Page 26 / 71 Scroll up to view Page 21 - 25
20
Chapter 5: Configuring the Router
The Security Tab - Firewall
Broadband Router with 2 Phone Ports
The Security Tab - Firewall
When you click the Security tab, you will see the
Firewall
screen. The Router’s firewall enhances the security of
your network. You can also enable a variety of filters to further protect your network and block anonymous
Internet requests.
Firewall
The firewall uses Stateful Packet Inspection (SPI) to check the incoming data transmissions before allowing them
to enter your network. To enhance the security of your network, this feature is enabled by default and cannot be
disabled.
Additional Filters
Filter Proxy
. Use of WAN proxy servers may compromise the Router’s security. If you deny proxy, you will block
access to any WAN proxy servers. Click the checkbox to enable proxy filtering.
Filter Cookies
. A cookie is data stored on your PC and used by Internet sites when you interact with them. Click
the checkbox to enable cookie filtering.
Filter Java Applets
. Java is a programming language for websites. If you deny Java Applets, you run the risk of
not having access to Internet sites created using this programming language. Click the checkbox to enable Java
Applet filtering.
Filter ActiveX
. ActiveX is a programming language for websites. If you deny ActiveX, you run the risk of not
having access to Internet sites created using this programming language. Click the checkbox to enable ActiveX
filtering.
Filter Multicast
. Multicasting allows for multiple transmissions to specific recipients at the same time. If
multicasting is permitted, then the Router will allow IP multicast packets to be forwarded to the appropriate
computers. Click the checkbox to enable multicast filtering.
Block WAN Requests
Block Anonymous Internet Requests
. This keeps your network from being “pinged” or detected and reinforces
your network security by hiding your network ports, so it is more difficult for intruders to work their way into your
network. Click the checkbox to block anonymous Internet requests. This feature is enabled by default.
When you have finished making changes to this screen, click the
Save Settings
button to save the changes, or
click the
Cancel Changes
button to undo your changes. For help information, click
Help
.
Figure 5-10: Security Tab - Firewall
spi
(stateful packet inspection)
firewall:
A
technology that inspects incoming packets of
information before allowing them to enter the
network
Downloaded from
www.Manualslib.com
manuals search engine
Page 27 / 71
21
Chapter 5: Configuring the Router
The Security Tab - VPN
Broadband Router with 2 Phone Ports
The Security Tab - VPN
The
VPN
screen allows you to allow VPN tunnels using IPSec, PPTP, or L2TP protocols to pass through the Router.
VPN Passthrough
IPSec Passthrough
. IPSec (Internet Protocol Security) is a suite of protocols used to implement secure exchange
of packets at the IP layer. To allow IPSec Passthrough, click the
Enable
button. To disable IPSec Passthrough,
click the
Disable
button.
PPTP Passthrough
. PPTP (Point-to-Point Tunneling Protocol) Passthrough allows the Point-to-Point (PPP) to be
tunneled through an IP network. To allow PPTP Passthrough, click the
Enable
button. To disable PPTP
Passthrough, click the
Disable
button.
L2TP Passthrough
. Layer 2 Tunneling Protocol Passthrough is the method used to enable Point-to-Point (PPP)
sessions via the Internet on the Layer 2 level. To allow L2TP Passthrough, click the
Enable
button. To disable
L2TP Passthrough, click the
Disable
button.
When you have finished making changes to this screen, click the
Save Settings
button to save the changes, or
click the
Cancel Changes
button to undo your changes. For help information, click
Help
.
Figure 5-11: Security Tab - VPN Passthrough
ipsec
: a VPN protocol used to implement
secure exchange of packets at the IP layer
pptp
: a VPN protocol that allows the Point to Point
Protocol (PPP) to be tunneled through an IP network.
This protocol is also used as a type of broadband
connection in Europe
vpn
: a security measure to protect data as it leaves
one network and goes to another over the Internet
Downloaded from
www.Manualslib.com
manuals search engine
Page 28 / 71
22
Chapter 5: Configuring the Router
The Access Restrictions Tab - Internet Access
Broadband Router with 2 Phone Ports
The Access Restrictions Tab - Internet Access
The
Internet Access
screen allows you to block or allow specific kinds of Internet usage and traffic, such as
Internet access, designated services, and websites during specific days and times.
Internet Access
Internet Access Policy
. Access can be managed by a policy. Use the settings on this screen to establish an
access policy (after the
Save Settings
button is clicked). Selecting a policy from the drop-down menu will
display that policy’s settings. To delete a policy, select that policy’s number and click the
Delete
button. To view
all the policies, click the
Summary
button.
Status
. Policies are disabled by default. To enable a policy, select the policy number from the drop-down menu,
and click the radio button beside
Enable
. To disable a policy, select the policy number from the drop-down menu,
and click the radio button beside
Disable
.
To create an Internet Access Policy:
1.
Select a number from the
Internet Access Policy
drop-down menu.
2.
To enable this policy, click the radio button beside
Enable
.
3.
Enter a Policy Name in the field provided.
Figure 5-12: Access Restrictions Tab - Internet Access
NOTE:
If you have an AT&T CallVantage Service account, contact AT&T technical support at
1-866-596-8464 before you enable an Internet Access Policy.
Downloaded from
www.Manualslib.com
manuals search engine
Page 29 / 71
23
Chapter 5: Configuring the Router
The Access Restrictions Tab - Internet Access
Broadband Router with 2 Phone Ports
4.
Click the
Edit List of PCs
button to select which PCs will be affected by the policy. The
List of PCs
screen will
appear. You can select a PC by MAC Address or IP Address. You can also enter a range of IP Addresses if you
want this policy to affect a group of PCs. After making your changes, click the
Save Settings
button to apply
your changes or
Cancel Changes
to cancel your changes. Click the
Close
button to return to the
Internet
Access
screen.
5.
Click the appropriate option,
Deny
or
Allow
, depending on whether you want to block or allow Internet access
for the PCs you listed on the
List of PCs
screen.
6.
Decide which days and what times you want this policy to be enforced. Select the individual days during
which the policy will be in effect, or select
Everyday
. Then enter a range of hours and minutes during which
the policy will be in effect, or select
24 Hours
.
7.
In the
Blocked Services
section, you can filter access to various services accessed over the Internet, such as
FTP or telnet. Select the service from the drop-down menu listing your choice of services. Then click the
>>
button to add the service to the
Blocked services
list. (You can block up to two services per policy.)
If you want to remove a service from the
Blocked services
list, then select it and click the
<<
button.
If the service you want is not available, then you can add a service. Enter the service’s name in the
Service
Name
field. Select its protocol from the
Protocol
drop-down menu, and enter its range in the
Port Range
fields. Then click the
Add
button.
If you want to edit a service’s settings, then select the service in the drop-down menu on the left. Change its
name, protocol setting, or port range. Then click the
Modify
button.
To delete a service, select it from the list on the left. Then click the
Delete
button.
8.
If you want to block websites with specific URL addresses, enter each URL in a separate field next to
Website
Blocking by URL Address
.
9.
If you want to block websites using specific keywords, enter each keyword in a separate field next to
Website
Blocking by Keyword
.
10. Click the
Save Settings
button to save the policy’s settings. To cancel the policy’s settings, click the
Cancel
Changes
button.
11. Repeat steps 1-10 to create more policies.
When you have finished making changes to this screen, click the
Save Settings
button to save the changes, or
click the
Cancel Changes
button to undo your changes. For help information, click
Help
.
Figure 5-13: List of PCs
Downloaded from
www.Manualslib.com
manuals search engine
Page 30 / 71
24
Chapter 5: Configuring the Router
The Applications & Gaming Tab - Port Range Forward
Broadband Router with 2 Phone Ports
The Applications & Gaming Tab - Port Range Forward
When you click the Applications & Gaming tab, you will see the
Port Range Forward
screen. Port range forwarding
sets up public services on your network, such as web servers, ftp servers, e-mail servers, or other specialized
Internet applications. (Specialized Internet applications are any applications that use Internet access to perform
functions such as videoconferencing or online gaming. Some Internet applications may not require any
forwarding.) When users send this type of request to your network via the Internet, the Router will forward those
requests to the appropriate PC.
Before using forwarding, you should assign a static IP address to the designated PC.
If you need to forward all ports to one PC, click the
DMZ
tab.
Port Range Forward
Port Range
To add a server using Port Range Forwarding, complete the following fields:
Application
. Enter the name of the application.
Start and End
. Enter the number or range of external port(s) used by the server or Internet application. Check
with the Internet application software documentation for more information.
Protocol
. Select the protocol
TCP
or
UDP
, or select
Both
.
IP Address
. Enter the IP address of the server that you want the Internet users to be able to access. To find the IP
address, go to “Appendix C: Finding the MAC Address and IP Address for Your Ethernet Adapter.”
Enable
. Check the
Enable
box to enable the application you have defined. Port Range Forwarding for a specific
application will not function if its Enable button is left unchecked. This is disabled (unchecked) by default.
When you have finished making changes to this screen, click the
Save Settings
button to save the changes, or
click the
Cancel Changes
button to undo your changes. For help information, click
Help
.
Figure 5-14: Applications & Gaming Tab -
Port Range Forward
ip
(internet protocol): a protocol
used to send data over a network
ip address
: the address used to identify
a computer or device on a network
tcp
: a network protocol for transmitting data that
requires acknowledgement from the recipient of
data sent
udp
: a network protocol for transmitting data
that does not require acknowledgement from
the recipient of the data that is sent.
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4.7 / 5 based on 3 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top