Page 46 / 105 Scroll up to view Page 41 - 45
37
Chapter 6: Setting Up and Configuring the Router
IPS Tab
4-Port Gigabit Security Router with VPN
Factory Defaults
Restore Factory Defaults
. Click this button to reset all configuration settings to their default values. Any settings
that have been saved will be lost when the default settings are restored. After clicking the button, another screen
will appear. Click
OK
to continue. Another screen will appear while the system reboots.
Firmware Upgrade
To upgrade firmware, download the latest firmware for the product from Linksys.com, extract it to your computer,
and perform the steps below:
1.
File
. Type in the name of the extracted firmware upgrade file or click
Browse
to locate the file.
2.
Start to Upgrade
. Once you have selected the appropriate file, click the
Start to Upgrade
button and follow
the on-screen instructions to upgrade your firmware.
IPS Tab
Configure
IPS Function
. Enable or Disable IPS Function.
Abnormally Detection
HTTP
. Web attack signature is matched. HTTP request decoder will decode UTF-8 (1,2, and 3 byte) code
and normalize URI (according to those evasion methods mentioned in whisker) before pattern match.
FTP
. FTP Bounce Detection and Inserting telnet opcodes into FTP command stream Detection.
TELNET
. Normalization of Telnet negotiation strings.
RPC
. RPC record fragging detection.
Signature Update
. Before upgrading the firmware, download the Router firmware upgrade file from the Linksys
website, www.linksys.com.
Browse
button
. In the field provided, enter the name of the extracted firmware upgrade file, or click the
Browse
button to find this file.
Figure 6-34: IPS Configure
Figure 6-33: Firmware Upgrade
Figure 6-32: Factory Defaults
Figure 6-31: Backup & Restore
WARNING:
Uploading a configuration file will destroy (overwrite) ALL of the existing settings.
Downloaded from
www.Manualslib.com
manuals search engine
Page 47 / 105
38
Chapter 6: Setting Up and Configuring the Router
IPS Tab
4-Port Gigabit Security Router with VPN
Update
button
. After you have selected the appropriate file, click this button, and follow the on-screen
instructions.
P2P/IM
Peer to Peer
Peer to peer file sharing applications can be blocked or allowed. The preconfigured file sharing networks are
GNUTELLA(EZPEER), FASTTRACK, KURO, EDONKEY2000, BITTORRECT, DIRECTCONNECT, PIGO, and WINMX.
Instant Messenger
Instant messaging applications can be blocked from use or allowed. The preconfigured instant messaging
applications are MSN, ICQ, YAHOO MESSEGER, SKYPE, IRC, ODIGO, REDIFF, GOOGLE TALK, and QQ.
Report
Twenty four hour diagram displaying network traffic and attacks.
Attacker
Displays the IP Address of attackers and the frequency (number of times) of the attacks.
Attacked Category
Displays the category (type) of attack and the frequency (number of times) of the attacks.
Information
Signature Version
. The Signature Version displays the version of the signature patterns in the router that
protects against malicious threats.
Last Time Upload
. This displays when the signature patterns in the router were last updated.
Protect Scope
. Displays a list of the categories of attacks that the IPS feature in the router protects against.
Figure 6-36: Report
Figure 6-35: P2P/IM
Downloaded from
www.Manualslib.com
manuals search engine
Page 48 / 105
39
Chapter 6: Setting Up and Configuring the Router
L2 Switch Tab
4-Port Gigabit Security Router with VPN
L2 Switch Tab
VLAN
VLAN Configuration
Port/VLAN VLANs are logical subgroups of a Local Area Network (LAN) created via software rather than defining a
hardware solution. VLANs combine user stations and network devices into a single domain regardless of the
physical LAN segment to which they are attached. VLANs allow network traffic to flow more efficiently within
subgroups. VLANs managed through software reduce the amount of time in which network changes are
implemented.
VLANs have no minimum number of ports, and can be created per unit, per device, per stack, or any other logical
connection combination, as VLANs are software based and not defined by physical attributes.
VLANs function at layer 2. Since VLANs isolate traffic within the VLAN, a Layer 3 router functioning router is
needed to allow traffic flow between VLANs. Layer 3 routers identify segments and coordinate with VLANs.
VLANs are broadcast and multicast domains. Broadcast and multicast traffic is transmitted only in the VLAN in
which the traffic is generated.
RADIUS
Mode
. Choose the function to Enable or Disable RADIUS.
RADIUS IP
. Enter the Server IP address.
RADIUS UDP Port
. Identifies the UDP port. The UDP port is used to verify the RADIUS server authentication.
RADIUS Secret
. Indicates the Key string used for authenticating and encrypting all RADIUS communications
between the device and the RADIUS server. This key must match the RADIUS server encryption key. If no
host-specific value is specified, the global value applies to each host.
Administration State
. Specifies the port authorization state. The possible field values are:
Auto
. The controlled port state is set by the Authentication method.
Force Authorized
. The controlled port state is set to Force-Authorized (forward traffic).
Force Unauthorized
. The controlled port state is set to Force-Unauthorized (discard traffic).
Figure 6-37: VLAN
Downloaded from
www.Manualslib.com
manuals search engine
Page 49 / 105
40
Chapter 6: Setting Up and Configuring the Router
L2 Switch Tab
4-Port Gigabit Security Router with VPN
Port State
. It displays the state of the selected port.
Port Setting
Port
. Displays the physical port number.
Link
. Displays the port duplex mode and speed. Full indicates that the interface supports transmission between
the device and its link partner in both directions simultaneously. Half indicates that the interface supports
transmission between the device and the client in only one direction at a time.
Mode
. Specify port duplex mode and speed. Auto Speed is a protocol between two link partners that enables a
port to advertise its transmission rate, duplex mode and flow control abilities to its partner.
Flow Control
. Displays the flow control status on the port. Operates when port is in Full duplex mode.
MaxFrame
. Displays the Max frame size the port can receive and send.
Statistics
Statistics Overview
Tx Bytes
. Displays the number of Bytes transmitted from the selected port.
Tx Frames
. Displays the number of Frames transmitted from the selected port.
Rx Bytes
. Displays the number of Bytes received on the selected port.
Rx Frames
. Displays the number of Frames received on the selected port.
Tx Errors
. Displays the number of error packets transmitted from the selected port.
Rx Errors
. Displays the number of error packets received from the selected port.
Cable Diagnostics
Port
. Select the port number.
Pair
. Each cable consists of 8 pins (4 pairs).
Cable Length
. The length of the cable.
Status
. The status of the pair.
Figure 6-40: Statistics
Figure 6-39: Port Setting
Figure 6-38: RADIUS
Downloaded from
www.Manualslib.com
manuals search engine
Page 50 / 105
41
Chapter 6: Setting Up and Configuring the Router
Status Tab
4-Port Gigabit Security Router with VPN
Status Tab
Gateway
Firmware Version
. This is the Gateway current firmware.
MAC Address
. This is the Gateway MAC Address, as seen by your ISP.
Current Time
. This shows the time, based on the time zone you selected on the Setup tab.
Internet Connection
Connection Mode
. This shows the mode of the connection.
Login Type
. This indicates the type of Internet connection you are using.
Interface
. The Gateway Internet Interface is displayed here.
IP Address
. The Gateway Internet IP Address is displayed here.
Subnet Mask
. This Subnet Mask is associated with the IP address above.
Default Gateway
. This is your ISP's Gateway.
DNS
. Shown here are the DNS (Domain Name System) IP addresses currently used by this Gateway.
IPv6 DNS
. This displays the IPv6 DNS IP Primary and Second Address.
Local Network
Current IP address System
. This shows the current system.
MAC Address
. This is the Router MAC Address, as seen on your local, Ethernet network.
IP Address
. The Internet IP Address is displayed here.
Subnet Mask
. This Subnet Mask is associated with the IP address above.
IPv6 Address
. This shows the IPv6 IP address, if applicable.
Figure 6-42: Status
Figure 6-41: Cable Diagnostics
Downloaded from
www.Manualslib.com
manuals search engine

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top