User manual

Configuring your RLXIC-EV RLXIC-EV Intelligent Cellular
User Manual RadioLinx® Intelligent Cellular Ethernet Gateway for Verizon
ProSoft Technology, Inc. Page 63 of 104
March 10, 2010
5.9 Security Configuration
The security tab covers firewall type functions, how data is routed or restricted
from one side of the Device to the other, from computers or devices connected to
the Device (LAN) and from computers or devices contacting it from a remote
source (WAN). These features are set as "rules".
Tip: For additional security, it is recommended you change the default password for ACEmanager.
Refer to the Admin chapter.
5.9.1 Solicited vs. Unsolicited
How the device responds to data being routed from one network connection to
the other depends on the origin of the data.
If a computer on the LAN initiates a contact to a WAN location (such as a
LAN connected computer accessing an Internet web site), the response to
that contact would be solicited.
If, however, a remote computer initiates the contact (such as a computer on
the Internet accessing a camera connected to the device), the connection is
considered unsolicited.