Download the latest version of the DNS2Go Client from:
|
|
- Shanna Page
- 6 years ago
- Views:
Transcription
1 Using DNS2Go with your Linksys Cable / DSL Router Many users with Cable and xdsl broadband connections are using hardware routers such as the Linksys Cable/DSL Routers to connect their local area network to the Internet. This tutorial explains basic configuration for your Linksys router with DNS2Go, and setting the router to run a mail and web server on your local area network. DNS2Go works great behind the Linksys Router, or any other hardware or software router (i.e. WinRoute Firewall.) The router WAN (Wide Area Network - or Internet) IP address is typically the only usable address on the router, and this is the IP address that gets published in the DNS2Go Dynamic DNS system. The WAN IP is also referred to as the Public Facing IP Address. Since this WAN IP is the incoming IP Address of the router, the router's PORTS need to be configured if you want to run a server. The router acts as a sort of firewall or NAT (Network Address Translator) and offers basic port filtering for security purposes. This port filtering also prevents you from running a web server, server, or any other server. DNS2Go Client Installation This tutorial assumes you will be running the DNS2Go Client Software on one of the PC's behind the Linksys router, basically any PC on the local area network that is connected to the router will work. Download the latest version of the DNS2Go Client from: Sign-up for a New DNS2Go domain or Transfer an existing Top Level Domain to the DNS2Go service. Once the DNS2Go Client software is downloaded and installed you will need to perform two initial tasks: Port 1227 will need to be opened in the router. The DNS2Go Client software communicates with our DNS2Go Servers using port 1227 for both UDP and TCP. (see Port Range Forwarding below) Enter your Domain Name and Registration Key into the DNS2Go Client Registration Tab.
2 With the DNS2Go Client running and connected to the DNS2Go Servers, the DNS2Go Client should show the IP address of the WAN port of the router. This is your Public Facing IP Address. The DNS2Go Rocket should appear in flight and indicate it is Connected to the DNS2Go Service.
3 Running Servers (Web, SMTP, FTP) on your Local Area Network (LAN) We assume that you have the DNS2Go Client software running, connected to the DNS2Go Server and displaying the correct Public Facing IP Address, and you have a web server, FTP server and or server set up for your domain. Important: DNS2Go is NOT nor does it provide Web Server, FTP Server or Mail Server functionality. DNS2Go merely provides you the ability to run such servers on a dynamic (changing) IP address by associating your current IP address with your static domain name. The Main Setup Screen of the Linksys Cable/DSL BEFSR41 Router shows the Hostname, Firmware version and more. When you set the Linksys router up, you need to configure the WAN and LAN settings under the Linksys SETUP Screen. Once you get the router up and running DHCP will need to be configured properly. To use servers on your LAN behind the Linksys router, and host your own WWW and FTP servers on the Internet, you should use static IP's on your LAN. Please consult the Linksys User Guide for instructions on Initial Router Setup and how to configure DHCP. If using DHCP you should set the server to an IP address outside of the DHCP range. Since the screenshot below shows the starting DHCP range at , and 50 users, that means that we can set a static IP on our server to and not have a problem or IP conflict. Some routers work fine with DHCP and port forwarding, and some do not. It all depends on the router and the firmware version. If you have problems with port forwarding and DHCP, set the server to a static LAN IP and that should fix the problem.
4 Port Range Forwarding To run Servers behind your router you need to know the Incoming PORT(s) of the desired service, and once you have the port(s), you can set the port as shown in the example below for Passive FTP (Port 20-21) and Web (port 80) as well as SMTP (25). Once you decide what PC is going to run the web, ftp, or server, you need to forward the proper port to the proper Internal IP address of the server. For example: - We have 1 PC on the internal network; the server is set at We also have another PC, that has a Web, FTP and Mail Server that has the LAN IP Address of , so in the example below, we set SERVICE PORT 80 to IP ADDRESS We have a FTP and SMTP Mail Server as well, so these ports (20-21 and 25) are also set to After you configure the ports to the proper IP Address, then click the apply button. This sets the router to forward the proper ports to your servers. To add other applications, you need to know the Service Port(s) and then you need to set the server up on your LAN and set the proper IP address. For more information on the Linksys cable and DSL router, please see the Linksys website at
5 Common Service Ports 20 - FTP data 21 - FTP 22 - SSH 23 - Telnet 25 - SMTP 43 - whois 53 - DNS 68 - DHCP 80 - HTTP POP SFTP NNTP NTP NetBIOS-ns NetBIOS-dgm NetBIOS IMAP SNMP IRC LDAP SSL SMB Doom SIMAP Ports between 1024 and are known as the Registered Ports. Basically, programs are supposed to register their use of these ports and thereby try to be careful and avoid stomping on each other. Here are some common ports and their programs DNS2Go Client Lotus Notes Microsoft SQL Server Citrix ICA Protocol Oracle SQL Citrix ICA / Microsoft Terminal Server NFS (Network File System) mysql ICQ Yahoo! Messenger AOL Instant Messenger PCAnywhere VNC VNC X Windowing System Napster RealServer / QuickTime Unreal HTTP Quake Half-Life Quake III VisNetic MailServer Control DNS2Go Support Additional DNS2Go Support Options and Material is available at:
TCP, UDP Ports, and ICMP Message Types1
Appendix A APPENDIX A TCP, UDP Ports, and ICMP Message Types1 I list useful TCP, UDP ports, and ICMP message types in this appendix. A comprehensive list of registered TCP and UDP services may be found
More informationAddresses, Protocols, and Ports Reference
APPENDIXA Addresses, Protocols, and Ports Reference This appendix provides a quick reference for the following topics: IP Addresses and Subnet Masks Protocols and Applications TCP and UDP Ports ICMP Types
More information1 of 5 5/19/05 9:48 AM
1 of 5 5/19/05 9:48 AM "Well Known" TCP and UDP Ports Used By Apple Software Products This document lists TCP and UDP ports used by Apple software products, such as Mac OS 9, Mac OS X, Mac OS X Server,
More informationNetwork-Based Application Recognition
Network-Based Application Recognition Last updated: September 2008 Common questions and answers regarding Cisco Network-Based Application Recognition (NBAR) follow. Q. What is NBAR? A. NBAR, an important
More informationSupported services. 21/tcp FTP File transfer. 22/tcp SSH Secure shell. 23/tcp Telnet Terminal access. 37/tcp Time Time. 80/tcp HTTP WWW pages
Supported services For security reasons stricter rules are applied to networks engaged in the eduroam project. The eduroam network is connected to Internet via Cisco PIX firewall. Everything that is not
More informationAddresses, Protocols, and Ports
APPENDIXB This appendix provides a quick reference for IP addresses, protocols, and applications. This appendix includes the following sections: IPv4 Addresses and Subnet Masks, page B-1 IPv6 Addresses,
More informationFirewall Simulation COMP620
Firewall Simulation COMP620 Firewall Simulation The simulation allows participants to configure their own simulated firewalls using Cisco-like syntax. Participants can take benign or malicious actions
More informationThe Administration Tab - Diagnostics
The Administration Tab - Diagnostics The diagnostic tests (Ping and Traceroute) allow you to check the connections of your network components. Ping Test. The Ping test will check the status of a connection.
More informationAddresses, Protocols, and Ports
This chapter provides a quick reference for IP addresses, protocols, and applications. IPv4 Addresses and Subnet Masks, page 1 IPv6 Addresses, page 5 Protocols and Applications, page 11 and Ports, page
More informationA+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e Chapter 8 Networking Essentials Objectives Learn about the protocols and standards Windows uses for networking Learn how to connect
More informationEdgeMarc 250W Network Services Gateway
EdgeMarc 250W Network Services Gateway Quick Start Guide Version 1.0 Page 1 of 7 200-250EW-001 Before You Start Please read this guide thoroughly as it describes the basic installation of the device. Refer
More informationIntroduction to Networking
Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI
More informationLegal and notice information
Legal and notice information Copyright 2017 Trend Micro Incorporated. All rights reserved. TippingPoint, the TippingPoint logo, and Digital Vaccine are trademarks or registered trademarks of Trend Micro
More informationRouters use access lists to control incoming or outgoing traffic. You should know the following characteristics of an access list.
8.1. Access List Routers use access lists to control incoming or outgoing traffic. You should know the following characteristics of an access list. Access lists describe the traffic type that will be controlled.
More informationHow to open ports in the DSL router firmware version 2.xx and above
How to open ports in the DSL router firmware version 2.xx and above This example shows how to open port 3389 (which is used by Remote Desktop service) in the DSL router running firmware version 2.xx or
More informationHP ArcSight Port and Protocol Information
Important Notice HP ArcSight Port and Protocol Information The information (data) contained on all sheets of this document constitutes confidential information of Hewlett- Packard Company or its affiliates
More informationAdvanced Security and Forensic Computing
Advanced Security and Forensic Computing Unit 2: Network Security Elements Dr Dr Bill Buchanan, Reader, School of of Computing. >Unit 2: 2: Network Security Elements Advanced Security and Forensic Computing
More information200AE1 Network Services Gateway
200AE1 Network Services Gateway Quick Start Guide Version 1.0 Before You Start Please read this guide thoroughly as it describes the basic installation of the device. Refer to online help for assistance
More informationDefault Application Policies
APPENDIXA The WAAS software includes more than 150 default application policies that help your WAAS system classify and optimize some of the most common traffic on your network. lists the default applications
More informationI m InTouch Installation Guide for the DSL/Cable environment with a Linksys router Models: BEFSRU31, BEFSR41 V.2, BEFSR11
I m InTouch router configuration p. 1 I m InTouch Installation Guide for the DSL/Cable environment with a Linksys router Models: BEFSRU31, BEFSR41 V.2, BEFSR11 Note: Different models may vary slightly
More informationSecure Router 1001,1001S, 1002, 1004, and 3120
Secure Router 1001,1001S, 1002, 1004, and 3120 Software Release 9.2.5 Readme Notes 1. Release Summary Release Date: 21-September-2007 Purpose: Software maintenance release to address customer found software
More informationStatic Application Mapping Using Performance Routing
Static Application Mapping Using Performance Routing The OER - Application Aware Routing with Static Application Mapping feature introduces the ability to configure standard applications using just one
More informationInternet Load Balancing Guide. Peplink Balance Series. Peplink Balance. Internet Load Balancing Solution Guide
Peplink Balance Internet Load Balancing Solution Guide http://www.peplink.com Copyright 2010 Peplink Internet Load Balancing Instant Improvement to Your Network Introduction Introduction Understanding
More informationWindows XP Remote Control Explained
Windows XP Remote Control Explained last modified 11/30/2001 Jason Simotas www.rethinkit.com Windows XP offers two built-in options for remote control operations allowing you to view (and control) another
More informationIntroduction to TCP/IP
Introduction to TCP/IP Properties and characteristics of TCP/IP IPv4 IPv6 Public vs private vs APIPA/link local Static vs dynamic Client-side DNS settings Client-side DHCP Subnet mask vs CIDR Gateway TCP/IP
More information4. The transport layer
4.1 The port number One of the most important information contained in the header of a segment are the destination and the source port numbers. The port numbers are necessary to identify the application
More informationBest Practice - Allow Aerohive Access Points Behind a CloudGen Firewall Access to Hive Manager NG
Best Practice - Allow Aerohive Access Points Behind a CloudGen Firewall Access to Hive Manager NG Aerohive devices running HiveOS such as Aerohive Access Points must be able to communicate with either
More informationTCP/IP Filtering. Main TCP/IP Filtering Dialog Box. Route Filters Button. Packet Filters Button CHAPTER
CHAPTER 11 Main Dialog Box To access this dialog box (Figure 11-1), select Global/Filtering/ from the Device View. Figure 11-1 Main Configuration Dialog Box Route Filters Button This button brings up a
More informationRX3041. User's Manual
RX3041 User's Manual Table of Contents 1 Introduction... 2 1.1 Features and Benefits... 3 1.2 Package Contents... 3 1.3 Finding Your Way Around... 4 1.4 System Requirements... 6 1.5 Installation Instruction...
More information4-Port Broadband user manual Model
4-Port Broadband Router user manual Model 524537 INT-524537-UM-0309-02 introduction Thank you for purchasing the INTELLINET NETWORK SOLUTIONS 4-Port Broadband Router, Model 524537. Combining a router,
More informationGlobal Information Assurance Certification Paper
Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without
More informationThe Applications and Gaming Tab - Port Range Forward
The Applications and Gaming Tab - Port Range Forward The Applications and Gaming Tab allows you to set up public services on your network, such as web servers, ftp servers, e-mail servers, or other specialized
More informationHands-On Activity. Firewall Simulation. Simulated Network. Firewall Simulation 3/19/2010. On Friday, February 26, we will be meeting in
Hands-On Activity Firewall Simulation COMP620 On Friday, February 26, we will be meeting in the Graham 212 lab to participate in a firewall configuration simulation. This simulator was written by Dr. Williams
More informationManual Ftp Windows Server 2008 Firewall Port Forward
Manual Ftp Windows Server 2008 Firewall Port Forward SMB/CIFS, FTP and WebDAV access is available allowing the use of existing client software to access the Alfresco data store. This allows you to browse
More informationSection 1.1: Networking Overview
Section 1.1: Networking Overview This section provides an introduction to networking. Students will become familiar with the following aspects of a network: Components of a network o Computers o Transmission
More informationAssignment - 1 Chap. 1 Wired LAN s
Assignment - 1 Chap. 1 Wired LAN s 1. (1 Mark) 1. Draw the frame format of Ethernet. 2. What is unicast, multicast and broadcast address? 3. State the purpose of CRC field. 2. (5 Marks) 1. Explain how
More informationChapter 14: Introduction to Networking
Chapter 14: Introduction to Networking Complete CompTIA A+ Guide to PCs, 6e How different networks are wired (or wireless) How to identify common network cables How Ethernet works About the OSI and TCP/IP
More informationSETUP FOR OUTLOOK (Updated October, 2018)
EMAIL SETUP FOR OUTLOOK (Updated October, 2018) This tutorial will show you how to set up your email in Outlook using IMAP or POP. It also explains how to configure Outlook for MAC. Click on your version
More informationTechnical Support Information
Technical Support Information Broadband Module/Broadband Module Plus Configuration Guidance Setting up Remote Access to a Network Device (Mail/File Server/Camera Etc) connected to the LAN port of the Broadband
More informationApplication Layer: OSI and TCP/IP Models
Application Layer Application Layer: OSI and TCP/IP Models The communication process between two communicating nodes is actually a communication process between two applications on these devices. Service
More informationNubo on premise POC requirements for VMWare ESXi
for VMWare ESXi Version 1 Date October, 2015 page 1 Table of Contents 1. About this document 2. Nubo POC Architecture Diagram 3. Hardware Requirements 4. Software Requirements 5. Network & Settings Requirements
More informationScanning. Course Learning Outcomes for Unit III. Reading Assignment. Unit Lesson UNIT III STUDY GUIDE
UNIT III STUDY GUIDE Course Learning Outcomes for Unit III Upon completion of this unit, students should be able to: 1. Recall the terms port scanning, network scanning, and vulnerability scanning. 2.
More informationTCP/IP Fundamentals. Introduction. Practice Practice : Name. Date Period
Name Date Period TCP/IP Fundamentals Introduction For the Network+ Certification exam, you should be able to identify the class of an IP address, an APIPA IP address, and a private IP address as well as
More informationContents. Cable/DSL Firewall Router
Contents Default Settings & Facts... 3 NetComm Cable/DSL Firewall Router Quick Start... 4 One page setup for Telstra Bigpond Cable... 4 One page setup for Optus Cable... 5 One page setup for most ADSL
More informationBCM50 Rls 6.0. Router - IP Firewall. Task Based Guide
BCM50 Rls 6.0 Router - IP Firewall Task Based Guide Copyright 2010 Avaya Inc. All Rights Reserved. Notices While reasonable efforts have been made to ensure that the information in this document is complete
More informationEdgeMarc 4552 Networking Gateway
EdgeMarc 4552 Networking Gateway Quick Start Guide Version 1.0 Page 1 of 7 201-4552-001 Before You Start Please read this guide thoroughly as it describes the basic installation of the device. Additional
More informationTRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016
TRANSMISSION CONTROL PROTOCOL ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016 ETI 2506 - TELECOMMUNICATION SYLLABUS Principles of Telecom (IP Telephony and IP TV) - Key Issues to remember 1.
More informationQuick Network Setup Guide
PWR PWR HDD HDD USB USB Quick Network Setup Guide Use Router to Connect to Network By using a router, you can connect your computer and 1-3 DVRs to the Internet through sharing by using a XDSL or cable
More informationLKR Port Broadband Router. User's Manual. Revision C
LKR-604 4-Port Broadband Router User's Manual Revision C 1 Contents 1 Introduction... 4 1.1 Features... 4 1.2 Package Contents... 4 1.3 Finding Your Way Around... 5 1.3.1 Front Panel... 5 1.3.2 Rear Panel
More informationGeneral Terms Node - File Permissions - file permissions file
CIS 375 General Terms Node - A networked computing device that takes a protocol address andcan initiate and respond to communication from other networked devices that employ similar protocols. File Permissions
More information4562 Converged Networking Router
4562 Converged Networking Router Quick Start Guide Version 1.0 Page 1 of 7 200-4562-001 Before You Start Please read this guide thoroughly as it describes the basic installation of the device. Additional
More informationBroadband Router User s Manual. Broadband Router User s Manual
Broadband Router User s Manual Table of Contents 1 Introduction... 1 1.1 Features... 1 1.2 Package Contents... 2 1.3 LEDs & Connectors of Broadband Router... 2 1.4 System Requirements... 2 1.5 Installation
More informationDebian/GNU Linux Networking
Debian/GNU Linux Networking Basics of the Networking Károly Erdei October 15, 2014 Károly Erdei Debian/GNU Linux Networking 1/41 Agenda 1 Networks 2 Ethernet 3 Internet Protocol 4 TCP 5 DHCP 6 Check Network
More informationConnecting From Anywhere. without iteleport Connect
Connecting From Anywhere without iteleport Connect Who should use this information Ideally, you should use iteleport Connect to set up access from anywhere. However, you might not be able to use that if:
More informationThe StrideLinx Remote Access Solution comprises the StrideLinx router, web-based platform, and VPN client.
Introduction: Intended Audience The StrideLinx Remote Access Solution is designed to offer safe and secure remote access to industrial equipment worldwide for efficient remote troubleshooting, programming
More informationStep-by-Step Configuration
Step-by-Step Configuration Kerio Technologies C 2001-2004 Kerio Technologies. All Rights Reserved. Printing Date: April 25, 2004 This guide provides detailed description on configuration of the local network
More informationStep-by-Step Configuration
Step-by-Step Configuration Kerio Technologies C 2001-2006 Kerio Technologies. All Rights Reserved. Printing Date: May 3, 2006 This guide provides detailed description on configuration of the local network
More informationUser Manual of RCS1~AP10
User Manual of RCS1~AP10 This manual is subject to tell users how to use this CAPWAP Broad Band Router with WLAN Controller and PoE Switch function, suit for those familiar with basic networking knowledge
More informationINTERNET SECURITY ROUTER FAQ
1 Introduction Release date: 5/4/2004 This document contains the frequently asked questions (FAQ) for SL-series Internet Security Router including SL- 1000, SL-500 and possibly the future SL- models. 2
More informationAdvanced Security and Mobile Networks
WJ Buchanan. ASMN (1) Advanced Security and Mobile Networks Unit 1: Network Security Application Presentation Session Transport Network Data Link Physical OSI Application Transport Internet Internet model
More informationVII. Corente Services SSL Client
VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...
More informationROYAL INSTITUTE OF INFORMATION & MANAGEMENT
ROYAL INSTITUTE OF INFORMATION & MANAGEMENT BASICS NETWORKING CHAPTER 1 Networking Basics to Networking Advantages of Networking Types of Network 1 Local Area Network (LAN) LAN features Basic LAN components
More informationVG422R. User s Manual. Rev , 5
VG422R User s Manual Rev 1.0 2003, 5 CONGRATULATIONS ON YOUR PURCHASE OF VG422R... 1 THIS PACKAGE CONTAINS... 1 CONFIRM THAT YOU MEET INSTALLATION REQUIREMENTS... 1 1. INSTALLATION GUIDE... 2 1.1. HARDWARE
More informationCCNA DISCOVERY V4.0 WORKING AT A SMALL-TO-MEDIUM BUSINESS OR ISP INSTRUCTOR REFERENCE GUIDE. Prepared by Cisco Learning Institute
CCNA DISCOVERY V4.0 WORKING AT A SMALL-TO-MEDIUM BUSINESS OR ISP COMPARISON OF NEW CURRICULA WITH EXISTING CURRICULA Prepared by Cisco Learning Institute June 25, 2007 Working for a Small-to-Medium Business
More informationHTG XROADS NETWORKS. Network Appliance How To Guide: EdgeBPR (Shaping) How To Guide
HTG X XROADS NETWORKS Network Appliance How To Guide: EdgeBPR (Shaping) How To Guide V 3. 8 E D G E N E T W O R K A P P L I A N C E How To Guide EdgeBPR XRoads Networks 17165 Von Karman Suite 112 888-9-XROADS
More informationGeneral Important Protocols for Examination of IA Examination 2018
Protocol General Important Protocols for Examination of IA Examination 2018 DNS - Domain Name System - translates network address (such as IP addresses) into terms understood by humans (such as Domain
More informationCCProxy. User Manual
CCProxy Proxy Server for Win98/NT/2000/XP/2003/Vista/2008 www.youngzsoft.net User Manual 2009.01 1 Content 1 Content...1 2 Introduction...3 3 Main Features...4 4 Installation...5 4.1 Step 1 - LAN networks
More informationStep-by-Step Configuration
Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Release Date: March 16, 2007 This guide provides detailed description on configuration of the local network which
More informationNessus Scan Report. Hosts Summary (Executive) Hosts Summary (Executive) Mon, 15 May :27:44 EDT
Nessus Scan Report Mon, 15 May 2017 15:27:44 EDT Table Of Contents Hosts Summary (Executive) 192.168.168.134 Hosts Summary (Executive) [-] Collapse All [+] Expand All 192.168.168.134 Summary Critical High
More informationChapter 8. Network Troubleshooting. Part II
Chapter 8 Network Troubleshooting Part II CCNA4-1 Chapter 8-2 Network Troubleshooting Review of WAN Communications CCNA4-2 Chapter 8-2 WAN Communications Function at the lower three layers of the OSI model.
More informationOER uses the following default value if this command is not configured or if the no form of this command is entered: timer: 300
holddown holddown To configure the Optimized Edge Routing (OER) prefix route dampening timer to set the minimum period of time that a new exit must be used before an alternate exit can be selected, use
More informationKey Features DATA SHEETS. Application centric analysis software delivering answers for application performance problems.
DATA SHEETS Unpublished ClearSight Analyzer The award winning ClearSight Analyzer (CSA) offers advanced application centric monitoring and performance analysis, enabling enterprise Network Administrators
More informationSoHo 401 VPN. Shared Broadband Internet Access VPN Gateway 3-Port Switching Hub, DMZ Port. Quick Install Guide
SoHo 401 VPN Shared Broadband Internet Access VPN Gateway 3-Port Switching Hub, DMZ Port Quick Install Guide i This guide covers only the most common situations. Please refer to the full User Manual on
More informationProtocol Filters APPENDIX
APPENDIX B The tables in this appendix list some of the protocols that you can filter on the access point. The tables include: Table A-1, Ethertype s Table A-2, IP s Table A-3, IP Port s In each table,
More informationConfiguration examples for the D-Link NetDefend Firewall series
Configuration examples for the D-Link NetDefend Firewall series Scenario: How to configure VLAN Platform Compatibility: All NetDefend Firewall Series Last update: 2008-03-10 Overview In this document,
More informationPort Utilization in Unified CVP
Utilization in Unified CVP Utilization Table Columns, page 1 Unified CVP Utilization, page 2 Utilization Table Columns The columns in the port utilization tables in this document describe the following:
More informationE&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang
E&CE 358: Tutorial 1 Instructor: Sherman (Xuemin) Shen TA: Miao Wang Email: m59wang@uwaterloo.ca 1 About Tutorials TA: Miao Wang Office: EIT 3133; Tutorials: Th 4:30 5:20 pm Topics Supplementary knowledge
More informationMulti-site Configuration and Installation Guide Port Forwarding Option
Multi-site Configuration and Installation Guide Port Forwarding Option V1.0 7-24-2006 Overview What this guide covers This guide will assist you in setting up a Wide Area Network (WAN) that allows your
More informationSchablone 2004_08_26. Gigaset SE587 WLAN dsl. Gigaset
Gigaset SE587 WLAN dsl / eng / A31008-N1083-L171-1-7619 / cover_front_587.fm / 13.11.2007 Gigaset SE587 WLAN dsl Gigaset Gigaset SE587 WLAN dsl / eng / A31008-N1083-L171-1-7619 / SE587_IVZ.fm / 12.12.2007
More informationGigaset Router / en / A31008-E105-B / cover_front_router.fm / s Be inspired
s Be inspired Table of Contents Table of Contents Safety precautions........................... 3 The Gigaset Router........................... 3 Features and Benefits..................................................
More informationTechnical Support Information
Technical Support Information Broadband Module/Broadband Module Plus Configuration Guidance Setting up Remote Access to a Network Device (Mail/File Server/Camera Etc) connected to the DMZ port of the Broadband
More informationPort Forwarding & Case Study
Introduction TalkTalk's responsibility lies with ensuring that this facility works on their routers, they cannot be held responsible for you devices that you are trying to forward to. This document not
More informationOn-Line Password Breaks CSC 193 WAKE FOREST. U N I V E R S I T Y Department of Computer Science. Spring 2014
On-Line Password Breaks CSC 193 WAKE FOREST U N I V E R S I T Y Department of Computer Science Spring 2014 Breaking Passwords We have focused on breaking system passwords Take the password file and run
More information8.1.4 NAT Application
Figure 54 How NAT Works 8.1.4 NAT Application The following figure illustrates a possible NAT application, where three inside LANs (logical LANs using IP Alias) behind the Prestige can communicate with
More informationPort Forwarding Setup (NB7)
Port Forwarding Setup (NB7) Port Forwarding Port forwarding enables programs or devices running on your LAN to communicate with the internet as if they were directly connected. This is most commonly used
More informationBIG-IP DNS: Monitors Reference. Version 12.1
BIG-IP DNS: Monitors Reference Version 12.1 Table of Contents Table of Contents Monitors Concepts...5 Purpose of monitors...5 Benefits of monitors...5 Methods of monitoring...5 Comparison of monitoring
More informationNETASQ MIGRATING FROM V8 TO V9
UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Date Version Author Details March 2014 V1.4 NETASQ Update Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 MAIN CHANGES IN VERSION 9 4 Web management
More informationWireless-G Router User s Guide
Wireless-G Router User s Guide 1 Table of Contents Chapter 1: Introduction Installing Your Router System Requirements Installation Instructions Chapter 2: Preparing Your Network Preparing Your Network
More informationDifferent Layers Lecture 21
Different Layers Lecture 21 10/17/2003 Jian Ren 1 The Transport Layer 10/17/2003 Jian Ren 2 Transport Services and Protocols Provide logical communication between app processes running on different hosts
More informationIXCHARIOT SERVER AND DESKTOP EDITIONS
IXCHARIOT SERVER AND DESKTOP EDITIONS TEST AND IMPROVE APPLICATION PERFORMANCE WITH FLEXIBLE SOFTWARE-BASED TEST TOOL PROBLEM: ENSURING NETWORK CHANGES WON T DISRUPT SERVICE QUALITY AND PERFORMANCE Today
More information2Wire IG 2700 ADSL Router. RJ45 connecting cable
Technical Support Information Case 6. BT 2Wire 2700 ADSL Router (BT Business Hub) configuration to allow a BT Versatility Broadband Module (BBM) IP Gateway connection for VoIP (IP Trunks and IP Extensions)
More informationBIG-IP Local Traffic Manager : Monitors Reference 13.0
BIG-IP Local Traffic Manager : Monitors Reference 13.0 Table of Contents Table of Contents Monitors Concepts... 5 Purpose of monitors...5 Benefits of monitors... 5 About icheck functionality for monitors...
More informationChapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued)
Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World
More informationChapter 4: Networking and the Internet
Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals
More informationLesson 5 TCP/IP suite, TCP and UDP Protocols. Chapter-4 L05: "Internet of Things ", Raj Kamal, Publs.: McGraw-Hill Education
Lesson 5 TCP/IP suite, TCP and UDP Protocols 1 TCP/IP Suite: Application layer protocols TCP/IP Suite set of protocols with layers for the Internet TCP/IP communication 5 layers: L7, L4, L3, L2 and L1
More informationCisco ISE Ports Reference
Cisco ISE Infrastructure Cisco ISE Infrastructure, on page 1 Cisco ISE Administration Node Ports, on page 2 Cisco ISE Monitoring Node Ports, on page 4 Cisco ISE Policy Service Node Ports, on page 6 Cisco
More informationAvaya AG250 Application Gateway Server Pre-Installation Checklist for Avaya Communication Manager
Avaya AG250 Application Gateway Server Pre-Installation Checklist for Avaya Communication Manager The Application Gateway Server delivers business applications to Internet-enabled IP telephones, personal
More informationMANetworkSwitchUserManual. Version 3.1
Factory Defaults 2016-09-07 The following tables describes the factory defaults and what will happen to various settings when you reset the switch. If you want to reset the switch, refer to General Settings
More informationGranular Protocol Inspection
The feature adds flexibility to the Cisco IOS Firewall by allowing it to perform a higher degree of inspection of TCP and User Data Protocol (UDP) traffic for most RFC 1700 application types. Finding Feature
More informationExtended ACL Configuration Mode Commands
Extended ACL Configuration Mode Commands To create and modify extended access lists on a WAAS device for controlling access to interfaces or applications, use the ip access-list extended global configuration
More information