Symbol Technologies WS 2000 User Manual

Page 41

Advertising
background image

Step 8: Configure Subnet Access

1. Click in a cell of the table that represents the subnet-to-subnet (or subnet-to-WAN)

relationship to define. All access rules (if any are defined) appear in the table in the
lower-half of the screen.

2. Use the pulldown menu above the list Allow or Deny all the entries specified in the

exception table. You cannot allow some protocols (or ports) and deny others.

3. From the list of checkboxes on the left side, select those protocols to allow or deny. The

protocols are automatically added to the table with the relevant Name, Transport, Start
Port, and End Port information. The available protocols are:

Protocol Transport,

Port Used

Description

HTTP

TCP, 80

Hypertext Transfer Protocol (HTTP) is the protocol for
transferring files on the World Wide Web. HTTP is an
application protocol that runs on top of the TCP/IP suite
of protocols, the foundation protocols for the Internet.

TELNET TCP, 23

TELNET is the terminal emulation protocol of TCP/IP.
TELNET uses TCP to achieve a virtual connection
between server and client, then negotiates options on
both sides of the connection.

FTP

TCP, 21

File Transfer Protocol (FTP) is an application protocol
that uses the Internet’s TCP/IP protocols. FTP provides
a simple and efficient way to exchange files between
computers on the Internet.

SMTP

TCP, 25

Simple Mail Transfer Protocol (SMTP) is a TCP/IP
protocol used for sending and receiving email. Due to
its limited ability to queue messages at the receiving
end, SMTP is often used with POP3 or IMAP. SMTP
sends the email, and then POP3 or IMAP receives the
email.

POP

TCP, 109:110

Post Office Protocol (POP3) is a TCP/IP protocol
intended to permit a workstation to dynamically access
a maildrop on a server host. A workstation uses POP3
to retrieve email that the server is holding for it.

DNS

TCP+UDP, 53

Domain Name Service (DNS) protocol searches for
resources using a database that is distributed among
different name servers.

• You can make changes to the information automatically filled into the table;

however, note that changes in the selected transport type can change the port
numbers that can be specified in the table.

4. To add an access rule for a protocol, port, or transport other than the ones available

from the checkboxes on the left, click the Add button. An empty row is added to the
table.

• Specify a Name to identify the new access rule. This could be the name of a

particular application, for example.

Copyright © 2004 Symbol Technologies, Inc. All Rights Reserved

41

WS 2000 Wireless Switch: 1.0 Date of last Revision: March 2004

Advertising