Page 36 / 96 Scroll up to view Page 31 - 35
Broadband Router with 2 Phone Ports
28
Chapter 5: Configuring the Router
The Security Tab - Firewall
The Security Tab - Firewall
When you click the Security tab, you will see the
Firewall
screen. You can use this screen to enable a variety of
web filters, which will enhance the firewall protecting your network.
Web Filters
Filter Proxy
. Use of WAN proxy servers may compromise the Gateway's security. Denying Filter Proxy will
disable access to any WAN proxy servers. To enable proxy filtering, click the checkbox.
Filter Java Applets
. Java is a programming language for websites. If you deny Java Applets, you run the risk of
not having access to Internet sites created using this programming language. To enable Java Applet filtering,
click the checkbox.
Filter Cookies
. A cookie is data stored on your computer and used by Internet sites when you interact with
them. To enable cookie filtering, click the checkbox.
Filter ActiveX
. ActiveX is a programming language for websites. If you deny ActiveX, you run the risk of not
having access to Internet sites created using this programming language. To enable ActiveX filtering, click the
checkbox.
When you have finished making changes on this screen, click the
Save Settings
button to save the changes, or
click the
Cancel Changes
button to undo your changes.
Figure 5-11: Security Tab - Firewall
Downloaded from
www.Manualslib.com
manuals search engine
Page 37 / 96
Broadband Router with 2 Phone Ports
29
Chapter 5: Configuring the Router
The Security Tab - VPN Passthrough
The Security Tab - VPN Passthrough
The
VPN Passthrough
screen allows you to allow VPN tunnels using IPSec, PPPoE, or PPTP protocols to pass
through the Router.
VPN Passthrough
IPSec Passthrough
. IPSec (Internet Protocol Security) is a suite of protocols used to implement secure
exchange of packets at the IP layer. To allow IPSec Passthrough, click the
Enabled
button. To disable IPSec
Passthrough, click the
Disabled
button.
PPPoE Passthrough
. PPPoE (Point-to-Point over Ethernet) Passthrough allows your PC(s) to use the PPPoE
client software provided by your ISP. Some ISPs may request that you use this feature on the Router. To allow
PPPoE Passthrough, click the
Enabled
button. To disable PPPoE Passthrough, click the
Disabled
button.
PPTP Pass Through
. PPTP (Point-to-Point Tunneling Protocol) Passthrough allows the Point-to-Point (PPP) to be
tunneled through an IP network. To allow PPTP Passthrough, click the
Enabled
button. To disable PPTP
Passthrough, click the
Disabled
button.
When you have finished making changes on this screen, click the
Save Settings
button to save the changes, or
click the
Cancel Changes
button to undo your changes.
Figure 5-12: Security Tab - VPN
Passthrough
Downloaded from
www.Manualslib.com
manuals search engine
Page 38 / 96
Broadband Router with 2 Phone Ports
30
Chapter 5: Configuring the Router
The Access Restrictions Tab - Filter
The Access Restrictions Tab - Filter
Filters can block specific internal users from accessing the Internet, anonymous Internet requests, and/or
multicasting.
Filter IP Address Range
You can create up to five different IP Address filters. To set up a filter, enter the IP address you wish to filter in
the field provided. Users who have filtered IP addresses will not be able to access the Internet at all.
Filter Port Range
You can create up to five different Port Range filters. To filter users by network port number, select the protocol
you want to filter,
TCP
,
UDP
, or
Both
, from the
Protocol
drop-down menu. Enter the port numbers you want to
filter in the
Start
and
End
fields. Users connected to the Router will no longer be able to access any port number
listed there.
Filter MAC Address
This feature blocks computers with specific MAC addresses from going out to the Internet. For information on
obtaining a MAC address, go to “Appendix C: Finding the MAC Address and IP Address for Your Ethernet Adapter.”
To set the MAC filter, click the
Edit MAC Filter Setting
button.
Edit MAC Filter Setting
. Click the
Edit MAC Filter Setting
button. Select the range of MAC address entries in
the drop-down box. In each
mac
field, enter the MAC address you want to filter.
Click the
Apply
button before
closing the window. To cancel changes, click the
Undo
button.
Figure 5-13: Access Restrictions Tab -
Filter
Figure 5-14: Filtered MAC Address
Downloaded from
www.Manualslib.com
manuals search engine
Page 39 / 96
Broadband Router with 2 Phone Ports
31
Chapter 5: Configuring the Router
The Access Restrictions Tab - Filter
Block WAN Requests
Use these features to enhance your network’s security and filter multicasting.
Block Anonymous Internet Requests
. This keeps your network from being “pinged” or detected and
reinforces your network security by hiding your network ports, so it is more difficult for intruders to work their
way into your network. Select
Enabled
to block anonymous Internet requests, or
Disabled
to allow anonymous
Internet requests.
Filter Multicast
. Multicasting allows for multiple transmissions to specific recipients at the same time. If
multicasting is permitted, then the Router will allow IP multicast packets to be forwarded to the appropriate
computers. Select
Enabled
to filter multicasting, or
Disabled
to disable this feature.
When you have finished making changes to this screen, click the
Save Settings
button to save the changes, or
click the
Cancel Changes
button to undo your changes.
Downloaded from
www.Manualslib.com
manuals search engine
Page 40 / 96
Broadband Router with 2 Phone Ports
32
Chapter 5: Configuring the Router
The Access Restrictions Tab - Device Access Control
The Access Restrictions Tab - Device Access Control
Use this screen to control local and remote access to the Router’s management ports via different services.
Access Control
Enable Access Control
. If you want to control access to the Router’s management ports via the services listed
below, click the checkbox. For each service, make sure the appropriate checkbox is checked if you want to
allow local or remote access. Make sure the appropriate checkbox is not checked if you want to block local or
remote access.
If the Access Control feature is disabled, then access is permitted within the local network but blocked for the
Internet.
Service Name
. You can control access for two services, Web and Secure Shell (SSH).
WAN
. If you want to block WAN (Internet) access for a service, make sure the appropriate checkbox is
unchecked. If you want to allow access, then make sure the appropriate checkbox is checked.
LAN
. If you want to block local access for a service, make sure the appropriate checkbox is unchecked. If you
want to allow access, then make sure the appropriate checkbox is checked.
IP Access List
. Specify the IP addresses that are allowed to remotely access the Router. If you want to delete an
IP address, select it and then click the
Delete
checkbox.
New IP
. To add an IP address, enter it in the field provided, and then click the
Add
checkbox.
When you have finished making changes to this screen, click the
Save Settings
button to save the changes, or
click the
Cancel Changes
button to undo your changes.
Figure 5-15: Access Restrictions Tab -
Device Access Control
NOTE:
When a checkbox
for a service is checked,
access is enabled. When a
checkbox is unchecked,
access is denied.
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top