Page 26 / 68 Scroll up to view Page 21 - 25
20
Chapter 5: Configuring the Wireless-B Broadband Router
The Wireless Tab - Advanced Wireless Settings
Wireless-B Broadband Router
The Wireless Tab - Advanced Wireless Settings
This tab is used to set up the Router’s advanced wireless functions. These settings should only be adjusted by an
expert administrator as incorrect settings can reduce wireless performance.
Basic Rate. The Basic Rate setting is not actually one rate of transmission but a series of rates, advertising to the
other wireless points in your network at what rates the Router can transmit. At the default setting, the Router will
advertise that it will
Automatically select the best rate
for transmission. Other options of rates to advertise are
1-2Mbps
, for use with older wireless technology, and
All
, when you wish to make all rates advertised. The Basic
Rate is not the rate transmitted; that is the Transmission Rate.
Control Tx Rates. The default transmission rate is Auto. The range is from 1 to 54Mbps. The rate of data
transmission should be set depending on the speed of your wireless network. You can select from a range of
transmission speeds, or keep the default setting,
Auto
, to have the Gateway automatically use the fastest
possible data rate and enable the Auto-Fallback feature. Auto-Fallback will negotiate the best possible
connection speed between the Gateway and a wireless client.
Preamble Type. The preamble defines the length of the CRC block for communication between the Router and the
roaming Network Card. (High network traffic areas should use the shorter preamble type.) Select the appropriate
preamble type,
Long Preamble(default)
or
Short Preamble
.
Authentication Type. The default is set to
Auto (default)
, which allows either Open System or Shared Key
authentication to be used. With
Open System
authentication, the sender and the recipient do NOT use a WEP key
for authentication. With
Shared Key
authentication, the sender and recipient use a WEP key for authentication.
Beacon Interval. The default value is
100
. Enter a value between 1 and 65,535 milliseconds. The Beacon Interval
value indicates the frequency interval of the beacon. A beacon is a packet broadcast by the Router to synchronize
the wireless network.
DTIM Interval. This value, between 1 and 16384, indicates the interval of the Delivery Traffic Indication Message
(DTIM). A DTIM field is a countdown field informing clients of the next window for listening to broadcast and
multicast messages. When the Router has buffered broadcast or multicast messages for associated clients, it
sends the next DTIM with a DTIM Interval value. Its clients hear the beacons and awaken to receive the broadcast
and multicast messages. The default value is
1
.
Fragmentation Threshold. This value specifies the maximum size for a packet before data is fragmented into
multiple packets. If you experience a high packet error rate, you may slightly increase the Fragmentation
Threshold. Setting the Fragmentation Threshold too low may result in poor network performance. Only minor
reduction of the default value is recommended. In most cases, it should remain at its default value of
2346
.
Figure 5-20: Wireless Tab - Advanced Wireless Settings
Downloaded from
www.Manualslib.com
manuals search engine
Page 27 / 68
21
Chapter 5: Configuring the Wireless-B Broadband Router
The Wireless Tab - Advanced Wireless Settings
Wireless-B Broadband Router
RTS Threshold. Should you encounter inconsistent data flow, only minor reduction of the default value,
2346
, is
recommended. If a network packet is smaller than the preset RTS threshold size, the RTS/CTS mechanism will
not be enabled. The Router sends Request to Send (RTS) frames to a particular receiving station and negotiates
the sending of a data frame. After receiving an RTS, the wireless station responds with a Clear to Send (CTS)
frame to acknowledge the right to begin transmission. The RTS Threshold value should remain at its default value
of 2346.
Change these settings as described here and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes.
The Security Tab - Filter
Filters block specific internal users from accessing the Internet. From the Filters tab, you can set up a filter
through an IP address or a network port number.
Filter IP Address Range. To set up a filter using IP addresses, enter the range of IP addresses you wish to filter in
the IP address fields. Users who have filtered IP addresses will not be able to access the Internet at all. If you only
want to filter one IP address instead of a range of IP addresses, enter the same value into both fields. For
instance, if you wish to filter the PC with the IP address of 192.168.1.5, enter 5 into both fields on one line:
192.168.1.5 ~ 192.168.1.5.
Filter Port Range. To filter users by network port number, select a protocol, then enter a network port number or a
range of network ports.
Enter the port numbers you want to filter in the port numbers fields.
Users connected to
the Router will no longer be able to access any port number listed there.
Filter MAC Address. This feature filters the Ethernet adapter’s specific MAC address from going out to the
Internet. To check your Ethernet adapter’s MAC address, you can run winipcfg or ipconfig in the command
prompt, depending on which Windows operating system you are using.
To set the MAC filter, click the
Edit MAC
Filter Setting
button.
When the screen appears, select the range in the drop-down menu, and in a MAC number
field, enter the 12-digit MAC address you want to filter. Click Apply to save the changes, or Undo to undo the
changes. For information on obtaining a MAC address, go to Appendix E: Finding the MAC Address and IP Address
for Your Ethernet Adapter.
Block WAN Requests. Enable the Block WAN Request feature by checking the radio button beside
Block
Anonymous Internet Requests
and you can prevent your network from being “pinged,” or detected, by other
Internet users. Click Disabled it you want to allow anonymous Internet requests.The Block WAN Request feature
also reinforces your network security by hiding your network ports. Both functions of the Block WAN Request
Figure 5-21: Security Tab - Filter
Figure 5-22: Security Tab - MAC Filter
Downloaded from
www.Manualslib.com
manuals search engine
Page 28 / 68
22
Chapter 5: Configuring the Wireless-B Broadband Router
The Security Tab - VPN Passthrough
Wireless-B Broadband Router
feature make it more difficult for outside users to work their way into your network. This feature is enabled by
default.
Filter Multicast. This feature allows for multiple transmissions to specific recipients at the same time.
Select
Enabled
to support the feature, or
Disabled
to keep the Router from multicasting.
Change these settings as described here and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes.
The Security Tab - VPN Passthrough
Use the settings on this tab to allow VPN tunnels in either IPSec or PPTP protocols to pass through the Router’s
firewall.
IPSec Passthrough. Internet Protocol Security (IPSec) is a suite of protocols used to implement secure exchange
of packets at the IP layer. To allow IPSec tunnels to pass through the Router, click the radio button beside
Enabled
. IPSec Passthrough is enabled by default. Click
Disabled
to disable the function.
PPPoE Passthrough. Point-to-Point Protocol over Ethernet allows your PC(s) to use the PPPoE client software
provided by your ISP. Some ISPs may request that you use this feature.To allow allow PPPoE Passthrough, click
the radio button beside
Enabled
. PPTP Passthrough is enabled by default. Click
Disabled
to disable the function.
PPTP Passthrough. Point-to-Point Tunneling Protocol is the method used to enable VPN sessions to a Windows
NT 4.0 or 2000 server. To allow PPTP tunnels to pass through the Router, click the radio button beside
Enabled
.
PPTP Passthrough is enabled by default. Click
Disabled
to disable the function.
Change these settings as described here and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes.
Figure 5-23: Security Tab - VPN Passthrough
Downloaded from
www.Manualslib.com
manuals search engine
Page 29 / 68
23
Chapter 5: Configuring the Wireless-B Broadband Router
The Applications and Gaming Tab - Port Range Forwarding
Wireless-B Broadband Router
The Applications and Gaming Tab - Port Range Forwarding
The Applications and Gaming Tab allows you to set up public services on your network, such as web servers, ftp
servers, e-mail servers, or other specialized Internet applications. (Specialized Internet applications are any
applications that use Internet access to perform functions such as videoconferencing or online gaming. Some
Internet applications may not require any forwarding.)
To forward a port, enter the information on each line for the criteria required. Descriptions of each criteria are
described here.
Application. In this field, enter the name you wish to give the application. Each name can be up to 12 characters.
Start/End. This is the port range. Enter the number that starts the port range under
Start
and the number that
ends the range under
End
.
Protocol. Enter the protocol used for this application, either
TCP
or
UDP
, or
Both
.
IP Address. For each application, enter the IP Address of the PC running the specific application.
Enable. Click the
Enable
checkbox to enable port forwarding for the relevant application.
Change these settings as described here and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes.
Figure 5-24: Applications and Gaming Tab - Port Range
Forwarding
Downloaded from
www.Manualslib.com
manuals search engine
Page 30 / 68
24
Chapter 5: Configuring the Wireless-B Broadband Router
The Applications and Gaming Tab - Port Triggering
Wireless-B Broadband Router
The Applications and Gaming Tab - Port Triggering
Port Triggering
Port Triggering is used for special applications that can request a port to be opened on demand. For this feature,
the Gateway will watch outgoing data for specific port numbers. The Gateway will remember the IP address of the
computer that sends a transmission requesting data, so that when the requested data returns through the
Gateway, the data is pulled back to the proper computer by way of IP address and port mapping rules.
Application. Enter the name you wish to give each application.
Start Port and End Port. Enter the starting and ending Triggered Range numbers and the Forwarded Range
numbers of the port you wish to forward.
When finished making your changes on this tab, click the
Save Settings
button to save these changes, or click
the
Cancel Changes
button to undo your changes.
The Applications and Gaming Tab - UPnP Forwarding
UPnP Forwarding
The UPnP Forwarding screen provides options for customization of port services for common applications.
When users send this type of request to your network via the Internet, the Gateway will forward those requests to
the appropriate computer. Any computer whose port is being forwarded should have its DHCP client function
disabled and should have a new static IP address assigned to it because its IP address may change when using
the DHCP function.
Choose or enter the Application in the field. Then, enter the External and Internal Port numbers in the fields.
Select the type of protocol you wish to use for each application:
TCP
or
UDP
. Enter the IP Address in the field.
Click
Enabled
to enable UPnP Forwarding for the chosen application.
When finished making your changes on this tab, click the
Save Settings
button to save these changes, or click
the
Cancel Changes
button to undo your changes.
Figure 5-26: Applications and Gaming - UPnP Forwarding
Figure 5-25: Applications and Gaming - Port Triggering
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top