Page 96 / 135
Scroll up to view Page 91 - 95
96
VPN L2TP Pass-through
Click
Select
to allow
an L2TP connection method over a VPN.
VPN PPTP Pass-through
Click
Select
to allow a
PPTP connection method over a VPN.
VPN IPSec Pass-through
Click
Select
to allow
an IPSec connection method over a VPN.
IPv6 Pass-through
Click
Select
to allow IPv6
packets to pass through the firewall.
PPPoE Pass-through
Click
Select
to allow
PPPoE packets to pass through the firewall.
Click
Apply
to save the settings or
Cancel
to discard changes.
Note:
VPN L2TP Pass-through, VPN PPTP Pass-through, and VPN
IPSec Pass-through are enabled by factory default.
Page 97 / 135
97
Configuring Demilitarized Zone
Configuring a device on the LAN as a Demilitarized Zone (DMZ) host allows unrestricted two-way Internet access for Internet
applications, such as online video games, to run from behind the NAT firewall. The DMZ function allows the router to redirect all
packets going to the WAN port IP address to a particular IP address on the LAN. The difference between the virtual server and the
DMZ function is that a virtual server redirects a particular service or Internet application, such as FTP, to a particular LAN client or
server, whereas a DMZ redirects all packets, regardless of the service, going to the WAN IP address to a particular LAN client or server.
A DMZ host allows a computer to have all its connections and ports completely open during data transmission.
To view the DMZ settings, click
Firewall
then select
DMZ
.
Enabling DMZ
Click Enable DMZ to activate DMZ functionality.
Local IP Address
Enter an IP address of a device on the LAN.
Click
Apply
to save the settings or
Cancel
to discard changes.
WARNING!
The PC defined as a DMZ host is not protected by the firewall and is vulnerable to malicious network attacks.
Do not store or manage sensitive information on the DMZ host.
Page 98 / 135
98
Configuring Denial of Service
To enable blocking of denial of service (DoS) attacks, select the DoS option in the Firewall section. DoS attacks can flood the Internet
connection with the continuous transmission of data. Blocking these attacks ensures that the Internet connection is always available.
To view the DoS settings, click
Firewall
then select
DoS
.
Block DoS
Enable or disable blocking DoS attacks.
Discard Ping on WAN
ICMP (ping) packages are blocked
while Block DoS is enabled.
Enable Discard Ping on WAN if the WAN port is required.
Click
Apply
to save the settings or
Cancel
to discard changes.
Page 99 / 135
99
Virtual Private Network Setup
A Virtual Private Network (VPN) provides a secure connection between two remote locations or two users over the Internet. It
provides authentication to securely encrypt data communicated between the two remote endpoints. The Short Model Name supports
up to 5 VPN tunnels, making it ideal for small-office / home-office users or employees who work from home but need to communicate
securely back to the main office.
Viewing Status
To view the Status settings, click
VPN
then select
Status
.
No. (Number)
The sequence number of the VPN tunnel.
Name
The name of the VPN tunnel.
Type
The type of VPN tunnel.
Gateway/Peer IP Address
The VPN gateway or peer IP address.
Transmit Packets
The number of packets transmitted.
Received Packets
The number of packets received.
Uptime
The amount of time the VPN has been active.
Select
Indicates the device(s) that can have actions performed on them.
Page 100 / 135
100
Configuring a VPN Tunnel Profile
To view the Status settings, click VPNthen select Status.
Manually configure a VPN tunnel profile.
Creating a Profile
•
Click
Add
to create a new VPN tunnel profile.
•
Click
Edit
to edit the settings of the selected profile.
•
Click
Delete Selected
to delete the selected profile.
•
Click
Delete All
to delete all current profiles.