A SERVICE OF

logo

Step 8: Configure Subnet Access
1. Click in a cell of the table that represents the subnet-to-subnet (or subnet-to-WAN)
relationship to define. All access rules (if any are defined) appear in the table in the
lower-half of the screen.
2. Use the pulldown menu above the list Allow or Deny all the entries specified in the
exception table. You cannot allow some protocols (or ports) and deny others.
3. From the list of checkboxes on the left side, select those protocols to allow or deny. The
protocols are automatically added to the table with the relevant Name, Transport, Start
Port, and End Port information. The available protocols are:
Protocol Transport,
Port Used
Description
HTTP
TCP, 80 Hypertext Transfer Protocol (HTTP) is the protocol for
transferring files on the World Wide Web. HTTP is an
application protocol that runs on top of the TCP/IP suite
of protocols, the foundation protocols for the Internet.
TELNET
TCP, 23 TELNET is the terminal emulation protocol of TCP/IP.
TELNET uses TCP to achieve a virtual connection
between server and client, then negotiates options on
both sides of the connection.
FTP
TCP, 21 File Transfer Protocol (FTP) is an application protocol
that uses the Internet’s TCP/IP protocols. FTP provides
a simple and efficient way to exchange files between
computers on the Internet.
SMTP
TCP, 25 Simple Mail Transfer Protocol (SMTP) is a TCP/IP
protocol used for sending and receiving email. Due to
its limited ability to queue messages at the receiving
end, SMTP is often used with POP3 or IMAP. SMTP
sends the email, and then POP3 or IMAP receives the
email.
POP
TCP, 109:110 Post Office Protocol (POP3) is a TCP/IP protocol
intended to permit a workstation to dynamically access
a maildrop on a server host. A workstation uses POP3
to retrieve email that the server is holding for it.
DNS
TCP+UDP, 53 Domain Name Service (DNS) protocol searches for
resources using a database that is distributed among
different name servers.
You can make changes to the information automatically filled into the table;
however, note that changes in the selected transport type can change the port
numbers that can be specified in the table.
4. To add an access rule for a protocol, port, or transport other than the ones available
from the checkboxes on the left, click the Add button. An empty row is added to the
table.
Specify a Name to identify the new access rule. This could be the name of a
particular application, for example.
Copyright © 2004 Symbol Technologies, Inc. All Rights Reserved 41
WS 2000 Wireless Switch: 1.0 Date of last Revision: March 2004