ZyXEL N4100 사용자 가이드
Chapter 4 System Setup
N4100 User’s Guide
67
4.3 Technical Reference
The following section contains additional technical information about the N4100
features described in this chapter.
features described in this chapter.
User Session
Limited
Limited
Select Unlimited to not place any restriction on the number of sessions
that each user connected to the N4100 can use.
that each user connected to the N4100 can use.
Select the other radio button and type a number (from 1 to 1024) if you
want to specify how many sessions each user connected to the N4100
can use.
want to specify how many sessions each user connected to the N4100
can use.
Layer 2
Isolation
Security
Isolation
Security
If you activate NAT, select Enable in this field to prevent communication
between subscribers. This is the default selection.
between subscribers. This is the default selection.
Select Disable, to deactivate layer 2 security and allow communication
between subscribers.
between subscribers.
Secure
administrator
IP addresses
administrator
IP addresses
Select Any to use any computer to access the web configurator on the
N4100.
N4100.
Select Specify and then enter the IP address(es) or ranges of IP
addresses of the computer(s) that are allowed to log in to configure the
N4100. The addresses can be on the LAN or the WAN.
addresses of the computer(s) that are allowed to log in to configure the
N4100. The addresses can be on the LAN or the WAN.
Multicast Pass
Through
Through
Select Enable to allow multicast traffic to pass through the N4100. This
may affect your network performance.
may affect your network performance.
Select Disable to prevent any multicast traffic from passing through the
N4100. This is the default setting.
N4100. This is the default setting.
Allow remote
user to ping
the device
user to ping
the device
This feature affects the security of the N4100’s WAN port. Ping (Packet
INternet Groper) is a protocol that sends out ICMP echo requests to test
whether or not a remote host is reachable. Select Enable to have the
N4100 respond to incoming Ping requests from the WAN. This is less
secure since someone on the Internet can see that the N4100 is there by
pinging it.
INternet Groper) is a protocol that sends out ICMP echo requests to test
whether or not a remote host is reachable. Select Enable to have the
N4100 respond to incoming Ping requests from the WAN. This is less
secure since someone on the Internet can see that the N4100 is there by
pinging it.
Select Disable to have the N4100 not respond to incoming Ping requests
from the WAN. This is more secure since someone on the Internet cannot
see that the N4100 is there by pinging it.
from the WAN. This is more secure since someone on the Internet cannot
see that the N4100 is there by pinging it.
SSL Certificate Secure Socket Layer (SSL) security allows you to create secure
connections between the N4100 and the management or subscriber
computer(s).
computer(s).
Select Default to use the default system-generated SSL certificate.
Select Customer Certificate to use a certificate obtained from a
certificate authority.
certificate authority.
for more information.
Apply
Click Apply to save your changes back to the N4100.
Table 7 ADVANCED > SYSTEM (continued)
LABEL
DESCRIPTION