Bittorrent Security - ZyXEL Communications NSA-220 Plus User Manual

Network storage appliance
Hide thumbs Also See for NSA-220 Plus:
Table of Contents

Advertisement

Chapter 7 Applications
Table 32 Applications > Download Service > Task Info
LABEL
Priority
Comment
Start Time
Completed on
Info-Hash
Tracker
Close

7.4.9 BitTorrent Security

When you download using BitTorrent, you reveal your IP address. This increases
the risk of hacking attacks, which can be protected against by a good firewall.
Use a Hardware-based Firewall
Place a hardware-based firewall between your network and the Internet (a
software-based firewall on your computer would just protect the computer itself,
not the NSA since your computer is not between your NSA and the Internet).
Ideally your firewall should have all of the following.
Figure 39 Firewall
• Stateful packet inspection to control access between the Internet and your
network and protect your NSA (and computers) from hacking attacks.
150
DESCRIPTION
Use this field to set the priority for downloading the task.
Select Auto to have the NSA automatically determine the
download task's priority.
Select High to have the NSA download this file before the other
files.
Enter a description for this download task.
This field displays when the NSA started to download files.
This field displays when the file was successfully downloaded to
the NSA.
This information is used to verify the torrent file.
This field displays the tracker that NSA is currently connected to.
A tracker is a server used for finding peers sharing the file.
Click this to close the screen.
Hacking
Malicious
Packets
Viruses
NSA-220 Plus User's Guide

Advertisement

Table of Contents
loading

Table of Contents