DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows individual clients to
obtain TCP/IP configuration at start-up from a server. You can configure the NBG5615’s LAN as a
DHCP server or disable it. When configured as a server, the NBG5615 provides the TCP/IP
configuration for the clients. If DHCP service is disabled, you must have another DHCP server on
your LAN, or else the computer must be manually configured.
14.1.1 What You Can Do
•Use the General screen to enable the DHCP server (Section 14.2 on page 133).
•Use the Advanced screen to assign IP addresses on the LAN to specific individual computers
based on their MAC Addresses (Section 14.3 on page 134).
•Use the Client List screen to view the current DHCP client information (Section 14.4 on page
136).
CHAPTER 14
DHCP Server
14.1.2 What You Need To Know
The following terms and concepts may help as you read through this chapter.
MAC Addresses
Every Ethernet device has a unique MAC (Media Access Control) address. The MAC address is
assigned at the factory and consists of six pairs of hexadecimal characters, for example,
00:A0:C5:00:00:02. Find out the MAC addresses of your network devices if you intend to add them
to the DHCP Client List screen.
14.2 DHCP Server General Screen
Use this screen to enable the DHCP server. Click Netw o rk > DHCP Server. The following screen
displays.
NBG5615 User’s Guide133
Chapter 14 DHCP Server
Figure 78 Network > DHCP Server > General
The following table describes the labels in this screen.
Table 52 Network > DHCP Server > General
LABELDESCRIPTION
DHCP ServerSelect Enable to activate DHCP for LAN.
IP Pool Starting
Address
Pool SizeThis field specifies the size, or count of the IP address pool for LAN.
ApplyClick Apply to save your changes back to the NBG5615.
CancelClick Cancel to begin configuring this screen afresh.
DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows
individual clients (computers) to obtain TCP/IP configuration at startup from a server.
Enable the DHCP server unless your ISP instructs you to do otherwise. Select Disable
to stop the NBG5615 acting as a DHCP server. When configured as a server, the
NBG5615 provides TCP/IP configuration for the clients. If not, DHCP service is
disabled and you must have another DHCP server on your LAN, or else the computers
must be manually configured. When set as a server, fill in the following four fields.
This field specifies the first of the contiguous addresses in the IP address pool for LAN.
14.3 DHCP Server Advanced Screen
This screen allows you to assign IP addresses on the LAN to specific individual computers based on
their MAC addresses. You can also use this screen to configure the DNS server information that the
NBG5615 sends to the DHCP clients.
To change your NBG5615’s static DHCP settings, click Netw ork > DHCP Server > Advanced. The
following screen displays.
134
NBG5615 User’s Guide
Figure 79 Network > DHCP Server > Advanced
Chapter 14 DHCP Server
The following table describes the labels in this screen.
Table 53 Network > DHCP Server > Advanced
LABELDESCRIPTION
Static DHCP Table
#This is the index number of the static IP table entry (row).
MAC AddressType the MAC address (with colons) of a computer on your LAN.
IP AddressType the LAN IP address of a computer on your LAN.
DNS Server
DNS Servers
Assigned by DHCP
Server
The NBG5615 passes a DNS (Domain Name System) server IP address (in the order you
specify here) to the DHCP clients. The NBG5615 only passes this information to the LAN
DHCP clients when you enable DHCP Server. When you disable DHCP Server, DHCP
service is disabled and you must have another DHCP sever on your LAN, or else the
computers must have their DNS server addresses manually configured.
NBG5615 User’s Guide
135
Chapter 14 DHCP Server
Table 53 Network > DHCP Server > Advanced (continued)
LABELDESCRIPTION
First DNS Server
Second DNS Server
Third DNS Server
ApplyClick Apply to save your changes back to the NBG5615.
CancelClick Cancel to begin configuring this screen afresh.
Select Obtained From I SP if your ISP dynamically assigns DNS server information
(and the NBG5615's WAN IP address). The field to the right displays the (read-only)
DNS server IP address that the ISP assigns.
Select User-Defined if you have the IP address of a DNS server. Enter the DNS server's
IP address in the field to the right. If you chose User-Defined, but leave the IP address
set to 0.0.0.0, User-Defined changes to None after you click Apply. If you set a
second choice to User-Defined, and enter the same IP address, the second User-Defined changes to None after you click Apply.
Select DNS Relay to have the NBG5615 act as a DNS proxy. The NBG5615's LAN IP
address displays in the field to the right (read-only). The NBG5615 tells the DHCP
clients on the LAN that the NBG5615 itself is the DNS server. When a computer on the
LAN sends a DNS query to the NBG5615, the NBG5615 forwards the query to the
NBG5615's system DNS server (configured in the WAN > I nternet Co nnection
screen) and relays the response back to the computer. You can only select DNS Relay
for one of the three servers; if you select DNS Relay for a second or third DNS server,
that choice changes to None after you click Apply.
Select None if you do not want to configure DNS servers. If you do not configure a DNS
server, you must know the IP address of a computer in order to access it.
14.4 DHCP Client List Screen
The DHCP table shows current DHCP client information (including IP Address, Host Name and MAC
Address) of network clients using the NBG5615’s DHCP servers.
Configure this screen to always assign an IP address to a MAC address (and host name). Click
Netw ork > DHCP Server > Client List.
Note: You can also view a read-only client list by clicking Monitor > DHCP Server.
Figure 80 Network > DHCP Server > Client List
The following table describes the labels in this screen.
Table 54 Network > DHCP Server > Client List
LABEL DESCRIPTION
# This is the index number of the host computer.
StatusThis field displays whether the connection to the host computer is up (a yellow bulb) or
down (a gray bulb).
136
NBG5615 User’s Guide
Chapter 14 DHCP Server
Table 54 Network > DHCP Server > Client List (continued)
LABEL DESCRIPTION
Host NameThis field displays the computer host name.
IP AddressThis field displays the IP address relative to the # field listed above.
MAC AddressThis field shows the MAC address of the computer with the name in the Host Nam e field.
Every Ethernet device has a unique MAC (Media Access Control) address which uniquely
identifies a device. The MAC address is assigned at the factory and consists of six pairs of
hexadecimal characters, for example, 00:A0:C5:00:00:02.
ReserveSelect this if you want to reserve the IP address for this specific MAC address.
ApplyClick Apply to save your changes back to the NBG5615.
CancelClick Cancel to reload the previous configuration for this screen.
NBG5615 User’s Guide
137
Chapter 14 DHCP Server
138
NBG5615 User’s Guide
15.1 Overview
A: 192.168.1.33
B: 192.168.1.34
C: 192.168.1.35
IP address
192.168.1.1
WANLAN
assigned by ISP
FTP, Telnet, SNMP
Port 80
Ports 21 to 25
NAT (Network Address Translation - NAT, RFC 1631) is the translation of the IP address of a host in
a packet. For example, the source address of an outgoing packet, used within one network is
changed to a different IP address known within another network.
The figure below is a simple illustration of a NAT network. You want to assign ports 21-25 to one
FTP, Telnet and SMTP server (A in the example), port 80 to another (B in the example) and assign
a default server IP address of 192.168.1.35 to a third (C in the example).
You assign the LAN IP addresses to the devices (A to D) connected to your NBG5615. The ISP
assigns the WAN IP address. The NAT network appears as a single host on the Internet. All traffic
coming from A to D going out to the Internet use the IP address of the NBG5615, which is
192.168.1.1.
CHAPTER 15
NAT
Figure 81 NAT Example
This chapter discusses how to configure NAT on the NBG5615.
Note: You must create a firewall rule in addition to setting up NAT, to allow traffic from
the WAN to be forwarded through the NBG5615.
15.1.1 What You Can Do
NBG5615 User’s Guide139
•Use the General screen to enable NAT (
Section 15.2 on page 141).
Chapter 15 NAT
•Use the Port Forw arding screen to set a default server and change your NBG5615’s port
forwarding settings to forward incoming service requests to the server(s) on your local network
(
Section 15.3 on page 142).
•Use the Port Trigger screen to change your NBG5615’s trigger port settings (
page 147
).
15.1.2 What You Need To Know
The following terms and concepts may help as you read through this chapter.
Inside/Outside
This denotes where a host is located relative to the NBG5615, for example, the computers of your
subscribers are the inside hosts, while the web servers on the Internet are the outside hosts.
Global/Local
This denotes the IP address of a host in a packet as the packet traverses a router, for example, the
local address refers to the IP address of a host when the packet is in the local network, while the
global address refers to the IP address of the host when the same packet is traveling in the WAN
side.
Section 15.5.3 on
Note: Inside/outside refers to the location of a host, while global/local refers to the IP
address of a host used in a packet.
An inside local address (ILA) is the IP address of an inside host in a packet when the packet is still
in the local network, while an inside global address (IGA) is the IP address of the same inside host
when the packet is on the WAN side. The following table summarizes this information.
Table 55 NAT Definitions
ITEMDESCRIPTION
InsideThis refers to the host on the LAN.
OutsideThis refers to the host on the WAN.
LocalThis refers to the packet address (source or destination) as the packet travels on the LAN.
GlobalThis refers to the packet address (source or destination) as the packet travels on the WAN.
Note: NAT never changes the IP address (either local or global) of an outside host.
What NAT Does
In the simplest form, NAT changes the source IP address in a packet received from a subscriber
(the inside local address) to another (the inside global address) before forwarding the packet to the
WAN side. When the response comes back, NAT translates the destination address (the inside
global address) back to the inside local address before forwarding it to the original inside host. Note
that the IP address (either local or global) of an outside host is never changed.
140
The global IP addresses for the inside hosts can be either static or dynamically assigned by the ISP.
In addition, you can designate servers, for example, a web server and a telnet server, on your local
NBG5615 User’s Guide
Chapter 15 NAT
network and make them accessible to the outside world. If you do not define any servers , NAT
offers the additional benefit of firewall protection. With no servers defined, your NBG5615 filters out
all incoming inquiries, thus preventing intruders from probing your network. For more information
on IP address translation, refer to RFC 1631, The IP Network Address Translator (NAT).
How NAT Works
Each packet has two addresses – a source address and a destination address. For outgoing packets,
the ILA (Inside Local Address) is the source address on the LAN, and the IGA (Inside Global
Address) is the source address on the WAN. For incoming packets, the ILA is the destination
address on the LAN, and the IGA is the destination address on the WAN. NAT maps private (local)
IP addresses to globally unique ones required for communication with hosts on other networks. It
replaces the original IP source address in each packet and then forwards it to the Internet. The
NBG5615 keeps track of the original addresses and port numbers so incoming reply packets can
have their original values restored. The following figure illustrates this.
Figure 82 How NAT Works
15.2 General
Use this screen to enable NAT and set a default server. Click Netw ork > NAT to open the General
screen.
Figure 83 Network > NAT > General
NBG5615 User’s Guide
141
Chapter 15 NAT
The following table describes the labels in this screen.
Table 56 Network > NAT > General
LABELDESCRIPTION
Network Address
Tra n s la tion (NAT)
ApplyClick Apply to save your changes back to the NBG5615.
CancelClick Cancel to begin configuring this screen afresh.
Network Address Translation (NAT) allows the translation of an Internet protocol
address used within one network (for example a private IP address used in a local
network) to a different IP address known within another network (for example a public
IP address used on the Internet).
Select Enable to activate NAT. Select Disable to turn it off.
15.3 Port Forwarding Screen
Use this screen to forward incoming service requests to the server(s) on your local network and set
a default server. You may enter a single port number or a range of port numbers to be forwarded,
and the local IP address of the desired server. The port number identifies a service; for example,
web service is on port 80 and FTP on port 21. In some cases, such as for unknown services or
where one server can support more than one service (for example both FTP and web service), it
might be better to specify a range of port numbers.
In addition to the servers for specified services, NAT supports a default server. A service request
that does not have a server explicitly designated for it is forwarded to the default server. If the
default is not defined, the service request is simply discarded.
Note: Many residential broadband ISP accounts do not allow you to run any server
processes (such as a Web or FTP server) from your location. Your ISP may
periodically check for servers and may suspend your account if it discovers any
active services at your location. If you are unsure, refer to your ISP.
Port forwarding allows you to define the local servers to which the incoming services will be
forwarded. To change your NBG5615’s port forwarding settings, click Netw ork > NAT > Port Forwarding. The screen appears as shown.
Note: If you do not assign a Default Server, the NBG5615 discards all packets received
for ports that are not specified in this screen or remote management.
Refer to
Appendix C on page 249 for port numbers commonly used for particular services.
142
NBG5615 User’s Guide
Figure 84 Network > NAT > Port Forwarding
The following table describes the labels in this screen.
Chapter 15 NAT
Table 57 Network > NAT > Port Forwarding
LABELDESCRIPTION
Default Server Setup
Default ServerIn addition to the servers for specified services, NAT supports a default server. A default
server receives packets from ports that are not specified in the Port Forw arding
screen. You can decide whether you want to use the default server or specify a server
manually.
Select this to use the default server.
Change to ServerSelect this and manually enter the server’s IP address.
Service NameSelect a pre-defined service from the drop-down list box. The pre-defined service port
Service ProtocolSelect the transport layer protocol supported by this virtual server. Choices are TCP,
Server IP AddressEnter the inside IP address of the virtual server here and click Add to add it in the port
#This is the number of an individual port forwarding server entry.
StatusThis icon is turned on when the rule is enabled.
NameThis field displays a name to identify this rule.
ProtocolThis is the transport layer protocol used for the service.
PortThis field displays the port number(s).
Server IP AddressThis field displays the inside IP address of the server.
ModifyClick the Edit icon to open the edit screen where you can modify an existing rule.
number(s) and protocol will be displayed in the port forwarding summary table.
Otherwise, select User define to manually enter the port number(s) and select the IP
protocol.
UDP, or TCP_ UDP.
If you have chosen a pre-defined service in the Service Nam e field, the protocol will be
configured automatically.
forwarding summary table.
Click the Delete icon to remove a rule.
NBG5615 User’s Guide
143
Chapter 15 NAT
Table 57 Network > NAT > Port Forwarding (continued)
LABELDESCRIPTION
ApplyClick Apply to save your changes back to the NBG5615.
CancelClick Cancel to begin configuring this screen afresh.
15.3.1 Port Forwarding Edit Screen
This screen lets you edit a port forwarding rule. Click a rule’s Edit icon in the Port Forwarding
screen to open the following screen.
Figure 85 Network > NAT > Port Forwarding Edit
The following table describes the labels in this screen.
Table 58 Network > NAT > Port Forwarding Edit
LABELDESCRIPTION
Port ForwardingSelect Enable to turn on this rule and the requested service can be forwarded to the host
with a specified internal IP address.
Select Disable to disallow forwarding of these ports to an inside server without having to
delete the entry.
Service NameType a name (of up to 31 printable characters) to identify this rule in the first field next to
ProtocolSelect the transport layer protocol supported by this virtual server. Choices are TCP, UDP,
PortType a port number(s) to define the service to be forwarded to the specified server.
Server IP
Address
BackClick Back to return to the previous screen.
ApplyClick Apply to save your changes back to the NBG5615.
CancelClick Cancel to begin configuring this screen afresh.
Service Name. Otherwise, select a predefined service in the second field next to Service
Nam e. The predefined service name and port number(s) will display in the Service Name
and Port fields.
or T CP_ UDP.
If you have chosen a pre-defined service in the Service Nam e field, the protocol will be
configured automatically.
To specify a range of ports, enter a hyphen (-) between the first port and the last port,
such as 10-.
Type the IP address of the server on your LAN that receives packets from the port(s)
specified in the Port field.
144
NBG5615 User’s Guide
15.4 Port Trigger Screen
To change your NBG5615’s trigger port settings, click Netw ork > NAT > Port Trigger. The screen
appears as shown.
Note: Only one LAN computer can use a trigger port (range) at a time.
Figure 86 Network > NAT > Port Trigger
Chapter 15 NAT
The following table describes the labels in this screen.
Table 59 Network > NAT > Port Trigger
LABELDESCRIPTION
#This is the rule index number (read-only).
NameType a unique name (up to 15 characters) for identification purposes. All characters are
IncomingIncoming is a port (or a range of ports) that a server on the WAN uses when it sends out
PortType a port number or the starting port number in a range of port numbers.
End PortType a port number or the ending port number in a range of port numbers.
TriggerThe trigger port is a port (or a range of ports) that causes (or triggers) the NBG5615 to
PortType a port number or the starting port number in a range of port numbers.
End PortType a port number or the ending port number in a range of port numbers.
ApplyClick Apply to save your changes back to the NBG5615.
CancelClick Cancel to begin configuring this screen afresh.
NBG5615 User’s Guide
permitted - including spaces.
a particular service. The NBG5615 forwards the traffic with this port (or range of ports) to
the client computer on the LAN that requested the service.
record the IP address of the LAN computer that sent the traffic to a server on the WAN.
145
Chapter 15 NAT
15.5 Technical Reference
The following section contains additional technical information about the NBG5615 features
described in this chapter.
15.5.1 NATPort Forwarding: Services and Port Numbers
A port forwarding set is a list of inside (behind NAT on the LAN) servers, for example, web or FTP,
that you can make accessible to the outside world even though NAT makes your whole inside
network appear as a single machine to the outside world.
Use the Port Forw arding screen to forward incoming service requests to the server(s) on your
local network. You may enter a single port number or a range of port numbers to be forwarded, and
the local IP address of the desired server. The port number identifies a service; for example, web
service is on port 80 and FTP on port 21. In some cases, such as for unknown services or where one
server can support more than one service (for example both FTP and web service), it might be
better to specify a range of port numbers.
In addition to the servers for specified services, NAT supports a default server. A service request
that does not have a server explicitly designated for it is forwarded to the default server. If the
default is not defined, the service request is simply discarded.
Note: Many residential broadband ISP accounts do not allow you to run any server
processes (such as a Web or FTP server) from your location. Your ISP may
periodically check for servers and may suspend your account if it discovers any
active services at your location. If you are unsure, refer to your ISP.
15.5.2 NAT Port Forwarding Example
Let's say you want to assign ports 21-25 to one FTP, Telnet and SMTP server (A in the example),
port 80 to another (B in the example) and assign a default server IP address of 192.168.1.35 to a
third (C in the example). You assign the LAN IP addresses and the ISP assigns the WAN IP address.
The NAT network appears as a single host on the Internet.
Figure 87 Multiple Servers Behind NAT Example
146
NBG5615 User’s Guide
15.5.3 Trigger Port Forwarding
Jane’s com puter
Real Audio Server
Port 7 0 7 0
Some services use a dedicated range of ports on the client side and a dedicated range of ports on
the server side. With regular port forwarding you set a forwarding port in NAT to forward a service
(coming in from the server on the WAN) to the IP address of a computer on the client side (LAN).
The problem is that port forwarding only forwards a service to a single LAN IP address. In order to
use the same service on a different LAN computer, you have to manually replace the LAN
computer's IP address in the forwarding port with another LAN computer's IP address.
Trigger port forwarding solves this problem by allowing computers on the LAN to dynamically take
turns using the service. The NBG5615 records the IP address of a LAN computer that sends traffic
to the WAN to request a service with a specific port number and protocol (a "trigger" port). When
the NBG5615's WAN port receives a response with a specific port number and protocol ("incoming"
port), the NBG5615 forwards the traffic to the LAN IP address of the computer that sent the
request. After that computer’s connection for that service closes, another computer on the LAN can
use the service in the same manner. This way you do not need to configure a new IP address each
time you want a different LAN computer to use the application.
15.5.4 Trigger Port Forwarding Example
The following is an example of trigger port forwarding.
Chapter 15 NAT
Figure 88 Trigger Port Forwarding Process: Example
1Jane requests a file from the Real Audio server (port 7070).
2Port 7070 is a “trigger” port and causes the NBG5615 to record Jane’s computer IP address. The
NBG5615 associates Jane's computer IP address with the "incoming" port range of 6970-7170.
3The Real Audio server responds using a port number ranging between 6970-7170.
4The NBG5615 forwards the traffic to Jane’s computer IP address.
5Only Jane can connect to the Real Audio server until the connection is closed or times out. The
NBG5615 times out in three minutes with UDP (User Datagram Protocol), or two hours with TCP/IP
(Transfer Control Protocol/Internet Protocol).
NBG5615 User’s Guide
147
Chapter 15 NAT
15.5.5 Two Points To Remember About Trigger Ports
1Trigger events only happen on data that is coming from inside the NBG5615 and going to the
outside.
2If an application needs a continuous data stream, that port (range) will be tied up so that another
computer on the LAN can’t trigger it.
148
NBG5615 User’s Guide
16.1 Overview
DDNS services let you use a domain name with a dynamic IP address.
16.1.1 What You Need To Know
The following terms and concepts may help as you read through this chapter.
What is DDNS?
Dynamic Domain Name Service (DDNS) services let you use a fixed domain name with a dynamic
IP address. Users can always use the same domain name instead of a different dynamic IP address
that changes each time to connect to the NBG5615 or a server in your network.
CHAPTER 16
DDNS
Note: The NBG5615 must have a public global IP address and you should have your
registered DDNS account information on hand.
16.2 General
To change your NBG5615’s DDNS, click Netw ork > DDNS. The screen appears as shown.
Figure 89 Dynamic DNS
NBG5615 User’s Guide149
Chapter 16 DDNS
The following table describes the labels in this screen.
Table 60 Dynamic DNS
LABELDESCRIPTION
Dynamic DNSSelect Enabl e to use dynamic DNS. Select Disable to turn this feature off.
Service ProviderSelect the name of your Dynamic DNS service provider.
Host NameEnter a host names in the field provided. You can specify up to two host names in the
UsenameEnter your user name.
PasswordEnter the password assigned to you.
ApplyClick Apply to save your changes back to the NBG5615.
CancelClick Cancel to begin configuring this screen afresh.
field separated by a comma (",").
150
NBG5615 User’s Guide
17.1 Overview
WAN
R1
R2
A
R3
LAN
This chapter shows you how to configure static routes for your NBG5615.
The NBG5615 usually uses the default gateway to route outbound traffic from computers on the
LAN to the Internet. To have the NBG5615 send data to devices not reachable through the default
gateway, use static routes.
For example, the next figure shows a computer (A) connected to the NBG5615’s LAN interface. The
NBG5615 routes most traffic from A to the Internet through the NBG5615’s default gateway (R1).
You create one static route to connect to services offered by your ISP behind router R2 . You create
another static route to communicate with a separate network behind a router R3 connected to the
LAN.
Figure 90 Example of Static Routing Topology
CHAPTER 17
Static Route
17.2 IP Static Route Screen
Click Netw ork > Static Route to open the Static Route screen.
NBG5615 User’s Guide151
Chapter 17 Static Route
Figure 91 Network > Static Route
The following table describes the labels in this screen.
Table 61 Network > Static Route
LABELDESCRIPTION
Add Static RouteClick this to create a new rule.
#This is the number of an individual static route.
StatusThis field indicates whether the rule is active (yellow bulb) or not (gray bulb).
NameThis field displays a name to identify this rule.
DestinationThis parameter specifies the IP network address of the final destination. Routing is always
GatewayThis is the IP address of the gateway. The gateway is a router or switch on the same
Subent MaskThis parameter specifies the IP network subnet mask of the final destination.
ModifyClick the Edit icon to open a screen where you can modify an existing rule.
ApplyClick Apply to save your changes back to the NBG5615.
CancelClick Cancel to begin configuring this screen afresh.
based on network number.
network segment as the device's LAN or WAN port. The gateway helps forward packets to
their destinations.
Click the Delete icon to remove a rule from the NBG5615.
17.2.1 Add/Edit Static Route
Click the Add Static Route button or a rule’s Edit icon in the Static Route screen. Use this screen
to configure the required information for a static route.
Figure 92 Network > Static Route: Add/Edit
152
NBG5615 User’s Guide
Chapter 17 Static Route
The following table describes the labels in this screen.
Table 62 Network > Static Route: Add/Edit
LABELDESCRIPTION
Static RouteSelect to enable or disable this rule.
Route NameType a name to identify this rule. You can use up to printable English keyboard
Destination IP
Address
IP Subnet Mask Enter the IP subnet mask here.
Gateway IP
Address
BackClick Back to return to the previous screen without saving.
ApplyClick Apply to save your changes back to the NBG5615.
CancelClick Cancel to set every field in this screen to its last-saved value.
characters, including spaces.
This parameter specifies the IP network address of the final destination. Routing is
always based on network number. If you need to specify a route to a single host, use a
subnet mask of 255.255.255.255 in the subnet mask field to force the network number to
be identical to the host ID.
Enter the IP address of the next-hop gateway. The gateway is a router or switch on the
same segment as your NBG5615's interface(s). The gateway helps forward packets to
their destinations.
NBG5615 User’s Guide
153
Chapter 17 Static Route
154
NBG5615 User’s Guide
18.1 Overview
WAN
LAN
3
4
1
2
A
Use these screens to enable and configure the firewall that protects your NBG5615 and your LAN
from unwanted or malicious traffic.
Enable the firewall to protect your LAN computers from attacks by hackers on the Internet and
control access between the LAN and WAN. By default the firewall:
• allows traffic that originates from your LAN computers to go to all of the networks.
• blocks traffic that originates on the other networks from going to the LAN.
The following figure illustrates the default firewall action. User A can initiate an IM (Instant
Messaging) session from the LAN to the WAN (1). Return traffic for this session is also allowed (2).
However other traffic initiated from the WAN is blocked (3 and 4).
CHAPTER 18
Firewall
Figure 93 Default Firewall Action
18.1.1 What You Can Do
•Use the General screen to enable or disable the NBG5615’s firewall (
18.1.2 What You Need To Know
•Use the Services screen enable service blocking, enter/delete/modify the services you want to
block and the date/time you want to block them (Section 18.3 on page 157).
Section 18.2 on page 157).
The following terms and concepts may help as you read through this chapter.
NBG5615 User’s Guide155
Chapter 18 Firewall
What is a Firewall?
Originally, the term “firewall” referred to a construction technique designed to prevent the spread of
fire from one room to another. The networking term "firewall" is a system or group of systems that
enforces an access-control policy between two networks. It may also be defined as a mechanism
used to protect a trusted network from a network that is not trusted. Of course, firewalls cannot
solve every security problem. A firewall is one of the mechanisms used to establish a network
security perimeter in support of a network security policy. It should never be the only mechanism or
method employed. For a firewall to guard effectively, you must design and deploy it appropriately.
This requires integrating the firewall into a broad information-security policy. In addition, specific
policies must be implemented within the firewall itself.
Stateful Inspection Firewall
Stateful inspection firewalls restrict access by screening data packets against defined access rules.
They make access control decisions based on IP address and protocol. They also "inspect" the
session data to assure the integrity of the connection and to adapt to dynamic protocols. These
firewalls generally provide the best speed and transparency; however, they may lack the granular
application level access control or caching that some proxies support. Firewalls, of one type or
another, have become an integral part of standard security solutions for enterprises.
About the NBG5615 Firewall
The NBG5615’s firewall feature physically separates the LAN and the WAN and acts as a secure
gateway for all data passing between the networks.
It is a stateful inspection firewall and is designed to protect against Denial of Service attacks when
activated (click the General tab under Firew all and then click the EnableFirew all check box).
The NBG5615's purpose is to allow a private Local Area Network (LAN) to be securely connected to
the Internet. The NBG5615 can be used to prevent theft, destruction and modification of data, as
well as log events, which may be important to the security of your network.
The NBG5615 is installed between the LAN and a broadband modem connecting to the Internet.
This allows it to act as a secure gateway for all data passing between the Internet and the LAN.
The NBG5615 has one Ethernet WAN port and four Ethernet LAN ports, which are used to physically
separate the network into two areas.The WAN (Wide Area Network) port attaches to the broadband
(cable or DSL) modem to the Internet.
The LAN (Local Area Network) port attaches to a network of computers, which needs security from
the outside world. These computers will have access to Internet services such as e-mail, FTP and
the World Wide Web. However, "inbound access" is not allowed (by default) unless the remote host
is authorized to use a specific service.
Guidelines For Enhancing Security With Your Firewall
1Change the default password via Web Configurator.
2Think about access control before you connect to the network in any way, including attaching a
modem to the port.
3Limit who can access your router.
156
NBG5615 User’s Guide
4Don't enable any local service (such as NTP) that you don't use. Any enabled service could present
a potential security risk. A determined hacker might be able to find creative ways to misuse the
enabled services to access the firewall or the network.
5For local services that are enabled, protect against misuse. Protect by configuring the services to
communicate only with specific peers, and protect by configuring rules to block packets for the
services at specific interfaces.
6Protect against IP spoofing by making sure the firewall is active.
7Keep the firewall in a secured (locked) room.
18.2 General Screen
Use this screen to enable or disable the NBG5615’s firewall, and set up firewall logs. Click Security
> Firew all to open the General screen.
Figure 94 Security > Firewall > General l
Chapter 18 Firewall
The following table describes the labels in this screen.
Table 63 Security > Firewall > General
LABELDESCRIPTION
Enable FirewallSelect this check box to activate the firewall. The NBG5615 performs access control and
protects against Denial of Service (DoS) attacks when the firewall is activated.
ApplyClick Apply to save the settings.
CancelClick Cancel to start configuring this screen again.
18.3 Services Screen
If an outside user attempts to probe an unsupported port on your NBG5615, an ICMP response
packet is automatically returned. This allows the outside user to know the NBG5615 exists. Use this
screen to prevent the ICMP response packet from being sent. This keeps outsiders from discovering
your NBG5615 when unsupported ports are probed.
You can also use this screen to enable service blocking, enter/delete/modify the services you want
to block and the date/time you want to block them.
Click Security > Firew all > Services. The screen appears as shown next.
NBG5615 User’s Guide
157
Chapter 18 Firewall
Figure 95 Security > Firewall > Services l
The following table describes the labels in this screen.
Table 64 Security > Firewall > Services
LABELDESCRIPTION
LABELDESCRIPTION
ICMPInternet Control Message Protocol is a message control and error-reporting protocol
Respond to Ping onThe NBG5615 will not respond to any incoming Ping requests when Disable is selected.
ApplyClick Apply to save the settings.
Enable Firewall Rule
Enable Firewall
Rule
ApplyClick Apply to save the settings.
Add Firewall Rule
Service NameEnter a name that identifies or describes the firewall rule.
MAC AddressEnter the MAC address of the computer for which the firewall rule applies.
Dest IP AddressEnter the IP address of the computer to which traffic for the application or service is
between a host server and a gateway to the Internet. ICMP uses Internet Protocol (IP)
datagrams, but the messages are processed by the TCP/IP software and directly apparent
to the application user.
Select LAN to reply to incoming LAN Ping requests. Select W AN to reply to incoming WAN
Ping requests. Otherwise select LAN &W AN to reply to all incoming LAN and WAN Ping
requests.
Select this check box to activate the firewall rules that you define (see Add Firew all Rule
below).
entering.
The NBG5615 applies the firewall rule to traffic initiating from this computer.
Source IP Address Enter the IP address of the computer that initializes traffic for the application or service.
The NBG5615 applies the firewall rule to traffic initiating from this computer.
ProtocolSelect the protocol (TCP, UDP or I CMP) used to transport the packets for which you want
Dest Port RangeEnter the port number/range of the destination that define the traffic type, for example
Source Port
Range
Add RuleClick Add to save the firewall rule.
Firewall Rule
#This is your firewall rule number. The ordering of your rules is important as rules are
Service NameThis is a name that identifies or describes the firewall rule.
MAC addressThis is the MAC address of the computer for which the firewall rule applies.
Dest IP This is the IP address of the computer to which traffic for the application or service is
Source IP This is the IP address of the computer from which traffic for the application or service is
ProtocolThis is the protocol (TCP, UDP or I CMP) used to transport the packets for which you want
Dest Port RangeThis is the port number/range of the destination that define the traffic type, for example
Source Port
Range
ActionDROP - Traffic matching the conditions of the firewall rule are stopped.
DeleteClick Delete to remove the firewall rule.
CancelClick Cancel to start configuring this screen again.
to apply the firewall rule.
TCP port 80 defines web traffic.
Enter the port number/range of the source that define the traffic type, for example TCP
port 80 defines web traffic.
applied in turn.
entering.
initialized.
to apply the firewall rule.
TCP port 80 defines web traffic.
This is the port number/range of the source that define the traffic type, for example TCP
port 80 defines web traffic.
See
Appendix C on page 249 for commonly used services and port numbers.
NBG5615 User’s Guide
159
Chapter 18 Firewall
160
NBG5615 User’s Guide
19.1 Overview
This chapter provides a brief overview of content filtering using the embedded web GUI.
Internet content filtering allows you to create and enforce Internet access policies tailored to your
needs. Content filtering is the ability to block certain web features or specific URL keywords.
19.1.1 What You Need To Know
The following terms and concepts may help as you read through this chapter.
Content Filtering Profiles
CHAPTER 19
Content Filtering
Content filtering allows you to block certain web features, such as cookies, and/or block access to
specific web sites. For example, you can configure one policy that blocks John Doe’s access to arts
and entertainment web pages.
A content filtering profile conveniently stores your custom settings for the following features.
Keyword Blocking URL Checking
The NBG5615 checks the URL’s domain name (or IP address) and file path separately when
performing keyword blocking.
The URL’s domain name or IP address is the characters that come before the first slash in the URL.
For example, with the URL www.zyxel.com.tw/news/pressroom.php
www.zyxel.com.tw
The file path is the characters that come after the first slash in the URL. For example, with the URL
www.zyxel.com.tw/news/pressroom.php
Since the NBG5615 checks the URL’s domain name (or IP address) and file path separately, it will
not find items that go across the two. For example, with the URL
pressroom.php, the NBG5615 would find “tw” in the domain name (www.zyxel.com.tw). It would
also find “news” in the file path (
.
, the file path is news/pressroom.php.
news/pressroom.php
) but it would not find “tw/news”.
, the domain name is
www.zyxel.com.tw/news/
19.2 Content Filter
Use this screen to restrict web features, add keywords for blocking and designate a trusted
computer. Click Security > Content Filter to open the Content Filter screen.
NBG5615 User’s Guide161
Chapter 19 Content Filtering
Figure 96 Security > Content Filter
The following table describes the labels in this screen.
Table 65 Security > Content Filter
LABELDESCRIPTION
Trusted IP SetupTo enable this feature, type an IP address of any one of the computers in your network
Restrict Web
Features
ActiveX A tool for building dynamic and active Web pages and distributed object applications.
JavaA programming language and development environment for building downloadable Web
CookiesUsed by Web servers to track usage and provide service based on ID.
Web ProxyA server that acts as an intermediary between a user and the Internet to provide
Enable URL
Keyword Blocking
that you want to have as a trusted computer. This allows the trusted computer to have
full access to all features that are configured to be blocked by content filtering.
Leave this field blank to have no trusted computers.
Select the box(es) to restrict a feature. When you download a page containing a
restricted feature, that part of the web page will appear blank or grayed out.
When you visit an ActiveX Web site, ActiveX controls are downloaded to your browser,
where they remain in case you visit the site again.
components or Internet and intranet business applications of all kinds.
security, administrative control, and caching service. When a proxy server is located on
the WAN it is possible for LAN users to circumvent content filtering by pointing to this
proxy server.
The NBG5615 can block Web sites with URLs that contain certain keywords in the domain
name or IP address. For example, if the keyword "bad" was enabled, all sites containing
this keyword in the domain name or IP address will be blocked, e.g., URL http://
www.website.com/bad.html would be blocked.
162
Select this check box to enable this feature.
KeywordType a keyword in this field. You may use any character (up to 64 characters). Wildcards
are not allowed. You can also enter a numerical IP address.
Add Click Add after you have typed a keyword.
Repeat this procedure to add other keywords. Up to 64 keywords are allowed.
When you try to access a web page containing a keyword, you will get a message telling
you that the content filter is blocking this request.
NBG5615 User’s Guide
Loading...
+ 103 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.