Motorola AP-51XX 사용자 설명서

다운로드
페이지 698
Configuring Access Point Security
6-33
4.
Click 
Apply
 to save any changes to the Subnet Access screen. Navigating away from the 
screen without clicking the Apply button results in all changes to the screens being lost. 
5.
Click 
Undo Changes
 (if necessary) to undo any changes made. Undo Changes reverts the 
settings displayed on the Subnet Access screen to the last saved configuration.
6.
Click 
Logout
 to securely exit the Access Point applet. A prompt displays confirming the 
logout before the applet is closed.
6.10.1.1 Available Protocols
Protocols that are not pre-configured can be specified using the drop down list within the 
Transport 
column within the Subnet Access and Advanced Subnet Access screens. They include:
ALL - Enables all of the protocol options displayed in the drop-down menu (as described 
below).
TCP - Transmission Control Protocol is a set of rules for sending data as message units over 
the Internet. TCP manages individual data packets. Messages are divided into packets for 
efficient routing through the Internet.
UDP User Datagram Protocol is used for broadcasting data over the Internet. Like TCP, UDP 
runs on top of Internet Protocol (IP) networks. Unlike TCP/IP, UDP/IP provides few error 
recovery services. UDP offers a way to directly connect, and then send and receive 
datagrams over an IP network. 
ICMP - Internet Control Message Protocol is tightly integrated with IP. ICMP messages are 
used for out-of-band messages related to network operation. ICMP packet delivery is 
unreliable. Hosts cannot count on receiving ICMP packets for a network problem.
AH - Authentication Header is one of the two key components of IP Security Protocol (IPsec). 
The other key component is Encapsulating Security Protocol (ESP).
AH provides authentication, proving the packet sender really is the sender, and the data 
really is the data sent. AH can be used in transport mode, providing security between two 
end points. Also, AH can be used in tunnel mode, providing security like that of a Virtual 
Private Network (VPN).
ESP Encapsulating Security Protocol is one of two key components of IP Security Protocol 
(IPsec). The other key component is Authentication Header (AH). ESP encrypts the packets 
and provides authentication services. ESP can be used in transport mode, providing security 
End Port
Enter the ending port number for a port range. If the protocol uses 
a single port, leave the field blank. A new entry might use Web 
Traffic 
for its name, TCP for its protocol, and 80 for its port number.