Page 61 / 106
Scroll up to view Page 56 - 60
59
Wireless G Router
SECTIONS
Table of Contents
1
2
3
4
5
7
8
9
10
6
USING THE WEB-BASED ADVANCED USER INTERFACE
Using the Access Point Mode
Note:
This advanced feature should be employed by advanced users
only� The Router can be configured to work as a wireless network
access point� Using this mode will defeat the NAT IP sharing feature
and DHCP server� In Access Point (AP) mode, the Router will need
to be configured with an IP address that is in the same subnet as
the rest of the network that you will bridge to� The default IP address
is 192�168�2�254 and subnet mask is 255�255�255�0� These can be
customized for your need�
1�
Enable the AP mode my selecting “Enable” in the “Use as Access
Point only” page� When you select this option, you will be able to
change the IP settings�
2�
Set your IP settings to match your network� Click “Apply Changes”�
3�
Connect a cable from the “Modem” port on the Router to your
existing network�
The Router is now acting as an access point� To access the Router’s
Web-Based Advanced User Interface again, type the IP address you
specified into your browser’s navigation bar� You can set the encryption
settings, MAC address filtering, SSID, and channel normally�
Page 62 / 106
60
Wireless G Router
SECTIONS
Table of Contents
1
2
3
4
5
7
8
9
10
6
USING THE WEB-BASED ADVANCED USER INTERFACE
Configuring the Firewall
Your Router is equipped with a firewall that will protect your network
from a wide array of common hacker attacks including:
•
IP Spoofing
•
SYN flood
•
Land Attack
•
UDP flooding
•
Ping of Death (PoD)
•
Tear Drop Attack
•
Denial of Service (DoS)
•
ICMP defect
•
IP with zero length
•
RIP defect
•
Smurf Attack
•
Fragment flooding
•
TCP Null Scan
The firewall also masks common ports that are frequently used to
attack networks� These ports appear to be “Stealth”, meaning that for
all intents and purposes, they do not exist to a would-be hacker� You
can turn the firewall function off if needed; however, while disabling the
firewall protection will not leave your network completely vulnerable to
hacker attacks, it is recommended that you leave the firewall enabled�
Page 63 / 106
61
Wireless G Router
SECTIONS
Table of Contents
1
2
3
4
5
7
8
9
10
6
USING THE WEB-BASED ADVANCED USER INTERFACE
Configuring Internal Forwarding Settings
The “Virtual Servers” function will allow you to route external (Internet)
calls for services such as a web server (port 80), FTP server (Port 21), or
other applications through your Router to your internal network� Since
your internal computers are protected by a firewall, computers outside
your network (over the Internet) cannot get to them because they cannot
be “seen�” You will need to contact the application vendor to find out
which port settings you need�
Entering Settings into the Virtual Server
To enter settings, enter the IP address in the space provided for the
internal (server) machine, and the port(s) required to pass� Then select
the port type (TCP or UDP), port number, check the “Enable” box, and
click “Set”� Opening ports in your firewall can pose a security risk� You
can enable and disable settings very quickly� It is recommended that
you disable the settings when you are not using a specific application�
Page 64 / 106
62
Wireless G Router
SECTIONS
Table of Contents
1
2
3
4
5
7
8
9
10
6
USING THE WEB-BASED ADVANCED USER INTERFACE
Setting Client IP Filters
The Router can be configured to restrict access to the Internet, email, or
other network services at specific days and times� Restriction can be set
for a single computer, a range of computers, or multiple computers�
To restrict Internet access to a single computer, for example, enter the
IP address of the computer to which you wish to restrict access in the
IP fields� Next, enter “80” in both the port fields� Select “Both”� Select
“Block”� You can also select “Always” to block access all of the time�
Select the day to start on top, the time to start on top, the day to end on
the bottom, and the time to stop on the bottom� Select “Enable”� Click
“Apply Changes”� The computer at the IP address you specified will now
be blocked from Internet access at the times you specified� Note: Be
sure you have selected the correct time zone under “Utilities > System
Settings > Time Zone”�
Page 65 / 106
63
Wireless G Router
SECTIONS
Table of Contents
1
2
3
4
5
7
8
9
10
6
USING THE WEB-BASED ADVANCED USER INTERFACE
Setting MAC Address Filtering
The MAC address filter is a powerful security feature that allows you
to specify which computers are allowed on the network� Any computer
attempting to access the network that is not specified in the filter list
will be denied access� When you enable this feature, you must enter
the MAC address of each client (computer) on your network to allow
network access to each�
To enable this feature, select “MAC Address Filtering” and click “Enable”
(1)
� Next, select the MAC address you would like to add to the list from
the drop-down menu of currently connected computers, click “Copy to”,
and select the slot to which to add the MAC address
(2)
� You can also
manually enter the MAC address in the space provided
(3)
� Click “Apply
Changes” to save the settings� You can have a MAC-address-filtering list
of up to 32 computers�
(1)
(3)
(2)