Configure appropriate security settings on small office/home office (SOHO) wireless and wired networks Flashcards

CompTIA A+ 220-1102 Exam Criteria

1
Q

Where can I find the Home Router Settings?

A

Home routers are usually supplied by an Internet Service Provider (ISP) and allow you to connect your system in the home network to the Internet. The different settings that can be configured to improve security are discussed below.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why do we needs to change the default passwords?

A

Usernames and passwords are two of the most commonly used methods for protecting our networks, computers, and data. Our equipment comes with default usernames and passwords from the manufacturer. As a best practice for security, these should be changed and should be done during the initial configuration. This is necessary because those usernames and passwords are typically easy to guess and remember. Default router passwords are written in manuals and are available online, so if you’re having trouble configuring your router, check the product manual for the default password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Where can I change the default password?

A

The following is a general description of how to change the password on your router. This will change the password to access the router and make configurations. Because routers are manufacturer-created and not standardized, each one will have a slightly different setup.

Enter your router’s IP address into your favorite web browser. This is also known as the default gateway and can be located in the command line by typing ipconfig.

Log in with the default username and password.

Go to the settings or security tab.

Select Change Router Password or a similar option.

Enter the new password.

Save the new settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why do we need to change a PSK ?

A

Another default password that should be changed is the pre-shared key that connects to the wireless access point and provides Wi-Fi access to devices. Similar to router configuration passwords, these passwords are simple to guess and easy to find. The password is frequently found on the bottom of the device itself. The following is a general description of how to change the password for your pre-shared key. Because routers are manufacturer-created and not standardized, each one will have a slightly different setup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Where can I change the PSK default password?

A

Enter your router’s IP address into your favorite web browser. This is also known as the default gateway and can be located in the command line by typing ipconfig.

Log in with the default username and password unless you have changed it

Click the wireless tab.

In the name or SSID box, change the name of the network to the desired name.

Choose the highest security level possible. It should be WPA2-PSK (AES)

Enter a new passphrase into the text box.

Click Save.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why do we need to use IP Filtering?

A

IP filtering, in conjunction with network address translation (NAT), can help protect your PC and network from malicious actors. Filtering IP addresses allows users to control what traffic enters and exits the network. Rules are created, and packets entering and leaving the network are inspected to ensure that they comply with the rules specified.

Filtering addresses helps to reserve our private address space as well. You can use NAT to conceal your unregistered private IP addresses behind a set of registered IP addresses. This aids in the protection of your internal network from outside networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the some of the common IP filtering techniques?

A

Route Filtering - This process helps filter out undesirable routes. Filters can be applied at the routers either before or after the routes are announced. In some cases, routers do not have enough main memory to store the entire global Border Gateway Protocol table. There is only so much space to store, and the local database is limited in size. Applying filters helps conserve memory. This practice is not recommended because it can result in suboptimal routing or even communication failures with small networks, as well as disrupt the normal flow of traffic.

Firewall Filtering - A firewall is a device or software application that allows or denies network transmissions based on a set of rules. Its purpose is to protect networks from unauthorized access while allowing legitimate traffic to pass through an access control list. Many routers that transfer data between networks include firewall components, and many firewalls can also perform basic routing functions.

Email Filtering - Email filters work by, among other things, matching a regular expression, a keyword, or the sender’s email address. More advanced solutions use IP blacklists, techniques for classifying documents, and complex image analysis algorithms to prevent messages from reaching protected mailboxes. Clean messages are delivered to the user’s mailbox, while tainted messages are routed to a quarantine application for review or even ignored. Email filtering can be very useful within an organization but can become a problem when an IP is improperly blacklisted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the disadvantages of IP filtering?

A

Disadvantages of IP Filtering:

Malicious traffic is frequently routed through Botnets, allowing it to bypass the filter.

It can be easily circumvented by using IP spoofing, VPNs, or proxies.

When using NAT, IP addresses are frequently shared by multiple users.

Maintaining the Blacklist can become a tedious task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the benefits of firmware updates?

A

Firmware Updates

Firmware is software that is embedded in hardware. Simply put, it is “software for hardware.” However, because software differs from firmware, the two terms should not be used interchangeably. Devices that you might consider to be strictly hardware, such as an optical drive, network card, programmable switches, and routers, all have software programmed into a special chip contained within the hardware itself. This tells the piece of hardware how to act and what to do. Firmware updates are released by equipment manufacturers to improve performance or add new features to their devices. You can get these updates by going to the manufacturer’s website.

Below are the common steps to updating your home router’s firmware:

Connect the router to your PC. You will need an Ethernet cable.

Open your browser, navigate to the manufacturer’s website, and locate the firmware update. Download it.

Files will usually be zipped. Unzip them.

Enter your router’s IP address into your web browser.

Log in with the default username and password unless you have changed it.

On the home page, select the downloaded firmware to update your router.

Select the firmware file previously downloaded and uploaded.

Reboot your router to finish the upgrade.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Content Filtering?

A

There are numerous reasons why users choose to restrict access to certain content, including online gambling, social networking sites, dating sites, intellectual property, child safety, and national security. Content filtering is not just enabled at the end user’s terminal, it is done throughout the data movement process. There are national mandates that are in place banning traffic and content from other specified countries.

ISP carriers may install blocking tools and filters to control traffic on the network. At the local network level, end users’ terminals are required to meet specifications in the network security policy. Enterprise environments will typically have a well-designed content filtering program, whereas SOHO environments will not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Whare are the consideration of content filtering?

A

Who will be subject to the filtering?

How well defined will the policy be?

How will this affect the end-user, and what are the possible negative outcomes?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the common type of Content Filtering?

A

IP & Protocol Based Blocking - IP-based blocking entails installing network barriers such as firewalls that block all traffic to a specific set of IP addresses. Protocol-based blocking employs other low-level network identifiers, such as a TCP/IP port number that can identify a specific application on a server or a type of application protocol. These fundamental approaches to content blocking do not block content directly; rather, they block traffic to known IP addresses, TCP/IP ports, or protocols associated with some content or an application. IP and protocol-based blocking can also be performed on user computers by software, typically for network security reasons.

Firewall & Deep Packet Inspection (DPI) - Devices that sit between the end-user and the rest of the Internet and filter based on specific content, patterns, or application types are used. Because all content must be evaluated against a pre-defined set of rules, this type of network blocking is computationally intensive and thus considered expensive. DPI blocking can also be done by software on user computers, typically for network security reasons. DPI blocking requires some type of signature or information about the content to be effective. Keywords, traffic characteristics such as packet sizes or transmission rates, filenames, or other content-specific information may be included. DPI blocking is a powerful tool for blocking or throttling specific applications, such as peer-to-peer file-sharing or Voice over IP (VoIP) traffic and data file types.

URL Blocking - URL-based blocking is a popular blocking method that can occur on a single computer or in a network device that connects the computer to the rest of the Internet. URL blocking only works with web-based applications and is not intended to be used to block non-web applications. A URL blocking filter intercepts the flow of web traffic and compares the URL in the HTTP request to a local database or online service. The URL filter will allow or deny the requested connection to the webserver based on the response.

Platform Blocking - The most common type of platform blocking is search engine blocking. This technique is frequently considered for other platforms with user communities like entertainment or social media sites. It is extremely difficult to use network-based or URL-based techniques to block individual content elements, such as a specific news article. Access to the entire site would have to be blocked in order to block the content.

DNS-Based Content Blocking - DNS-based content blocking examines and controls DNS queries. A specialized DNS resolver performs two functions in DNS-based content blocking: in addition to performing DNS lookups, the resolver checks names against a block list. When a user’s computer attempts to use a blocked name, the special server returns erroneous information, such as the IP address of a server displaying a notice that the content has been blocked. As a result, the user can’t easily access the content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why is Physical Placement important in securing your SOHO network?

A

A SOHO router is designed and marketed specifically for small and home offices. It can handle more traffic because of enhanced equipment. A SOHO network can consist of both wired and wireless computers. Because these networks are also intended for business use, they may include printers as well as voice over IP (VoIP) and fax over IP technology. Where the router/access point is setup in a SOHO environment can play a big part in its ability to function at the highest level with wireless clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some suggestions you can apply in terms of Physical placement of a router?

A

Place the router/access point as close to the center of the environment as possible. Signal strength radiating from your wireless access point degrades the further out it goes. If placed in the center of the environment, the coverage space can be maximized.

Place the router/access point as high as possible so the signal radiates evenly and disperses throughout the SOHO environment.

Use additional access points or a repeater to extend the signal. If areas of the SOHO environment are getting signals, additional access points can be added, or repeaters can be used to extend the signal from the original router/access point.

Minimize the number of walls that can interfere with the signal. The wavelengths can have trouble penetrating through walls, especially in the 5GHZ range.

Do not place them inside cabinets. This degrades the signal because it bounces around in the cabinet.

Electronic and common household devices can be working on the same frequencies that our traffic is being carried and can create interference. Microwaves and remote controls are known for working within the 2.4 GHz range.

Disable the WPS button. This feature allows users to enter the network without having to enter the credentials. On the router, a button is pressed that broadcasts out a signal, which is then used to connect to the network. This is very problematic, and thus the WPS button should be disabled for best security practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the security concerns for small business in regards to a SOHO network?

A

There are some security concerns inherent within a SOHO network. Small businesses, unlike larger corporations, typically cannot afford to hire a professional staff to manage their networks. Because of their financial and community standing, small businesses are more likely to be targets of security attacks than households.

It can be difficult to know how much to invest in network infrastructure to meet a company’s future needs as it grows. Overinvesting too soon wastes money, while underinvesting can have a negative impact on business productivity. Monitoring network load and the responsiveness of the company’s top business applications can aid in the identification of bottlenecks before they become critical.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why do we utilize DHCP Reservations?

A

In SOHO and enterprise environments, you are likely to be using a dynamic host configuration protocol to manage the IP space. DHCP is responsible for distributing IP addresses to the network. In a SOHO environment, this is likely built into the capability of the router. In an enterprise environment, this is likely to be a function of a server. DHCP will automatically distribute an IP address to a machine entering the network.

Would we want devices to have the same IP address all the time? The answer is yes. Some devices like printers and servers should be statically set in the network because they provide services and should be easily found. In order to set a device statically and ensure that DHCP is not going to give it to another machine, a DHCP reservation needs to be set.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How can I configure DHCP Reservation?

A

Open the command line and type ipconfig /all. Capture the details for the default gateway and the MAC address of the machine. A Wi-Fi card and Ethernet port need to have two different MAC addresses and will have to have a different IP as well. Write down whichever IP you use the most.

Enter your router’s IP address into your web browser. This is also known as the default gateway and can be located in the command line by typing ipconfig.

Log in with the default username and password unless you have changed it.

Find the DHCP reservation setting. It might also be listed under Static Lease or some variation.

Type in the MAC address of the desired machine for the MAC address field.

Type in the IP address desired for the Static IP address field.

Repeat the steps for any other computers, servers and printers that require a static address.

18
Q

What is a static WAN IP?

A

A wide area network IP is a public or global IP address that is routable on the Internet. This type of address is usually assigned via an Internet Service Provider and gives users access to the World Wide Web. You can find out what your WAN IP address is by a simple search on the Internet. This is different than the Local Area Network (LAN), where an IP will be given from the private IP address range from a DHCP server or after being statically set.

19
Q

What are the Public and Private ranges?

A

Public IP Ranges:

Class A: 1.0.0.0 - 126.255.255.255

Class B: 128.0.0.0 - 191.0.1.255

Class C: 192.0.0.0 - 198.17.255.255

Private Ranges:

Class A: 10.0.0.0 — 10.255.255.255

Class B: 172.16. 0.0 — 172.31.255.255

Class C: 192.168. 0.0 — 192.168.255.255

20
Q

What is a screened subnet?

A

A screened subnet, DMZ, or triple-homed firewall all refer to a network in which a firewall with three network interfaces is used. This enables it to provide some additional protection against cyber-attacks from outside sources.

A separate network is established in which internet-facing appliances can be installed. For example, Techies Company hosts a website on a web server that is set up to be in the screened subnet. When a user searches for the web page on the internet, they will only be able to access the screened subnet area. All of Techies Company’s private data that they do not want to be exposed is kept on a separate network. If an employee from Techies Company was working from home, they would be able to use their credentials to authenticate and get into the subnet.

21
Q

What is a SSID?

A

The Service Set Identifier is the name of the wireless access point, which allows users to connect to the network and have access to Wi-fi. Routers are shipped with a default SSID from the manufacturer. Changing this can help to improve the posture for security reasons. Usually, default SSIDs are paired with default passwords on the internet documentation and can help threat actors identify the type of router being used. It is easier for them to find and execute this information to exploit your wireless network.

22
Q

How can I change the SSID?

A

To change the SSID, generic instructions are provided below:

Enter your router’s IP address into your favorite web browser. This is also known as the default gateway and can be located in the command line by typing ipconfig.

Log in with the default username and password unless you have changed it.

Go to the wireless menu.

Change the default SSID to the desired SSID.

It is also recommended that you change the Pre-Shared Key (PSK).

Save the new settings.

23
Q

What are the other considerations in terms of SSID set up?

A

To disable the SSID broadcast, generic instructions are provided below:

Enter your router’s IP address into your favorite web browser. This is also known as the default gateway and can be located in the command line by typing ipconfig.

Log in with the default username and password unless you have changed it.

Go to the wireless menu.

Enable the checkbox to hide SSID.

It is recommended that you also change the default SSID to a desired SSID.

Best practice is to change the Pre-Shared Key (PSK) as well.

Save the new settings.

24
Q

What are the encryption settings for a SOHO?

A

To provide maximum protection, wireless network security relies on a combination of encryption, authentication, and authorization. Encryption is concerned with protecting information within a session, reading the information in a data stream and modifying it so that it is unreadable to users outside the network.

Routers will receive packets of information from a device and apply the encryption standard to them. Block cipher is most commonly used, where a set size of data is filled and then encrypted in chunks. There are also stream ciphers that encrypt information bit by bit, instead of waiting for a block to fill to encrypt.

25
Q

What are the four available encryption protocols available on most routers today?

A
  1. Wired Equivalent Privacy (WEP) encrypts information packets as they are sent out from the access point or wireless network card using the RC4 stream cipher algorithm. Once the access point receives the packets sent by the user’s network card, it decrypts them. Instead of being encrypted in blocks, each byte of data is encrypted bit by bit with a unique packet key. This ensures that if a hacker cracks the packet key, the only information leaked is that which is contained in that packet. A pre-shared password, a state array, and an initialization vector are combined to form the packet key (IV). The IV is a computer-generated 3-byte random number. It is either prepended or appended to the ciphertext before being sent to the receiver, where the computer removes the IV before decrypting the ciphertext. All and all, this encryption is a very weak encryption standard and was almost immediately cracked upon its release.
  2. Wi-fi Protected Access (WPA) encrypts information packets as they are sent out from the access point or wireless network card using the Temporal Key Integrity Protocol (TKIP). This protocol is considered to be cracked and is no longer considered safe. When a device connects to a WPA network successfully, keys are generated through a four-way handshake between the access point and the device. A message integrity code is included when TKIP encryption is used to ensure that the data is not spoofed. It takes the place of WEP’s weaker packet guarantee, known as cyclic redundancy check. All in all, this encryption standard is better than WEP but has since been updated.
  3. Wi-fi Protected Access 2 (WPA2) encrypts information packets as they are sent out from the access point or wireless network card using the Advanced Encryption Standard (AES) algorithm. When WPA2 is enabled with the strongest encryption option, anyone within network range may be able to see the traffic, but it is scrambled using the most recent encryption standards and is accepted by the Department of Defense as the industry standard. This standard has stood for quite some time and is still continued to be supported.
  4. Wi-fi Protected Access 3 (WPA3) is the most recent generation of Wi-Fi security, released in 2018. It has not yet gained widespread acceptance, but it aims to improve some security aspects that WPA2 lacks, such as securing open networks, protecting simple passwords, and simplifying device configuration.
26
Q

Why is suggested to disable Guest Accounts?

A

Most routers allow the capability to create separate networks for your personal devices and guests who are accessing the Wi-fi. In high traffic areas where customers may need Wi-fi, for example, coffee shops, a guest network will be vital. In general, if one is not needed, you may want to consider disabling the account. It is inherently not secure, so it is susceptible to unwanted connections. The more users connecting to the Wi-fi and using the bandwidth, the slower the service will be. Also, guest networks are the first door into your network for a skilled threat actor. Below are the generic steps for you to access your router and check to make sure the guest account is disabled. Each router will have a slightly different interface due to them being manufacturer-specific.

27
Q

How can you disable Guest Accounts?

A

Enter your router’s IP address into your favorite web browser. This is also known as the default gateway and can be located in the command line by typing ipconfig.

Log in with the default username and password unless you have changed it.

Go to the wireless menu.

On the main pane, you should see the guest network. Make sure the check box is not enabled; deselect it if it is.

Click Save.

28
Q

Why would you change wireless channels on a router?

A

Wi-Fi channels are the channels that your wireless Internet network uses to send and receive data. Having more channels can help your Internet connection run faster. The number of WiFi channels that you have and are able to use is determined by the type of router that you have. Most routers use the 2.4 GHz frequency, which has 14 channels and the 5 GHz frequency, which has 45 channels. Each one of these network types has its advantages and disadvantages. We will cover those below and give a generic description of how to access and change the channel of your Wi-Fi.

29
Q

How does the 2.4ghz channel work?

A

2.4 GHz, as previously stated, has 14 channels. This may appear to be sufficient, but keep in mind that these signals are radio waves that radiate omnidirectionally. As a result, there are only three recommended channels that you should use so that their frequencies do not overlap and can help with signal interference. Channels 1, 6, and 11 do not overlap and are the three channels recommended for 2.4 GHz networks. It is a slower standard because the 2.4 GHz network has fewer channels and, thus, fewer lanes for traffic to move. It also happens to be a frequency that many of our household appliances, such as microwaves, remote controls, and IoT devices, use, which can cause interference with the frequency. The advantage of using a 2.4 GHz network is its coverage area and ability to spread through an environment regardless of walls.

30
Q

How does 5Ghz channel work?

A

5 GHz, has 45 channels. This is adequate and provides some flexibility in terms of channels and channel bonding to increase speed on the 5 GHz network. It is not imperative to choose a channel like 1, 6, or 11 due to channel availability. It is a faster standard than the 2.4 GHz network, which has fewer channels and thus fewer traffic lanes. The main disadvantage of using a 5 GHz network is its limited coverage area and ability to spread through walls. The signals are shorter and choppier, and they do not radiate as well as 2.4 GHz signals. The signals have a difficult time passing through structures.

31
Q

How do you change Channels on your Wireless channel?

A

Use a Wi-Fi analyzer to see other networks around you. For the 2.4 GHz network, determine the best channel to switch to 1, 6 or 11.

Enter your router’s IP address into your favorite web browser. This is also known as the default gateway and can be located in the command line by typing ipconfig.

Log in with the default username and password unless you have changed it.

Go to the wireless menu.

Click on each standard 2.4 and 5 GHz.

On the main pane of each page, you should see the channel.

Select the desired channel.

Click Save.

32
Q

What is PnP and UPnP?

A

PnP and UPnP are 2 terms that are very similar but have some clear distinctions. Plug and play (PnP) is a collection of operating system standards that enable hardware connectivity via automatic device detection and configuration. When new hardware is connected to a computer, it is automatically detected, and the necessary files and drivers are installed, allowing the hardware to function and communicate.

Universal Plug and Play (UPnP) is a set of protocols and technologies that enable devices to discover and connect to one another automatically. When it functions properly, it automates all of the complex steps required for devices to communicate with one another, whether directly or through a network. To support zero-configuration networking, Universal Plug and Play employs standard networking protocols.

33
Q

What are the functions of UPnP?

A

Provides an HTML-based user interface for controlling or viewing the device’s status.

The device is updated.

Gives an IP address to the device and informs the network.

Describes the device’s capabilities, such as whether it is a server, printer, or scanner, as well as the device’s network availability and shares to the other network devices.

Common uses for Universal Plug and Play:

Adding a network-attached printer.

Using a media server to share photos and stream content.

Home Automation & Surveillance.

34
Q

What are the flaws of using UPnP?

A

However, this technology is not without flaws. There can be issues with security. The main problem with Universal Plug and Play is that it lacks an authentication mechanism. It simply trusts that the devices attempting to access and use the network are legitimate and grants access. Many of the network security features put in place to stop threat actors can be circumvented by a compromised computer. This risk, however, can be greatly mitigated with proper implementation.

35
Q

What are Firewalls used for on wireless routers?

A

SOHO routers have firewalls. The firewall settings can be configured to filter specific types of traffic from the Internet, disable unused ports, or access a particular device in the internal network.

36
Q

Why is it preferred to consider port security and Disable Unused Ports?

A

Ports are logical, and port number ranges from 0 to 65,353. Well-known Port numbers have a range from 0 to 1023 and are reserved for common TCP/IP applications. Registered Ports are for other less common protocols and range from 1024 to 49,151. The remaining range from 49,152 to 65,535 is covered by Dynamic Ports, which the computer uses to help monitor traffic.

Some ports may need to be open depending on what you do, while others may not. To keep computers secure, the state of their security should be frequently assessed. This is referred to as hardening the computer and decreasing the attack surface. For instance, if you are housing a web server, you would want to ensure that you have HTTP and HTTPS protocols enabled. Each of these has a standard port associated with its traffic. HTTP uses port 80, which is insecure, whereas HTTPS uses port 443, which uses TLS to provide encryption and is considered relatively safe. When you assess the networks and computers, you can determine the ports and protocols you need to use and harden the system accordingly.

37
Q

What are the most known ports used?

A

The following are some common ports:

20/21 - File Transfer Protocol (FTP)

22 - Secure Shell (SSH)

23 - Telnet

25 - Simple Mail Transfer Protocol (SMTP)

53 - Domain Name System (DNS)

67/68 - Dynamic Host Configuration Protocol (DHCP)

80 - Hypertext Transfer Protocol (HTTP)

110 - Post Office Protocol 3 (POP3)

137/139 - Network Basic Input/Output System (NetBIOS)/NetBIOS over TCP/IP (NetBT)

143 - Internet Mail Access Protocol (IMAP)

161/162 - Simple Network Management Protocol (SNMP)

389 - Lightweight Directory Access Protocol (LDAP)

433 - Hypertext Transfer Protocol Secure (HTTPS)

445 - Server Message Block (SMB)/Common Internet Files (CIFS)

3389 - Remote Desktop Protocol (RDP)

38
Q

What is the use of Port Forwarding/Mapping?

A

Port forwarding allows computers on the Internet to connect to a computer in a private network. It works in conjunction with Network Address Translation (NAT). For instance, if a user wants to connect to their PC remotely using remote desktop protocol, they will send a request to their public IP address over port 3389. The home router will have to be configured with port forwarding to send the traffic to the computer. Typically, there will be a port forwarding page where you will enter the port and IP addresses to which the permissions will be applied.

Remote desktop also has to be enabled on the home computer. Once configured, the remote desktop connection will be allowed, and port forwarding will occur. That is one example of port forwarding, but it has several other uses, including Backups, Virtual Desktops, CCTV and Security & Game servers, to name a few.

39
Q

What steps do you need to take to create port forwarding?

A

Generic steps to configure a router with port forwarding. Each router will have a slightly different interface due to them being manufacturer-specific.

Enter your router’s IP address into your favorite web browser. This is also known as the default gateway and can be located in the command line by typing ipconfig.

Log in with the default username and password unless you have changed it.

Click the Port Forwarding configuration page.

Name the application.

Enter the external port number.

Enter the internal port number.

Enter the IP address of the computer being connected to.

Check Enabled.

Click Save.

40
Q
A