Motorola WS2000 Reference Guide - Page 44
Transport, Description
View all Motorola WS2000 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 44 highlights
3-8 WS2000 Wireless Switch System Reference Guide 3. Enable or disable logging of firewall access by using the Enable logging check box. When enabled, a log entry is created every time a packet is denied by the action "Deny". A log entry is created once per session for packets that match the firewall rules when the action is "Allow". 4. From the list of checkboxes on the left side, select those protocols to allow or deny. The protocols are automatically added to the table with the relevant Name, Transport, Start Port, and End Port information. The available protocols are shown in the table below. Protocol Transport, Description Port Used HTTP TCP, 80 Hypertext Transfer Protocol (HTTP) is the protocol for transferring files on the World Wide Web. HTTP is an application protocol that runs on top of the TCP/IP suite of protocols, the foundation protocols for the Internet. TELNET TCP, 23 TELNET is the terminal emulation protocol of TCP/IP. TELNET uses TCP to achieve a virtual connection between server and client, then negotiates options on both sides of the connection. FTP TCP, 21 File Transfer Protocol (FTP) is an application protocol that uses the Internet's TCP/IP protocols. FTP provides a simple and efficient way to exchange files between computers on the Internet. SMTP TCP, 25 Simple Mail Transfer Protocol (SMTP) is a TCP/IP protocol used for sending and receiving email. Due to its limited ability to queue messages at the receiving end, SMTP is often used with POP3 or IMAP. SMTP sends the email, and then POP3 or IMAP receives the email. POP TCP, 109:110 Post Office Protocol (POP3) is a TCP/IP protocol intended to permit a workstation to dynamically access a maildrop on a server host. A workstation uses POP3 to retrieve email that the server is holding for it. DNS TCP+UDP, 53 Domain Name Service (DNS) protocol searches for resources using a database that is distributed among different name servers. You can make changes to the information automatically filled into the table; however, note that changes in the selected transport type can change the port numbers that can be specified in the table. 5. To add an access rule for a protocol, port, or transport other than the ones available from the checkboxes on the left, click the Add button. An empty row is added to the table. • Specify a Name to identify the new access rule. For example, this could be the name of a particular application. • Select a transport type from the Transport column's pull-down menu. The available transports are: Transport ALL TCP Description This selection designates all of the protocols displayed in the table's pull-down menu, as described below. Transmission Control Protocol (TCP) is a set of rules used with Internet Protocol (IP) to send data as message units over the Internet. While IP handles the actual delivery of data, TCP keeps track of individual units of data called packets. Messages are divided into packets for efficient routing through the Internet.