Page 51 / 106 Scroll up to view Page 46 - 50
4021192 Rev B
51
Configure Wireless Settings
Wireless > WDS Settings
The Wireless Distribution System (WDS) Settings page allows you to expand the
coverage of your wireless network by deploying signal repeaters.
Make sure the
channel settings are the same for all WDS enabled devices.
Select the
WDS Settings
tab to open the Wireless WDS Settings page. Use this page
to configure the WDS settings.
Wireless WDS Settings Page Description
Use the descriptions and instructions in the following table to configure the wireless
distribution system settings for your residential gateway. After you make your
selections, click
Save Settings
to apply your changes or
Cancel Changes
to cancel.
Section
Field Description
WDS
WDS MAC Address
Displays the WDS MAC Address (or BSSID) of your gateway access point
Allow Wireless Signal To Be Repeated by a Repeater
Check this box to allow a wireless client to connect to a repeater and route
traffic between the wireless client and a repeater. A maximum of 3
repeaters are allowed.
Remote Access Point's MAC Address (MAC 1 through 3)
Use the three fields (MAC 1, 2, and 3) to enter the MAC address of the
repeaters
Page 52 / 106
52
4021192 Rev B
Configure Wireless Settings
Wireless > QoS
Quality of Service (QoS) ensures better service to high-priority types of network
traffic, which may involve demanding, real-time applications, such as video
conferencing. QoS settings allow you to specify priorities for different types of
traffic. Lower priority traffic will be slowed down to allow greater throughput or
less delay for high priority traffic. Select the
QoS
tab to open the Wireless QoS page.
Wireless QoS Page Description
Use the descriptions and instructions in the following table to configure each QoS
setting. After you make your selections, click
Save Settings
to apply your changes or
Cancel Changes
to cancel.
Section
Field Description
Quality of Service
(QoS)
Wireless
WMM Support
If WMM (Wi-Fi Multimedia) is supported by your wireless
clients, enabling this feature means that voice and multimedia
traffic will be given higher priority than other traffic. Select
the desired option:
Enable
(factory default)
Disable
Page 53 / 106
4021192 Rev B
53
Configure Wireless Settings
Section
Field Description
No ACK
Allows you to enable or disable NO ACK. This feature is
recommended for data services where transmission is
important and packet loss is tolerable to a certain degree. If
you select
Disable
, an acknowledge packet is returned for
every packet received. This provides a more reliable
transmission, but it increases traffic load, which decreases
performance.
Select the desired option:
Enable
Disable
(factory default)
Page 54 / 106
54
4021192 Rev B
Configure Security
Configure Security
Security > Firewall
Advanced firewall technology deters hackers and protects the home network from
unauthorized access. Use this page to configure a firewall that can filter out various
types of unwanted traffic on the gateway’s local network.
Select the
Firewall
tab to open the Security Firewall page.
Use the descriptions and instructions in the following table to configure the firewall
for your residential gateway. After you make your selections, click
Save Settings
to
apply your changes or
Cancel Changes
to cancel.
Section
Field Description
Firewall
SPI Firewall Protection
SPI Firewall Protection blocks Denial of Service (DoS) attacks. A DoS attack does not
attempt to steal data or damage your computers, but it overloads your Internet
connection so you cannot use it.
Select the desired option:
Enable
(factory default)
Disable
Page 55 / 106
4021192 Rev B
55
Configure Security
Section
Field Description
Filters
Filter Proxy
Enables/disables filter proxy. If local users have access to WAN proxy servers, they
may be able to circumvent the content filters and access Internet sites blocked by
the device. If you select the Filter Proxy feature, it will block access to any WAN
proxy servers.
Block Pop-Up Windows
Enables/disables popup windows. Some commonly used applications employ
popup windows as part of the application. If you disable popup windows, it may
interfere with some of these applications.
Block Web Page Cookies
Enables/disables cookie blocking. This feature filters the unsolicited delivery of
cookies to devices from the Internet to devices in your private local network.
Cookies are computer files that contain personal information or web surfing
behavior data.
Block Java and ActiveX Scripts
Enables/disables java applets and ActiveX scripts. This feature helps to protect the
devices in your private network from irritating or malicious Java applets that are
sent, unsolicited, to devices in your private network from the Internet. These
applets run automatically when they are received by a PC.
Java is a programming language for websites. If you select the Filter Java Applets
feature, you may not have access to Internet sites created using this programming
language.
This feature also helps to protect the devices in your private network from irritating
or malicious ActiveX controls that are sent, unsolicited, to devices in your private
network from the Internet. These ActiveX controls run automatically when they are
received by a PC.
Block fragmented IP packets
Enables/disables filtering of fragmented IP packets. This feature helps protect your
private local network from Internet based denial of service attacks.
Block Port Scan Detection
Enables/disables the gateway from responding to Internet based port scans. This
feature is designed to protect your private local network from Internet based
hackers who attempt to gain unsolicited access your network by detecting open IP
ports on your gateway.
Block IP Flood Detection
(checked
factory default)
Blocks malicious devices that are attempting to flood devices or networks with
illegal broadcast packets. Also referred to as ―broadcast storm.‖
Block WAN
Requests
Block Anonymous Internet Requests
(checked
factory default)
Enable this feature to keep your network from being "pinged" or detected by other
Internet users. The Block Anonymous Internet Requests feature also hides your
network ports. Both make it more difficult for outside users to enter your network.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top