User's Manual
Table Of Contents
- Reference Manual for the Model FWAG114 Cable/ DSL Wireless ProSafe Firewall
- Contents
- About This Manual
- Chapter 1 Introduction
- Chapter 2 Connecting the Firewall to the Internet
- Chapter 3 Wireless Configuration
- Chapter 4 Firewall Protection and Content Filtering
- Chapter 5 Maintenance
- Chapter 6 Advanced Configuration
- Chapter 7 Troubleshooting
- Appendix A Technical Specifications
- Appendix B Network, Routing, Firewall, and Basics
- Appendix C Preparing Your Network
- Appendix D Wireless Networking Basics
- Glossary
- Index
- About This Manual
- Chapter 1 Introduction
- Chapter 2 Connecting the Firewall to the Internet
- Chapter 3 Wireless Configuration
- Observe Performance, Placement, and Range Guidelines
- Implement Appropriate Wireless Security
- Understanding Wireless Settings
- Chapter 4 Firewall Protection and Content Filtering
- Firewall Protection and Content Filtering Overview
- Block Sites
- Using Rules to Block or Allow Specific Kinds of Traffic
- Services
- Using a Schedule to Block or Allow Specific Traffic
- Getting E-Mail Notifications of Event Logs and Alerts
- Viewing Logs of Web Access or Attempted Web Access
- Configuring E-Mail Alert and Web Access Log Notifications
- Chapter 5 Maintenance
- Chapter 6 Advanced Configuration
- Chapter 7 Troubleshooting
- Appendix A Technical Specifications
- Appendix B Network, Routing, Firewall, and Basics
- Appendix C Preparing Your Network
- Appendix D Wireless Networking Basics
- Glossary
- Index
Reference Manual for the Model FWAG114 Cable/DSL Wireless ProSafe Firewall
Network, Routing, Firewall, and Basics B-3
195.34.12.7
The latter version is easier to remember and easier to enter into your computer.
In addition, the 32 bits of the address are subdivided into two parts. The first part of the address
identifies the network, and the second part identifies the host node or station on the network. The
dividing point may vary depending on the address range and the application.
There are five standard classes of IP addresses. These address classes have different ways of
determining the network and host sections of the address, allowing for different numbers of hosts
on a network. Each address type begins with a unique bit pattern, which is used by the TCP/IP
software to identify the address class. After the address class has been determined, the software
can correctly identify the host section of the address. The follow figure shows the three main
address classes, including network and host sections of the address for each address type.
Figure 7-1: Three Main Address Classes
The five address classes are:
•Class A
Class A addresses can have up to 16,777,214 hosts on a single network. They use an eight-bit
network number and a 24-bit node number. Class A addresses are in this range:
1.x.x.x to 126.x.x.x.
•Class B
Class B addresses can have up to 65,354 hosts on a network. A Class B address uses a 16-bit
network number and a 16-bit node number. Class B addresses are in this range:
7261
C
lass A
N
etwork Node
C
lass B
C
lass C
Network Node
Network Node