Belkin F5D6231-4 User Manual - Page 27

Configuring Internal Forwarding Settings - port forward

Page 27 highlights

USING THE WEB-BASED ADVANCED USER INTERFACE Configuring the Firewall Your Router is equipped with a firewall that will protect your network from a wide array of common hacker attacks including: • IP Spoofing • Land Attack • Ping of Death (PoD) • Denial of Service (DoS) • IP with zero length • Smurf Attack • TCP Null Scan • SYN flood • UDP flooding • Tear Drop Attack • ICMP defect • RIP defect • Fragment flooding The firewall also masks common ports that are frequently used to attack networks. These ports appear to be "Stealth" meaning that for all intents and purposes, they do not exist to a would-be hacker. You can turn the firewall function off if needed, however, it is recommended that you leave the firewall enabled. Disabling the firewall protection will not leave your network completely vulnerable to hacker attacks, but it is recommended that you leave the firewall enabled. 50 USING THE WEB-BASED ADVANCED USER INTERFACE Configuring Internal Forwarding Settings The Virtual Servers function will allow you to route external (Internet) calls for services such as a web server (port 80), FTP server (Port 21), or other applications through your Router to your internal network. Since your internal computers are protected by a firewall, computers outside your network (over the Internet) cannot get to them because they cannot be "seen". A list of common applications has been provided in case you need to configure the Virtual Server function for a specific application. If your application is not listed, you will need to contact the application vendor to find out which port settings you need. Choosing an Application Select your application from the drop-down list. Click "Add". The settings will be transferred to the next available space in the screen. Click "Apply Changes" to save the setting for that application. To remove an application, select the number of the row that you want to remove then click "Clear". Manually Entering Settings into the Virtual Server To manually enter settings, enter the IP address in the space provided for the internal (server) machine, the port(s) required to pass (use a comma between multiple ports), select the port type (TCP or UDP), and click "Apply Changes". You can only pass one port per internal IP address. Opening ports in your firewall can pose a security risk. You can enable and disable settings very quickly. It is recommended that you disable the settings when you are not using a specific application. 51

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44

USING THE WEB-BASED ADVANCED USER INTERFACE
Configuring Internal Forwarding Settings
The Virtual Servers function will allow you to route external (Internet) calls for
services such as a web server (port 80), FTP server (Port 21), or other
applications through your Router to your internal network. Since your internal
computers are protected by a firewall, computers outside your network (over the
Internet) cannot get to them because they cannot be “seen”. A list of common
applications has been provided in case you need to configure the Virtual Server
function for a specific application. If your application is not listed, you will need
to contact the application vendor to find out which port settings you need.
Choosing an Application
Select your application from the drop-down list. Click “Add”. The settings will be
transferred to the next available space in the screen. Click “Apply Changes” to
save the setting for that application. To remove an application, select the
number of the row that you want to remove then click “Clear”.
Manually Entering Settings into the Virtual Server
To manually enter settings, enter the IP address in the space provided for the
internal (server) machine, the port(s) required to pass (use a comma between
multiple ports), select the port type (TCP or UDP), and click “Apply Changes”.
You can only pass one port per internal IP address. Opening ports in your
firewall can pose a security risk. You can enable and disable settings very
quickly. It is recommended that you disable the settings when you are not
using a specific application.
50
USING THE WEB-BASED ADVANCED USER INTERFACE
Configuring the Firewall
Your Router is equipped with a firewall that will protect your network from a
wide array of common hacker attacks including:
• IP Spoofing
• Land Attack
• Ping of Death (PoD)
• Denial of Service (DoS)
• IP with zero length
• Smurf Attack
• TCP Null Scan
The firewall also masks common ports that are frequently used to attack
networks. These ports appear to be “Stealth” meaning that for all intents and
purposes, they do not exist to a would-be hacker. You can turn the firewall
function off if needed, however, it is recommended that you leave the firewall
enabled. Disabling the firewall protection will not leave your network
completely vulnerable to hacker attacks, but it is recommended that you leave
the firewall enabled.
• SYN flood
• UDP flooding
• Tear Drop Attack
• ICMP defect
• RIP defect
• Fragment flooding
51