User`s manual
Version 3.0.1 179 July 2010
MP-20x Telephone Adapter 13. Security
For example, when you point your Web browser to a Web page on the Internet, a request
is sent out to the Internet for this page. When the request reaches MP-20x, the firewall
identifies the request type and origin--HTTP and a specific PC in your home network, in
this case. Unless you have configured access control to block requests of this type from
this computer, the firewall allows this request to pass out onto the Internet (refer to 'WAN
PPPoE' on page 110 for
more on setting access controls). When the Web page is returned
from the Web server the firewall associates it with this session and allows it to pass,
regardless of whether HTTP access from the Internet to the home network is blocked or
permitted.
Note that it is the origin of the request, not subsequent responses to this request, that
determines whether a session can be established or not.
You can choose from among three pre-defined security levels for MP-20x: Minimum,
Typical, and Maximum (the default setting). The table below summarizes the behavior of
MP-20x for each of the three security levels.
Table 13-1: Behavior for the Three Security Levels
Security Level Requests Originating
in the WAN
(Incoming Traffic)
Requests
Originating
in the LAN
(Outgoing Traffic)
Maximum
Security
(Default)
Blocked: No access to home network
from Internet, except as configured in
the Local Servers, DMZ host and
Remote Access screens
Limited: Only commonly- used services,
such as Web- browsing and e-mail, are
permitted
Typical Security
Blocked: No access to home network
from Internet, except as configured in
the Local Servers, DMZ host and
Remote Access screens
Unrestricted: All services are permitted,
except as configured in the Access
Control screen
Minimum
Security
Unrestricted: Permits full access from
Internet to home network; all connection
attempts permitted.
Unrestricted: All services are permitted,
except as configured in the Access
Control screen
These services include Telnet, FTP, HTTP, HTTPS, DNS, IMAP, POP3 and SMTP.
The list of allowed services at 'Maximum Security' mode can be edited in the screen'
'Access Contro'l on page 180'.
Some applications (such as some Internet messengers and Peer-To-Peer client
applications) tend to use these ports if they cannot connect with their own default ports.
When applying this behaviour, these applications are not blocked outbound, even at
Maximum Security Level.