Page 66 / 120 Scroll up to view Page 61 - 65
62
Using the Web-Based Advanced User Interface
Setting up a Deny Access List
The “Deny Access” list lets you specify computers that you DO NOT want to
access the network. Any computer in the list will not be allowed access to the
wireless network. All others will.
1.
Select the “Deny” radio button
(1)
to begin setting up a list of computers
to be denied access to the wireless network.
2.
Next, in the “MAC Address” field that is blank
(2),
type in the MAC
address of the wireless computer you want to deny access to the wireless
network, then click “<<Add”
(3)
.
3.
Continue to do this until all of the computers you want to deny access to
have been entered.
4.
Click “Apply Changes”
(4)
to finish.
(1)
Page 67 / 120
63
Using the Web-Based Advanced User Interface
section
1
9
2
3
4
5
6
7
8
10
Configuring the Firewall
Your Router is equipped with a firewall that will protect your network from a
wide array of common hacker attacks including:
• IP Spoofing
• Land Attack Ping of Death (PoD)
• Denial of Service (DoS)
• IP with zero length
• Smurf Attack
• TCP Null Scan
• SYN flood
• UDP flooding
• Tear Drop Attack
• ICMP defect
• RIP defect
• Fragment flooding
The firewall also masks common ports that are frequently used to attack
networks. These ports appear to be “stealth” meaning that for all intents
and purposes, they do not exist to a would-be hacker. You can turn the
firewall function off if needed; however, it is recommended that you leave the
firewall enabled. Disabling the firewall protection will not leave your network
completely vulnerable to hacker attacks, but it is recommended that you leave
the firewall enabled.
Page 68 / 120
64
Using the Web-Based Advanced User Interface
Configuring Internal Forwarding Settings
The Virtual Servers function will allow you to route external (Internet) calls for services
such as a web server (port 80), FTP server (Port 21), or other applications through
your Router to your internal network. Since your internal computers are protected
by a firewall, computers outside your network (over the Internet) cannot get to them
because they cannot be “seen”. A list of common applications has been provided
in case you need to configure the Virtual Server function for a specific application. If
your application is not listed, you will need to contact the application vendor to find
out which port settings you need.
Choosing an Application
Select your application from the drop-down list. Click “Add”. The settings will be
transferred to the next available space in the screen. Click “Apply Changes” to save
the setting for that application. To remove an application, select the number of the
row that you want to remove then click “Clear”.
Manually Entering Settings into the Virtual Server
To manually enter settings, enter the IP address in the space provided for the internal
(server) machine, the port(s) required to pass (use a comma between multiple ports),
select the port type (TCP or UDP), and click “Apply Changes”. You can only pass one
port per internal IP address. Opening ports in your firewall can pose a security risk.
You can enable and disable settings very quickly. It is recommended that you disable
the settings when you are not using a specific application.
Page 69 / 120
65
Using the Web-Based Advanced User Interface
section
1
9
2
3
4
5
6
7
8
10
Setting Client IP Filters
The Router can be configured to restrict access to the Internet, email, or other
network services at specific days and times. Restriction can be set for a single
computer, a range of computers, or multiple computers.
To restrict Internet access to a single computer for example, enter the IP
address of the computer you wish to restrict access to in the IP fields
(1)
.
Next, enter “80” in both the port fields
(2)
. Select “Both”
(3)
. Select “Block”
(4)
. You can also select “Always” to block access all of the time. Select the
day to start on top
(5)
, the time to start on top
(6)
, the day to end on the
bottom
(7)
, and the time to stop
(8)
on the bottom. Select “Enable”
(9)
. Click
“Apply Changes”. The computer at the IP address you specified will now be
blocked from Internet access at the times you specified.
Note:
Be sure you have selected the correct time zone under “Utilities>
System Settings> Time Zone”.
(1)
(2)
(3)
(4)
(5)
(7)
(6)
(8)
(9)
Page 70 / 120
66
Using the Web-Based Advanced User Interface
Enabling the Demilitarized Zone (DMZ)
The DMZ feature allows you to specify one computer on your network to be placed
outside of the firewall. This may be necessary if the firewall is causing problems with
an application such as a game or video conferencing application. Use this feature on
a temporary basis. The computer in the DMZ is
NOT
protected from hacker attacks.
To put a computer in the DMZ, enter the last digits of its IP address in the IP field
and select “Enable”. Click “Apply Changes” for the change to take effect. If you
are using multiple static WAN IP addresses, it is possible to select which WAN IP
address the DMZ host will be directed to. Type in the WAN IP address you wish the
DMZ host to direct to, enter the last two digits of the IP address of the DMZ host
computer, select “Enable” and click “Apply Changes”.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top