Port triggering, Wireless security, Dmz port triggering wireless security – Motorola SBG900 User Manual

Page 19

Advertising
background image

13

SBG900 User Guide

Home

X

Exit

Print

Overview Installation Troubleshooting

Contact

FAQ

Specifications Glossary License

Configuration: Basic Gateway TCP/IP Wireless USB

DMZ

A de-militarized zone (

DMZ

) is one or more computers logically located outside the firewall between an SBG900

LAN and the Internet. A DMZ prevents direct access by outside users to private data.

For example, you can set up a web server

on a DMZ computer to enable outside users to access your website

without exposing confidential data on your network.

A DMZ can also be useful to play interactive games that may have a problem running through a firewall. You can
leave a computer used for gaming

only

exposed to the Internet while protecting the rest of your network. For more

information, see

Gaming Configuration Guidelines

.

Port Triggering

When you run a PC application that accesses the Internet, it typically initiates communications with a computer on
the Internet. In some applications, especially gaming, the computer on the Internet also initiates communications
with your PC. Because NAT does not normally allow these incoming connections to occur, the SBG900 supports
port triggering.

The SBG900 is preconfigured with port triggering for common applications. You can also configure additional port
triggers if needed on the

Gateway > PORT TRIGGERS — custom Page

.

Wireless Security

Because wireless LAN signals are transmitted using radio signals, it may be possible for your neighbor or
someone else you do not want accessing your wireless LAN. You need to limit access to only the intended
persons. To prevent unauthorized eavesdropping of data transmitted over the wireless LAN, you must enable
wireless security.

The default SBG900 settings provide no security for transmitted data.

The SBG900 enables you to use the following wireless security measures:

Restrict access to computers having the same unique network name as the SBG900

Encrypt data transmitted over the wireless interface by configuring a Wired Equivalency Privacy (WEP) key
on the SBG900 and wireless LAN clients (stations)

Define a MAC access control list to restrict wireless LAN access to clients based on the MAC address.

If you disable ESSID broadcasting to enable closed network operation, the SBG900 does not transmit the network
name (ESSID). This provides additional protection because only wireless stations configured with your network
name can communicate with the SBG900. Closed network operation is an enhancement of the IEEE 802.11b
standard.

For information about configuring a wireless security, see

Setting Up the Wireless LAN

”.

Advertising