SMC Networks SMC Barricade SMC7004VWBR Benutzerhandbuch

Seite 14

Advertising
background image

I

NTRODUCTION

1-4

User-Definable Application Sensing Tunnel

You may define special applications that require multiple connections
such as Internet gaming, video conferencing, and Internet telephony.
The Wireless Barricade will then sense the application type and open a
multi-port tunnel for it.

DMZ Hosts Support

Allows a networked computer to be fully exposed to the Internet.
This function is used when the special application sensing tunnel
feature is insufficient to allow an application to function correctly.

Security

The Wireless Barricade supports security features that deny Internet
access to specified users, or drop requests for specific services. The
Wireless Barricade’s firewall also blocks common hacker attacks,
including IP Spoofing, Land Attack, Ping of Death, IP with zero
length, Smurf Attack, UDP port loopback, Snork Attack, TCP null
scan, and TCP SYN flooding.

Virtual Private Network

The Wireless Barricade supports three of the most commonly used
VPN protocols – PPTP, L2TP, and IPSec. These protocols allow
remote users to establish a secure connection to their corporate
network. If your service provider supports VPNs, then any of these
protocols can be used to create an authenticated and encrypted tunnel
for passing secure data over the Internet (i.e., a traditionally shared
data network). The VPN protocols supported by the Wireless
Barricade are briefly described below.

Advertising