Page 26 / 59 Scroll up to view Page 21 - 25
26
Advanced Wireless-N Router
Linksys E2000
Chapter 3: Advanced Configuration
MAC Address Filter List
Wireless Client List
Click this option to open the
Wireless
Client List
screen°
Wireless Client List
Wireless Client List
This screen shows computers and other devices on
the wireless network° The list can be sorted by Client
Name, Interface, IP Address, MAC Address, and Status°
Select
Save to MAC Address Filter List
for any device
you want to add to the MAC Address Filter List° Then
click
Add
°
To update the on-screen information, click
Refresh
°
To exit this screen and return to the
Wireless MAC Filter
screen, click
Close
°
MAC 01-50
Enter the MAC addresses of the devices
whose wireless access you want to control°
Click
Save Settings
to apply your changes, or click
Cancel
Changes
to clear your changes°
Wireless > Advanced Wireless Settings
This
Advanced Wireless Settings
screen is used to set up
the Router’s advanced wireless functions° These settings
should only be adjusted by an advanced user because
incorrect settings can reduce wireless performance° In
most cases, keep the default settings°
Wireless > Advanced Wireless Settings
Advanced Wireless
AP Isolation
The AP (Access Point) Isolation feature
isolates all wireless clients and wireless devices on your
network from each other° Wireless devices will be able to
communicate with the Router but not with each other° To
use this option, select
Enabled
° AP Isolation is disabled by
default°
Frame Burst
Enabling this option should provide your
network with greater performance, depending on the
manufacturer of your wireless products° To use this option,
keep the default,
Enabled
° Otherwise, select
Disabled
°
Authentication Type
The Authentication Type setting
is available if the Security Mode is RADIUS or WEP° The
default is set to
Auto
, which allows either Open System
or Shared Key authentication to be used° With Open
System authentication, the sender and the recipient do
NOT use a WEP key for authentication° With Shared Key
authentication, the sender and recipient use a WEP key for
authentication° Select
Shared Key
to only use Shared Key
authentication°
Basic Rate
The Basic Rate setting is not actually one
rate of transmission but a series of rates at which the
Router can transmit° (The Basic Rate is not the actual rate
of data transmission° If you want to specify the Router’s
rate of data transmission, configure the Transmission
Rate setting°) The Router will advertise its Basic Rate to
the other wireless devices in your network, so they know
which rates will be used° The Router will also advertise that
it will automatically select the best rate for transmission°
The default setting is
Default
, when the Router can
transmit at all standard wireless rates (1-2 Mbps, 5°5 Mbps,
11 Mbps, 18 Mbps, and 24 Mbps)° Select
1-2Mbps
for
use with older wireless technology° Select
All
, when the
Router can transmit at all wireless rates°
Transmission Rate
The Transmission setting is available
if the Network Mode is BG-Mixed, Wireless-G Only, or
Wireless-B Only° The rate of data transmission should be
set depending on the speed of your wireless network°
Select from a range of transmission speeds, or keep the
default,
Auto
, to have the Router automatically use the
fastest possible data rate and enable the Auto-Fallback
feature° Auto-Fallback will negotiate the best possible
connection speed between the Router and a wireless
client°
N Transmission Rate
The N Transmission setting is
available if the Network Mode is Mixed or Wireless-N Only°
The rate of data transmission should be set depending
on the speed of your Wireless-N networking° Select from
a range of transmission speeds, or keep the default,
Auto
, to have the Router automatically use the fastest
possible data rate and enable the Auto-Fallback feature°
Auto-Fallback will negotiate the best possible connection
speed between the Router and a wireless client°
Page 27 / 59
27
Advanced Wireless-N Router
Linksys E2000
Chapter 3: Advanced Configuration
CTS
Protection
Mode
The
Router
automatically
uses CTS (Clear-To-Send) Protection Mode when your
Wireless-N and Wireless-G devices are experiencing severe
problems and are not able to transmit to the Router in an
environment with heavy 802°11b traffic° This option boosts
the Router’s ability to catch all Wireless-N and Wireless-G
transmissions but severely decreases performance° To use
this option, keep the default,
Auto
° To disable this option,
select
Disabled
°
Beacon Interval
A beacon is a packet broadcast by the
Router to synchronize the wireless network° The Beacon
Interval value indicates the frequency interval of the
beacon° Enter a value between 20 and 65,535 milliseconds°
The default value is
100
°
DTIM Interval
This value, between 1 and 255, indicates
the interval of the Delivery Traffic Indication Message
(DTIM)° A DTIM field is a countdown field informing
clients of the next window for listening to broadcast
and multicast messages° When the Router has buffered
broadcast or multicast messages for associated clients, it
sends the next DTIM with a DTIM Interval value° Its clients
hear the beacons and awaken to receive the broadcast
and multicast messages° The default value is
1
°
Fragmentation
Threshold
This
value
specifies
the
maximum size for a packet before data is fragmented
into multiple packets° If you experience a high packet
error rate, you may slightly increase the Fragmentation
Threshold° Setting the Fragmentation Threshold too low
may result in poor network performance° Only minor
reduction of the default value is recommended° In most
cases, it should remain at its default value of
2346
°
RTS Threshold
Should you encounter inconsistent data
flow, only minor reduction of the default value,
2347
, is
recommended° If a network packet is smaller than the
preset Request to Send (RTS) threshold size, the RTS/CTS
(Clear to Send) mechanism will not be enabled° The Router
sends RTS frames to a particular receiving station and
negotiates the sending of a data frame° After receiving
an RTS, the wireless station responds with a CTS frame
to acknowledge the right to begin transmission° The RTS
Threshold value should remain at its default value of
2347
°
Click
Save Settings
to apply your changes, or click
Cancel
Changes
to clear your changes°
Security > Firewall
The
Firewall
screen is used to configure a firewall that can
filter out various types of unwanted traffic on the Router’s
local network°
Security > Firewall
Firewall
SPI Firewall Protection
To use firewall protection,
keep the default selection,
Enabled
° To turn off firewall
protection, select
Disabled
°
Internet Filter
Filter Anonymous Internet Requests
This option makes
it more difficult for outside users to work their way into
your network° This option is enabled by default° Disable it
to allow anonymous Internet requests
°
Filter Multicast
The multicasting feature allows for
multiple transmissions to specific recipients at the
same time° If multicasting is permitted, then the Router
will allow IP multicast packets to be forwarded to the
appropriate computers° Select this option to enable the
filter° This option is disabled by default°
Filter Internet NAT Redirection
This option is used to
prevent a local computer from using a URL or Internet
address to access the local server° Select this option to
enable the filter° This option is disabled by default°
Filter IDENT (Port 113)
The Filter IDENT (Identification)
option keeps port 113 from being scanned by devices
outside of your local network° This option is enabled by
default° Disable it to allow port 113 to be scanned°
Web Filter
Proxy
Use of WAN proxy servers may compromise the
Gateway’s security° Denying Proxy will disable access to
any WAN proxy servers° Select this option to enable proxy
filtering° Deselect the option to allow proxy access
°
Page 28 / 59
28
Advanced Wireless-N Router
Linksys E2000
Chapter 3: Advanced Configuration
Java
Java is a programming language for websites° If you
deny Java, you run the risk of not having access to Internet
sites created using this programming language° Select
this option to enable Java filtering° Deselect the option to
allow Java usage
°
ActiveX
ActiveX is a programming language for websites°
If you deny ActiveX, you run the risk of not having access to
Internet sites created using this programming language°
Select this option to enable ActiveX filtering° Deselect the
option to allow ActiveX usage
°
Cookies
A cookie is data stored on your computer and used
by Internet sites when you interact with them° Select this option
to filter cookies° Deselect the option to allow cookie usage°
Click
Save Settings
to apply your changes, or click
Cancel
Changes
to clear your changes°
Security > VPN Passthrough
The
VPN Passthrough
screen allows you to enable VPN
tunnels using IPSec, PPTP, or L2TP protocols to pass through
the
Router
’s firewall°
Security > VPN Passthrough
VPN Passthrough
IPSec Passthrough
Internet Protocol Security (IPSec) is
a suite of protocols used to implement secure exchange
of packets at the IP layer° To allow IPSec tunnels to pass
through the Router, keep the default,
Enabled
°
PPTP Passthrough
Point-to-Point Tunneling Protocol
(PPTP) allows the Point-to-Point Protocol (PPP) to be
tunneled through an IP network° To allow PPTP tunnels to
pass through the Router, keep the default,
Enabled
°
L2TP Passthrough
Layer 2 Tunneling Protocol is the
method used to enable Point-to-Point sessions via the
Internet on the Layer 2 level° To allow L2TP tunnels to pass
through the Router, keep the default,
Enabled
°
Click
Save Settings
to apply your changes, or click
Cancel
Changes
to clear your changes°
Access Restrictions > Internet Access
The
Internet Access
screen allows you to block or allow
specific kinds of Internet usage and traffic, such as Internet
access, designated services, and websites during specific
days and times°
Access Restrictions > Internet Access
Internet Access Policy
Access Policy
Access can be managed by a policy° Use
the settings on this screen to establish an access policy
(after
Save Settings
is clicked)° Selecting a policy from
the drop-down menu will display that policy’s settings°
To delete a policy, select that policy’s number and click
Delete This Policy
° To view all the policies, click
Summary
°
Summary
The policies are listed with the following information: No°,
Policy Name, Access, Days, Time, and status (Enabled)° To
enable a policy, select
Enabled
° To delete a policy, click
Delete
° Click
Save Settings
to save your changes, or click
Cancel Changes
to clear your changes° To return to the
Internet Access Policy
screen, click
Close
°
Summary
Page 29 / 59
29
Advanced Wireless-N Router
Linksys E2000
Chapter 3: Advanced Configuration
Status
Policies are disabled by default° To enable a policy,
select the policy number from the drop-down menu, and
select
Enabled
°
To create a policy, follow steps 1-11° Repeat these steps to
create additional policies, one at a time°
1° Select a number from the
Access Policy
drop-down
menu°
Enter a Policy Name in the field provided°
To enable this policy, select
Enabled
°
4° Click
Edit List
to select which computers will be affected
by the policy° The
List of PCs
screen appears° You can
select a computer by MAC address or IP address° You
can also enter a range of IP addresses if you want this
policy to affect a group of computers° After making your
changes, click
Save Settings
to apply your changes, or
click
Cancel Changes
to clear your changes° Then click
Close
°
List of PCs
5° Select
the
appropriate
option,
Deny
or
Allow
,
depending on whether you want to block or allow
Internet access for the computers you listed on the
List
of PCs
screen°
6° Decide which days and what times you want this
policy to be enforced° Select the individual days during
which the policy will be in effect, or select
Everyday
°
Then enter a range of hours and minutes during which
the policy will be in effect, or select
24 Hours
°
7° You can block websites with specific URL addresses°
Enter each URL in a separate
Website Blocking by URL
Address
field°
You can also block websites using specific keywords°
Enter each keyword in a separate
Keyword
field°
You can filter access to various services accessed over
the Internet, such as FTP or telnet° (You can block up to
three applications per policy°)
From the Applications list, select the application you
want to block° Then click the
>>
button to move it to
the Blocked List° To remove an application from the
Blocked List, select it and click the
<<
button°
10° If the application you want to block is not listed or you
want to edit a service’s settings, enter the application’s
name in the
Application Name
field° Enter its range
in the
Port Range
fields° Select its protocol from the
Protocol
drop-down menu° Then click
Add
°
To modify a service, select it from the Application
list° Change its Application Name, Port Range, and/or
Protocol setting° Then click
Modify
°
To delete a service, select it from the Application list°
Then click
Delete
°
11° Click
Save Settings
to save the policy’s settings° To
cancel the policy’s settings, click
Cancel Changes
°
Applications and Gaming > Single Port
Forwarding
The
Single Port Forwarding
screen allows you to customize
port services for various applications°
When users send these types of requests to your network
via the Internet, the
Router
will forward those requests to
the appropriate computers (also called servers)° Before using
forwarding, you should assign static IP addresses to the
designated computers (use the DHCP Reservation option on
the
Basic Setup
screen; refer to
DHCP Reservation
,
page 19
Applications and Gaming > Single Port Forwarding
Single Port Forwarding
Preset applications are available for the first five entries°
For each entry, complete the following:
Application Name
Select the appropriate application°
To IP Address
Enter the IP address of the computer that
should receive the requests° If you assigned a static IP
address to the computer, then you can look up its static IP
address; refer to
DHCP Reservation
,
page 19
°
Enabled
Select
Enabled
to enable port forwarding°
You can customize entries for additional applications° For
each entry, complete the following:
Page 30 / 59
30
Advanced Wireless-N Router
Linksys E2000
Chapter 3: Advanced Configuration
Application Name
Enter the name you wish to give the
application° Each name can be up to 12 characters°
External Port
Enter the external port number used by
the computer or Internet application° Check with the
Internet application documentation for more information°
Internal Port
Enter the internal port number used by the
computer or Internet application° Check with the Internet
application documentation for more information°
Protocol
Select the protocol(s) used for this application,
TCP
(Transmission Control Protocol),
UDP
(User Datagram
Protocol), or
Both
°
To IP Address
Enter the IP address of the computer that
should receive the requests° If you assigned a static IP
address to the computer, then you can look up its static IP
address; refer to
DHCP Reservation
,
page 19
°
Enabled
Select
Enabled
to enable port forwarding°
Click
Save Settings
to apply your changes, or click
Cancel
Changes
to clear your changes°
Applications and Gaming > Port Range
Forwarding
The
Port Range Forwarding
screen allows you to set up
public services on your network, such as web servers,
ftp servers, e-mail servers, or other specialized Internet
applications° (Specialized Internet applications are any
applications that use Internet access to perform functions
such as videoconferencing or online gaming° Some Internet
applications may not require any forwarding°)
When users send these types of requests to your network
via the Internet, the
Router
will forward those requests to
the appropriate computers (also called servers)° Before using
forwarding, you should assign static IP addresses to the
designated servers (use the DHCP Reservation option on the
Basic Setup
screen; refer to
DHCP Reservation
,
page 19
If you need to forward all ports to one computer, click the
DMZ
tab°
Applications and Gaming > Port Range Forwarding
Port Range Forwarding
For each entry, complete the following°
Application Name
Enter the name you wish to give the
application° Each name can be up to 12 characters°
Start~End Port
Enter the number or range of port(s)
used by the server or Internet applications° Check with the
Internet application documentation for more information°
Protocol
Select the protocol(s) used for this application,
TCP
,
UDP
, or
Both
°
To IP Address
Enter the IP address of the computer
running the specific application° If you assigned a static IP
address to the computer, then you can look up its static IP
address;
refer to
DHCP Reservation
,
page 19
°
Enabled
Select
Enabled
to enable port forwarding°
Click
Save Settings
to apply your changes, or click
Cancel
Changes
to clear your changes°
Applications & Gaming > Port Range
Triggering
The
Port Range Triggering
screen allows the Router to
watch outgoing data for specific port numbers° The IP
address of the computer that sends the matching data is
remembered by the Router, so that when the requested
data returns through the Router, the data is pulled back
to the proper computer by way of IP address and port
mapping rules°
Applications and Gaming > Port Range Triggering
Port Range Triggering
For each entry, complete the following:
Application Name
Enter the application name of the
trigger°
Triggered Range
Enter the starting and ending port
numbers of the triggered port number range° Check
with the Internet application documentation for the port
number(s) needed°

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top