APPLICATIONS
•DMZ Host Support
Allows a networked computer to be fully exposed to the Internet. This function is used when NAT and firewall security prevent an Internet application from functioning correctly.
•Security
The Barricade supports security features that deny Internet access to specified users, or filter all requests for specific services that the administrator does not want to serve. The Barricade’s firewall also blocks common hacker attacks, including IP Spoofing, Land Attack, Ping of Death, IP with zero length, Smurf Attack, UDP port loopback, Snork Attack, TCP null scan, and TCP SYN flooding. WPA/WPA2, WEP, SSID, and MAC filtering provide security over the wireless network.
•Virtual Private Network (VPN Pass-through)
The Barricade supports three of the most commonly used VPN protocols – PPTP, L2TP, and IPSec. The VPN protocols supported by the Barricade are briefly described below.
•
•L2TP merges the best features of PPTP and L2F – Like PPTP, L2TP requires that the ISP’s routers support the protocol.
•IP Security – Provides IP