What You Need To Know - ZyXEL Communications LTE3202-M430 User Manual

4g lte indoor router
Table of Contents

Advertisement

9.1.2 What You Need To Know

The following terms and concepts may help as you read through this chapter.
About the LTE3202-M430 Firewall
The LTE3202-M430's firewall feature physically separates the LAN and the WAN and acts as a secure
gateway for all data passing between the networks.
It is a stateful inspection firewall and is designed to protect against Denial of Service attacks when
activated (click the General tab under Firewall and then click the Enable Firewall check box). The
LTE3202-M430's purpose is to allow a private Local Area Network (LAN) to be securely connected to the
Internet. The LTE3202-M430 can be used to prevent theft, destruction and modification of data, as well
as log events, which may be important to the security of your network.
The LTE3202-M430 is installed between the LAN and a broadband modem connecting to the Internet.
This allows it to act as a secure gateway for all data passing between the Internet and the LAN.
The LTE3202-M430 has one Ethernet WAN port and four Ethernet LAN ports, which are used to physically
separate the network into two areas.The WAN (Wide Area Network) port attaches to the broadband
(cable or DSL) modem to the Internet.
The LAN (Local Area Network) port attaches to a network of computers, which needs security from the
outside world. These computers will have access to Internet services such as e-mail, FTP and the World
Wide Web. However, "inbound access" is not allowed (by default) unless the remote host is authorized to
use a specific service.
Guidelines For Enhancing Security With Your Firewall
Change the default password via Web Configurator.
1
Think about access control before you connect to the network in any way, including attaching a
2
modem to the port.
Limit who can access your router.
3
Don't enable any local service (such as NTP) that you don't use. Any enabled service could present a
4
potential security risk. A determined hacker might be able to find creative ways to misuse the enabled
services to access the firewall or the network.
For local services that are enabled, protect against misuse. Protect by configuring the services to
5
communicate only with specific peers, and protect by configuring rules to block packets for the services
at specific interfaces.
Protect against IP spoofing by making sure the firewall is active.
6
Keep the firewall in a secured (locked) room.
7
Chapter 9 Firewall
LTE3202-M430 User's Guide
65

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents