Page 61 / 112 Scroll up to view Page 56 - 60
Using the Web-Based Advanced User Interface
59
section
2
1
3
4
5
6
7
8
9
10
Using the Access Point Mode
Note:
This advanced feature should be employed by advanced users
only. The Router can be configured to work as a wireless network
access point. Using this mode will defeat the NAT IP sharing feature
and DHCP server. In Access Point (AP) mode, the Router will need to
be configured with an IP address that is in the same subnet as the
rest of the network that you will bridge to. The default IP address
is 192.168.2.254 and subnet mask is 255.255.255.0. These can be
customized for your need.
1.
Enable the AP mode my selecting “Enable” in the “Use as Access
Point only” page. When you select this option, you will be able to
change the IP settings.
2.
Set your IP settings to match your network. Click “Apply
Changes”.
3.
Connect a cable from the WAN port on the Router to your
existing network.
The Router is now acting as an access point. To access the Router’s
Web-Based Advanced User Interface again, type the IP address
you specified into your browser’s navigation bar. You can set the
encryption settings, MAC address filtering, SSID, and
channel normally.
Page 62 / 112
60
Using the Web-Based Advanced User Interface
Configuring the Firewall
Your Router is equipped with a firewall that will protect your network
from a wide array of common hacker attacks including:
• IP Spoofing
• SYN flood
• Land Attack
• UDP flooding
• Ping of Death (PoD)
• Tear Drop Attack
• Denial of Service (DoS)
• ICMP defect
• IP with zero length
• RIP defect
• Smurf Attack
• Fragment flooding
• TCP Null Scan
The firewall also masks common ports that are frequently used to
attack networks. These ports appear to be “Stealth”, meaning that for
all intents and purposes, they do not exist to a would-be hacker. You
can turn the firewall function off if needed; however, it is recommended
that you leave the firewall enabled. Disabling the firewall protection will
not leave your network completely vulnerable to hacker attacks, but it
is recommended that you leave the firewall enabled.
Page 63 / 112
Using the Web-Based Advanced User Interface
61
section
2
1
3
4
5
6
7
8
9
10
Configuring Internal Forwarding Settings
The “Virtual Servers” function will allow you to route external (Internet)
calls for services such as a web server (port 80), FTP server (Port 21),
or other applications through your Router to your internal network.
Since your internal computers are protected by a firewall, computers
outside your network (over the Internet) cannot get to them because
they cannot be “seen.” A list of common applications has been
provided in case you need to configure the “Virtual Server” function for
a specific application. You will need to contact the application vendor
to find out which port settings you need.
Entering Settings into the Virtual Server
To enter settings, enter the IP address in the space provided for the
internal (server) machine, the port(s) required to pass, select the port type
(TCP or UDP), and click “Apply Changes”. Each inbound port entry has
two fields with five characters maximum per field that allows a start and
end port range, e.g. [xxxxx]-[xxxxx]. For each entry, you can enter a single
port value by filling in the two fields with the same value (e.g. [7500]-
[7500]) or a wide range of ports (e.g. [7500]-[9000]). If you need multiple
single port values or a combination of ranges and a single value, you must
use multiple entries up to the maximum of 20 entries (e.g. 1. [7500]-[7500],
2. [8023]-[8023], 3. [9000]-[9000]). You can only pass one port per internal
IP address. Opening ports in your firewall can pose a security risk. You
can enable and disable settings very quickly. It is recommended that you
disable the settings when you are not using a specific application.
Page 64 / 112
62
Using the Web-Based Advanced User Interface
Setting Client IP Filters
The Router can be configured to restrict access to the Internet, email,
or other network services at specific days and times. Restriction can be
set for a single computer, a range of computers, or multiple computers.
To restrict Internet access to a single computer, for example, enter
the IP address of the computer you wish to restrict access to in the IP
fields
(1)
. Next, enter “80” in both the port fields
(2)
. Select “Both”
(3)
.
Select “Block”
(4)
. You can also select “Always” to block access all
of the time. Select the day to start on top
(5)
, the time to start on
top
(6)
, the day to end on the bottom
(7)
, and the time to stop
(8)
on
the bottom. Select “Enable”
(9)
. Click “Apply Changes”. The computer
at the IP address you specified will now be blocked from Internet
access at the times you specified.
Note:
Be sure you have selected the
correct time zone under “Utilities> System Settings> Time Zone”.
(1)
(2)
(3)
(4)
(7)
(8)
(9)
(5)
(6)
Page 65 / 112
Using the Web-Based Advanced User Interface
63
section
2
1
3
4
5
6
7
8
9
10
Setting MAC Address Filtering
The MAC address filter is a powerful security feature that allows you
to specify which computers are allowed on the network. Any computer
attempting to access the network that is not specified in the filter list
will be denied access. When you enable this feature, you must enter
the MAC address of each client (computer) on your network to allow
network access to each.
To enable this feature, select “MAC Address Filtering” and click
“Enable”
(1)
. Next, enter the MAC address of each computer on your
network by clicking in the space provided
(2)
and entering the MAC
address of the computer you want to add to the list. Click “Add”
(3)
,
then “Apply Changes” to save the settings. You can have a
MAC-address-filtering list of up to 32 computers.
Note:
You will not be able to delete the MAC address of the computer
you are using to access the Router’s administrative functions (the
computer you are using now).

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top