Motorola WS2000 - Wireless Switch - Network Management Device System Reference Manual page 44

Wireless switch
Hide thumbs Also See for WS2000 - Wireless Switch - Network Management Device:
Table of Contents

Advertisement

3-8 WS2000 Wireless Switch System Reference Guide
3. Enable or disable logging of firewall access by using the Enable logging check box. When enabled, a log
entry is created every time a packet is denied by the action "Deny". A log entry is created once per
session for packets that match the firewall rules when the action is "Allow".
4. From the list of checkboxes on the left side, select those protocols to allow or deny. The protocols are
automatically added to the table with the relevant Name, Transport, Start Port, and End Port information.
The available protocols are shown in the table below.
Protocol
Transport,
Port Used
HTTP
TCP, 80
TELNET
TCP, 23
FTP
TCP, 21
SMTP
TCP, 25
POP
TCP, 109:110
DNS
TCP+UDP, 53
You can make changes to the information automatically filled into the table; however, note that
changes in the selected transport type can change the port numbers that can be specified in the
table.
5. To add an access rule for a protocol, port, or transport other than the ones available from the checkboxes
on the left, click the
• Specify a
application.
• Select a transport type from the
Transport
ALL
TCP
Description
Hypertext Transfer Protocol (HTTP) is the protocol for transferring files on the World
Wide Web. HTTP is an application protocol that runs on top of the TCP/IP suite of
protocols, the foundation protocols for the Internet.
TELNET is the terminal emulation protocol of TCP/IP. TELNET uses TCP to achieve a
virtual connection between server and client, then negotiates options on both sides of
the connection.
File Transfer Protocol (FTP) is an application protocol that uses the Internet's TCP/IP
protocols. FTP provides a simple and efficient way to exchange files between
computers on the Internet.
Simple Mail Transfer Protocol (SMTP) is a TCP/IP protocol used for sending and
receiving email. Due to its limited ability to queue messages at the receiving end,
SMTP is often used with POP3 or IMAP. SMTP sends the email, and then POP3 or IMAP
receives the email.
Post Office Protocol (POP3) is a TCP/IP protocol intended to permit a workstation to
dynamically access a maildrop on a server host. A workstation uses POP3 to retrieve
email that the server is holding for it.
Domain Name Service (DNS) protocol searches for resources using a database that is
distributed among different name servers.
Add
button. An empty row is added to the table.
Name
to identify the new access rule. For example, this could be the name of a particular
Transport
Description
This selection designates all of the protocols displayed in the table's pull-down menu, as described
below.
Transmission Control Protocol (TCP) is a set of rules used with Internet Protocol (IP) to send data as
message units over the Internet. While IP handles the actual delivery of data, TCP keeps track of
individual units of data called packets. Messages are divided into packets for efficient routing
through the Internet.
column's pull-down menu. The available transports are:

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents