Page 41 / 92 Scroll up to view Page 36 - 40
Enable DMZ:
If an application has trouble working from behind the router, you can
expose one computer to the Internet and run the application on that computer.
Note: Placing a computer in the DMZ may expose that computer to a variety of
security risks. Use of this option is only recommended as a last resort.
DMZ IP Address:
Specify the IP address of the computer on the LAN that you want
to have unrestricted Internet communication. If this computer obtains it’s IP address
automatically using
DHCP
, be sure to make a
DHCP reservation
on the
Basic ->
DHCP
page so that the IP address of the
DMZ machine
does not change.
After you’ve completed all modifications or deletions, you must click the
Save
Settings
button at the top of the page to save your changes. The router must reboot
before new settings will take effect. You will be prompted to
Reboot the Device
or
Continue
. If you need to make additional settings changes, click
Continue
. If you are
finished with your configuration settings, click the
Reboot the Device
button.
3.9.5
Non-UDP/ TCP/ IMCP LAN Sessions
When a LAN application that uses a protocol other than UDP, TCP, or ICMP initiates a
session to the Internet, the router's NAT can track such a session, even though it
does not recognize the protocol. This feature is useful because it enables certain
applications (most importantly a single VPN connection to a remote host) without the
need for an
Application Layer Gateway
.
Note that this feature does not apply to the DMZ host (if one is enabled). The DMZ
host always handles these kinds of sessions
.
Enable:
Enabling this option enables single VPN connections to a remote host. (But,
for multiple VPN connections, the appropriate VPN ALG must be used.) Disabling this
option, however, only disables VPN if the appropriate VPN ALG is also disabled.
3.9.6
Application Level Gateway (ALG) Configuration
Here you can enable or disable ALGs. Some protocols and applications require special
handling of the IP payload to make them work with network address translation
(NAT). Each ALG provides special handling for a specific protocol or application. A
number of ALGs for common applications are enabled by default.
Page 41 of 92
Page 42 / 92
PPTP:
Allows multiple machines on the LAN to connect to their corporate networks
using PPTP protocol. When the PPTP ALG is enabled, LAN computers can establish
PPTP VPN connections either with the same or with different VPN servers. When the
PPTP ALG is disabled, the router allows VPN operation in a restricted way -- LAN
computers are typically able to establish VPN tunnels to different VPN Internet
servers but not to the same server.
IPSec (VPN):
Allows multiple VPN clients to connect to their corporate networks
using IPSec. Some VPN clients support traversal of IPSec through NAT. This option
may interfere with the operation of such VPN clients. If you are having trouble
connecting with your corporate network, try disabling this option.
Check with the system administrator of your corporate network whether your VPN
client supports NAT traversal.
Note that L2TP VPN connections typically use IPSec to secure the connection. To
achieve multiple VPN pass-through in this case, the IPSec ALG must be enabled.
RTSP:
Allows applications that use Real Time Streaming Protocol to receive
streaming media from the Internet. QuickTime and Real Player are some of the
common applications using this protocol.
Windows/ MSN Messenger:
Supports use on LAN computers of Microsoft Windows
Messenger (the Internet messaging client that ships with Microsoft Windows) and
MSN Messenger. The SIP ALG must also be enabled when the Windows Messenger
ALG is enabled.
FTP:
Allows FTP clients and servers to transfer data across NAT. Refer to the
Advanced -> Virtual Server page if you want to host an FTP server.
H.323 (NetMeeting):
Allows H.323 (specifically Microsoft Netmeeting) clients to
communicate across NAT. Note that if you want your buddies to call you, you should
also set up a virtual server for NetMeeting. Refer to the Advanced
Virtual Server
page for information on how to set up a virtual server.
SIP:
Allows devices and applications using VoIP (Voice over IP) to communicate
across NAT. Some VoIP applications and devices have the ability to discover NAT
devices and work around them. This ALG may interfere with the operation of such
devices. If you are having trouble making VoIP calls, try turning this ALG off.
Page 42 of 92
Page 43 / 92
Wake-On-LAN:
This feature enables forwarding of "magic packets" (that is,
specially formatted wake-up packets) from the WAN to a LAN computer or other
device that is "Wake on LAN" (WOL) capable. The WOL device must be defined as
such on the Advanced
Virtual Server page. The LAN IP address for the virtual
server is typically set to the broadcast address 192.168.0.255. The computer on the
LAN whose MAC address is contained in the magic packet will be awakened.
MMS:
Allows Windows Media Player, using MMS protocol, to receive streaming media
from the Internet.
3.10
Inbound filter
The Inbound Filters option is an advanced method of controlling data received from
the Internet. With this feature you can configure inbound data filtering rules that
control data based on an IP address range.
Inbound Filters can be used for limiting access to a server on your network to a
system or group of systems. Filter rules can be used with Virtual Server, Gaming, or
Remote Administration features.
Page 43 of 92
Page 44 / 92
3.10.1
Add/Edit Inbound Filter Rule
Here you can add entries to the
Inbound Filter Rules List
below, or edit existing
entries.
Name:
. Enter a name for the rule that is meaningful to you.
Action:
The rule can either
Allow
or
Deny
messages.
Remote IP Range:
Define the ranges of Internet addresses this rule applies to. For
a single IP address, enter the same address in both the
Start
and
End
boxes. Up to
eight ranges can be entered. The
Enable
checkbox allows you to turn on or off
specific entries in the list of ranges.
Save:
Saves the new rule or modified existing rule to the Rules list. When you are
done editing the settings, you must click the
Save Settings
button at the top of the
page to make the changes effective and permanent.
3.10.2
Inbound Filter Rules List
The section lists the current
Inbound Filter Rules
. An
Inbound Filter Rule
can be
changed by clicking the
Edit
icon, or deleted by clicking the
Delete
icon. When you
click the
Edit
icon, the item is highlighted, and the "
Edit Inbound Filter Rule
" section
is activated for editing. After you’ve completed all modifications or deletions, you
must click the
Save Settings
button at the top of the page to save your changes. The
router must reboot before new settings will take effect. You will be prompted to
Reboot the Device
or
Continue
. If you need to make additional settings changes,
click
Continue
. If you are finished with your configuration settings, click the
Reboot
the Device
button.
In addition to the filters listed here, two predefined filters are available wherever
inbound filters can be applied:
Allow All:
Permit any WAN user to access the related capability.
Deny All:
Prevent all WAN users from accessing the related capability. (LAN users
are not affected by Inbound Filter Rules..
3.11
Advanced Wireless
Transmit Power:
Normally the wireless transmitter operates at 100% power. In some
circumstances, however, there might be a need to isolate specific frequencies to a smaller
area. By reducing the power of the radio, you can prevent transmissions from reaching
beyond your corporate/home office or designated wireless area.
Beacon Period:
Beacons are packets sent by a wireless router to synchronize wireless
devices. Specify a Beacon Period value between 20 and 1000. The default value is set to
100 milliseconds. Values that are not a multiple of 4, are forced to a multiple of 4.
Page 44 of 92
Page 45 / 92
RTS Threshold:
When an excessive number of wireless packet collisions are occurring,
wireless performance can be improved by using the RTS/CTS (Request to Send/Clear to
Send) handshake protocol. The wireless transmitter will begin to send RTS frames (and
wait for CTS) when data frame size in bytes is greater than the RTS Threshold. This
setting should remain at its default value of 2346 bytes.
Fragmentation Threshold:
Wireless frames can be divided into smaller units
(fragments) to improve performance in the presence of RF interference and at the limits
of RF coverage. Fragmentation will occur when frame size in bytes is greater than the
Fragmentation Threshold. This setting should remain at its default value of 2346 bytes.
Setting the Fragmentation value too low may result in poor performance.
DTIM Interval:
A DTIM is a countdown informing clients of the next window for
listening to broadcast and multicast messages. When the wireless router has buffered
broadcast or multicast messages for associated clients, it sends the next DTIM with a
DTIM Interval value. Wireless clients detect the beacons and awaken to receive the
broadcast and multicast messages. The default value is 1. Valid settings are between 1
and 255.
802.11d Enable:
Enables 802.11d operation. 802.11d is a wireless specification for
operation in additional regulatory domains. This supplement to the 802.11 specifications
Page 45 of 92

Rate

3.5 / 5 based on 2 votes.

Popular Ping-Communication Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top