Page 61 / 98 Scroll up to view Page 56 - 60
57
2
1
3
4
5
6
section
Using the Web-Based Advanced User Interface
7
8
9
10
Configuring Internal Forwarding Settings
The “Virtual Servers” function will allow you to route external (Internet)
calls for services such as a web server (port 80), FTP server (Port 21), or
other applications through your Router to your internal network. Since
your internal computers are protected by a firewall, computers outside
your network (over the Internet) cannot get to them because they cannot
be “seen.” You will need to contact the application vendor to find out
which port settings you need.
Entering Settings into the Virtual Server
To enter settings, enter the IP address in the space provided for the
internal (server) machine, and the port(s) required to pass. Then select
the port type (TCP or UDP), check the “Enable” box, and click “Apply
Changes”. Each inbound port entry has two fields with five characters
maximum per field that allows a start and end port range, e.g. [xxxxx]-
[xxxxx]. For each entry, you can enter a single port value by filling in
the two fields with the same value (e.g. [7500]-[7500]) or a wide range
of ports (e.g. [7500]-[9000]). If you need multiple single port values or a
combination of ranges and a single value, you must use multiple entries
up to the maximum of 20 entries (e.g. 1. [7500]-[7500], 2. [8023]-[8023],
3. [9000]-[9000]). You can only pass one port per internal IP address.
Opening ports in your firewall can pose a security risk. You can enable
and disable settings very quickly. It is recommended that you disable the
settings when you are not using a specific application.
Downloaded from
www.Manualslib.com
manuals search engine
Page 62 / 98
Using the Web-Based Advanced User Interface
58
Setting Client IP Filters
The Router can be configured to restrict access to the Internet, email, or
other network services at specific days and times. Restriction can be set
for a single computer, a range of computers, or multiple computers.
To restrict Internet access to a single computer for example, enter the
IP address of the computer you wish to restrict access to in the IP fields
(1)
. Next, enter “80” in both the port fields
(2)
. Select “Both”
(3)
. Select
“Block”
(4)
. You can also select “Always” to block access all of the time.
Select the day to start on top
(5)
, the time to start on top
(6)
, the day
to end on the bottom
(7)
, and the time to stop
(8)
on the bottom. Select
“Enable”
(9)
. Click “Apply Changes”. The computer at the IP address
you specified will now be blocked from Internet access at the times you
specified. Note: Be sure you have selected the correct time zone under
“Utilities> System Settings> Time Zone”.
(1)
(2)
(3)
(4)
(7)
(8)
(9)
(5)
(6)
Downloaded from
www.Manualslib.com
manuals search engine
Page 63 / 98
59
2
1
3
4
5
6
section
Using the Web-Based Advanced User Interface
7
8
9
10
Setting MAC Address Filtering
The MAC address filter is a powerful security feature that allows you
to specify which computers are allowed on the network. Any computer
attempting to access the network that is not specified in the filter list
will be denied access. When you enable this feature, you must enter the
MAC address of each client (computer) on your network to allow network
access to each.
(2)
(3)
(4)
To enable this feature, select “MAC Address Filtering” and click “Enable
MAC Address Filtering”
(1)
. Next, enter the MAC address of each
computer on your network by clicking in the space provided
(2)
and
entering the MAC address of the computer you want to add to the list.
Click “Add”
(3)
, then “Apply Changes”
(4)
to save the settings. You can
have a MAC-address-filtering list of up to 32 computers.
Note:
You will not be able to delete the MAC address of the computer you
are using to access the Router’s administrative functions (the computer
you are using now).
(1)
Downloaded from
www.Manualslib.com
manuals search engine
Page 64 / 98
Using the Web-Based Advanced User Interface
60
Enabling the Demilitarized Zone (DMZ)
The DMZ feature allows you to specify one computer on your network to
be placed outside of the firewall. This may be necessary if the firewall
is causing problems with an application such as a game or video
conferencing application. Use this feature on a temporary basis. The
computer in the DMZ is NOT protected from hacker attacks. Note: If your
ISP subscription provides you with additional public (WAN) IP addresses,
additional computers can be placed outside the firewall provided each
computer uses a different public (WAN) IP.
To put a computer in the DMZ, enter the last digits of its IP address in the IP
field and select “Enable”. Click “Apply Changes” for the change to take effect.
Downloaded from
www.Manualslib.com
manuals search engine
Page 65 / 98
61
2
1
3
4
5
6
section
Using the Web-Based Advanced User Interface
7
8
9
10
WAN Ping Blocking
Computer hackers use what is known as “pinging” to find potential victims
on the Internet. By pinging a specific IP address and receiving a response
from the IP address, a hacker can determine that something of interest
might be there. The Router can be set up so it will not respond to an ICMP
ping from the outside. This heightens the level of security of your Router.
(1)
To turn off the ping response, select “Block ICMP Ping”
(1)
and click
“Apply Changes”. The Router will not respond to an ICMP ping.
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top