8-Port H323/SIP VoIP Gateway
8-Port H323/SIP VoIP Gateway 8-Port H323/SIP VoIP Gateway
4.2.8.4 Firewall Firewall Options Enable Hacker Attack Protect The hackers always try to break into you system or crack down your network. The gateway provides hacker attack protect modules to protect your home network. Discard PING from WAN side “Ping” is the most widely used tool to diagnose the network. Hackers use “ping” to discover your gateway firstly and try to hack your home network later. Discard “ping” from WAN side prevent the hacker from discovering your home network by using “ping”. Disallow to PING the Gateway Check this item not only prevent ping from the WAN side, but also prevent pinging the home gateway from the LAN side. The side effect is to increase the difficulty to diagnose your home network. Drop Port Scan Packets The most famous Internet hacking method is the port scan. “Port scan” 98
scans all the TCP/UDP port of a station to find out the opened ports. After confirmed, the hackers try to connect to the listened ports to attack your computer. Check this option, the home gateway will drop the port scan packets to protect your system. Allow to Scan Security Port (113) Some Linux email servers will try to detect the security TCP/UDP port (113). If you drop it, the Linux email servers will not allow you to log into. Allow it can solve such kind of problem. Discard NetBios Packets The NetBios protocol is widely used by the MS Windows Network Place, which should only be use in the home network and should not be used in the Internet environment. Strongly suggest you to check this item for security consideration. Accept Fragment Packets Accept packets that are fragmented. Send ICMP packets when error Send ICMP packets when the error happens in connection. Advance settings Click this button, the detail hacker attack patterns will appear to let you decide which one should be enabled. Figure 7-2 shows the hacker attack patterns to protect. 99
- Page 47 and 48: 4.2.2.9 VoIP Routing Profile Settin
- Page 49 and 50: Please remember to press the modify
- Page 51 and 52: f. No Answer Sec. Defined the wait
- Page 53 and 54: 1.4.2.11 VoIP Authorization Setting
- Page 55 and 56: 4.2.3.2 Setup the Register Server
- Page 57 and 58: q. Conference ID: Some SIP Server r
- Page 59 and 60: FXO: Analog phone interface for con
- Page 61 and 62: It will indicate the status of link
- Page 63 and 64: 4.2.5.2 Listen Port /VoIP Setup/Adv
- Page 65 and 66: Silence Detection / Suppression: En
- Page 67 and 68: 4.2.5.5 Flash & Call waiting /VoIP
- Page 69 and 70: 4.2.5.7 QoS /VoIP Setup/Advance Set
- Page 71 and 72: 4.2.5.9 FoIP /VoIP Setup/Advance Se
- Page 73 and 74: Prompt voice for replace dial tone:
- Page 75 and 76: 4.2.6.2 Telnet & SNMP /VoIP Setup/A
- Page 77 and 78: the most update information. Cable/
- Page 79 and 80: LAN MAC Address Short for Media Acc
- Page 81 and 82: 1.2.7.3 Date & Time This page is us
- Page 83 and 84: 1.2.7.5 System Log The system log p
- Page 85 and 86: 4.2.8 Route Function(/System Setup)
- Page 87 and 88: Subnet Mask Set the subnet mask of
- Page 89 and 90: dropped. D. DNS This page sets the
- Page 91 and 92: IP Pool Ending Address The ending a
- Page 93 and 94: 4.2.8.3 NAT Virtual Server This is
- Page 95 and 96: The Port Mapping page does a port r
- Page 97: DMZ Check this item to enable DMZ s
- Page 101 and 102: URL Filtering Enable URL Filter Che
- Page 103 and 104: 4.2.8.5 Routing Routing Table This
- Page 105 and 106: 4.2.8.6 UPnP Settings UPnP Enable U
- Page 107 and 108: 4.2.8.7 DDNS Enabled Check this ite
- Page 109 and 110: 4.2.9.2 VoIP Module /System Mainten
- Page 111: 4.2.10 Save Modification /Save Modi
scans all the TCP/UDP port of a station to find out the opened ports. After<br />
confirmed, the hackers try to connect to the listened ports to attack your<br />
computer. Check this option, the home gateway will drop the port scan<br />
packets to protect your system.<br />
Allow to Scan Security <strong>Port</strong> (113)<br />
Some Linux email servers will try to detect the security TCP/UDP port (113).<br />
If you drop it, the Linux email servers will not allow you to log into. Allow<br />
it can solve such kind of problem.<br />
Discard NetBios Packets<br />
The NetBios protocol is widely used by the MS Windows Network Place,<br />
which should only be use in the home network and should not be used in the<br />
Internet environment. Strongly suggest you to check this item for security<br />
consideration.<br />
Accept Fragment Packets<br />
Accept packets that are fragmented.<br />
Send ICMP packets when error<br />
Send ICMP packets when the error happens in connection.<br />
Advance settings<br />
Click this button, the detail hacker attack patterns will appear to let you<br />
decide which one should be enabled. Figure 7-2 shows the hacker attack<br />
patterns to protect.<br />
99