Page 66 / 114 Scroll up to view Page 61 - 65
62
Using the Web-Based Advanced User Interface
Setting MAC Address Control
The MAC address filter is a powerful security feature that allows you
to specify which computers are allowed on the wireless network.
Note:
This list applies only to wireless computers. This list can be
configured so any computer attempting to access the wireless network
that is not specified in the filter list will be denied access. When you
enable this feature, you must enter the MAC address of each client
(computer) to which you want to allow network access. The “Block”
feature lets you turn on and off access to the network easily for any
computer without having to add and remove the computer’s MAC
address from the list.
Page 67 / 114
63
Using the Web-Based Advanced User Interface
section
1
9
2
3
4
5
6
7
8
10
Setting up an Allow Access List
1.
Select the “Allow” radio button
(1)
to begin setting up a list of
computers allowed to connect to the wireless network.
2.
Next, in the “MAC Address” field that is blank
(3)
, type in the
MAC address of the wireless computer to which you want to give
access to the wireless network.
3.
Continue to do this until all of the computers you want to add
have been entered.
4.
Click “Apply Changes”
(4)
to finish.
Setting up a Deny Access List
The “Deny Access” list lets you specify computers that you DO NOT
want to access the network. Any computer in the list will not be
allowed access to the wireless network. All others will.
1.
Select the “Deny” radio button
(2
) to begin setting up a list of
computers to be denied access to the wireless network.
2.
Next, in the “MAC Address” field that is blank
(3)
, type in the
MAC address of the wireless computer to which you want to deny
access to the wireless network.
3.
Continue to do this until all of the computers you want to deny
access to have been entered.
4.
Click “Apply Changes”
(4)
to finish.
(1)
(3)
(4)
(2)
Page 68 / 114
64
Using the Web-Based Advanced User Interface
Configuring the Firewall
Your N1 Vision is equipped with a firewall that will protect your
network from a wide array of common hacker attacks including:
IP Spoofing
Land Attack Ping of Death (PoD)
Denial of Service (DoS)
IP with zero length
Smurf Attack
TCP Null Scan
SYN flood
UDP flooding
Tear Drop Attack
ICMP defect
RIP defect
Fragment flooding
The firewall also masks common ports that are frequently used to
attack networks. These ports appear to be “stealth” meaning that
for all intents and purposes, they do not exist to a would-be hacker.
Disabling the firewall protection will not leave your network completely
vulnerable to hacker attacks, but it is recommended that you leave the
firewall enabled.
Page 69 / 114
65
Using the Web-Based Advanced User Interface
section
1
9
2
3
4
5
6
7
8
10
Configuring Internal Forwarding Settings
The Virtual Servers function will allow you to route external (Internet)
calls for services such as a web server (port 80), FTP server (Port 21),
or other applications through your N1 Vision to your internal network.
Since your internal computers are protected by a firewall, computers
outside your network (over the Internet) cannot get to them because
they cannot be “seen”. A list of common applications has been
provided in case you need to configure the Virtual Server function
for a specific application. If your application is not listed, you will
need to contact the application vendor to find out which port settings
you need.
Choosing an Application
Select your application from the drop-down list. Click “Add”. The
settings will be transferred to the next available space in the screen.
Click “Apply Changes” to save the setting for that application. To
remove an application, select the number of the row that you want to
remove then click “Clear”.
Manually Entering Settings into the Virtual Server
To manually enter settings, enter the IP address in the space provided
for the internal (server) machine, the port(s) required to pass (use a
comma between multiple ports), select the port type (TCP or UDP),
and click “Apply Changes”. You can only pass one port per internal IP
address. Opening ports in your firewall can pose a security risk. You
can enable and disable settings very quickly. It is recommended that
you disable the settings when you are not using a specific application.
Page 70 / 114
66
Using the Web-Based Advanced User Interface
Setting Client IP Filters
The N1 Vision can be configured to restrict access to the Internet,
e-mail, or other network services at specific days and times.
Restriction can be set for a single computer, a range of computers,
or multiple computers.
To restrict Internet access to a single computer for example, enter
the IP address of the computer you wish to restrict access to in the
IP fields
(1)
. Next, enter “80” in both the port fields
(2)
. Select “Both”
(3)
. Select “Block”
(4)
. You can also select “Always” to block access
all of the time. Select the day to start on top
(5)
, the time to start on
top
(6)
, the day to end on the bottom
(7)
, and the time to stop
(8)
on
the bottom. Select “Enable”
(9).
Click “Apply Changes”. The computer
at the IP address you specified will now be blocked from Internet
access at the times you specified. Note: Be sure you have selected the
correct time zone under “Utilities> System Settings> Time Zone”.
(1)
(2)
(3)
(4)
(7)
(8)
(9)
(5)
(6)

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top