Page 31 / 72 Scroll up to view Page 26 - 30
31
of
72
SIP
Allows devices and applications using VoIP (Voice over IP) to communicate across NAT.
Some VoIP applications and devices have the ability to discover NAT devices and work
around them. This ALG may interfere with the operation of such devices. If you are
having trouble making VoIP calls, try turning this ALG off.
Wake-On-LAN
This feature enables forwarding of "magic packets" (that is, specially formatted wake-up
packets) from the WAN to a LAN computer or other device that is "Wake on LAN" (WOL)
capable. The WOL device must be defined as such on the
Advanced
Virtual Server
page. The LAN IP address for the virtual server is typically set to the broadcast address
192.168.0.255. The computer on the LAN whose MAC address is contained in the magic
packet will be awakened.
MMS
Allows Windows Media Player, using MMS protocol, to receive streaming media from the
internet.
INBOUND FILTER
When you use the Virtual Server, Gaming, or Remote Administration features to open specific
ports to traffic from the Internet, you could be increasing the exposure of your LAN to
cyberattacks from the Internet. In these cases, you can use Inbound Filters to limit that exposure
by specifying the IP addresses of internet hosts that you trust to access your LAN through the
ports that you have opened. You might, for example, only allow access to a game server on your
home LAN from the computers of friends whom you have invited to play the games on that
server.
Inbound Filters can be used for limiting access to a server on your network to a system or group
of systems. Filter rules can be used with Virtual Server, Gaming, or Remote Administration
features. Each filter can be used for several functions; for example a "Game Clan" filter might
allow all of the members of a particular gaming group to play several different games for which
gaming entries have been created. At the same time an "Admin" filter might only allows systems
from your office network to access the WAN admin pages and an FTP server you use at home. If
you add an IP address to a filter, the change is effected in all of the places where the filter is
used.
Add/Edit Inbound Filter Rule
Here you can add entries to the Inbound Filter Rules List below, or edit existing entries.
Name
Enter a name for the rule that is meaningful to you.
Action
The rule can either Allow or Deny messages.
Page 32 / 72
32
of
72
Remote IP Range
Define the ranges of Internet addresses this rule applies to. For a single IP address, enter
the same address in both the
Start
and
End
boxes. Up to eight ranges can be entered.
The
Enable
checkbox allows you to turn on or off specific entries in the list of ranges.
Save/Update
Record the changes you have made into the following list.
Clear
Re-initialize this area of the screen, discarding any changes you have made.
Inbound Filter Rules List
The section lists the current Inbound Filter Rules. An entry can be changed by clicking
the Edit icon or can be deleted by clicking the Delete icon. When you click the Edit icon,
the item is highlighted, and the "Edit Inbound Filter Rule" section is activated for editing.
In addition to the filters listed here, two predefined filters are available wherever inbound
filters can be applied:
Allow All
Permit any WAN user to access the related capability.
Deny All
Prevent all WAN users from accessing the related capability. (LAN users are not affected
by Inbound Filter Rules.)
ADVANCED WIRELESS
Transmit Power
Normally the wireless transmitter operates at 100% power. In some circumstances,
however, there might be a need to isolate specific frequencies to a smaller area. By
reducing the power of the radio, you can prevent transmissions from reaching beyond
your corporate/home office or designated wireless area.
Beacon Period
Beacons are packets sent by a wireless router to synchronize wireless devices. Specify a
Beacon Period value between 20 and 1000. The default value is set to 100 milliseconds.
RTS Threshold
When an excessive number of wireless packet collisions are occurring, wireless
performance can be improved by using the RTS/CTS (Request to Send/Clear to Send)
handshake protocol. The wireless transmitter will begin to send RTS frames (and wait for
CTS) when data frame size in bytes is greater than the RTS Threshold. This setting
should remain at its default value of 2346 bytes.
Page 33 / 72
33
of
72
Fragmentation Threshold
Wireless frames can be divided into smaller units (fragments) to improve performance in
the presence of RF interference and at the limits of RF coverage. Fragmentation will
occur when frame size in bytes is greater than the Fragmentation Threshold. This setting
should remain at its default value of 2346 bytes. Setting the Fragmentation value too low
may result in poor performance.
DTIM Interval
A DTIM is a countdown informing clients of the next window for listening to broadcast and
multicast messages. When the wireless router has buffered broadcast or multicast
messages for associated clients, it sends the next DTIM with a DTIM Interval value.
Wireless clients detect the beacons and awaken to receive the broadcast and multicast
messages. The default value is 1. Valid settings are between 1 and 255.
802.11d Enable
Enables 802.11d operation. 802.11d is a wireless specification for operation in additional
regulatory domains. This supplement to the 802.11 specifications defines the physical
layer requirements (channelization, hopping patterns, new values for current MIB
attributes, and other requirements to extend the operation of 802.11 WLANs to new
regulatory domains (countries). The current 802.11 standard defines operation in only a
few regulatory domains (countries). This supplement adds the requirements and
definitions necessary to allow 802.11 WLAN equipment to operate in markets not served
by the current standard. Enable this option if you are operating in one of these "additional
regulatory domains".
Wireless Isolation
Enabling Wireless Isolation prevents associated wireless clients from communicating with
each other.
WMM Enable
Enabling WMM can help control latency and jitter when transmitting multimedia content
over a wireless connection.
WDS Enable
When WDS is enabled, this access point functions as a wireless repeater and is able to
wirelessly communicate with other APs via WDS links. Note that WDS is incompatible
with WPA -- both features cannot be used at the same time. A WDS link is bidirectional;
so this AP must know the MAC Address (creates the WDS link) of the other AP, and the
other AP must have a WDS link back to this AP. Make sure the APs are configured with
same channel number.
WDS AP MAC Address
Specifies one-half of the WDS link. The other AP must also have the MAC address of this
AP to create the WDS link back to this AP. Enter a MAC address for each of the other
APs that you want to connect with WDS.
Page 34 / 72
34
of
72
WISH
WISH is short for Wireless Intelligent Stream Handling, a technology developed to enhance your
experience of using a wireless network by prioritizing the traffic of different applications.
WISH
Enable WISH
Enable this option if you want to allow WISH to prioritize your traffic.
Priority Classifiers
HTTP
Allows the router to recognize HTTP transfers for many common audio and video
streams and prioritize them above other traffic. Such streams are frequently used by
digital media players.
Windows Media Center
Enables the router to recognize certain audio and video streams generated by a
Windows Media Center PC and to prioritize these above other traffic. Such streams are
used by systems known as Windows Media Extenders, such as the Xbox 360.
Automatic
When enabled, this option causes the router to automatically attempt to prioritize traffic
streams that it doesn't otherwise recognize, based on the behaviour that the streams
exhibit. This acts to deprioritize streams that exhibit bulk transfer characteristics, such as
file transfers, while leaving interactive traffic, such as gaming or VoIP, running at a
normal priority.
Add/Edit WISH Rule
A WISH Rule identifies a specific message flow and assigns a priority to that flow. For
most applications, the priority classifiers ensure the right priorities and specific WISH
Rules are not required.
WISH supports overlaps between rules. If more than one rule matches for a specific
message flow, the rule with the highest priority will be used.
Enable
Specifies whether the entry will be active or inactive.
Name
Create a name for the rule that is meaningful to you.
Page 35 / 72
35
of
72
Priority
The priority of the message flow is entered here. Four priorities are defined:
BK: Background (least urgent).
BE: Best Effort.
VI: Video.
VO: Voice (most urgent).
Protocol
The protocol used by the messages.
Host 1 IP Range
The rule applies to a flow of messages for which one computer's IP address falls within
the range set here.
Host 1 Port Range
The rule applies to a flow of messages for which host 1's port number is within the range
set here.
Host 2 IP Range
The rule applies to a flow of messages for which the other computer's IP address falls
within the range set here.
Host 2 Port Range
The rule applies to a flow of messages for which host 2's port number is within the range
set here.
Save/Update
Record the changes you have made into the following list.
Clear
Re-initialize this area of the screen, discarding any changes you have made.
WISH Rules
This section lists the defined WISH Rules. Click the Enable checkbox at the left to directly
activate or de-activate the entry. An entry can be changed by clicking the Edit icon or can
be deleted by clicking the Delete icon. When you click the Edit icon, the item is
highlighted, and the "Edit WISH Rule" section is activated for editing.

Rate

4 / 5 based on 1 vote.

Popular Kyocera Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top