Trademarks - Siemens Gigaset Owner's Manual

Siemens gigaset 4-port router dsl/cable
Hide thumbs Also See for Gigaset:
Table of Contents

Advertisement

User-Definable Application Sensing Tunnel
N
You may define special applications that require multiple connections such as Inter-
net gaming, video conferencing, and Internet telephony. The Gigaset Router will
then sense the application type and open a multi-port tunnel for it.
DMZ Hosts Support
N
Allows a networked computer to be fully exposed to the Internet. This function is
used when the special application sensing tunnel feature is insufficient to allow an
application to function correctly.
Security
N
The Gigaset Router supports security features that deny Internet access to specified
users, or drop requests for specific services. The Gigaset Router's firewall also blocks
common hacker attacks.
Virtual Private Network
N
The Gigaset Router supports three of the most commonly used VPN protocols –
PPTP, L2TP, and IPSec. These protocols allow remote users to establish a secure con-
nection to their corporate network. If your service provider supports VPNs, then any
of these protocols can be used to create an authenticated and encrypted tunnel for
passing secure data over the Internet (i.e., a traditionally shared data network). The
VPN protocols supported by the Gigaset Router are briefly described below.
– Point-to-Point Tunneling Protocol – Provides a secure tunnel for remote client
access to a PPTP security gateway. PPTP includes provisions for call origination
and flow control required by ISPs.
– Layer Two Tunneling Protocol – Includes most of the features provided by PPTP,
but has less overhead and is more suited for managed networks.
– IP Security – Provides IP network-layer encryption. IPSec can support large
encryption networks (such as the Internet) by using digital certificates for device
authentication.

Trademarks

All product and company names are trademarks or registered trademarks of their
respective holders.
The Gigaset Router
5

Advertisement

Table of Contents
loading

Table of Contents