Page 26 / 35 Scroll up to view Page 21 - 25
25
3.6.4
Passthrough
VPN:
VPN including PPTP, IPSEC and L2TP, if checked, the internal network and external
network can directly establish a corresponding VPN services, without NAT affect
FTP:
FTP server with non-standard port, can prevent the conflict which has established a
connection with fit data channel
NetMeeting: T
he internal network NetMeeting services establish connections directly with external
network NetMeeting services, without NAT affect
3.6.5
DMZ
If you have a client PC that cannot run Internet application properly from behind the NAT firewall
or after configuring the Special Applications function, then you can open the client up to
unrestricted two-way Internet access. Enter the IP address of a DMZ host to this screen. Adding a
client to the DMZ (Demilitarized Zone) may expose your local network to a variety of security risks,
so you can only use this option as a last resort.
Page 27 / 35
26
3.7
Firewall
3.7.1
Firewall Options
The router provides extensive firewall protect by restricting connections to reduce the risk of
intrusion and defending against a wide array of common hacker attacks. However
for applications
that require unrestricted access to the Internet, you can configure a specific client/server as a
demilitarized zone.
Firewall Options Select the functions that firewall supports. The selections include Enable Hacker
Attack Protect ,Discard PING from WAN side, Deny PING to the Gateway, Drop Port Scan packets,
Allow to Scan Security Port (113),Discard NetBIOS Packets, Accept Fragment Packets and Send
ICMP Packets When Error is Encountered.
3.7.2
Client Filtering
You can filter Internet client based on IP addresses, port, application types, and time of day.
For example, this screen shows that clients in the address rang 192.168.0.2-4 are permanently
restricted from using WEB(Port 80) are blocked from browsing the Internet from Monday through
Friday.
Page 28 / 35
27
IP Address:
Enter the starting/ending IP address.
Port:
Enter the port range based over the protocol for access policy.
Type:
Select one protocol (TCP/UDP/Both) from the drop-down menu.
Block Time:
Always or manually set the filter time.
Day:
Select the day(s) to run the access policy.
Time:
Select the time range of client filter.
Comment:
You can add some comment for this item.
3.7.3
URL Filtering
To configure the URL Filtering feature, please specify the web sites and/or web URLs containing
the keyword you want to filter on your network. You can deny or allow Internet access for the URL
addresses.
For example, in this screen you can see that clients in the address rang 192.168.0.100-200 are
unable to browsing the sites (
www.google.com
).
Page 29 / 35
28
3.7.4
MAC Filtering
The MAC address filter enables you to allow or restrict specified nodes from communicating with
other nodes.
MAC Address Control:
The device's MAC address that you want to filter.
Comment:
You can add some comment for this item.
3.8
Routing
3.8.1
Routing Table
The Routing Table window displays the current routing information in the system.
Page 30 / 35
29
3.8.2
Static Routing
A static route is a pre-determined pathway that network information must travel to reach a specific
host or network.
Destination Network IP:
The network address of destination network.
Subnet Mask:
the subnet mask of destination network.
Gateway IP:
The next stop gateway of the path toward the destination network. This is the IP of the
neighbor router that this router should communicate with on the path to the destination network.
3.8.3
Dynamic Routing
Dynamic Routing can be used to cache routes learned by routing protocols, thus allowing the
automation of static routing maintenance. The router, using the RIP (Routing Information Protocol),
determines the network packet’s route based on the fewest number of hops between the source and
the destination. In this case, you can automatically adjust to physical changes in the network layout.

Rate

3.5 / 5 based on 2 votes.

Popular Linkskey Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top