Coming Soon: GET-IT: Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET-IT: Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET
Alcatel

Features of the Built-In Firewall in Alcatel SpeedTouch Pro

Do I need a firewall with the Alcatel ADSL modem? Can I disable it?

No, actually you don’t need the firewall. After converting your SpeedTouch Home modem to the Pro version, a firewall (built-in in the modem) is activated by default. You can check this by using software like Zone Alarm to see if attacks take place. You can also check this within the modem:

  1. Open a telnet session to the modem ("start" – "run" – "telnet 10.0.0.138").

    Sponsored Content

    Say Goodbye to Traditional PC Lifecycle Management

    Traditional IT tools, including Microsoft SCCM, Ghost Solution Suite, and KACE, often require considerable custom configurations by T3 technicians (an expensive and often elusive IT resource) to enable management of a hybrid onsite + remote workforce. In many cases, even with the best resources, organizations are finding that these on-premise tools simply cannot support remote endpoints consistently and reliably due to infrastructure limitations.

  2. When asked for a username, type your username and password (the one you’ve configured here Upgrade from Alcatel SpeedTouch Home to Pro)

  3. At the prompt type "ip" (without the quotes)

  4. At the new prompt type "config" (without the quotes).

You can disable/enabled the firewall using:

​Config firewalling=off

config firewalling=on

Links

Alcatel SpeedTouch Support page

Related Topics:

BECOME A PETRI MEMBER:

Don't have a login but want to join the conversation? Sign up for a Petri Account

Register
Comments (0)

Leave a Reply

Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: