Page 36 / 90 Scroll up to view Page 31 - 35
30
Chapter 5: Configuring the Wireless-N Home Router
The Security Tab - VPN Passthrough
Wireless-N Home Router
The Security Tab - VPN Passthrough
The
VPN Passthrough
screen allows you to allow VPN tunnels using IPSec, L2TP, or PPTP protocols to pass
through the Router.
VPN Passthrough
IPSec Passthrough
. IPSec (Internet Protocol Security) is a suite of protocols used to implement secure exchange
of packets at the IP layer. To allow IPSec Passthrough, click the
Enabled
button. To disable IPSec Passthrough,
click the
Disabled
button.
L2TP Passthrough
. Layer 2 Tunneling Protocol is the method used to enable Point-to-Point sessions via the
Internet on the Layer 2 level. To allow L2TP tunnels to pass through the Router, click the
Enabled
button. To
disable L2TP Passthrough, click the
Disabled
button.
PPTP Passthrough
. PPTP (Point-to-Point Tunneling Protocol) Passthrough allows the Point-to-Point (PPP) to be
tunneled through an IP network. To allow PPTP Passthrough, click the
Enabled
button. To disable PPTP
Passthrough, click the
Disabled
button.
When you have finished making changes to this screen, click the
Save Settings
button to save the changes, or
click the
Cancel Changes
button to undo your changes. For more information, click
Help
.
Figure 5-25: VPN Passthrough
ipsec
: a VPN protocol used to implement secure
exchange of packets at the IP layer.
pptp
: a VPN protocol that allows the Point to Point
Protocol (PPP) to be tunneled through an IP network.
This protocol is also used as a type of broadband
connection in Europe.
vpn
: a security measure to protect data as it leaves
one network and goes to another over the Internet.
Page 37 / 90
31
Chapter 5: Configuring the Wireless-N Home Router
The Access Restrictions Tab - Internet Access Policy
Wireless-N Home Router
The Access Restrictions Tab - Internet Access Policy
The
Internet Access Policy
screen allows you to block or allow specific kinds of Internet usage and traffic, such as
Internet access, designated services, websites, and inbound traffic during specific days and times.
Internet Access Policy
Access Policy
. Access can be managed by a policy. Use the settings on this screen to establish an access policy
(after the
Save Settings
button is clicked). Selecting a policy from the drop-down menu will display that policy’s
settings. To delete a policy, select that policy’s number and click the
Delete This Policy
button. To view all the
policies, click the
Summary
button.
On the
Summary
screen, the policies are listed with the following information: No., Policy Name, Access, Days,
Time, and status (Enabled). To enable a policy, click the
Enabled
checkbox. To delete a policy, click its
Delete
button. Click the
Save Settings
button to save your changes, or click the
Cancel Changes
button to cancel your
changes. To return to the
Internet Access Policy
screen, click the
Close
button.
Status
. Policies are disabled by default. To enable a policy, select the policy number from the drop-down menu,
and click the radio button beside
Enabled
.
To create a policy:
1.
Select a number from the
Access Policy
drop-down menu.
2.
Enter a Policy Name in the field provided.
3.
To enable this policy, click the radio button beside
Enabled
.
4.
Click the
Edit List
button to select which PCs will be affected by the policy. The
List of PCs
screen will appear.
You can select a PC by MAC address or IP address. You can also enter a range of IP addresses if you want this
policy to affect a group of PCs. After making your changes, click the
Save Settings
button to apply your
changes or
Cancel Changes
to cancel your changes.
5.
Click the appropriate option,
Deny
or
Allow
, depending on whether you want to block or allow Internet access
for the PCs you listed on the
List of PCs
screen.
6.
Decide which days and what times you want this policy to be enforced. Select the individual days during
which the policy will be in effect, or select
Everyday
. Then enter a range of hours and minutes during which
the policy will be in effect, or select
24 Hours
.
Figure 5-26: Access Restrictions Tab - Internet Access
Policy
Figure 5-27: Summary
Page 38 / 90
32
Chapter 5: Configuring the Wireless-N Home Router
The Access Restrictions Tab - Internet Access Policy
Wireless-N Home Router
7.
You can block websites with specific URL addresses. Enter each URL in a separate field next to
Website
Blocking by URL Address
.
8.
You can also block websites using specific keywords. Enter each keyword in a separate field next to
Website
Blocking by Keyword
.
9.
You can filter access to various services accessed over the Internet, such as FTP or telnet. (You can block up
to three applications per policy.)
From the Applications list, select the application you want to block. Then click the
>>
button to move it to the
Blocked List. To remove an application from the Blocked List, select it and click the
<<
button.
10. If the application you want to block is not listed or you want to edit a service’s settings, enter the application’s
name in the
Application Name
field. Enter its range in the
Port Range
fields. Select its protocol from the
Protocol
drop-down menu. Then click the
Add
button.
To modify a service, select it from the Application list. Change its name, port range, and/or protocol setting.
Then click the
Modify
button.
To delete a service, select it from the Application list. Then click the
Delete
button.
11. Click the
Save Settings
button to save the policy’s settings. To cancel the policy’s settings, click the
Cancel
Changes
button.
For more information, click
Help
.
Figure 5-28: List of PCs
Page 39 / 90
33
Chapter 5: Configuring the Wireless-N Home Router
The Applications & Gaming Tab - Single Port Forwarding
Wireless-N Home Router
The Applications & Gaming Tab - Single Port Forwarding
When you click the Applications & Gaming tab, you will see the
Single Port Forwarding
screen. You can customize
port services for common applications on this screen.
When users send these types of requests to your network via the Internet, the Router will forward those requests
to the appropriate servers (computers). Before using forwarding, you should assign static IP addresses to the
designated servers (use the DHCP Reservation feature on the
Basic Setup
screen).
Single Port Forwarding
Common applications are available for the first five entries. Select the appropriate application. Then enter the IP
address of the server that should receive these requests. Click the
Enabled
checkbox to activate this entry.
For additional applications, complete the following fields:
Application Name
. Enter the name of the application.
External Port
. Enter the external port number used by the server or Internet application. Check with the Internet
application documentation for more information.
Internal Port
. Enter the internal port number used by the server or Internet application. Check with the Internet
application documentation for more information.
Protocol
. Select the protocol
TCP
or
UDP
, or select
Both
.
To IP Address
. Enter the IP address of the server that should receive the requests. To find the IP address, go to
“Appendix E: Finding the MAC Address and IP Address for Your Ethernet Adapter.” If you assigned a static IP
address to the server, then you can click the
DHCP Reservation
button on the
Basic Setup
screen to look up its
static IP address.
Enabled
. Click the
Enabled
checkbox to enable the applications you have defined. This is disabled (unchecked)
by default.
When you have finished making changes to this screen, click the
Save Settings
button to save the changes, or
click the
Cancel Changes
button to undo your changes. For more information, click
Help
.
Figure 5-29: Applications & Gaming Tab -
Single Port Forwarding
tcp
: a network protocol for transmitting data that
requires acknowledgement from the recipient of
data sent.
udp
: a network protocol for transmitting data
that does not require acknowledgement from
the recipient of the data that is sent.
Page 40 / 90
34
Chapter 5: Configuring the Wireless-N Home Router
The Applications & Gaming Tab - Port Range Forwarding
Wireless-N Home Router
The Applications & Gaming Tab - Port Range Forwarding
Port range forwarding sets up public services on your network, such as web servers, ftp servers, e-mail servers,
or other specialized Internet applications. (Specialized Internet applications are any applications that use Internet
access to perform functions such as videoconferencing or online gaming. Some Internet applications may not
require any forwarding.)
When users send these types of requests to your network via the Internet, the Router will forward those requests
to the appropriate servers (computers). Before using forwarding, you should assign static IP addresses to the
designated servers (use the DHCP Reservation feature on the
Basic Setup
screen).
If you need to forward all ports to one PC, click the
DMZ
tab.
Port Range Forwarding
To add an application, complete the following fields:
Application Name
. Enter the name of the application.
Start ~ End Port
. Enter the number or range of port(s) used by the server or Internet application. Check with the
Internet application documentation for more information.
Protocol
. Select the protocol
TCP
or
UDP
, or select
Both
.
To IP Address
. Enter the IP address of the server that you want the Internet users to be able to access. To find
the IP address, go to “Appendix E: Finding the MAC Address and IP Address for Your Ethernet Adapter.” If you
assigned a static IP address to the server, then you can click the
DHCP Reservation
button on the
Basic Setup
screen to look up its static IP address.
Enabled
. Click the
Enabled
checkbox to enable the applications you have defined. This is disabled (unchecked)
by default.
When you have finished making changes to this screen, click the
Save Settings
button to save the changes, or
click the
Cancel Changes
button to undo your changes. For more information, click
Help
.
Figure 5-30: Applications & Gaming Tab -
Port Range Forwarding

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top