Page 56 / 104 Scroll up to view Page 51 - 55
53
Using the Web-Based Advanced User Interface
Setting MAC Address Control
The MAC address filter is a powerful security feature that allows you
to specify which computers are allowed on the wireless network.
Note:
This list applies only to wireless computers. This list can be
configured so any computer attempting to access the wireless network
that is not specified in the filter list will be denied access. When you
enable this feature, you must enter the MAC address of each client
(computer) to which you want to allow network access. The “Block”
feature lets you turn on and off access to the network easily for any
computer without having to add and remove the computer’s MAC
address from the list.
Downloaded from
www.Manualslib.com
manuals search engine
Page 57 / 104
Using the Web-Based Advanced User Interface
54
section
2
1
3
4
5
6
7
8
9
10
Setting up an Allow Access List
1.
Select the “Allow” radio button
(1)
to begin setting up a list of
computers allowed to connect to the wireless network.
2.
Next, in the “MAC Address” field that is blank
(3)
, type in the
MAC address of the wireless computer you want to be able to
access the wireless network, then click “<<Add”
(4)
.
3.
Continue to do this until all of the computers you want to add
have been entered.
4.
Click “Apply Changes”
(5)
to finish.
Setting up a Deny Access List
The “Deny Access” list lets you specify computers that you DO NOT
want to access the network. Any computer in the list will not be
allowed access to the wireless network. All others will.
1.
Select the “Deny” radio button
(2)
to begin setting up a list of
computers to be denied access to the wireless network.
2.
Next, in the “MAC Address” field that is blank
(3)
, type in the
MAC address of the wireless computer you want to deny access
to the wireless network, then click “<<Add”
(4)
.
3.
Continue to do this until all of the computers you want to deny
access to have been entered.
4.
Click “Apply Changes”
(5)
to finish.
Downloaded from
www.Manualslib.com
manuals search engine
Page 58 / 104
55
Using the Web-Based Advanced User Interface
Configuring the Firewall
Your Router is equipped with a firewall that will protect your network
from a wide array of common hacker attacks including:
IP Spoofing
Land Attack Ping of Death (PoD)
Denial of Service (DoS)
IP with zero length
Smurf Attack
TCP Null Scan
SYN flood
UDP flooding
Tear Drop Attack
ICMP defect
RIP defect
Fragment flooding
The firewall also masks common ports that are frequently used
to attack networks. These ports appear to be “stealth” meaning
that for all intents and purposes, they do not exist to a would-be
hacker. You can turn the firewall function off if needed; however, it
is recommended that you leave the firewall enabled. Disabling the
firewall protection will not leave your network completely vulnerable
to hacker attacks, but it is recommended that you leave the
firewall enabled.
Downloaded from
www.Manualslib.com
manuals search engine
Page 59 / 104
Using the Web-Based Advanced User Interface
56
section
2
1
3
4
5
6
7
8
9
10
Configuring Internal Forwarding Settings
The Virtual Servers function will allow you to route external (Internet)
calls for services such as a web server (port 80), FTP server (Port 21),
or other applications through your Router to your internal network.
Since your internal computers are protected by a firewall, computers
outside your network (over the Internet) cannot get to them because
they cannot be “seen”. A list of common applications has been
provided in case you need to configure the Virtual Server function
for a specific application. If your application is not listed, you will
need to contact the application vendor to find out which port settings
you need.
Choosing an Application
Select your application from the drop-down list. Click “Add”. The
settings will be transferred to the next available space in the screen.
Click “Apply Changes” to save the setting for that application. To
remove an application, select the number of the row that you want to
remove then click “Clear”.
Manually Entering Settings into the Virtual Server
To manually enter settings, enter the IP address in the space provided
for the internal (server) machine, the port(s) required to pass (use a
comma between multiple ports), select the port type (TCP or UDP),
and click “Apply Changes”. You can only pass one port per internal IP
address. Opening ports in your firewall can pose a security risk. You
can enable and disable settings very quickly. It is recommended that
you disable the settings when you are not using a specific application.
Downloaded from
www.Manualslib.com
manuals search engine
Page 60 / 104
57
Using the Web-Based Advanced User Interface
Setting Client IP Filters
The Router can be configured to restrict access to the Internet,
email, or other network services at specific days and times. Restriction
can be set for a single computer, a range of computers,
or multiple computers.
To restrict Internet access to a single computer for example, enter the
IP address of the computer you wish to restrict access to in the IP
fields
(1)
. Next, enter “80” in both the port fields
(2)
. Select “Both”
(3)
.
Select “Block”
(4)
. You can also select “Always” to block access all
of the time. Select the day to start on top
(5)
, the time to start on top
(6)
, the day to end on the bottom
(7)
, and the time to stop
(8)
on the
bottom. Select “Enable”
(9)
.
Click “Apply Changes”. The computer at
the IP address you specified will now be blocked from Internet access
at the times you specified.
Note:
Be sure you have selected the
correct time zone under “Utilities> System Settings> Time Zone”.
(1)
(2)
(3)
(4)
(7)
(8)
(9)
(5)
(6)
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top