Page 66 / 114 Scroll up to view Page 61 - 65
65
Using the Web-Based Advanced User Interface
section
Configuring the Firewall
Your Router is equipped with a firewall that will protect your network
from a wide array of common hacker attacks including:
IP Spoofing
Land Attack Ping of Death (PoD)
Denial of Service (DoS)
IP with zero length
Smurf Attack
TCP Null Scan
SYN flood
UDP flooding
Tear Drop Attack
ICMP defect
RIP defect
Fragment flooding
The firewall also masks common ports that are frequently used to
attack networks° These ports appear to be “stealth” meaning that
for all intents and purposes, they do not exist to a would-be hacker°
Disabling the firewall protection will not leave your network completely
vulnerable to hacker attacks, but it is recommended that you leave the
firewall enabled°
Page 67 / 114
66
Using the Web-Based Advanced User Interface
Configuring Internal Forwarding Settings
The Virtual Servers function will allow you to route external (Internet)
calls for services such as a web server (port 80), FTP server (Port 21),
or other applications through your Router to your internal network°
Since your internal computers are protected by a firewall, computers
outside your network (over the Internet) cannot get to them because
they cannot be “seen”° A list of common applications has been
provided in case you need to configure the Virtual Server function
for a specific application° If your application is not listed, you will
need to contact the application vendor to find out which port settings
you need°
Choosing an Application
Select your application from the drop-down list° Click “Add”° The
settings will be transferred to the next available space in the screen°
Click “Apply Changes” to save the setting for that application° To
remove an application, select the number of the row that you want to
remove then click “Clear”°
Manually Entering Settings into the Virtual Server
To manually enter settings, enter the IP address in the space provided
for the internal (server) machine, the port(s) required to pass (use a
comma between multiple ports), select the port type (TCP or UDP),
and click “Apply Changes”° You can only pass one port per internal IP
address° Opening ports in your firewall can pose a security risk° You
can enable and disable settings very quickly° It is recommended that
you disable the settings when you are not using a specific application°
Page 68 / 114
67
Using the Web-Based Advanced User Interface
section
Setting Client IP Filters
The Router can be configured to restrict access to the Internet,
e-mail, or other network services at specific days and times°
Restriction can be set for a single computer, a range of computers,
or multiple computers°
To restrict Internet access to a single computer for example, enter
the IP address of the computer you wish to restrict access to in the
IP fields
(1)
° Next, enter “80” in both the port fields
(2)
° Select “Both”
(3)
° Select “Block”
(4)
° You can also select “Always” to block access
all of the time° Select the day to start on top
(5)
, the time to start on
top
(6)
, the day to end on the bottom
(7)
, and the time to stop
(8)
on
the bottom° Select “Enable”
(9)
° Click “Apply Changes”° The computer
at the IP address you specified will now be blocked from Internet
access at the times you specified° Note: Be sure you have selected the
correct time zone under “Utilities> System Settings> Time Zone”°
(1)
(2)
(3)
(4)
(7)
(8)
(9)
(5)
(6)
Page 69 / 114
68
Using the Web-Based Advanced User Interface
Enabling the Demilitarized Zone (DMZ)
The DMZ feature allows you to specify one computer on your network
to be placed outside of the firewall° This may be necessary if the
firewall is causing problems with an application such as a game or
video conferencing application° Use this feature on a temporary basis°
The computer in the DMZ is
NOT
protected from hacker attacks°
To put a computer in the DMZ, enter the last digits of its IP address in
the IP field and select “Enable”° Click “Apply Changes” for the change
to take effect° If you are using multiple static WAN IP addresses,
it is possible to select which WAN IP address the DMZ host will be
directed to° Type in the WAN IP address you wish the DMZ host to
direct to, enter the last two digits of the IP address of the DMZ host
computer, select “Enable” and click “Apply Changes”°
Page 70 / 114
69
Using the Web-Based Advanced User Interface
section
Using Dynamic DNS
The Dynamic DNS service allows you to alias a dynamic IP address
to a static host name in any of the many domains DynDNS°org offers,
allowing your network computers to be more easily accessed from
various locations on the Internet° DynDNS°org provides this service,
for up to five host names, free to the Internet community°
The Dynamic DNS
SM
service is ideal for a home website, file server, or
to make it easy to access your home PC and stored files while you’re
at work° Using the service can ensure that your host name always
points to your IP address, no matter how often your ISP changes
it° When your IP address changes, your friends and associates can
always locate you by visiting yourname°dyndns°org instead!
To register free for your Dynamic DNS host name, please visit

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top