Page 51 / 77 Scroll up to view Page 46 - 50
Section 3 – Configuration
D-Link DIR-320 User Manual
48
Application Rules
Use the Application Rules menu to configure applications that
require multiple connections, such as Internet Telephony, video
conferencing, and Internet gaming. The following window lists six
Special Applications that commonly use more than one connection.
To configure one of these applications, tick its corresponding
checkbox and then modify the fields listed below the following figure.
The user may add a new application by modifying the fields listed
and then clicking the
Save Settings
button at the top of the window.
To enable an already existing Application Rule, click on its
corresponding checkbox. To configure other Application Rules for the
Router, type the port or port range or select an application form the
pull-down menu, type a name for the rule and select the traffic type
and click the
Save Settings
button at the top of the window.
Page 52 / 77
Section 3 – Configuration
D-Link DIR-320 User Manual
49
Access Control
Access Control, or MAC filtering, is a basic security measure that
should be used on any network that is exposed to a security risk. A
packet filter system examines data packets and scrutinizes them in
order to control network access. Filtering rules determine whether
packets are passed through the Router from either side of the
gateway. The rules are created and controlled by the network
administrator and can be precisely defined. These rules are used to
block access to the LAN from outside the network and/or to deny
access to the WAN from within the network.
MAC Filters
All computers are uniquely identified by their MAC (Media Access
Control) address. The following window will allow users to deny
computers access to the Internet or only allow certain computers
access to the Internet, based on their MAC address. To access this
window, click the
Advanced
tab along the top of the configuration
window, then the
Access Control
tab to the left hand side.
To configure MAC filters, manually enter a MAC address to be
filtered by ticking its corresponding checkbox and then configuring
the desired fields on the window above. Select
Turn MAC Filtering
OFF
,
Turn MAC Filtering ON and ALLOW computers listed to access
the network
, and
Turn MAC Filtering ON and DENY computers listed
to access the network
from the drop-down menu. When you are
finished, click the
Save Settings
button at the top of the window.
Page 53 / 77
Section 3 – Configuration
D-Link DIR-320 User Manual
50
Firewall & DMZ
The Firewall & DMZ menu is used to define enforce specific predefined policies intended to
protect against certain common types of attacks.
A DoS "denial-of-service" attack is characterized by an explicit attempt by attackers to
prevent legitimate users of a service from using that service. Examples include: attempts to
"flood" a network, thereby preventing legitimate network traffic, attempts to disrupt
connections between two machines, thereby preventing access to a service, attempts to
prevent a particular individual from accessing a service, or, attempts to disrupt service to a
specific system or person. To enable this function, tick the
Enable DoS Prevention
checkbox.
Firewall Rules
To configure rules for the firewall, modify the following fields and click the
Save Settings
button at the top of the window to set the rule in the Routers memory. Newly configured
firewall rules will be displayed in the
Firewall Rules List
at the bottom of the window.
Internal Attack Prevention
This is used for ARP attacks. The router will drop ARP inquiry packets when it detects an
extraordinarily high volume of ARP requests.
DMZ Host
Firewalls may conflict with certain interactive applications such as video conferencing or
playing Internet video games. For these applications, a firewall bypass can be set up using
a DMZ IP address. The DMZ IP address is a “visible” address and does not benefit from the
full protection of the firewall function. Therefore it is advisable that other security
precautions be enabled to protect the other computers and devices on the LAN. It may be
wise to use isolate the device with the DMZ IP address from the rest of the LAN.
For example, if you want to use video conferencing and still use a firewall, you can place
the server in the DMZ. The IP address of this server will then be the DMZ IP address. You
can designate the server’s IP address as the DMZ by typing in the IP address in the
DMZ
IP Address
space provided and then enabling its status by ticking the
Enable DMZ Host
checkbox. Click the
Save Settings
button at the top of the window when you are finished.
Page 54 / 77
Section 3 – Configuration
D-Link DIR-320 User Manual
51
Advanced Wireless
The Advanced Wireless menu is used
to configure settings that can increase
the performance of your router. Click
Save Settings
when you have
completed your changes.
See the table below for descriptions of
the advanced wireless settings
parameters.
Page 55 / 77
Section 3 – Configuration
D-Link DIR-320 User Manual
52
Performance
Parameter
Transmit power
Allows the user to adjust the transmit power of the router. A high transmit power allows a greater area range of accessibility to the router. When
multiple overlapping access points are present, it may be desirable to reduce transmission power.
Beacon Interval
Beacons are emitted from the router in order to synchronize the wireless network. You may set the Beacon Interval range between 20-100
microseconds per beacon sent. The default is 100.
RTS Threshold
The RTS (Request to Send) Threshold controls the size of data packets issued to a RTS packet. A lower level will send packets more frequently
which may consume a great amount of the available bandwidth. A high threshold will allow the router to recover from interference or collisions
which is more prevalent in a network with high traffic or high electromagnetic interference. The default setting is 2346.
Fragmentation
The fragmentation threshold will determine if packets are to be fragmented. Packets over the 2346 byte limit will be fragmented before
transmission. 2346 is the default setting.
DTIM Period
DTIM (Delivery Traffic Indication Message) Period is a countdown informing clients of the next menu for listening to broadcast and multicast
messages. The default setting is 1.
Preamble Type
Long Preamble should be used where 802.11b clients are present.
CTS Mode
Clear to Send mode should only be used when wireless clients are close enough to each other to “hear“ or detect the presence of ther other clients.
The Auto option will use CTS mode only when associating clients are in close proximity to each other.
802.11g Only Mode
The router can be forced to associate with exclusively 802.11g devices.
Fragmentation
The fragmentation threshold will determine if packets are to be fragmented. Packets over the 2346 byte limit will be fragmented before
transmission. 2346 is the default setting.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top