Belkin F5D6231-4 Network Router User Manual


 
USING THE WEB-BASED ADVANCED USER INTERFACE
Configuring Internal Forwarding Settings
The Virtual Servers function will allow you to route external (Internet) calls for
services such as a web server (port 80), FTP server (Port 21), or other
applications through your Router to your internal network. Since your internal
computers are protected by a firewall, computers outside your network (over the
Internet) cannot get to them because they cannot be “seen”. A list of common
applications has been provided in case you need to configure the Virtual Server
function for a specific application. If your application is not listed, you will need
to contact the application vendor to find out which port settings you need.
Choosing an Application
Select your application from the drop-down list. Click “Add”. The settings will be
transferred to the next available space in the screen. Click “Apply Changes” to
save the setting for that application. To remove an application, select the
number of the row that you want to remove then click “Clear”.
Manually Entering Settings into the Virtual Server
To manually enter settings, enter the IP address in the space provided for the
internal (server) machine, the port(s) required to pass (use a comma between
multiple ports), select the port type (TCP or UDP), and click “Apply Changes”.
You can only pass one port per internal IP address. Opening ports in your
firewall can pose a security risk. You can enable and disable settings very
quickly. It is recommended that you disable the settings when you are not
using a specific application.
50
USING THE WEB-BASED ADVANCED USER INTERFACE
Configuring the Firewall
Your Router is equipped with a firewall that will protect your network from a
wide array of common hacker attacks including:
IP Spoofing
Land Attack
Ping of Death (PoD)
Denial of Service (DoS)
IP with zero length
•Smurf Attack
•TCP Null Scan
The firewall also masks common ports that are frequently used to attack
networks. These ports appear to be “Stealth” meaning that for all intents and
purposes, they do not exist to a would-be hacker. You can turn the firewall
function off if needed, however, it is recommended that you leave the firewall
enabled. Disabling the firewall protection will not leave your network
completely vulnerable to hacker attacks, but it is recommended that you leave
the firewall enabled.
•SYN flood
UDP flooding
•Tear Drop Attack
•ICMP defect
RIP defect
•Fragment flooding
51