Page 31 / 48
Scroll up to view Page 26 - 30
Fig 3.6.2.1
3.6.2.2 MAC Filter
Click
MAC Filter
in the left bar to open the screen of Fig 3.6.2.2. Entries in this table are used to restrict certain
types of data packets from your local network to Internet through the Gateway. Use of such filters can be helpful in
securing or restricting your local network.
Click the button
Apply Changes
to save the settings of this page.
Click the button
Add Rule
to add a new rule of the MAC Filter.
Fig 3.6.2.2
31
Page 32 / 48
3.6.2.3 URL Blocking
Click
URL Blocking
in the left bar to open the screen of Fig 3.6.2.3. This page is used to configure the Blocked
FQDN(Such as tw.yahoo.com) and filtered keyword. Here you can add/delete FQDN and filtered keyword.
Fig 3.6.2.3
3.6.3 Virtual Server
Click
Virtual Server
in the sub-menu to open the menu in the left bar,whick contains two items:
Services
and
DMZ Settings
.
3.6.3.1 Services
Click
Services
in the left bar to open the screen of Fig 3.6.3.1. This page is used to enable the servers in the local
network.
Click the button
Add
to add a virtual server.
32
Page 33 / 48
Fig 3.6.3.1
3.6.3.2 DMZ Settings
Click
DMZ Settings
in the left bar to open the screen of Fig 3.6.3.2. A Demilitarized Zone is used to
provide Internet services without sacrificing unauthorized access to its local private network. Typically, the
DMZ host contains devices accessible to Internet traffic, such as Web (HTTP ) servers, FTP servers, SMTP
(e-mail) servers and DNS servers.
Select the checkbox
Enable DMZ
to enable this function. Then input a IP Address of the DMZ host.
Click the button
Apply Changes
to save the settings of this page.
Fig 3.6.3.2
3.6.4 Routing
Click
Routing
in the sub-menu to open the menu in the left bar, whick contains two items:
RIP
and
Static
Route.
33
Page 34 / 48
3.6.4.1 RIP
Click
RIP
in the left bar to open the screen of Fig 3.6.4.1. Enable the RIP if you are using this device as a
RIP-enabled router to communicate with others using the Routing Information Protocol. This page is used to select the
interfaces on your deviceis that use RIP, and the version of the protocol used.
Fig 3.6.4.1
3.6.4.2 Static Route
Click
Static Route
in the left bar to open the screen of Fig 3.6.4.2-1. This page is used to configure the
routing information. Here you can add/delete IP routes.
Fig 3.6.4.2-1
Click the button Show Routes, the below window will appear. The table shows a list of destination routes
commonly accessed by your network.
34
Page 35 / 48
Fig 3.6.4.2-2
3.6.5 IP QoS
Click
Anti-dos
in the sub-menu to open the screen of Fig 3.6.5. Entries in this table are used to assign
the precedence for each incoming packet based on physical LAN port, TCP/UDP port number, and
source/destination IP address/subnet masks.
Fig 3.6.5
3.6.6 Anti-dos
Click
Anti-dos
in the sub-menu to open the screen of Fig 3.6.6. "denial-of-service attack"(DoS Attack) a
type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. In
this page, you can configure to prevent DOS attacks.
Click the button
Apply Changes
to save the settings of this page.
35