Applications - Siemens Gigaset Owner's Manual

Siemens gigaset 4-port router dsl/cable
Hide thumbs Also See for Gigaset:
Table of Contents

Advertisement

The Gigaset Router
DHCP for dynamic IP configuration, and DNS for domain name mapping
N
Firewall with Stateful Packet Inspection, client privileges, hacker prevention, DoS,
N
and NAT
NAT also enables multi-user access with a single-user account, and virtual server
N
functionality (providing protected access to Internet services such as web, mail, FTP,
and Telnet)
Virtual Private Network support using PPTP, L2TP, or IPSec pass-through
N
User-definable application sensing tunnel supports applications requiring multiple
N
connections
Parental controls allow the user to bar certain web sites
N
Email alerts when the user's network is being compromised
N
Easy setup through a web browser on any operating system that supports TCP/IP
N
Compatible with all popular Internet applications
N

Applications

Many advanced applications are provided by the Gigaset Router, such as:
LAN Access
N
The Gigaset Router provides connectivity to 10/100 Mbps devices, making it easy to
create a network in small offices or homes.
Internet Access
N
This device supports Internet access through a DSL or cable connection. Since many
DSL providers use PPPoE to establish communications with end users, the Gigaset
Router includes a built-in client for this protocol, eliminating the need to install this
service on your computer.
Shared IP Address
N
The Gigaset Router shares a single IP address with up to 253 users. Using only one
ISP account, multiple users on your network can simultaneously browse the Inter-
net.
Virtual Server
N
If you have a static IP address, you can set up the Gigaset Router to act as a virtual
host for network address translation. Remote users access various services at your
site using the static IP address. Then, depending on the requested service (or port
number), the Gigaset Router routes the request to the appropriate server (at an
internal network IP address). This secures your network from direct attack by hack-
ers, and provides more flexible management by allowing you to change internal net-
work IP addresses without affecting outside access to your network.
4

Advertisement

Table of Contents
loading

Table of Contents