Page 46 / 89 Scroll up to view Page 41 - 45
44
N Wireless Router
SECTIONS
Table of Contents
1
2
3
4
5
7
8
9
10
6
USING THE WEB-BASED ADVANCED USER INTERFACE
Setting MAC Address Control
The MAC address filter is a powerful security feature that allows you to
specify which computers are allowed on the wireless network.
Note:
This list applies only to wireless computers. This list can be configured
so any computer attempting to access the wireless network that is not
specified in the filter list will be denied access. When you enable this
feature, you must enter the MAC address of each client (computer) to
which you want to allow network access. The “Block” feature lets you
turn on and off access to the network easily for any computer without
having to add and remove the computer’s MAC address from the list.
(a)
(b)
(c)
(d)
(e)
Setting up an Allow Access List
1�
Select the “Allow” radio button (a) to begin setting up a list
of computers allowed to connect to the wireless network.
2�
Next, in the “MAC Address” field that is blank (c), type in the
MAC address of the wireless computer you want to be able
to access the wireless network, then click “<<Add” (d).
3�
Continue to do this until all of the computers you want to add have
been entered.
4�
Click “Apply Changes” (e) to finish.
Page 47 / 89
45
N Wireless Router
SECTIONS
Table of Contents
1
2
3
4
5
7
8
9
10
6
USING THE WEB-BASED ADVANCED USER INTERFACE
Setting up a Deny Access List
The “Deny Access” list lets you specify computers that you DO NOT
want to access the network. Any computer in the list will not be allowed
access to the wireless network. All others will.
1�
Select the “Deny” radio button (b) to begin setting up a list of
computers to be denied access to the wireless network.
2�
Next, in the “MAC Address” field that is blank (c), type in the
MAC address of the wireless computer you want to deny
access to the wireless network, then click “<<Add” (d).
(a)
(c)
(e)
(d)
(b)
Configuring the Firewall
Your Router is equipped with a firewall that will protect your network
from a wide array of common hacker attacks including:
IP Spoofing
Land Attack Ping of Death (PoD)
Denial of Service (DoS)
IP with zero length
Smurf Attack
TCP Null Scan
SYN flood
UDP flooding
Tear Drop Attack
ICMP defect
RIP defect
Fragment flooding
3�
Continue to do this until all of the computers you want to deny
access to have been entered.
4�
Click “Apply Changes” (e) to finish.
Page 48 / 89
46
N Wireless Router
SECTIONS
Table of Contents
1
2
3
4
5
7
8
9
10
6
USING THE WEB-BASED ADVANCED USER INTERFACE
The firewall also masks common ports that are frequently used to
attack networks. These ports appear to be “stealth” meaning that for
all intents and purposes, they do not exist to a would-be hacker. You
can turn the firewall function off if needed; however, it is recommended
that you leave the firewall enabled. Disabling the firewall protection will
not leave your network completely vulnerable to hacker attacks, but it is
recommended that you leave the firewall enabled.
Configuring Internal Forwarding Settings
The Virtual Servers function will allow you to route external (Internet)
calls for services such as a web server (port 80), FTP server (Port 21), or
other applications through your Router to your internal network. Since
your internal computers are protected by a firewall, computers outside
your network (over the Internet) cannot get to them because they cannot
be “seen”. A list of common applications has been provided in case you
need to configure the Virtual Server function for a specific application.
If your application is not listed, you will need to contact the application
vendor to find out which port settings you need.
Page 49 / 89
47
N Wireless Router
SECTIONS
Table of Contents
1
2
3
4
5
7
8
9
10
6
USING THE WEB-BASED ADVANCED USER INTERFACE
Choosing an Application
Select your application from the drop-down list. Click “Add”. The
settings will be transferred to the next available space in the screen.
Click “Apply Changes” to save the setting for that application. To remove
an application, select the number of the row that you want to remove
then click “Clear”.
Manually Entering Settings into the Virtual Server
To manually enter settings, enter the IP address in the space provided
for the internal (server) machine, the port(s) required to pass (use a
comma between multiple ports), select the port type (TCP or UDP),
and click “Apply Changes”. You can only pass one port per internal IP
address. Opening ports in your firewall can pose a security risk. You can
enable and disable settings very quickly. It is recommended that you
disable the settings when you are not using a specific application.
Setting Client IP Filters
The Router can be configured to restrict access to the Internet, email, or
other network services at specific days and times. Restriction can be set
for a single computer, a range of computers, or multiple computers.
Page 50 / 89
48
N Wireless Router
SECTIONS
Table of Contents
1
2
3
4
5
7
8
9
10
6
USING THE WEB-BASED ADVANCED USER INTERFACE
To restrict Internet access to a single computer for example, enter the
IP address of the computer you wish to restrict access to in the IP fields
(1). Next, enter “80” in both the port fields (2). Select “Both” (3). Select
“Block” (4). You can also select “Always” to block access all of the time.
Select the day to start on top (5), the time to start on top (6), the day to
end on the bottom (7), and the time to stop (8) on the bottom. Select
“Enable” (9). Click “Apply Changes”. The computer at the IP address
you specified will now be blocked from Internet access at the times you
specified.
Note:
Be sure you have selected the correct time zone under
“Utilities> System Settings> Time Zone”.
(1)
(2)
(3)
(4)
(7)
(8)
(9)
(5)
(6)
Enabling the Demilitarized Zone (DMZ)
The DMZ feature allows you to specify one computer on your network
to be placed outside of the firewall. This may be necessary if the firewall
is causing problems with an application such as a game or video
conferencing application. Use this feature on a temporary basis. The
computer in the DMZ is
NOT
protected from hacker attacks.
To put a computer in the DMZ, enter the last digits of its IP address in
the IP field and select “Enable”. Click “Apply Changes” for the change
to take effect. If you are using multiple static WAN IP addresses, it is
possible to select which WAN IP address the DMZ host will be directed
to. Type in the WAN IP address you wish the DMZ host to direct to, enter
the last two digits of the IP address of the DMZ host computer, select
“Enable” and click “Apply Changes”.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top