EasyManua.ls Logo

ZyXEL Communications NSA-220 Plus - Bittorrent Security

ZyXEL Communications NSA-220 Plus
520 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Chapter 7 Applications
NSA-220 Plus User’s Guide
150
7.4.9 BitTorrent Security
When you download using BitTorrent, you reveal your IP address. This increases
the risk of hacking attacks, which can be protected against by a good firewall.
Use a Hardware-based Firewall
Place a hardware-based firewall between your network and the Internet (a
software-based firewall on your computer would just protect the computer itself,
not the NSA since your computer is not between your NSA and the Internet).
Ideally your firewall should have all of the following.
Figure 39 Firewall
Stateful packet inspection to control access between the Internet and your
network and protect your NSA (and computers) from hacking attacks.
Priority Use this field to set the priority for downloading the task.
Select Auto to have the NSA automatically determine the
download task’s priority.
Select High to have the NSA download this file before the other
files.
Comment Enter a description for this download task.
Start Time This field displays when the NSA started to download files.
Completed on This field displays when the file was successfully downloaded to
the NSA.
Info-Hash This information is used to verify the torrent file.
Tracker This field displays the tracker that NSA is currently connected to.
A tracker is a server used for finding peers sharing the file.
Close Click this to close the screen.
Table 32 Applications > Download Service > Task Info
LABEL DESCRIPTION
Hacking
Malicious
Viruses
Packets

Table of Contents

Other manuals for ZyXEL Communications NSA-220 Plus

Related product manuals