Belkin F1PI210ENau User Guide - Page 28

Parameter Description, Flags, Network Address, Netmask, Gateway, Interface, Metric, Firewall, Access

Page 28 highlights

section Advanced Setup Method Parameter Description Flags: Indicates the route status: C = Direct connection on the same subnet S = Static route R = RIP (Routing Information Protocol) assigned route I = ICMP (Internet Control Message Protocol) Redirect route Network Address: Destination IP address Netmask: The subnetwork associated with the destination This is a template that identifies the address bits in the destination address used for routing to specific subnets. Each bit that corresponds to a "1" is part of the subnet mask number; each bit that corresponds to "0" is part of the host number Gateway: The IP address of the router at the next hop to which frames are forwarded Interface: The local interface through which the next hop of this route is reached Metric: When a router receives a routing update that contains a new or changed destination network entry, the router adds 1 to the metric value indicated in the update and enters the network in the routing table Firewall Advanced Setup Method 1 The VoIP Router's firewall enables access control of client PCs, blocks common hacker attacks, including IP Spoofing, Land Attack, Ping of Death, IP with zero length, Smurf Attack, UDP port loopback, 2 Snork Attack, TCP null scan, and TCP SYN flooding. The firewall does not significantly affect system performance and we advise leaving it enabled to protect your network. 3 You can select a pre-defined firewall level from the drop down list. Available options are High, Medium, Low Level & User Defined. 4 Select User Defined to manually adjust the firewall settings. Note: After you check the radio button in the "Enable or disable 5 Firewall features" field, you must click the "SAVE SETTINGS" button to display the list of firewall features. 6 Access Control 7 Access Control allows users to define the outgoing traffic permitted or not-permitted through the WAN interface. In the example above, all incoming and outgoing emails are blocked. The default is to permit all outgoing traffic. (See the following page for details.) The VoIP Router can also limit the access of hosts within the local 52 53

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53

52
Advanced Setup Method
Advanced Setup Method
53
section
2
1
3
4
5
6
7
Parameter Description
Flags:
Indicates the route status:
C = Direct connection on the same subnet
S = Static route
R = RIP (Routing Information Protocol) assigned route
I = ICMP (Internet Control Message Protocol) Redirect route
Network Address:
Destination IP address
Netmask:
The subnetwork associated with the destination
This is a template that identifies the address bits in the destination
address used for routing to specific subnets. Each bit that corresponds
to a “1” is part of the subnet mask number; each bit that corresponds
to “0” is part of the host number
Gateway:
The IP address of the router at the next hop to which frames
are forwarded
Interface:
The local interface through which the next hop of this route
is reached
Metric:
When a router receives a routing update that contains a new or
changed destination network entry, the router adds 1 to the metric value
indicated in the update and enters the network in the routing table
Firewall
The VoIP Router’s firewall enables access control of client PCs,
blocks common hacker attacks, including IP Spoofing, Land Attack,
Ping of Death, IP with zero length, Smurf Attack, UDP port loopback,
Snork Attack, TCP null scan, and TCP SYN flooding. The firewall does
not significantly affect system performance and we advise leaving it
enabled to protect your network.
You can select a pre-defined firewall level from the drop down list.
Available options are High, Medium, Low Level & User Defined.
Select User Defined to manually adjust the firewall settings.
Note:
After you check the radio button in the “Enable or disable
Firewall features” field, you must click the “SAVE SETTINGS” button
to display the list of firewall features.
Access Control
Access Control allows users to define the outgoing traffic permitted
or not-permitted through the WAN interface. In the example above, all
incoming and outgoing emails are blocked. The default is to permit all
outgoing traffic. (See the following page for details.)
The VoIP Router can also limit the access of hosts within the local