Two Points To Remember About Trigger Ports; Nat Traversal; Cautions With Upnp; Vpn - ZyXEL Communications NR2301 User Manual

5g nr portable router
Table of Contents

Advertisement

9.16.5 Two Points To Remember About Trigger Ports

Trigger events only happen on data that is coming from inside the NR2301 and going to the outside.
1
If an application needs a continuous data stream, that port (range) will be tied up so that another
2
computer on the LAN cannot trigger it.

9.16.6 NAT Traversal

UPnP NAT traversal automates the process of allowing an application to operate through NAT. UPnP
network devices can automatically configure network addressing, announce their presence in the
network to other UPnP devices and enable exchange of simple product and service descriptions. NAT
traversal allows the following:
• Dynamic port mapping
• Learning public IP addresses
• Assigning lease times to mappings
Windows Messenger is an example of an application that supports NAT traversal and UPnP.

9.16.7 Cautions With UPnP

The automated nature of NAT traversal applications in establishing their own services and opening
firewall may present network security issues. Network information and configuration may also be
obtained and modified by users in some network environments.
When a UPnP device joins a network, it announces its presence with a multicast message. For security
reasons, the NR2301 allows multicast messages on the LAN only.
All UPnP-enabled devices may communicate freely with each other without additional configuration.
Disable UPnP if this is not your intention.

9.16.8 VPN

A virtual private network (VPN) provides secure communications between sites without the expense of
leased site-to-site lines. A secure VPN is a combination of tunneling, encryption, authentication, access
control and auditing. It is used to transport traffic over the Internet or any insecure network that uses
TCP/IP for communication.
Internet Protocol Security (IPSec) is a standards-based VPN that offers flexible solutions for secure data
communications across a public network like the Internet. IPSec is built around a number of
standardized cryptographic techniques to provide confidentiality, data integrity and authentication at
the IP layer.
The following figure provides one perspective of a VPN tunnel.
Chapter 9 Device Management
NR2301 User's Guide
100

Advertisement

Table of Contents
loading

Table of Contents