AT&T Inidv2 I3812v Urer Guide
Here you can view all the pages of manual AT&T Inidv2 I3812v Urer Guide. The ATT manuals for Telephone are available online for free. You can easily download all the documents as PDF.
Page 51
Configuring Firewall 47 6.Select the application you want to modify, click Edit; the selected profile page opens. 7.Modify any information, as necessary. 8.Click Add to List; a message appears informing you of the status and the information appears in the Definition List pane. Note: You are prompted to enter your password if one is set up.
Page 52
iNID -- i3812V User Guide 48 Deleting Profiles You can delete only the profiles you created. Before deleting a user-defined profile, make sure to remove it from the Hosted Applications pane. 1.Open a Web browser and enter http://gateway.2Wire.net to access the 2Wire i3812V user interface. 2.Click on the Home page; the Firewall Status page opens. 3.Select Applications, Pinholes and DMZ; a page opens showing hosted applications. 4.Scroll to the Edit firewall settings for this computer pane. Note:...
Page 53
Configuring Firewall 49 5.Click Edit or delete user-defined application; a page similar to the following opens. 6.Select the application you want to delete, click Delete. Allowing all Applications (DMZplus) DMZplus is a special firewall mode that is used for hosting applications. When in the DMZplus mode, the designated computer: Appears as if it is directly connected to the Internet. Has all unassigned TCP and UDP ports opened and pointed to it. Can receive unsolicited network traffic from the...
Page 54
iNID -- i3812V User Guide 50 1.Open a Web browser and enter http://gateway.2Wire.net to access the 2Wire i3812V user interface. 2.Click on the Home page; the Firewall Status page opens. 3.Select Applications, Pinholes and DMZ; a page opens showing hosted applications. Caution: Use the DMZplus mode with caution! A computer in the DMZplus mode is less secure because all available por ts are open and all incoming Internet traffic is directed to this computer.
Page 55
Configuring Firewall 51 4.Select the computer that you want to allow all applications. 5.Select the Allow all applications (DMZplus mode) button. 6.Click Save. 7.Confirm that the computer you selected in Step 1 is configured for DHCP. If it is not, configure it for DHCP. 8.Restar t the computer. When the computer restar ts, it receives a special IP address from the system and all unassigned TCP and UDP por ts are forwarded to it. Stopping DMZplus 1.Open a Web browser and enter...
Page 56
iNID -- i3812V User Guide 52 4.Select the computer that you want to stop the DMZplus mode. 5.Select the Maximum protection button from the Edit firewall settings for this computer pane. 6.Click Save. 7.Access the computer that you selected in Step 1. 8.Restar t the computer. Customizing Firewall Configuration The i3812V comes with a set of default firewall settings that you can change to adapt to your environment. You can change the timeout sessions and protocol that you want to go through the...
Page 57
Configuring Firewall 53 3.Click Advanced Configuration; the following page opens displaying the default settings.
Page 58
iNID -- i3812V User Guide 54 4.Customize your Internet security. −Stealth Mode: When the Stealth Mode is selected, your computer is “invisible” to port-scanning programs. Consequently, no reply is received in response in their quest to gain unauthorized access to computers and servers. If your computer is always connected to Internet, it is good practice to select the Stealth Mode to prevent potential hacking to your computer. −Block Ping: When enabled, Block Ping blocks all ping requests. Ping is a...
Page 59
Configuring Firewall 55 −Invalid Source/Destination IP address. When enabled, the firewall checks and verifies the following IP addresses: −IP source address (broadcast or multicast) −TCP destination IP address (not unicast) −If the IP source and destination address are the same −Invalid IP source received from private/home network −Packet Flood (SYN/UDP/ICMP/Other). When enabled, the firewall checks for SYN, UDP, ICMP, and other types of packet floods on the local and Internet-facing interfaces...