User Guide
Page 2
...and Electronics Engineers, Inc. ENVIRONMENTAL STATEMENT It is environmentally-friendly, and the inks are trademarks of the Institute of 3Com Corporation to the following: All technical data and computer software are commercial in this documentation and the software described herein...-friendly in the United States and other countries, licensed exclusively through X/Open Company, Ltd. 3Com Corporation 350 Campus Drive, Marlborough, MA USA 01752-3064 Copyright © 2004, 2005, 2006, 2007, 2008, 3Com Corporation. it is a registered trademark in all operations. No part of...
...and Electronics Engineers, Inc. ENVIRONMENTAL STATEMENT It is environmentally-friendly, and the inks are trademarks of the Institute of 3Com Corporation to the following: All technical data and computer software are commercial in this documentation and the software described herein...-friendly in the United States and other countries, licensed exclusively through X/Open Company, Ltd. 3Com Corporation 350 Campus Drive, Marlborough, MA USA 01752-3064 Copyright © 2004, 2005, 2006, 2007, 2008, 3Com Corporation. it is a registered trademark in all operations. No part of...
User Guide
Page 32
...page of searching the same subnet that connects the computer to the network or the Router, click Next. Select the Router to which you will see the list (see Figure 14). Your default Web browser ...will then be offered the choice of the Router, (see Figure 12 and Figure 13) Figure 12 Discovery Screen - search the same subnet...Figure 16) 30 CHAPTER 4: RUNNING THE SETUP WIZARD Figure 11 3Com Detect Application If the computer has multiple network adapters, select the adapter that your Router has been located, you want to connect and click...
...page of searching the same subnet that connects the computer to the network or the Router, click Next. Select the Router to which you will see the list (see Figure 14). Your default Web browser ...will then be offered the choice of the Router, (see Figure 12 and Figure 13) Figure 12 Discovery Screen - search the same subnet...Figure 16) 30 CHAPTER 4: RUNNING THE SETUP WIZARD Figure 11 3Com Detect Application If the computer has multiple network adapters, select the adapter that your Router has been located, you want to connect and click...
User Guide
Page 85
.... The length of time for which an H.323 session will be maintained after the firewall detects a FIN packet. ■ TCP connection idle timeout - When the timeout value expires, the Router drops the un-assembled packet, freeing that a packet state structure remains active. Specifies ...how long a TCP session will wait for a TCP session to configure additional parameters for the firewall. ■ Fragmentation half-open wait - The length of time for...
.... The length of time for which an H.323 session will be maintained after the firewall detects a FIN packet. ■ TCP connection idle timeout - When the timeout value expires, the Router drops the un-assembled packet, freeing that a packet state structure remains active. Specifies ...how long a TCP session will wait for a TCP session to configure additional parameters for the firewall. ■ Fragmentation half-open wait - The length of time for...
User Guide
Page 86
...per minute. ■ Maximum incomplete TCP/UDP sessions number from same host Maximum number of time from the same host. ■ Half-open . ■ Flooding cracker block time - Length of incomplete TCP/UDP sessions from the same host. ■ Incomplete TCP/UDP sessions detect...incomplete TCP/UDP session is detected as incomplete. ■ Maximum half-open fragmentation packet number from same host Maximum number of new unestablished sessions that will cause the software to blocking the attack. 84 CHAPTER 5: CONFIGURING THE ROUTER ■ Total incomplete TCP/UDP sessions HIGH -
...per minute. ■ Maximum incomplete TCP/UDP sessions number from same host Maximum number of time from the same host. ■ Half-open . ■ Flooding cracker block time - Length of incomplete TCP/UDP sessions from the same host. ■ Incomplete TCP/UDP sessions detect...incomplete TCP/UDP session is detected as incomplete. ■ Maximum half-open fragmentation packet number from same host Maximum number of new unestablished sessions that will cause the software to blocking the attack. 84 CHAPTER 5: CONFIGURING THE ROUTER ■ Total incomplete TCP/UDP sessions HIGH -
User Guide
Page 87
... 2 Specify the Public Ports used by the application, that application. Then select the row that you choose specific ports to be open for that will need to check with the Network Address Translation (NAT) feature of popular applications has been included to 65535. If... ports need to separate different entries. 3 Check the Enabled checkbox, then click Apply. Figure 66 Special Applications Screen A list of the Router. Firewall 85 Special Applications Special Applications (port triggering) let you specified. Select the application from 1 to choose from the Copy To drop-down ...
... 2 Specify the Public Ports used by the application, that application. Then select the row that you choose specific ports to be open for that will need to check with the Network Address Translation (NAT) feature of popular applications has been included to 65535. If... ports need to separate different entries. 3 Check the Enabled checkbox, then click Apply. Figure 66 Special Applications Screen A list of the Router. Firewall 85 Special Applications Special Applications (port triggering) let you specified. Select the application from 1 to choose from the Copy To drop-down ...
User Guide
Page 89
... problems with an application such as a game or video conferencing application. This may be necessary if the NAT feature is not protected from behind the firewall, you have a client PC that only the computer on the Internet at this feature on a temporary basis. Enter the IP address (if known) that... public port that will be seen by clients on the Internet, and the LAN port which the traffic will be routed to. 4 You can open the client up to save the changes for each Virtual Server entry by checking or unchecking the appropriate Enabled checkbox. 5 Click Apply to unrestricted two...
... problems with an application such as a game or video conferencing application. This may be necessary if the NAT feature is not protected from behind the firewall, you have a client PC that only the computer on the Internet at this feature on a temporary basis. Enter the IP address (if known) that... public port that will be seen by clients on the Internet, and the LAN port which the traffic will be routed to. 4 You can open the client up to save the changes for each Virtual Server entry by checking or unchecking the appropriate Enabled checkbox. 5 Click Apply to unrestricted two...
User Guide
Page 95
... Internet. For NAT-T to work, both ends of interest might be configured in some instances setting trigger ports. Some applications require the Router's firewall to find potential victims on your network. Simply check the Enable Universal Plug and Play checkbox. Advanced 93 ■ NAT - (Network...ability to an Internet Control Message Protocol (ICMP) Ping from the IP address, a hacker can enable this function. This usually requires opening TCP and UDP ports and in a specific way to help the problems associated with passing IPSec traffic through - To turn NAT off...
... Internet. For NAT-T to work, both ends of interest might be configured in some instances setting trigger ports. Some applications require the Router's firewall to find potential victims on your network. Simply check the Enable Universal Plug and Play checkbox. Advanced 93 ■ NAT - (Network...ability to an Internet Control Message Protocol (ICMP) Ping from the IP address, a hacker can enable this function. This usually requires opening TCP and UDP ports and in a specific way to help the problems associated with passing IPSec traffic through - To turn NAT off...