Page 31 / 59 Scroll up to view Page 26 - 30
31
WPS
Wi-Fi Protected Setup (WPS) is the simplest way to establish a connection
between the wireless clients and the wireless router. You don’t have to select
the encryption mode and fill in a long encryption passphrase every time when
you try to setup a wireless connection. You only need to press a button on
both wireless client and wireless router, and WPS will do the rest for you.
The wireless router supports two types of WPS: WPS via Push Button and
WPS via PIN code. If you want to use the Push Button, you have to push a
specific button on the wireless client or in the utility of the wireless client to
start the WPS mode, and switch the wireless router to WPS mode. You can
simply push the WPS button of the wireless router, or click the ‘Start to
Process’ button in the web configuration interface. If you want to use the PIN
code, you have to know the PIN code of the wireless client and switch it to
WPS mode, then fill-in the PIN code of the wireless client through the web
configuration interface of the wireless router.
WPS
Check the box to enable WPS function and uncheck it to disable the
WPS function.
WPS Current Status
If the wireless security (encryption) function of this
wireless router is properly set, you’ll see a ‘Configured’ message here.
Otherwise, you’ll see ‘UnConfigured’.
Page 32 / 59
32
Self Pin Code
This is the WPS PIN code of the wireless router. You may need
this information when connecting to other WPS-enabled wireless devices.
SSID
This is the network broadcast name (SSID) of the router.
Authentication Mode
It shows the active authentication mode for the
wireless connection.
Passphrase Key
It shows the passphrase key that is randomly generated by
the wireless router during the WPS process. You may need this information
when using a device which doesn’t support WPS.
WPS via Push Button
Press the button to start the WPS process. The router
will wait for the WPS request from the wireless devices within 2 minutes.
WPS via PIN
You can fill-in the PIN code of the wireless device and press the
button to start the WPS process. The router will wait for the WPS request
from the wireless device within 2 minutes.
Page 33 / 59
33
12
Firewall Settings
The Broadband router provides extensive firewall protection by restricting
connection parameters, thus limiting the risk of hacker attacks, and defending
against a wide array of common Internet attacks. However, for applications that
require unrestricted access to the Internet, you can configure a specific
client/server as a Demilitarized Zone (DMZ).
Note
: To enable the Firewall settings select Enable and click Apply
Page 34 / 59
34
DMZ
If you have a client PC that cannot run an Internet application (e.g. Games)
properly from behind the NAT firewall, then you can open up the firewall
restrictions to unrestricted two-way Internet access by defining a DMZ Host.
The DMZ function allows you to re-direct all packets going to your WAN port
IP address to a particular IP address in your LAN. The difference between the
virtual server and the DMZ function is that the virtual server re-directs a
particular service/Internet application (e.g. FTP, websites) to a particular LAN
client/server, whereas DMZ re-directs all packets (regardless of services)
going to your WAN
IP address to a particular LAN client/server.
Enable DMZ
Enable/disable DMZ
Public IP Address
The IP address of the WAN port or any other Public IP
addresses given to you by your ISP
Client PC IP Address
Fill-in the IP address of a particular host in your LAN
that will receive all the packets originally going to the WAN port/Public IP
address above.
Click
<Apply>
at the bottom of the screen to save the above configurations.
Page 35 / 59
35
Denial of Service (DoS)
The Broadband router's firewall can block common hacker attacks, including
Denial of Service, Ping of Death, Port Scan and Sync Flood. If Internet attacks
occur the router can log the events.
Ping of Death
Protections from Ping of Death attack
Discard Ping From WAN
The router’s WAN port will not respond to any Ping
requests
Port Scan
Protects the router from Port Scans.
Sync Flood
Protects the router from Sync Flood attack.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top