Page 41 / 89 Scroll up to view Page 36 - 40
Configuring Wireless Security
1
Click the Security link under the Wireless menu to open the Security screen:
2
In the Security Mode menu, choose
WPA
or
WPA-Enterprise
unless you
have wireless equipment that does not support WPA; in that case, choose
128-bit WEP
(more secure) or
64-bit WEP
(more compatible with older
wireless equipment).
The WTM652 displays a screen to allow you to configure the chosen mode.
The following screens show WPA and 128-bit WEP screens.
3
Enter a password or pass phrase in the text box. For WEP security, click the
Generate
button to the right of the text box to create the hex key.
Note
: Do not make changes to the other items unless required by your oth-
er wireless equipment.
4
Click the
Save
button.
Touchstone WTM652 Telephony Modem User’s Guide
Safety
Getting
Started
Battery
Installation
Installation
Wireless
Configuration
Ethernet
Configuration
Usage
Troubleshooting
Glossary
41
Page 42 / 89
Configuring Wi-fi Protected Setup (WPS)
Wi-fi Protected Setup (WPS) is a standard method for easily configuring a secure
connection between your WTM652 and computers or other wifi-capable devices
(known as
enrollees
). Follow these steps to use WPS to connect to the WTM652.
1
Click the Wireless Setup link in the navigation menu, then click Wi-Fi Pro-
tected Setup.
The Wi-Fi Protected Setup window appears.
2.
Check the
WPS Enable
box in the WTM652 screen.
3
Use the appropriate connection method as described below:
a.
If your client device has a “Wi-Fi Protected Setup” button
: Press the but-
ton on the client device, then click the Simple Push Button button on the
WTM652 screen.. When the client indicates that it has configured suc-
cessfully, click the
Save
button in the WTM652 screen and refer to your
client device documentation for further instructions.
b.
If your client device has a WPS PIN number
: Check the
WPS Enable
box in the WTM652 screen, and enter the client’s PIN in the Enrollee PIN
field on the WTM652 screen.
Touchstone WTM652 Telephony Modem User’s Guide
Safety
Getting
Started
Battery
Installation
Installation
Wireless
Configuration
Ethernet
Configuration
Usage
Troubleshooting
Glossary
42
Page 43 / 89
43
Safety
Getting
Started
Battery
Installation
Installation
Wireless
Configuration
Ethernet
Configuration
Usage
Troubleshooting
Glossary
Touchstone WTM652 Telephony Modem User’s Guide
c.
If your client device asks for the router’s PIN number
: Enter the WTM652
PIN. The PIN can be found on the WPS screen (
AP Active PIN
) or on a
sticker on the back of the WTM652.
4.
If the connection is successful, the
Secure
indicator stops flashing and re-
mains lit. Otherwise, the
Secure
light continues to flash for up to two min-
utes (indicating that it is ready to accept a client connection) then turns off.
If the
Secure
light turns off, start again at step 1.
Note
: When WPS is enabled, the WTM652 displays the status, network
name, security type, encryption type, and passphrase at the bottom of the
WPS screen. If your client does not support WPS, use these settings to man-
ually configure the client.
You have completed the basic configuration steps. Unless your cable operator re-
quires additional configuration, which would be described in the information packet,
you should now be able to access the Internet. If you want to further customize
your configuration, proceed as follows:
Configuring the Firewall
Configuring DDNS
Configuring Wireless Bridging
If you have any problems, proceed to
Troubleshooting
.
Page 44 / 89
44
Safety
Getting
Started
Battery
Installation
Installation
Wireless
Configuration
Ethernet
Configuration
Usage
Troubleshooting
Glossary
Touchstone WTM652 Telephony Modem User’s Guide
Configuring the Firewall
The WTM652 provides a
firewall
to protect the computers on your home network
from unwanted access. The firewall provides the following features:
Virtual Server Support: if you have a server on your home network that you
want to make available to the general Internet, you can configure a virtual
server. The firewall passes requests from the Internet to the designated
computer on your home network.
Client filters: you can use client filters to block computers on your network
from accessing the Internet (or certain services) during specific days and
times.
MAC Address filtering: allows access to the wireless network only by com-
puters specifically authorized to connect.
Ping blocking: ignores ICMP (Ping) requests from the Internet.
Proceed to the next page to begin configuring the firewall.
Configuring Virtual Servers
Follow these steps to allow outside access to servers on your internal network.
1
Click the Firewall link in the navigation menu, then click Virtual Servers.
The Virtual Servers window appears.
2
Proceed as follows:
If
you want to…
Then
Add a well-known service
Choose the desired service from the
Add
drop-down menu and then click the
Add
button.
Add a custom service
Fill in a row as follows:
Description: the service name.
Inbound port: the beginning and ending
ports of the range required to support this
service. These are the ports that outside
clients use to access your serv er.
Page 45 / 89
Type: Choose TCP or UDP. If the service re-
quires passing both TCP and UDP packets,
you must create a second row.
Private IP address: the IP address of the
server on your internal network.
Private port: the beginning and ending
ports of the range required by this service.
The private ports may be different from the
Inbound ports.
Enable or disable a service
Check (or clear) the box in the Enable column
next to the service.
Remove a service
Choose the row to remove in the Clear Entry
drop-down menu and click the
Clear
button.
3
Click the
Save
button at the bottom of the page (you may need to scroll
down) to save your changes.
4
Proceed to
Configuring Client IP Filters
.
Configuring Client IP Filters
Follow these steps to configure client IP filters.
1
Click the Firewall link in the navigation menu, then click Firewall Setting.
The Firewall Setting window appears.
2
Fill in the fields as follows:
IP: the beginning and ending address in a range of IP addresses. To block
only one address, use the same address twice.
Port: the beginning and ending port in a range of ports. To block only one
port, enter the same port twice.
Type: choose one of TCP, UDP, or BOTH.
Block Time: choose Always to set up a permanent block, or Block to
specify days and times to block access.
Touchstone WTM652 Telephony Modem User’s Guide
Safety
Getting
Started
Battery
Installation
Installation
Wireless
Configuration
Ethernet
Configuration
Usage
Troubleshooting
Glossary
45

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top