Page 31 / 92 Scroll up to view Page 26 - 30
Enable StreamEngine™:
This option is enabled by default. Disable this option for
testing how the traffic and services performs without StreamEngine™ enabled. This
engine will enhance VoIP, video conferencing, gaming, data throughput while
keeping control of P2P applications.
Automatic Classification:
This option is enabled by default so that your router will
automatically determine which programs should have network priority. Leave this
option enabled for best performance, so that it may automatically set the priorities
for your applications.
Dynamic Fragmentation:
This option should be enabled when you have a slow
Internet uplink. It helps reduce the impact that large, low priority network packets
can have on more urgent ones by breaking the large packets into several smaller
packets.
3.5.2
Add/Edit StreamEngine™ Rule
A
StreamEngine™ rule
identifies a specific message flow and assigns a priority to
that flow. For most applications,
automatic classification
will be adequate, and
specific
StreamEngine™ rules
will not be required.
Note: Conflicting rules are not permitted. Conflicting rules are those that share any
combination of source address/port, destination address/port, and protocol.
Rejecting conflicting rules ensures the that every flow defined in a rule receives the
expected priority and avoids indeterminate prioritization that could reduce QoS
effectiveness.
Enable:
Toggle whether a
StreamEngine
™ rule
is
Enabled
or
Disabled
.
Name:
Create a name for the rule that is meaningful to you.
Priority:
The priority of the message flow is entered here. 1 receives the highest
priority (most urgent) and 255 receives the lowest priority. 0 is reserved. Flows that
are not prioritized by any rule receive lowest priority.
Page 31 of 92
Page 32 / 92
Protocol:
The
protocol
used by the messages. The common choices can be selected
from the drop-down menu. To specify any other protocol, enter its
protocol number
(
as assigned by the IANA
) in the
Protocol
box.
Local IP Range:
The rule applies to a flow of messages whose LAN-side IP address
falls within the range set here.
Local Port Range:
The rule applies to a flow of messages whose LAN-side port
number is within the range set here.
Remote IP Range:
The rule applies to a flow of messages whose WAN-side IP
address falls within the range set here.
Remote Port Range:
The rule applies to a flow of messages whose WAN-side port
number is within the range set here.
Save:
Saves the new rule or modified existing rule to the
StreamEngine™ Rules
list.
When you are done editing the settings, you must click the
Save Settings
button at
the top of the page to make the changes effective and permanent.
3.5.3
StreamEngine™ Rules List
The section shows the currently defined
StreamEngine™ rules
. A
StreamEngine™
rule
can be changed by clicking the
Edit
icon, or deleted by clicking the
Delete
icon.
When you click the
Edit
icon, the item is highlighted, and the "
Edit StreamEngine™
Rule
" section is activated for editing. After you’ve completed all modifications or
deletions, you must click the
Save Settings
button at the top of the page to save
your changes. The router must reboot before new settings will take effect. You will
be prompted to
Reboot the Device
or
Continue
. If you need to make additional
settings changes, click
Continue
. If you are finished with your configuration settings,
click the
Reboot the Device
button.
3.6
Routing
This section contains
Routing
options, allowing you to define fixed routes to defined
destinations.
Page 32 of 92
Page 33 / 92
3.6.1
Add/ Edit Route
Adds a new route to the IP routing table, or edits an existing route.
Enable:
Toggle whether a
route
is
Enabled
or
Disabled
.
Route is via another gateway:
When checked, the Gateway box is displayed and
must be completed with the IP address of the gateway/router to which this route
corresponds. Datagrams sent to this route are forwarded onto the given Gateway IP
address for further processing. When unchecked, this route represents a local route
for which this router has its own IP address with which to communicate.
Name:
Assign a meaningful name to this route for your own use.
Destination IP:
The IP address or network that the packets will be attempting to
access
Note: 192.168.1.0 with a Netmask of 255.255.255.0 means traffic will be routed to
the entire 192.168.1.x network.
Netmask:
The bits in the mask specify which bits of the IP address must match.
Note: 255.255.255.255 is used to signify only the host that was entered in the
Destination IP field.
Page 33 of 92
Page 34 / 92
Gateway:
Specifies the next hop to be taken if this route is used. A gateway of
0.0.0.0 implies there is no next hop, and the IP address matched is directly
connected to the router on the interface specified: LAN or WAN.
Metric:
The route metric is a value from 1 to 16 that indicates the cost of using this
route. A value of 1 is the lowest cost, and 15 is the highest cost. A value of 16
indicates that the route is not reachable from this router. When trying to reach a
particular destination, computers on your network will select the best route, ignoring
unreachable routes.
Interface:
Specifies the interface, LAN or WAN, that the IP packet must use to
transit out of the router when this route is used.
Save:
Saves the new rule or modified existing rule to the Rules list. When you are
done editing the settings, you must click the Save Settings button at the top of the
page to make the changes
effective and permanent.
3.6.2
Routes List
The section shows the current routing table entries. Certain required routes are
predefined and cannot be changed. Routes that you add can be changed by clicking
the
Edit
icon, or deleted by clicking the
Delete
icon. When you click the
Edit
icon, the
item is highlighted, and the "
Edit Route
" section is activated for editing. After you’ve
completed all modifications or deletions, you must click the
Save Settings
button at
the top of the page to save your changes. The router must reboot before new
settings will take effect. You will be prompted to
Reboot the Device
or
Continue
. If
you need to make additional settings changes, click
Continue
. If you are finished
with your configuration settings, click the
Reboot the Device
button.
3.7
Access Control
The Access Control section allows you to control access in and out of your network.
Use this feature as Parental Controls to only grant access to approved sites, limit
web access based on time or dates, and/or block access from applications like P2P
utilities or games.
Page 34 of 92
Page 35 / 92
3.7.1
Access Control
Enable:
Toggle whether
access control
is
Enabled
or
Disabled
.
Note:
When Access Control is disabled, every device on the LAN has unrestricted
access to the Internet. However, if you enable Access Control, Internet access is
restricted for those devices that have an Access Control Policy configured for them.
All other devices have unrestricted access to the Internet.
Add Policy:
Click this button to start creating a new access control policy. The Policy
Wizard guides you through the steps of defining each access control policy. A policy
is the "Who, What, When, and How" of access control -- whose computer will be
affected by the control, what internet addresses are controlled, when will the control
be in effect, and how is the control implemented. You can define multiple policies.
The Policy Wizard starts when you click the button below and also when you edit an
existing policy.
3.7.2
Policy Table
This section shows the currently defined
access control policies
. A policy can be
changed by clicking the
Edit
icon, or deleted by clicking the
Delete
icon. When you
click the
Edit
icon, the
Policy Wizard
starts and guides you through the process of
changing a policy. You can enable or disable specific policies in the list by clicking the
"
Enable
" checkbox. After you’ve completed all modifications or deletions, you must
click the
Save Settings
button at the top of the page to save your changes. The
router must reboot before new settings will take effect. You will be prompted to
Reboot the Device
or
Continue
. If you need to make additional settings changes,
click
Continue
. If you are finished with your configuration settings, click the
Reboot
the Device
button.
3.7.3
WEB Filter
This section is where you add the Web sites to be used for
Access Control
. The Web
sites listed here are used when the
Web Filter
option is enabled in
Access Control
.
Page 35 of 92

Rate

3.5 / 5 based on 2 votes.

Popular Ping-Communication Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top