate server (at another internal IP address). This secures your network from direct attack by hackers, and provides more flexible management by allowing you to change internal IP addresses without affecting outside access to your network.
◆DMZ Host Support — Allows a networked computer to be fully exposed to the Internet. This function is used when NAT and firewall security prevent an Internet application from functioning correctly.
◆Security — The Barricade supports security features that deny Internet access to specified users, or filter all requests for specific services the administrator does not want to serve. WPA
◆Virtual Private Network (VPN) — The Barricade supports one of the most commonly used VPN protocols – PPTP. This protocol allows remote users to establish a secure connection to their corporate network. If your service provider supports VPNs, then these protocols can be used to create an authenticated and encrypted tunnel for passing secure data over the Internet (i.e., a traditionally shared data network). The VPN protocols supported by the Barricade are briefly described below.
– 22 –