Page 96 / 180 Scroll up to view Page 91 - 95
WRVS4400N User Guide
90
Administration Tab
Setting Up and Configuring the Router
Firmware Upgrade
To upgrade firmware, download the latest firmware for the product from Linksys.com, extract it
to your computer, and perform the steps below:
1.
File
—Type in the name of the extracted firmware upgrade file or click
Browse
to locate the
file from the file system.
2.
Start to Upgrade
—When you have selected the appropriate file, click the
Start to
Upgrade
button and follow the on-screen instructions to upgrade your firmware.
Downloaded from
www.Manualslib.com
manuals search engine
Page 97 / 180
WRVS4400N User Guide
91
IPS Tab
Setting Up and Configuring the Router
IPS Tab
The Wireless Router supports advanced Intrusion Prevention Systems (IPS), which is an integral
part of the self-defending strategy—It allows you to stay current on the latest threats so that
malicious or damaging traffic is accurately identified, classified, and stopped in realtime. You
can use IPS together with Firewall, IP based ACL, and IPsec VPN to achieve maximum securities.
The IPS is hardware-accelerated on this Wireless Router.
Configure IPS functions on this screen after enabling IPS.
Configuration
IPS Function
—Enable or Disable the IPS Function as desired.
Abnormally Detection
HTTP
—Web attacks use weaknesses on HTTP protocol to trigger the buffer overflow on
Web servers. The default is Disable.
FTP
—FTP attacks use weaknesses on FTP protocol to generate illegal FTP commands to
the FTP server. The default is Disable.
TELNET
—Telnet attacks use weakness on TELNET protocol to execute illegal commands
on the TELNET server. The default is Disable.
RPC
—Remote Procedure Call allows attackers to issue illegal commands to be executed
on RPC server. The default is Disable
Signature Update
—To protect your local network from the latest Internet threats, you are
encouraged to upgrade the IPS Signature file regularly. First, you need to download the
Signature file from www.linksys.com to your PC. Then you can select this file by clicking the
Browse
button. Use the
Upgrade
button to start an upgrade.
Browse
button
—Enter the path name of the new signature file In the field provided, or click
the
Browse
button to find this file from your Windows file system.
Update
button
—After you have selected the file, click this button to start an upgrade.
Downloaded from
www.Manualslib.com
manuals search engine
Page 98 / 180
WRVS4400N User Guide
92
IPS Tab
Setting Up and Configuring the Router
Change these settings as described here and click
Save Settings
to apply your changes, or click
Cancel Changes
to cancel your changes. Help information is displayed on the right-hand side
of the screen, and click
More
for additional details.
P2P/IM
This tab allows the system administrator to set up policies on using P2P or IM software across
the Internet.
Peer to Peer
When users download files from the Internet by Peer to Peer (P2P) software, the WAN port
bandwidth will be occupied. You can enable the blocking to the following P2P software
applications. The defaults are
non-block
for the following applications:
GNUTELLA(EZPEER), FASTTRACK, KURO, EDONKEY2000, BITTORRECT, DIRECTCONNECT,
PIGO, and WINMX.
Instant Messenger
Users might use IM software to chat with friends or transferring files (bandwidth hogging). You
can enable the blocking to the following IM software applications. The defaults are
non-block
for the following applications.
MSN, ICQ, YAHOO MESSEGER, SKYPE, IRC, ODIGO, REDIFF, GOOGLE TALK, and IM QQ.
Change these settings as described here and click
Save Settings
to apply your changes, or click
Cancel Changes
to cancel your changes. Help information is displayed on the right-hand side
of the screen, and click
More
for additional details.
Downloaded from
www.Manualslib.com
manuals search engine
Page 99 / 180
WRVS4400N User Guide
93
IPS Tab
Setting Up and Configuring the Router
Report
This screen provides the network history status, including network traffic and attack counts,
through diagram and tables.
Report Diagram
—Twenty-four hour diagram displays network traffic and attacks.
Attacker
Displays the IP Address of attackers and the frequency (number of times) of the attacks in a
table.
Attacked Category
Displays the category (type) of attack and the frequency (number of times) of the attacks in a
table.
Downloaded from
www.Manualslib.com
manuals search engine
Page 100 / 180
WRVS4400N User Guide
94
L2 Switch Tab
Setting Up and Configuring the Router
Click the
View Log
button to view the log.
Information
Signature Version
—The Signature Version displays the version of the signature patterns file
loaded in the Wireless Router that protects against malicious threats.
Last Time Upload
—Displays when the signature patterns file in the Wireless Router were last
updated.
Protect Scope
—Displays a list of the categories of attacks that the IPS feature in the Router
protects against. Those includes DoS/DDoS, Buffer Overflow, Web Attack, Scan, Trojan Horse,
and IM / P2P.
L2 Switch Tab
The Layer 2 Switch Tab provides configurations to the layer 2 switching features on the four
Ethernet LAN ports of the Wireless Router. They include VLAN, port configuration, cable
diagnostics, and RADIUS authentication.
VLAN
VLAN Configuration
VLANs are logical subgroups of a Local Area Network (LAN) created via software rather than
defining a hardware solution. VLANs combine user stations and network devices into a single
domain regardless of the physical LAN segment to which they are attached. VLANs allow
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top