Accton Technology ACC7004WFW 2.4 GHz Wireless Router User Manual scan 1 XDW

Accton Technology Corp 2.4 GHz Wireless Router scan 1 XDW

User manual 4

Download: Accton Technology ACC7004WFW 2.4 GHz Wireless Router User Manual scan 1 XDW
Mirror Download [FCC.gov]Accton Technology ACC7004WFW 2.4 GHz Wireless Router User Manual scan 1 XDW
Document ID234492
Application IDZr/x+y5fQFFJHYsOk4kb3g==
Document DescriptionUser manual 4
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize104.4kB (1305026 bits)
Date Submitted2002-04-01 00:00:00
Date Available2002-04-01 00:00:00
Creation Date2002-03-29 15:19:50
Producing SoftwareAcrobat Distiller 5.0 (Windows)
Document Lastmod2002-03-29 15:20:07
Document Titlescan-1.XDW
Document CreatorPScript5.dll Version 5.2
Document Author: brian

COWGURING m5 BARRICADE PLUS
Schedule Rule
senefime Rme
ml; Moe dvfines «hem rule hams and mm: m schedule m use mm ‘Awess cammr page.
. Enabh gums Cumin! Schndulns: 7? ‘m r Nu
. Schema Rum hula (up w 10 mm)
u-
mm
You can filter Internet access for local clients based on the “Rule
Name,” and time of day.
1. Click on “Add Schedule Rule”
4-29
NETWORKING AND CLIENT SERVICES
2. Define the appropriate settings for a schedule rule (as shown in
the following screen).
3. Click “OK” and then the “APPLY” button to save your settings.
(as shown on previous page)
Edit Schedule Rule
Nam “MA 7 7
J’Jommsnt Namath!
CONFIGURING THE BARRICADE PLUS
State/”Lil Packet Inspection
in 530th new mini
mum Fume
, fans-Sm: mm mm.
., In'gznlnn Appllwllnn Type
imits the access of the incoming traffic from the WAN port, When
the SP1 feature is turned on, all the incoming packets will be blocked
unless certain types of traffic types are checked by the users. When
the user checks certain types of traffic, only the particular type of
traffic initiated from the Internal LAN will be allowed. For example,
if the user only checks “FTP service” from the Stateful Packet
Inspection page, all the incoming traffic will be blocked except the
FTP connection initiated from the local LAN.
This option allows you to select different application types that are
using dynamic port numbers If you need to use the Stateful Packet
Inspection (SP1) for blocking packets, click on the “Yes” radio button
in the “SP1 Enable” field and then check the “Inspection Application
Type” that you need, such as Packet Fragmentation, TCP
Connection, UDP Session, FTP Service, H.325 Service and TFT P
Service.
NETWORKING AND CLIENT SERVICES
32
Hacker Prevention
The Barricade Plus’ firewall inspects packets at the application layer.
It maintains TCP and UDP session information, including timeouts
and number of active sessions, and provides the ability to detect and
prevent certain types of network attacks such as DOS attacks.
Network attacks that deny access to a network device are called
denial—of—sewice (DOS) attacks. Denials of Service (DOS) attacks
are aimed at devices and networks with a connection to the
Internet. Their goal is not to steal information, but to disable a
device or network so users no longer have access to network
I'CSOUI‘CCI
By using the above inspected information and timeout/ threshold
critieria, the Bauicade Plus provides the following DoS attack
preventions: Ping of Death (Ping flood) attack, SYN flood attack, IP
fragment attack (Teardrop Attack), Bruteeforce attack, Land Attack,
IP Spoofing attack, IP with zero length, TCP null scan (Port Scan
Attack), UDP port loopback, Snork Attack etc.
The firewall does not significantly affect system performance, so we
advise enabling the prevention features to protect your network
users.
COWIGURUVG THE BARRICADE PLUS
: ~ ,, W i '- a
HuckgrfPrwm-m , ' '
1m Mun-w»: mu m may mun mmmuxhjlgilknq Mum; 1m mummy; omnmfimh um
um, S’mmmunk mu m 1mm 5mm Amman? mu xm and 1c? sm mm — —
,. "my”..m mm ' ,
‘ ("5ch I‘m-1 ! in.“ mm
" , " my Mum
- m... mum-gm“ in "mm: ”mm. m w. mu ynu By Marti
ymyzhanw-n 7 ,,
— am am. Adams»
' - t‘mnué-inn Polity
Ravawwmia‘n ,,,,,,,,, seam,
TcP w W 5 sewn-1L ,
, Tana-nmmmmudm ,m;u.
mpg-wanu-smwufi , mm, , ,
“in mum-m mu m,
. 058 mm}; ‘ -
Fuwullilmn Fbvd sham Tum , mama;
- mm 5mm nil-vim
m Sniiqn: Numutnm 1mm um m "‘ "rand:
m. "MEI ,, mm mm, '
amki-efimfi mm
',;sWQJ,i@@@;
Hacker Prevention Feature
Check the prevention items as required
When backers attempt to enter your network, we can alert you
by e—maz'l
Enter your E—mail address for alerting hacker access
Specify your E—mail server.
4-53
NETWORKING AND CLIENT SERVICES
- Connection Policy
Enter the appropriate values for TCP/UDP sessions
' DOS Criteria and Part Scan Criteria
Setup DOS and port scan criteria in the spaces provided.
DMZ (Demililafized Zone)
hum-mun cv.‘ s n.-
l-qmw new
1,110,111 96 :
Umnfiomnllmzud lam) 7
n,“ ma . to am n ma: um run m mm alvimim yupurly fmmhuhilmn: rum-«ax.
Jan M cm w m; mm a; m mmricvndm my mm “mums.“ 3 mm m: , mt
wimpy. F135 “n be rum-diam rmmwmwuy mmunmm mg Mamet yawn]. v-s-u
mat-mug, avg-kg mum», n. ml or. am, wumfll m a my: Pam“ {anMPD'
ninlfi‘tjl'Add-ny
mimezfiz , '
whom-4“, ‘
~ 7 laudszln'é
191652477,
misul'u‘, 7
, «anwfs
gamezlr,
mussel?“
Q @Q
If you have a Client PC hat cannot run an Internet application
properly from behind the firewall, then you can open the client up
to unrestricted two-way Internet access. Enter the IP address of a
DMZ host to this screen. Adding a client to the DMZ (Demilitarized
Zone) may expose your local network to a variety of security risks,
50 only use this option as a last resort
CONFIGwaING 77113 BARRICADE PLUS
Virtual Private Networks (VPN) Tunnel
vinsemrigg ', ,'
win» mm WM‘ 1 "mm Mm "mu m.- as m. mini- Mm by nitahfismnn m
cmMnficmnawzrurmzd xmmklnfpfxnqu gum-u. mmmmum.
VJN provides a flexible and secure network to the authenticated
users through IPsec (IP Security) and PPTP (Point—to—Point
Tunneling Protocol) sessions.
465
NETWORKING AND CLIENT SERVICES
4-36
IPsec
IPsec is a set of protocols that offers advanced security services in the
extranet VPNs.
You have to define the authentication algorithms of the Security
Association (SA) by entering appropriate values in the “Inbound SA”
and “Outbound SA’fflfields for using IPsec security controlifl 7
ViubnnIh-l: EE 37 f
rap-mm“; wry ,
41mg fiwmnmmmmssur ,
lPsae
lPsgc akms uses to define a finale settle P59: mnmemxh a remote and
, palm. ma ma Indudssma summer Dom ands mm sswrsmrmsl andme
Jnballndlvmbuu'idSecnrilyAsamm‘on (5A);
inn-h: f-‘m rm’ '
mun-ask
spa
imi‘mafi figs-j pr
Submlllnlc in? ‘35
swmw Wrfia‘s‘i
Huh Alumni-u
my:
hummer
«an
DulmuniSA: ,
$9
lunllP‘Mdv-fl; 152 31a}, 11 4m ,
Sun-MIA: 7 E [3 lg ffi ,,
mun-mm..- is: than L J"; 7
sum“ Wigs—m AK“,
smmycmfi, |mflfl>|rwvfiilflr W?
Ilfllllnllrfihm: Grimm “MES ("SHM
m — 'f—_-I84mlonuefl24£flnmmgug
EumNu-dihm: num- 13302532“: f uauac
CONFIGURING THE BARRICADE PLUS
PPTP Client
Point—to-Point Tunneling Protocol (PPTP) allows the secure remote
access over the Internet by simply dialing in a local point provided
Dy an ISP,
PPTP Guam
* “' pm maul to a yufliwhd-illn ' mm m mwm 1m Wham-91h '
llnrhrrlewpnsmrfi rum mp am as“, am i. mum wvlivn m mnyw mm by game "my
4mm“: 5an a Mmmm ldl- 11mm flmnddhkflm . mlwlmvniafi mim- rmmh thn lm-mlmnmaifln i:
maul-mm umwmlm» Dims inn-mum 53mm lining-mun In. Mum-um my: fim-Jmn mam he twp-fl 1?-
mm wbmfl muk. «m 3mm m»- nlhel m ui m {um-1 mm m... a. mim ,
Using the above screen allows client PCs to establish a normal
PPTP session and provides hassle—free configuration of the PPTP
client on each client PC.
Provide the “Use PPTP Authentication” information to remotely log
on the network.
4-37
NETWORKING AND CLIENT SERVICES
P3773 SEW
PPTF SW!
The Barricaflé Plus snows PCs immins Mama to rameIBMog ma ma LANusingme PFTannsiim
— promml TN! page mums ma marmrm and pmmmrm Vernal/a uselswnn are emfnrimd to log mm
— ma [mum am we IP midis): range maisrgnmflmse users —
Addrzss P091;
Slzn add'ew
Endaddress: _ ‘F, ,,nu ‘
Use the above screen to authorize remote access for assigned IP
addresses on the host server.

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.3
Linearized                      : No
Encryption                      : Standard V1.2 (40-bit)
User Access                     : Print, Copy, Fill forms, Extract, Assemble, Print high-res
Modify Date                     : 2002:03:29 15:20:07+08:00
Create Date                     : 2002:03:29 15:19:50+08:00
Title                           : scan-1.XDW
Author                          : brian
Creator                         : PScript5.dll Version 5.2
Producer                        : Acrobat Distiller 5.0 (Windows)
Page Count                      : 10
EXIF Metadata provided by EXIF.tools
FCC ID Filing: HEDACC7004WFW

Navigation menu