Velocity Edge GX440 User's Guide Page 133

  • Download
  • Add to my manuals
  • Print
  • Page
    / 412
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 132
Rev 1 Oct.13 133
7
7: Security Configuration
The security tab covers firewall-type functions. These functions
include how data is routed or restricted from one side of the device to
the other, i.e., from computers or devices connected to the device
(LAN) and from computers or devices contacting it from a remote
source (WAN). These features are set as rules.
Tip: For additional security, Sierra Wireless recommends that you change
the default password for ACEmanager. See Change Password on page 261.
Solicited vs. Unsolicited
How the device responds to data being routed from one network
connection to the other depends on the origin of the data.
If a computer on the LAN initiates a contact to a WAN location
(such as a LAN connected computer accessing an Internet web
site), the response to that contact is solicited.
If, however, a remote computer initiates the contact (such as a
computer on the Internet accessing a camera connected to the
device), the connection is considered unsolicited.
Port Forwarding
In Port Forwarding, any unsolicited data coming in on a defined
Public Port is routed to the corresponding Private Port and Host IP of
a device connected to the specified Physical Interface. You can
forward a single port or a range of ports.
Note: Port Forwarding requires Private Mode. See Private and Public Mode
on page 67.
Figure 7-1: Port Forwarding
Internet
Public port(s) Private port(s)
Host IP/Destination computerAirLink device
Page view 132
1 2 ... 128 129 130 131 132 133 134 135 136 137 138 ... 411 412

Comments to this Manuals

No comments