Step 8: Configure Subnet Access

1.Click in a cell of the table that represents the subnet-to-subnet (or subnet-to-WAN) relationship to define. All access rules (if any are defined) appear in the table in the lower-half of the screen.

2.Use the pulldown menu above the list Allow or Deny all the entries specified in the exception table. You cannot allow some protocols (or ports) and deny others.

3.From the list of checkboxes on the left side, select those protocols to allow or deny. The protocols are automatically added to the table with the relevant Name, Transport, Start Port, and End Port information. The available protocols are:

Protocol

Transport,

Description

 

Port Used

 

HTTP

TCP, 80

Hypertext Transfer Protocol (HTTP) is the protocol for

 

 

transferring files on the World Wide Web. HTTP is an

 

 

application protocol that runs on top of the TCP/IP suite

 

 

of protocols, the foundation protocols for the Internet.

TELNET

TCP, 23

TELNET is the terminal emulation protocol of TCP/IP.

 

 

TELNET uses TCP to achieve a virtual connection

 

 

between server and client, then negotiates options on

 

 

both sides of the connection.

FTP

TCP, 21

File Transfer Protocol (FTP) is an application protocol

 

 

that uses the Internet’s TCP/IP protocols. FTP provides

 

 

a simple and efficient way to exchange files between

 

 

computers on the Internet.

SMTP

TCP, 25

Simple Mail Transfer Protocol (SMTP) is a TCP/IP

 

 

protocol used for sending and receiving email. Due to

 

 

its limited ability to queue messages at the receiving

 

 

end, SMTP is often used with POP3 or IMAP. SMTP

 

 

sends the email, and then POP3 or IMAP receives the

 

 

email.

POP

TCP, 109:110

Post Office Protocol (POP3) is a TCP/IP protocol

 

 

intended to permit a workstation to dynamically access

 

 

a maildrop on a server host. A workstation uses POP3

 

 

to retrieve email that the server is holding for it.

DNS

TCP+UDP, 53

Domain Name Service (DNS) protocol searches for

 

 

resources using a database that is distributed among

 

 

different name servers.

You can make changes to the information automatically filled into the table; however, note that changes in the selected transport type can change the port numbers that can be specified in the table.

4.To add an access rule for a protocol, port, or transport other than the ones available from the checkboxes on the left, click the Add button. An empty row is added to the table.

Specify a Name to identify the new access rule. This could be the name of a particular application, for example.

Copyright © 2004 Symbol Technologies, Inc. All Rights Reserved

41

WS 2000 Wireless Switch: 1.0 Date of last Revision: March 2004

 

Page 41
Image 41
Symbol Technologies WS 2000 manual Protocol Transport Description Port Used, Http