Page 26 / 52 Scroll up to view Page 21 - 25
48
Advanced Setup Method
Advanced Setup Method
49
section
2
1
3
4
5
6
7
Parameter Description
Index:
Displays the number of the route.
Network Address:
Displays the IP address of the remote computer
for which to set a static route.
Subnet Mask:
Displays the subnet mask of the remote network for
which to set a static route.
Gateway:
Displays the WAN IP address of the gateway to the remote
network.
Configure:
Allows you to modify or delete configuration settings.
Click Add or Edit to display the following page and add a new static
route to the list.
Parameter Description
Index:
Displays the number of the route.
Network Address:
Enter the IP address of the remote computer for
which to set a static route.
Subnet Mask:
Enter the subnet mask of the remote network for which
to set a static route.
Gateway:
Enter the WAN IP address of the gateway to the remote
network.
NAT Mapping Table displays the current NAPT address mappings. The
NAT address mappings are listed 20 lines per page, click the control
buttons to move forwards and backwards. As the NAT mapping is
dynamic, a Refresh button is provided to refresh the NAT Mapping
Table with the most up-to-date values.
The content of the NAT Mapping Table is described as follows:
Protocol - protocol of the flow.
Local IP - local (LAN) host’s IP address for the flow.
Local Port - local (LAN) host’s port number for the flow.
Pseudo IP - translated IP address for the flow.
Pseudo Port - translated port number for the flow.
Peer IP - remote (WAN) host’s IP address for the flow.
Peer Port - remote (WAN) host’s port number for the flow.
Route
These pages define routing related parameters, including static routes
and Routing Information Protocol (RIP) parameters.
Static Route Parameters
Page 27 / 52
50
Advanced Setup Method
Advanced Setup Method
51
section
2
1
3
4
5
6
7
Version:
Sets the RIP version to use on this interface.
Poison Reverse:
A method for preventing loops that would cause
endless retransmission of data traffic.
Authentication Required:
None, No authentication.
Password:
A password authentication key is included in the packet.
If this does not match what is expected, the packet will be discarded.
This method provides very little security as it is possible to learn the
authentication key by watching RIP packets.
MD5:
An algorithm that is used to verify data integrity through the
creation of a 128-bitmessage digest from data input (which may be a
message of any length) that is claimed to be as unique to that specific
data as a fingerprint is to a specific individual.
Authentication Code:
Password or MD5 Authentication key.
RIP sends routing-update messages at regular intervals and when
the network topology changes. When a router receives a routing
update that includes changes to an entry, it updates its routing table
to reflect the new route. RIP routers maintain only the best route to
a destination. After updating its routing table, the router immediately
begins transmitting routing updates to inform other network routers of
the change.
Routing Table
RIP Parameter
The device supports RIP v1 and v2 to dynamically exchange routing
information with adjacent routers.
Parameter Description
General RIP Parameters
RIP mode:
Globally enables or disables RIP.
Auto summary:
If Auto summary is disabled, then RIP packets will
include sub-network information from all sub-net works connected
to the ADSL Router. If enabled, this sub-network information will be
summarized to one piece of information covering all sub-networks.
Table of current Interface RIP parameter:
Interface:
The WAN interface to be configured.
Operation Mode:
Disable:
RIP disabled on this interface.
Enable:
RIP enabled on this interface.
Silent:
Listens for route broadcasts and updates its route table. It
does not participate in sending route broadcasts.
Page 28 / 52
52
Advanced Setup Method
Advanced Setup Method
53
section
2
1
3
4
5
6
7
The VoIP Router’s firewall enables access control of client PCs,
blocks common hacker attacks, including IP Spoofing, Land Attack,
Ping of Death, IP with zero length, Smurf Attack, UDP port loopback,
Snork Attack, TCP null scan, and TCP SYN flooding. The firewall does
not significantly affect system performance and we advise leaving it
enabled to protect your network.
Note:
After you check the radio button in the “Enable or disable
Firewall features” field, you must click the “SAVE SETTINGS” button
to display the list of firewall features.
Access Control
Access Control allows users to define the outgoing traffic permitted
or not-permitted through the WAN interface. In the example above, all
incoming and outgoing emails are blocked. The default is to permit all
outgoing traffic. (See the following page for details.)
The VoIP Router can also limit the access of hosts within the local
area network (LAN). The MAC Filtering Table allows the VoIP Router
to enter up to 32 MAC addresses that are not allowed access to the
WAN port.
Parameter Description
Flags:
Indicates the route status:
C = Direct connection on the same subnet.
S = Static route.
R = RIP (Routing Information Protocol) assigned route.
I = ICMP (Internet Control Message Protocol) Redirect route.
Network Address:
Destination IP address.
Netmask:
The subnetwork associated with the destination.
This is a template that identifies the address bits in the destination
address used for routing to specific subnets. Each bit that
corresponds to a “1” is part of the subnet mask number; each bit that
corresponds to “0” is part of the host number.
Gateway:
The IP address of the router at the next hop to which
frames are forwarded.
Interface:
The local interface through which the next hop of this route
is reached.
Metric:
When a router receives a routing update that contains a new or
changed destination network entry, the router adds 1 to the metric value
indicated in the update and enters the network in the routing table.
Firewall
Page 29 / 52
54
Advanced Setup Method
Advanced Setup Method
55
section
2
1
3
4
5
6
7
The VoIP Router can also limit the access of hosts within the local
area network (LAN). The MAC Filtering Table allows the VoIP Router
to enter up to 32 MAC addresses that are allowed access to the WAN
port. All other devices will be denied access.
URL Blocking
To configure the URL Blocking feature, use the table below to specify
the web sites (www.somesite.com) and/or keywords you want to filter
on your network.
To complete this configuration, you will need to create or modify an
access rule in “Access Control”. To modify an existing rule, click the
Edit option next to the rule you want to modify. To create a new rule,
click on the Add PC option.
From the Access Control Page, Add PC section, check the option for
“WWW with URL Blocking” in the Client PC Service table to filter out
the web sites and keywords selected below, on a specific PC.
The VoIP Router allows the user to block access to web sites from a
particular PC by entering either a full URL address or just a keyword.
This feature can be used to protect children from accessing violent or
pornographic web sites.
The following items are displayed on the Access Control screen:
Parameter Description
Enable Filtering:
Enables or disables the filtering function.
Normal Filtering Table:
Displays the IP address (or an IP address
range) filtering table.
Click Add PC on the Access Control screen to view the following
page.
Access Control Add PC
The settings in the screen shot below will block all email sending and
receiving.
Define the appropriate settings for client PC services (as shown
above). Click “OK” to save your settings. The added PC will now
appear in the Access Control page.
MAC Filter
Use this page to block access to your network using MAC addresses.
Page 30 / 52
56
Advanced Setup Method
Advanced Setup Method
57
section
2
1
3
4
5
6
7
Edit Schedule Rule
You can create and edit schedule rules on this page.
Define the appropriate settings for a schedule rule (as shown on the
above screen).
Intrusion Detection
The VoIP Router’s firewall inspects packets at the application layer,
maintains TCP and UDP session information including timeouts and
number of active sessions, and provides the ability to detect and
prevent certain types of network attacks such as Denial-of-Service
(DoS) attacks.
Schedule Rule
You may filter Internet access for local clients based on rules.
Each access control rule may be activated at a scheduled time.
Define the schedule on the Schedule Rule page, and apply the rule on
the Access Control page.
Click Add Schedule Rule to add a new rule and bring up the following
page.

Rate

4 / 5 based on 1 vote.

Popular iiNet Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top