Page 51 / 93 Scroll up to view Page 46 - 50
49
N+ Wireless Modem Router
SECTIONS
Table of Contents
1
2
3
4
5
7
8
9
10
6
USING THE WEB-BASED ADVANCED USER INTERFACE
Using the Access Point Mode
Note:
This advanced feature should be employed by advanced
users only° The Router can be configured to work as a wireless
network access point° Using this mode will defeat the NAT IP
sharing feature and DHCP server° In AP mode, the Router will need
to be configured with an IP address that is in the same subnet
as the rest of the network that you will bridge to° The default IP
address is 192°168°2°254 and subnet mask is 255°255°255°0° These
can be customized for your need°
Enable the AP mode my selecting “Enable” in the “Use as
Access Point only” page° When you select this option, you will
be able to change the IP settings°
Configuring the Firewall
Your Router is equipped with a firewall that will protect your network
from a wide array of common hacker attacks including:
IP Spoofing
SYN flood
Land Attack Ping of Death (PoD)
UDP flooding
Denial of Service (DoS)
Tear Drop Attack
IP with zero length
ICMP defect
Smurf Attack
RIP defect
TCP Null Scan
Fragment flooding
The firewall also masks common ports that are frequently used to
attack networks° These ports appear to be “stealth” meaning that for
all intents and purposes, they do not exist to a would-be hacker° You
can turn the firewall function off if needed; however, it is recommended
that you leave the firewall enabled° Disabling the firewall protection will
not leave your network completely vulnerable to hacker attacks, but it is
recommended that you leave the firewall enabled°
Set your IP settings to match your network° Click “Apply Changes”°
Connect a cable from the WAN port on the Router to your
existing network°
The Router is now acting as an access point° To access the Router
advanced user interface again, type the IP address you specified into
your browser’s navigation bar° You can set the encryption settings, MAC
address filtering, SSID, and channel normally°
Page 52 / 93
50
N+ Wireless Modem Router
SECTIONS
Table of Contents
1
2
3
4
5
7
8
9
10
6
USING THE WEB-BASED ADVANCED USER INTERFACE
Configuring Internal Forwarding Settings
The Virtual Servers function will allow you to route external (Internet)
calls for services such as a web server (port 80), FTP server (Port 21), or
other applications through your Router to your internal network° Since
your internal computers are protected by a firewall, computers outside
your network (over the Internet) cannot get to them because they cannot
be “seen”° A list of common applications has been provided in case you
need to configure the Virtual Server function for a specific application°
If your application is not listed, you will need to contact the application
vendor to find out which port settings you need°
Choosing an Application
Select your application from the drop-down list° Click “Add”° The settings
will be transferred to the next available space in the screen° Click
“Apply Changes” to save the setting for that application° To remove an
application, select the number of the row that you want to remove then
click “Clear”°
Manually Entering Settings into the Virtual Server
To manually enter settings, enter the IP address in the space provided for
the internal (server) machine, the port(s) required to pass (use a comma
between multiple ports), select the port type (TCP or UDP), and click
“Apply Changes”° You can only pass one port per internal IP address°
Opening ports in your firewall can pose a security risk° You can enable
and disable settings very quickly° It is recommended that you disable the
settings when you are not using a specific application°
Page 53 / 93
51
N+ Wireless Modem Router
SECTIONS
Table of Contents
1
2
3
4
5
7
8
9
10
6
USING THE WEB-BASED ADVANCED USER INTERFACE
Access Control
The Router can be configured to restrict access to the Internet, e-mail,
or other network services at specific days and times° Restriction can be
set for a single computer, a range of computers, or multiple computers°
Select the “Enable” radio button to use this feature°
There are four main configurations for Access Control lists° The first one
is “Schedule” for that rule° The second is “Service” for the services to
be blocked for that rule° The third is “URL Blocking” for the URL access
restrictions, and the fourth is “URL Keyword Blocking” for certain
keywords to be blocked in the URL address°
“Everyday” is the default for the days of the week that this rule will be
implemented on the “Schedule” page°
To restrict Internet access to a single computer, for example, click the
“Add” button and select the appropriate entry° This entry will deny
access as a default according the specified criteria° Users can also add
a particular MAC address of a device manually and press the “Add”
button° They can also create a blanket rule for all the devices that are
connecting via the Guest Access feature°
The Access Control rule can be removed by clicking the “Delete” button°
Click on the entry number for the configuration options°
The second configuration for the Access Control list is the “service”
that is to be blocked or allowed° Users can choose to “Block All
Services”, “Allow All Services”, or configure from a list of predefined
popular services°
Page 54 / 93
52
N+ Wireless Modem Router
SECTIONS
Table of Contents
1
2
3
4
5
7
8
9
10
6
USING THE WEB-BASED ADVANCED USER INTERFACE
The third configuration for the Access Control list is the “URL List” for
the URL addresses that are to be blocked or allowed° Users can choose
to “Block All URLs”, “Allow All URLs”, or configure their own list of URLs°
The fourth configuration for the Access Control list is the “URL Keyword
List” for the URL address keywords that are to be blocked or allowed°
The default value is blank for this list and the user can configure a list of
URL address keywords°
Enabling the Demilitarized Zone (DMZ)
The DMZ feature allows you to specify one computer on your network
to be placed outside of the firewall° This may be necessary if the firewall
is causing problems with an application such as a game or video
conferencing application° Use this feature on a temporary basis° The
computer in the DMZ is
NOT
protected from hacker attacks°
Page 55 / 93
53
N+ Wireless Modem Router
SECTIONS
Table of Contents
1
2
3
4
5
7
8
9
10
6
USING THE WEB-BASED ADVANCED USER INTERFACE
To put a computer in the DMZ, enter the last digits of its IP address in
the IP field and select “Enable”° Click “Apply Changes” for the change
to take effect° If you are using multiple static WAN IP addresses, it is
possible to select which WAN IP address the DMZ host will be directed
to° Type in the WAN IP address you wish the DMZ host to direct to, enter
the last two digits of the IP address of the DMZ host computer, select
“Enable” and click “Apply Changes”°
Using Dynamic DNS
The Dynamic DNS service allows you to alias a dynamic IP address
to a static host name in any of the many domains DynDNS°org offers,
allowing your network computers to be more easily accessed from
various locations on the Internet° DynDNS°org provides this service, for
up to five host names, free to the Internet community°
The Dynamic DNSSM service is ideal for a home website, file server, or
to make it easy to access your home PC and stored files while you’re at
work° Using the service can ensure that your host name always points to
your IP address, no matter how often your ISP changes it° When your IP
address changes, your friends and associates can always locate you by
visiting yourname°dyndns°org instead!
To register free for your Dynamic DNS host name, please visit
http://www°dyndns°org
°

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top