Schmid Watson Technical Information Page 49

  • Download
  • Add to my manuals
  • Print
  • Page
    / 292
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 48
Watson-SHDSL-Router-GUI-Manual.doc
Version 2.3-03
Watson SHDSL Router
Web-based Management Manual
Revision: 2012-02-29
8-3
ing to a flexible and configurable set of rules. These rules are designed to prevent
unwanted intrusions from the outside, while allowing home users access to the In-
ternet services that they require.
The firewall rules specify what types of services available on the Internet may be
accessed from the home network and what types of services available in the home
network may be accessed from the Internet. Each request for a service that the
firewall receives, whether originating in the Internet or from a computer in the home
network, is checked against the set of firewall rules to determine whether the re-
quest should be allowed to pass through the firewall. If the request is permitted to
pass, then all subsequent data associated with this request (a "session") will also
be allowed to pass, regardless of its direction.
For example, when you point your Web browser to a Web page on the Internet, a
request is sent out to the Internet for this page. When the request reaches Watson
the firewall will identify the request type and origin-HTTP and a specific PC in your
home network, in this case. Unless you have configured access control to block re-
quests of this type from this computer, the firewall will allow this request to pass out
onto the Internet (refer to Section 8.2.2 for more on setting access controls). When
the Web page is returned from the Web server the firewall will associate it with this
session and allow it to pass, regardless of whether HTTP access from the Internet
to the home network is blocked or permitted. The important thing to note here is
that it is the origin of the request, not subsequent responses to this request, that
determines whether a session can be established or not. These services include
Telnet, FTP, HTTP, HTTPS, DNS, IMAP, POP3 and SMTP. The list of allowed ser-
vices at 'Maximum Security' mode can be edited in the Access Control page. Atten-
tion: Some applications (such as some Internet messengers and Peer-To-Peer cli-
ent applications) tend to use these ports, if they cannot connect with their own de-
fault ports. When applying this behavior, these applications will not be blocked out-
bound, even at Maximum Security Level.
To configure Watson's security settings, perform the following:
1. Choose between the three predefined security levels described in the table
above.
Note: Using the Minimum Security setting may expose the home network to significant
security risks, and thus should only be used, when necessary, for short periods of
time.
2. Check the 'Block IP Fragments' box in order to protect your home network from a
common type of hacker attack that could make use of fragmented data packets
to sabotage your home network. Note that VPN over IPSec and some UDP-
based services make legitimate use of IP fragments. You will need to allow IP
fragments to pass into the home network in order to make use of these select
services.
3. Click 'OK' to save the settings.
8.2.2 Access Control
You may want to block specific computers within the home network (or even the
whole network) from accessing certain services on the Internet. For example, you
may want to prohibit one computer from surfing the Web, another computer from
transferring files using FTP, and the whole network from receiving incoming e-mail.
Page view 48
1 2 ... 44 45 46 47 48 49 50 51 52 53 54 ... 291 292

Comments to this Manuals

No comments