Draytek Vigor2955 Manuel d'utilisateur Page 4

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 6
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 3
Outgoing/Incoming traffic inspection based on connection information
Appliance-based gateway security and content filtering
You have been allocated multiple public IP address by your ISP. You hence can have a one-to-one
relationship between a public IP address and an internal/private IP address. This means that you
have the protection of NAT (see earlier) but the PC can be addressed directly from the outside world
by its aliased public IP address, but still by only opening specific ports to it (for example TCP port
80 for an http/web server).
The packet is forwarded to a specific local PC if the port number matches with the defined port
number. You can also translate the external port to another port locally.
As port redirection (above) but allows you to define a range of ports.
This opens up a single PC completely. All incoming packets will be forwarded onto the
PC with the local IP address you set. The only exceptions are packets received in response
to outgoing requests from other local PCs or incoming packets which match rules in the
other two methods.
The precedence is as follows :
Port Redirection > Open Ports > DMZ
Stateful Packet Inspection (SPI)
Content Security Management(CSM)
Multi-NAT
Port Redirection
Open Ports
DMZ Host
The header information of an IP packet (IP or MAC source/destination addresses; source /destination
ports; DiffServ attribute; direction dependent, bandwidth dependent, remote-site dependent
Act of preventing customers, users, clients or other computers from accessing data on a computer.
Source IP address check on all interfaces:only IP addresses classified within the defined IP networks
are allowed.
Utilizes object-oriented approach to firewall policy
E-mail alert and logging via syslog
Flexible DHCP with 'IP-MAC binding'
The use of authentication and encryption techniques on a Wireless Distribution System (WDS) link
between compatible access points.
Policy-based IP Packet Filter
DoS/DDoS Prevention
IP Address Anti-spoofing
Object-based Firewall
Notification
Bind IP to MAC Address
WDS Security
Firewall
Blocks users in a VLAN from sending traffic directly to each other.
Authorizes a defined IP user to use WLAN; this is used by the LAN to identify each client uniquely
in order to switch packets correctly.
Create a secure tunnel between wireless client PC and the router, over the existing wireless connection,
thus providing greater security as the traffic between that wireless client and the router is then encrypted
and within a private tunnel using IPSec/3DES encryption (or as selected)
WEP (Wireless Encryption Protocol) is a method of data encryption for wireless clients, which makes the
sending of your data over the wireless interface more secure. By default, WEP is turned off on the router.
Prevent from Wireless sniffing
IEEE standard for port-based network access control. The authenticator acts like a security guard to a
protected WLAN network.
An authentication/encryption standard from the WiFi Alliance; WPA is intended to replace WEP
encryption, being considered to be more secure and is a pre-cursor to the eventual
IEEE 802.11i standard.
Wireless Access Point
Wireless VLAN (Wireless LAN
Isolation)
MAC Address Access Control
VPN over WLAN
64/128-bit WEP
Hidden SSID
802.1X Authentication with RADIUS
Client
WPA/WPA2
URL Keyword Blocking
Web Content Filter
Time Schedule Control
Whitelist and Blacklist
Java applet, cookies, active X, compressed, executable, multimedia file blocking
Dynamic URL filtering database
Set rule according to your specific office hours
Content Filter
Easy of Adoption
Industrial-standard Interoperability
No additional client or remote site licensing required
Compatible with other leading 3rd party vendor VPN devices
Vigor2950
Series
Vue de la page 3
1 2 3 4 5 6

Commentaires sur ces manuels

Pas de commentaire