Page 56 / 94 Scroll up to view Page 51 - 55
54
Manually Configuring your Router
1
Wireless channels must match between Router and AP.
2
Security settings (WEP) must match between Router and AP.
3
If MAC filtering is enabled, user must be sure to add the WLAN MAC
address(es) of the Router/AP in order to allow communication with each
other.
4
If using a network protected by WPA, the SSID on both Access Points
must be the same.
Firewall
Your Router is equipped with a firewall that will protect your network
from a wide array of common hacker attacks including:
IP Spoofing
Land Attack
Ping of Death (PoD)
Denial of Service (DoS)
IP with zero length
Smurf Attack
TCP Null Scan
SYN flood
UDP flooding
Tear Drop Attack
ICMP defect
RIP defect
Fragment flooding
The firewall also masks common ports that are frequently used to
attack networks. These ports appear to be “Stealth”, meaning that
essentially they do not exist to a would-be hacker. You can turn the
firewall function off if needed; however, it is recommended that you
leave the firewall enabled. Disabling the firewall protection will not
leave your network completely vulnerable to hacker attacks, but it is
recommended that you leave the firewall enabled.
Page 57 / 94
Manually Configuring your Router
55
section
2
1
3
4
5
6
7
8
9
10
11
12
Virtual Servers
Virtual servers allow you to route external (Internet) calls for services such
as a web server (port 80), FTP server (Port 21), or other applications,
through your Router to your internal network. Since your internal
computers are protected by a firewall, machines from the Internet cannot
get to them because they cannot be “seen”. If you need to configure the
virtual server function for a specific application, you will need to contact
the application vendor to find out which port settings you need. You can
manually input this port information into the Router.
Choosing an Application
A list of popular applications has been included to choose from. Click
on “Select a Service” then select your application from the drop-down
list. The settings will be transferred to the first row available. Click
“Add” to save the setting for that application.
Manually Entering Settings into the Virtual Server
To manually enter settings, click on “Custom Server” and enter a
name for the server. Enter the Server IP address in the space provided
for the internal machine and the port(s) required to pass. Then select
the protocol type (TCP or UDP), and then click “Add”.
Opening ports in your firewall can pose a security risk. You can enable
and disable settings very quickly. It is recommended that you disable
the settings when you are not using a specific application.
Page 58 / 94
56
Manually Configuring your Router
Client IP Filters
The Router can be configured to restrict access to the Internet, email, or
other network services at specific days and times.
To restrict Internet access to a single computer for example, enter
a name of the filter in “Filter Name” box
(1)
and IP address of the
computer you wish to restrict access to in the IP field
(2)
. Next, enter
“80:80” in the Port field
(3)
. Select protocol from the “Protocol”
drop-down box
(4)
. Click “Apply Changes”. The computer at the IP
address you specified will now be blocked from Internet access.
MAC Address Filtering
The MAC address filter is a powerful security feature that allows you
to specify which computers are allowed on the network. Any computer
attempting to access the network that is not specified in the filter list
will be denied access. When you enable this feature, you must enter a
name for the user and the MAC address of each client on your network
to allow network access. Next, click “Add” to save the settings.
(1)
(2)
(3)
(4)
Page 59 / 94
Manually Configuring your Router
57
section
2
1
3
4
5
6
7
8
9
10
11
12
DMZ (Demilitarized Zone)
If you have a client PC that cannot run an Internet application
properly from behind the firewall, you can open the client up to
unrestricted two-way Internet access. This may be necessary if the
NAT feature is causing problems with an application such as a game
or video conferencing application. Use this feature on a temporary
basis.
The computer in the DMZ is not protected from
hacker attacks.
To put a computer in the DMZ, enter its LAN IP address in the “Private
IP” field and click “Apply Changes” for the change to take effect.
Blocking an ICMP Ping
Computer hackers use what is known as “pinging” to find potential
victims on the Internet. By pinging a specific IP address and
receiving a response from the IP address, a hacker can determine
that something of interest might be there. The Router can be set
up so it will not respond to an ICMP ping from the outside. This
heightens the level of security of your Router.
To turn off the ping response, select “Block ICMP Ping”
(1)
and click
“Apply Changes”. The Router will not respong to an ICMP Ping.
Page 60 / 94
58
Manually Configuring your Router
Utilities
The “Utilities” screen lets you manage different parameters of the
Router and perform certain administrative functions.
Restart Router
Sometimes it may be necessary to restart or reboot the Router if it
begins working improperly. Restarting or rebooting the Router will
NOT delete any of your configuration settings.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top