ZyXEL Communications PLA-470 V2 - V3.0.5 Guía de instalación Pagina 250

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 349
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 249
To test the good operation of the PLC network, it can also be useful to run
“Ping” commands from the PC connected to the PLC network to the InternetBox as
illustrated in Figure 10.13.
For this purpose, all the PCs or terminals must be in the same addressing plane
as the InternetBox (for example, for an IP network of the 192.168.10.x type, the
InternetBox is in IP = 192.168.10.1 and the other devices in IP = 192.168.10.100,
101, 102, and so forth). The configuration of the network address (or IP) for a PC is
detailed in Chapter 9.
To start the “Ping” command, just proceed as follows:
Click on “Start” then on “Execute.”
Enter cmd. A DOS window opens.
Enter the following command:
C:\>ping 192.168.10.1
Pinging 192.168.10.1 with 32 bytes of data :
Reply of 192.168.10.1 : bytes=32 time=3 ms TTL=64
Reply of 192.168.10.1 : bytes=32 time=2 ms TTL=64
Reply of 192.168.10.1 : bytes=32 time=2 ms TTL=64
Reply of 192.168.10.1 : bytes=32 time=2 ms TTL=64
If replies are sent back with this command, this means that the network links are
configured and ready to be used by applications.
Firewall
The connection to the Internet network can provide access to the home network to
ill-intentioned people. The only solution to prevent these attacks consists of using a
firewall. The purpose of a firewall is to authorize certain protocols only, within the
home network, depending on the port number used.
Each protocol uses a specific port number (e.g., port 80 for HTTP [hypertext
transfer protocol] which enables it to be recognized as such by the network). By only
authorizing certain ports and therefore certain applications, such as electronic mail,
HTTP, or FTP, all the other ports are prohibited.
Among the many firewalls available on the market, there are free ones such as
those available in Linux distributions using a 2.4 or 2.6 kernel.
Windows XP enables you to establish software firewalling rules for a station’s
network connection but not for the entire network, unlike hardware firewalls,
which can prohibit a protocol for an entire network.
To access the Windows XP software firewall, just proceed as follows:
In the Configuration panel, select “Network connection” to display the win-
dow illustrated in Figure 10.14.
Select “Ethernet network connection” to display the dialogue box illustrated in
Figure 10.15.
Click on the “Advanced” tab and click on “Settings” to display the Windows
Firewall dialog box as illustrated in Figure 10.16.
In the “General” tab, tick the “On” box (recommended).
Configuring Security Parameters 231
Vista de pagina 249
1 2 ... 245 246 247 248 249 250 251 252 253 254 255 ... 348 349

Comentarios a estos manuales

Sin comentarios