Asus Internet Security Router Instrukcja Użytkownika

Przeglądaj online lub pobierz Instrukcja Użytkownika dla Networking Asus Internet Security Router. Asus Internet Security Router User`s manual Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj

Podsumowanie treści

Strona 1 - Internet Security

Internet Security Router User’s Manual Revision 1.1 Oct. 30, 2003

Strona 2

x 11.7.1 Main Mode Remote Access...118 11.7.2 Aggressive Mode Remote Access...

Strona 4

Internet Security Router User’s Manual Chapter 10. Configuring VPN 85 10 Configuring VPN The chapter contains instructions for configuring VPN conne

Strona 5

Chapter 10. Configuring VPN Internet Security Router User’s Manual 86 Name Encryption Algorithm Authentication Algorithm Diffie-Hellman Group Key Man

Strona 6

Internet Security Router User’s Manual Chapter 10. Configuring VPN 87 Default lifetime Default lifetime for the pre-configured IKE proposals and IPSe

Strona 7

Chapter 10. Configuring VPN Internet Security Router User’s Manual 88 Options Description VPN Connection Type Site to site Click this radio button to

Strona 8

Internet Security Router User’s Manual Chapter 10. Configuring VPN 89 Options Description Xauth (aggressive mode only) Xauth is a user ID and passwo

Strona 9

Chapter 10. Configuring VPN Internet Security Router User’s Manual 90 Options Description Pre-shared Key Specific Options PFS Group PFS stands for pe

Strona 10

Internet Security Router User’s Manual Chapter 10. Configuring VPN 91 10.3.1 Add a Rule for VPN Connection Using Pre-shared Key VPN Tunnel Configurat

Strona 11 - List of Figures

Chapter 10. Configuring VPN Internet Security Router User’s Manual 92 7. Assign a priority for this rule by selecting a number from the “Move to” drop

Strona 12

Internet Security Router User’s Manual Chapter 10. Configuring VPN 93 10.4 Establish VPN Connection Using Manual Keys This section describes the step

Strona 13

xi 17 Index...149 List of Figures Figure 2.1. Front Panel LEDs...

Strona 14 - List of Tables

Chapter 10. Configuring VPN Internet Security Router User’s Manual 94 5. Click on “Enable” or “Disable” radio button to enable or disable this rule. 6

Strona 15

Internet Security Router User’s Manual Chapter 10. Configuring VPN 95 1. Log into Configuration Manager as admin, click the VPN menu, and then click

Strona 16

Chapter 10. Configuring VPN Internet Security Router User’s Manual 96 Figure 10.3 shows all the parameters available for VPN connections. To see an up

Strona 17 - 1 Introduction

Internet Security Router User’s Manual Chapter 10. Configuring VPN 97 10.6.1.1 Configure Rules on Internet Security Router 1 (ISR1) This section desc

Strona 18

Chapter 10. Configuring VPN Internet Security Router User’s Manual 98 Figure 10.5. Intranet VPN Policy Configuration on ISR1 Step 1: Configure VPN con

Strona 19 - 2.3 Rear Panel

Internet Security Router User’s Manual Chapter 10. Configuring VPN 99 Refer to the section 10.3 Establish VPN Connection Using Automatic Keying to co

Strona 20 - 2.4 Major Features

Chapter 10. Configuring VPN Internet Security Router User’s Manual 100 Field Value Mask 255.255.255.0 NAT None Action Allow VPN Enable Note: The ou

Strona 21

Internet Security Router User’s Manual Chapter 10. Configuring VPN 101 Internet 192.168.1.10 ISR1ISR2ADSL/Cable ModemADSL/Cable Modem192.16

Strona 22 - 2.4.1.7 Log and Alerts

Chapter 10. Configuring VPN Internet Security Router User’s Manual 102 5. Save the configuration. 10.6.2.2 Configure VPN Rules on ISR1 Step 1: Configu

Strona 23 - 2.4.2 VPN

Internet Security Router User’s Manual Chapter 10. Configuring VPN 103 Figure 10.9. Extranet Example – Outgoing NAT Pool Configuration on ISR1 2. Co

Strona 24

xii Figure 9.4 NAPT – Map Any Internal PCs to a Single Global IP Address...48 Figure 9.5 Reve

Strona 25 - 3 Quick Start Guide

Chapter 10. Configuring VPN Internet Security Router User’s Manual 104 Figure 10.11. Extranet Example – Outbound ACL Rule on ISR1 2. Configure inboun

Strona 26

Internet Security Router User’s Manual Chapter 10. Configuring VPN 105 Refer to the section 10.3 Establish VPN Connection Using Automatic Keying to c

Strona 27 - 3.2.3 Windows® 2000 PCs:

Chapter 10. Configuring VPN Internet Security Router User’s Manual 106 2. Configure incoming static NAT pool (reverse-static-NAT) for translating addr

Strona 28

Internet Security Router User’s Manual Chapter 10. Configuring VPN 107 Figure 10.17. Extranet Example – Inbound ACL Rule on ISR2 10.6.2.4 Establish

Strona 30

Internet Security Router User’s Manual Chapter 11. Configuring Remote Access 109 11 Configuring Remote Access 11.1 Remote Access The Internet Securi

Strona 31

Chapter 11. Configuring Remote Access Internet Security Router User’s Manual 110 Field Description User Name Enter a unique User name for the user th

Strona 32

Internet Security Router User’s Manual Chapter 11. Configuring Remote Access 111 6. If you want to add a user to this newly created group, continue w

Strona 33

Chapter 11. Configuring Remote Access Internet Security Router User’s Manual 112 3. Click on the button to delete this user group. Note that a user

Strona 34

Internet Security Router User’s Manual Chapter 11. Configuring Remote Access 113 Field Description Outbound Select this if this rule is for outbound

Strona 35

xiii Figure 10.4. Typical Intranet Network Diagram...

Strona 36 - 3.3.3 Testing Your Setup

Chapter 11. Configuring Remote Access Internet Security Router User’s Manual 114 Figure 11.4. Login Console After a successful login, the screen appe

Strona 37 - Manager[CT9]

Internet Security Router User’s Manual Chapter 11. Configuring Remote Access 115 11.5 Configure Firewall for Remote Access Remote Access is usually u

Strona 38 - 4.2 Functional Layout

Chapter 11. Configuring Remote Access Internet Security Router User’s Manual 116 2. Create an inbound group ACL rule (see Figure 11.8) to allow remote

Strona 39

Internet Security Router User’s Manual Chapter 11. Configuring Remote Access 117 5. An IP address (in the IP Address field) is automatically assigned

Strona 40

Chapter 11. Configuring Remote Access Internet Security Router User’s Manual 118 11.7 Configure VPN for Remote Access Remote Access VPN is used primar

Strona 41 - 5 Configuring LAN Settings

Internet Security Router User’s Manual Chapter 11. Configuring Remote Access 119 Figure 11.12. Main Mode Remote Access Example – Configure the Virtu

Strona 42 - 5.2.1 What is DHCP?

Chapter 11. Configuring Remote Access Internet Security Router User’s Manual 120 11.7.2 Aggressive Mode Remote Access Aggressive Mode remote access w

Strona 43 - 5.2.2 Why use DHCP?

Internet Security Router User’s Manual Chapter 11. Configuring Remote Access 121 3. Create a VPN policy for Richard and Gloria. The settings for this

Strona 45 - 5.3 DNS

Internet Security Router User’s Manual Chapter 12. System Management 123 12 System Management This chapter describes the following administrative ta

Strona 46 - 5.4 Viewing LAN Statistics

xiv Figure 12.5. Default Setting Configuration Page...1

Strona 47 - 6 Configuring WAN Settings

Chapter 12. System Management Internet Security Router User’s Manual 124 12.2 Change the Login Password The first time you log into the Configuration

Strona 48 - 6.3 Dynamic IP

Internet Security Router User’s Manual Chapter 12. System Management 125 Figure 12.3. System Information Configuration Page 12.4 Setup Date and Time

Strona 49

Chapter 12. System Management Internet Security Router User’s Manual 126 address of time servers and the desired update interval. Select your time zon

Strona 50 - 6.4 Static IP

Internet Security Router User’s Manual Chapter 12. System Management 127 12.5.2 Backup System Configuration Follow the steps below to backup system c

Strona 51 - 6.5 Viewing WAN Statistics

Chapter 12. System Management Internet Security Router User’s Manual 128 Figure 12.7. Restore System Configuration Page 2. Enter the path and name of

Strona 52

Internet Security Router User’s Manual Chapter 12. System Management 129 1. Log into Configuration Manager, click the System Management menu and then

Strona 53 - 7 Configuring Routes

Chapter 12. System Management Internet Security Router User’s Manual 130 12.8 Logout Configuration Manager To logout of Configuration Manager, click o

Strona 54 - 7.3 Static Routing

Internet Security Router User’s Manual Chapter 13. ALG Configuration 131 13 ALG Configuration Table 13.1 lists all the supported ALGs (Application L

Strona 55

Chapter 13. ALG Configuration Internet Security Router User’s Manual 132 ALG/Application Name Protocol and Port Predefined Service Name Tested Softwa

Strona 56

Internet Security Router User’s Manual Chapter 13. ALG Configuration 133 ALG/Application Name Protocol and Port Predefined Service Name Tested Softw

Strona 57 - 8 Configuring DDNS

xv Table 9.10. Time Range Configuration Parameters...80 T

Strona 59

Internet Security Router User’s Manual Chapter 14. IP Addresses, Network Masks, and Subnets 135 14 IP Addresses, Network Masks, and Subnets 14.1 IP

Strona 60

Chapter 14. IP Addresses, Network Masks, and Subnets Internet Security Router User’s Manual 136 Class A networks are the Internet's largest netwo

Strona 61 - 9.1 Firewall Overview

Internet Security Router User’s Manual Chapter 14. IP Addresses, Network Masks, and Subnets 137 Class C: 255.255.255.0 These are called default becau

Strona 63 - 9.2.2 Dynamic NAT

Internet Security Router User’s Manual Appendix 15. Troubleshooting 139 15 Troubleshooting This appendix suggests solutions for problems you may enc

Strona 64 - Translation)

Appendix 15. Troubleshooting Internet Security Router User’s Manual 140 Problem Troubleshooting Suggestion addresses within a predefined pool PCs ca

Strona 65 - 9.2.4 Reverse Static NAT

Internet Security Router User’s Manual Appendix 15. Troubleshooting 141 Figure 15.1. Using the ping Utility If the target computer cannot be located

Strona 66

Appendix 15. Troubleshooting Internet Security Router User’s Manual 142 Figure 15.2. Using the nslookup Utility There may be several addresses associ

Strona 67

Internet Security Router User’s Manual Appendix 16. Glossary 143 16 Glossary 10BASE-T A designation for the type of wiring used by Ethernet network

Strona 69

Appendix 16. Glossary Internet Security Router User’s Manual 144 element of URLs, which identify a specific file at a web site, e.g., http://www.asus.

Strona 70

Internet Security Router User’s Manual Appendix 16. Glossary 145 from 0 to 255, separated by periods, e.g., 209.191.4.240. An IP address consists of

Strona 71

Appendix 16. Glossary Internet Security Router User’s Manual 146 between your ISP and your computer. The WAN interface on the Internet Security Router

Strona 72

Internet Security Router User’s Manual Appendix 16. Glossary 147 twisted pair The ordinary copper telephone wiring long used by telephone companies.

Strona 74 - 9.5 Configuring URL Filters

Internet Security Router User’s Manual Appendix 16. Glossary 149 17 Index 100BASE-T, 143 10BASE-T, 143 ADSL, 143 authenticate, 143 Binary numbers,

Strona 75 - 9.5.3 Add an URL Filter Rule

Appendix 17. Index Internet Security Router User’s Manual 150 Inbound ACL Configuration page, 49 Internet, 144 troubleshooting access to, 139 Intranet

Strona 76

Internet Security Router User’s Manual Appendix 17. Index 151 Routing Configuration, 37 Setup Wizard, 15, 23 User Password Configuration, 124 WAN Sta

Strona 77 - Access)

Internet Security Router User’s Manual Chapter 1. Introduction 1 Introduction Congratulations on becoming the owner of the Internet Security Router.

Strona 78

Chapter 1. Introduction Internet Security Router User’s Manual 2 Note Provides clarification or non-essential information on the current topic. Def

Strona 79 - 9.6.2.3 Add a Service

Internet Security Router User’s Manual Chapter 2. Getting to Know the Internet Security Router 3 2 Getting to Know the Internet Security Router 2.1

Strona 80 - 9.6.2.5 Delete a Service

ii Copyright Information No part of this manual, including the products and software described in it, may be reproduced, transmitted, transcribed, st

Strona 81

Chapter 2. Getting to Know the Internet Security Router Internet Security Router User’s Manual 4 Table 2.2. Rear Panel Labels and LEDs Label Function

Strona 82

Internet Security Router User’s Manual Chapter 2 Getting to Know the Internet Security Router 5 „ Reverse Static – This is inbound mapping that maps

Strona 83

Chapter 2. Getting to Know the Internet Security Router Internet Security Router User’s Manual 6 Flooder Port Scans TCP XMAS Scan, TCP Null Scan TCP S

Strona 84 - Application Filter)

Internet Security Router User’s Manual Chapter 2 Getting to Know the Internet Security Router 7 „ Alerts sent to the administrator via e-mail. „ Mai

Strona 85

Chapter 2. Getting to Know the Internet Security Router Internet Security Router User’s Manual 8 „ Remote Access VPN – Corporations use VPN to establi

Strona 86

Internet Security Router User’s Manual Chapter 3. Quick Start Guide 9 3 Quick Start Guide This Quick Start Guide provides basic instructions for con

Strona 87

Chapter 3. Quick Start Guide Internet Security Router User’s Manual 10 3.1.4 Step 4. Turn on the Internet Security Router, the ADSL or cable modem and

Strona 88

Internet Security Router User’s Manual Chapter 3. Quick Start Guide 11 If the LEDs illuminate as expected, the Internet Security Router hardware is

Strona 89 - 9.7.2 Configuring IP Pool

Chapter 3. Quick Start Guide Internet Security Router User’s Manual 12 You may be prompted to install files from your Windows 2000 installation CD or

Strona 90 - 9.7.2.4 Modify an IP Pool

Internet Security Router User’s Manual Chapter 3. Quick Start Guide 13 1. In the Windows NT task bar, click the <Start> button, point to Settin

Strona 91 - 9.7.2.6 IP Pool Example

iii Table of Contents 1 Introduction...1 1.1 Features...

Strona 92 - 9.7.3 Configuring NAT Pool

Chapter 3. Quick Start Guide Internet Security Router User’s Manual 14 3.3 Part 3 — Quick Configuration of the Internet Security Router In Part 3, you

Strona 93

Internet Security Router User’s Manual Chapter 3. Quick Start Guide 15 3. Enter your user name and password, and then click to enter the Configurat

Strona 94 - 9.7.3.6 NAT Pool Example

Chapter 3. Quick Start Guide Internet Security Router User’s Manual 16 5. Now we are at the System Information setup page; enter the requested informa

Strona 95

Internet Security Router User’s Manual Chapter 3. Quick Start Guide 17 Figure 3.7. Setup Wizard – LAN IP Configuration Page Figure 3.8. Setup Wizar

Strona 96 - 9.7.4 Configuring Time Range

Chapter 3. Quick Start Guide Internet Security Router User’s Manual 18 Figure 3.9. Setup Wizard – WAN PPPoE Configuration Page Figure 3.10. Setup

Strona 97 - 9.7.4.4 Modify a Time Range

Internet Security Router User’s Manual Chapter 3. Quick Start Guide 19 • Host name is optional. You may leave it empty if your ISP did not provide s

Strona 98 - 9.7.4.7 Time Range Example

Chapter 3. Quick Start Guide Internet Security Router User’s Manual 20 • Enter at lease the primary DNS IP address provided by your ISP. Secondary DN

Strona 99

Internet Security Router User’s Manual Chapter 4. Getting Started with the Configuration Manager 21 4 Getting Started with the Configuration Manager

Strona 100

Chapter 4. Getting Started with the Configuration Manager Internet Security Router User’s Manual 22 Note You can change the password at any time (see

Strona 101 - 10 Configuring VPN

Internet Security Router User’s Manual Chapter 4. Getting Started with the Configuration Manager 23 Button/Icon Function Adds the existing configura

Strona 102

iv 3.1.4 Step 4. Turn on the Internet Security Router, the ADSL or cable modem and power up your computers...

Strona 103

Chapter 4. Getting Started with the Configuration Manager Internet Security Router User’s Manual 24 Figure 4.4. System Information Page

Strona 104

Internet Security Router User’s Manual Chapter 5. Configuring LAN Settings 25 5 Configuring LAN Settings This chapter describes how to configure LAN

Strona 105

Chapter 5. Configuring LAN Settings Internet Security Router User’s Manual 26 Figure 5.1. LAN IP Address Configuration Page 2. Enter a LAN IP address

Strona 106

Internet Security Router User’s Manual Chapter 5. Configuring LAN Settings 27 On a DHCP-enabled network, the IP information is assigned dynamically r

Strona 107

Chapter 5. Configuring LAN Settings Internet Security Router User’s Manual 28 enter the LAN IP or your ISP’s DNS IP in the primary DNS Server IP Addre

Strona 108 - 10.3.4 Display VPN Rules

Internet Security Router User’s Manual Chapter 5. Configuring LAN Settings 29 5.3 DNS 5.3.1 About DNS Domain Name System (DNS) servers map the user-

Strona 109

Chapter 5. Configuring LAN Settings Internet Security Router User’s Manual 30 2. Configure the LAN PCs to use the IP addresses assigned by the DHCP se

Strona 110 - 10.4.4 Display VPN Rules

Internet Security Router User’s Manual Chapter 6. Configuring WAN Settings 31 6 Configuring WAN Settings This chapter describes how to configure WAN

Strona 111 - 10.5 VPN Statistics

Chapter 6. Configuring WAN Settings Internet Security Router User’s Manual 32 Table 6.1. WAN PPPoE Configuration Parameters Setting Description Host

Strona 112 - 10.6 VPN Connection Examples

Internet Security Router User’s Manual Chapter 6. Configuring WAN Settings 33 Field Description Host Name Host name is optional but may be required

Strona 113

v 5.3.2 Assigning DNS Addresses...29 5.3.3 Configuring DNS Relay...

Strona 114

Chapter 6. Configuring WAN Settings Internet Security Router User’s Manual 34 6.4 Static IP 6.4.1 WAN Static IP Configuration Parameters Table 6.3 des

Strona 115

Internet Security Router User’s Manual Chapter 6. Configuring WAN Settings 35 5. Enter the IP address of the primary DNS server. This information sho

Strona 117

Internet Security Router User’s Manual Chapter 7. Configuring Routes 37 7 Configuring Routes You can use Configuration Manager to define specific ro

Strona 118

Chapter 7. Configuring Routes Internet Security Router User’s Manual 38 7.2 Dynamic Routing using RIP (Routing Information Protocol) RIP enables routi

Strona 119

Internet Security Router User’s Manual Chapter 7. Configuring Routes 39 2. Click to delete the selected route. WARNING Do not remove the route for

Strona 121

Internet Security Router User’s Manual Chapter 8. Configuring DDNS 41 8 Configuring DDNS Dynamic DNS is a service that allows computers to use the s

Strona 122

Chapter 8. Configuring DDNS Internet Security Router User’s Manual 42 Internet ISRHTTP DDNS Server(DynDNS, TokyoDNS)DynDNSsl1000.homeunix.comTokyo

Strona 123

Internet Security Router User’s Manual Chapter 8. Configuring DDNS 43 Field Description HTTP DDNS Specific Settings DDNS Service [For HTTP DDNS only

Strona 124

vi 9 Configuring Firewall/NAT Settings...45 9.1 Firewall Overview...

Strona 125 - Configuring Remote Access

Chapter 8. Configuring DDNS Internet Security Router User’s Manual 44 4. In the DDNS Configuration page, select “Enable” for the DDNS State and “RFC-2

Strona 126

Internet Security Router User’s Manual Chapter 9. Configuring Firewall/NAT Settings 45 9 Configuring Firewall/NAT Settings The Internet Security Rou

Strona 127

Chapter 9. Configuring Firewall/NAT Settings Internet Security Router User’s Manual 46 9.1.3.2 Tracking Connection State The stateful inspection engin

Strona 128 - Example

Internet Security Router User’s Manual Chapter 9. Configuring Firewall/NAT Settings 47 Figure 9.1 Static NAT – Mapping Four Private IP Addresses to

Strona 129

Chapter 9. Configuring Firewall/NAT Settings Internet Security Router User’s Manual 48 9.2.3 NAPT (Network Address and Port Translation) or PAT (Port

Strona 130

Internet Security Router User’s Manual Chapter 9. Configuring Firewall/NAT Settings 49 9.2.4 Reverse Static NAT Reverse static NAT maps a globally va

Strona 131

Chapter 9. Configuring Firewall/NAT Settings Internet Security Router User’s Manual 50 Field Description ID Add New Click on this option to add a new

Strona 132

Internet Security Router User’s Manual Chapter 9. Configuring Firewall/NAT Settings 51 Field Description IP Address, Subnet, Range and IP Pool Selec

Strona 133

Chapter 9. Configuring Firewall/NAT Settings Internet Security Router User’s Manual 52 Field Description associate with an inbound ACL rule. Time Ran

Strona 134

Internet Security Router User’s Manual Chapter 9. Configuring Firewall/NAT Settings 53 4. Make changes to any or all of the following fields: source/

Strona 135

vii 9.5.5 Delete an URL Filter Rule...59 9.5.6 View Configured URL Filter Rul

Strona 136

Chapter 9. Configuring Firewall/NAT Settings Internet Security Router User’s Manual 54 Figure 9.9. Outbound ACL Configuration Page 9.4.1 Outbound AC

Strona 137

Internet Security Router User’s Manual Chapter 9. Configuring Firewall/NAT Settings 55 Field Description network. IP Address This option allows you

Strona 138

Chapter 9. Configuring Firewall/NAT Settings Internet Security Router User’s Manual 56 Field Description Single, Range Select any of these and enter

Strona 139 - 12 System Management

Internet Security Router User’s Manual Chapter 9. Configuring Firewall/NAT Settings 57 9.4.3 Add an Outbound ACL Rule To add an outbound ACL rule, fo

Strona 140

Chapter 9. Configuring Firewall/NAT Settings Internet Security Router User’s Manual 58 4. Click on the button to modify this ACL rule. The new setti

Strona 141 - 12.4 Setup Date and Time

Internet Security Router User’s Manual Chapter 9. Configuring Firewall/NAT Settings 59 Figure 9.11. URL Filter Configuration Page 9.5.3 Add an URL F

Strona 142

Chapter 9. Configuring Firewall/NAT Settings Internet Security Router User’s Manual 60 proxy web server is used. If you don’t use a proxy server for y

Strona 143

Internet Security Router User’s Manual Chapter 9. Configuring Firewall/NAT Settings 61 Figure 9.13. Self Access Rule Configuration Page 9.6.1.1 Self

Strona 144 - 12.6 Upgrade Firmware

Chapter 9. Configuring Firewall/NAT Settings Internet Security Router User’s Manual 62 2. Select “Add New” from the Self Access rule drop-down list. 3

Strona 145

Internet Security Router User’s Manual Chapter 9. Configuring Firewall/NAT Settings 63 Figure 9.14. Service List Configuration Page 9.6.2.1 Service

Strona 146

viii 9.7.2.2 Access IP Pool Configuration Page – (Firewall è Policy List è IP Pool)...

Strona 147 - 13 ALG Configuration

Chapter 9. Configuring Firewall/NAT Settings Internet Security Router User’s Manual 64 5. Click on the button to create the new service. The new ser

Strona 148

Internet Security Router User’s Manual Chapter 9. Configuring Firewall/NAT Settings 65 Field Description to get into a "stuck state" where

Strona 149

Chapter 9. Configuring Firewall/NAT Settings Internet Security Router User’s Manual 66 Field Description Minimum IP Fragment Size Enter the Minimum s

Strona 150

Internet Security Router User’s Manual Chapter 9. Configuring Firewall/NAT Settings 67 „ NAT Pools – This option allows you to configure NAT Pools th

Strona 151 - 14.2 Network classes

Chapter 9. Configuring Firewall/NAT Settings Internet Security Router User’s Manual 68 Field Description CWD Allow or deny of change directory. LIST

Strona 152 - 14.3 Subnet masks

Internet Security Router User’s Manual Chapter 9. Configuring Firewall/NAT Settings 69 Figure 9.16. Application Filter Configuration Page 9.7.1.3 Ad

Strona 153 - Class C: 255.255.255.0

Chapter 9. Configuring Firewall/NAT Settings Internet Security Router User’s Manual 70 Figure 9.18. FTP Filter Example – Configuring FTP Filter Rule

Strona 154

Internet Security Router User’s Manual Chapter 9. Configuring Firewall/NAT Settings 71 Figure 9.21. FTP Filter Example – Associate FTP Filter Rule t

Strona 155 - 15 Troubleshooting

Chapter 9. Configuring Firewall/NAT Settings Internet Security Router User’s Manual 72 7. Check the web application files to block – in this example,

Strona 156 - 15.1.1 ping

Internet Security Router User’s Manual Chapter 9. Configuring Firewall/NAT Settings 73 Figure 9.24. Modify an Application Filter 9.7.1.5 Delete an A

Strona 157 - 15.1.2 nslookup

ix 10.4.4 Display VPN Rules...94 10.5 VPN Statistics...

Strona 158

Chapter 9. Configuring Firewall/NAT Settings Internet Security Router User’s Manual 74 Field Description IP Address Enter the IP Address. 9.7.2.2 Acc

Strona 159 - 16 Glossary

Internet Security Router User’s Manual Chapter 9. Configuring Firewall/NAT Settings 75 2. Click on the icon of the IP pool to be modified in the IP

Strona 160

Chapter 9. Configuring Firewall/NAT Settings Internet Security Router User’s Manual 76 Figure 9.27. IP Pool Example – Add Two IP Pools – MISgroup1 an

Strona 161

Internet Security Router User’s Manual Chapter 9. Configuring Firewall/NAT Settings 77 Field Description Static Select this type of NAT to set a one

Strona 162

Chapter 9. Configuring Firewall/NAT Settings Internet Security Router User’s Manual 78 9.7.3.3 Add a NAT Pool To add a NAT Pool, follow the instructio

Strona 163

Internet Security Router User’s Manual Chapter 9. Configuring Firewall/NAT Settings 79 10.64.2.0/24 ISRStatic NAT PoolLAN Port192.168.1.1WAN Port

Strona 164

Chapter 9. Configuring Firewall/NAT Settings Internet Security Router User’s Manual 80 Figure 9.32. NAT Pool Example – Associate a NAT Pool to an ACL

Strona 165 - 17 Index

Internet Security Router User’s Manual Chapter 9. Configuring Firewall/NAT Settings 81 9.7.4.2 Access Time Range Configuration Page – (Firewall è Pol

Strona 166

Chapter 9. Configuring Firewall/NAT Settings Internet Security Router User’s Manual 82 5. Click on the button to save the new settings. 9.7.4.5 Del

Strona 167

Internet Security Router User’s Manual Chapter 9. Configuring Firewall/NAT Settings 83 9.8 Firewall Statistics – Firewall è Statistics The Firewall S

Komentarze do niniejszej Instrukcji

Brak uwag