Wireless security, Virtual private networks, Dmz wireless security – Iomega SBG1000 User Manual
Page 22
16
SBG1000 Wireless Cable Modem Gateway User Guide
X
Exit
Overview Installation Troubleshooting Contact
FAQ Specifications Glossary License
Configuration: Basic Gateway TCP/IP Wireless Print Server USB
DMZ
A de-militarized zone (
DMZ
) is one or more computers logically located outside the firewall between an SBG1000
LAN and the Internet. A DMZ prevents direct access by outside users to private data. You can use a DMZ to set up
a web
server
without exposing confidential data on your network. A DMZ is also useful for people playing games
that have a problem running a computer game’s protocol through a firewall. DMZ provides the person playing
games a way to expose a single host directly to the Internet and thus overcome any firewall issues.
Wireless Security
To prevent unauthorized eavesdropping of data transmitted over the wireless LAN, you must enable wireless
security. The default Open authentication setting provides no security for transmitted data.
You can
data transmitted over the IEEE 802.11b wireless interface by configuring a
key on the
Motorola SBG1000 Wireless Cable Modem Gateway and wireless LAN
(stations).
You can also define a MAC access control list to restrict wireless LAN access to specified clients based on the
client
If you enable closed network operation, the network name (ESSID) is not transmitted in the IEEE 802.11b beacon
frame. This provides additional network protection because only IEEE 802.11b stations that are configured with
your network name can associate with the SBG1000. Closed network operation is not part of the IEEE 802.11b
standard
For information about configuring a WEP key, see
“Configuring Basic Wireless LAN Security”
Virtual Private Networks
The SBG1000 allows multiple
operation to securely connect remote computers over the
Internet through the SBG1000. The SBG1000:
•
Is compatible with Point to Point Tunneling Protocol (
) and Layer 2 Tunneling Protocol (
L2TP
)
•
Is fully interoperable with any
client or gateway and
certified IPSec stacks