Download Print this page

SMC Networks SMC7004WFW Configuration Manual page 59

Vpn ipsec & pptp configuration guide
Hide thumbs Also See for SMC7004WFW:

Advertisement

FTP) to a public address. This secures your network from direct attack by hackers, and
provides more flexible management by allowing you to change internal IP addresses
without affecting outside access to your network. NAT must be enabled to provide multi-
user access to the Internet or to use the Virtual Server function.
PPPoE
(Point-to-Point Protocol over Ethernet) Point-to-Point Protocol is a method of secure data
transmission originally created for dial-up connections. PPPoE is for Ethernet
connections.
PPTP
(Point-to-Point Tunneling Protocol) It provides a means for tunneling IP traffic in Layer 2.
For instance, it allows you to establish a connection to a corporate network and share
files or other data as if your machine were actually on that local network.
Router
In communications, a device that examines the destination address of a message and
selects the most effective route. A router receives physical layer signals from a network,
performs data link and network layer protocol processing, then sends the signals via an
appropriate data link and physical layer protocols to another network.
SHA1
The Secure Hash Algorithm is a cryptographic message digest algorithm used to create
digital signatures. It is slower than MD5, but more secure.
SNMP
Format used for network management data. Data is passed between SNMP agents
(processes that monitor activity in hubs, switches, etc.) and the workstation used to
oversee the network. SNMP uses Management Information Bases (MIBs), which are
databases that define what information is obtainable from a networked device and what
can be controlled (turned off, on, etc.).
SPI
Stateful Packet Inspection ensures that the data coming into your network was
requested by an end node computer on your LAN. The Barricade Plus examines the
incoming data and compares it to a database of trusted information. As traffic leaves the
network it is defined by certain characteristics. Incoming information is then compared to
these sets of characteristics. If the incoming data matches the predefined set of
characteristics the incoming traffic is allowed. If no match is found the incoming traffic is
discarded.

Advertisement

loading