Page 31 / 105 Scroll up to view Page 26 - 30
22
Chapter 6: Setting Up and Configuring the Router
Setup Tab
4-Port Gigabit Security Router with VPN
IPv6
IPv6 Address
. If your network has implemented IPv6, enter the proper IPv6 address in this field.
Prefix Length
. Enter the appropriate IPv6 prefix length.
Router Advertisement
. Enabling this option allows IPv6 hosts to configure their IP addresses automatically
using the IPv6 prefix broadcast by the router.
Primary DNS
. Enter the Primary IPv6 DNS server address.
Secondary DNS
. Enter the Secondary IPv6 DNS server address.
DMZ
The
DMZ
screen allows one local PC to be exposed to the Internet for use of a special-purpose service such as
Internet gaming and videoconferencing. Whereas Port Range Forwarding can only forward a maximum of 10
ranges of ports, DMZ hosting forwards all the ports for one PC at the same time.
DMZ Hosting
. This feature allows one local PC to be exposed to the Internet for use of a special-purpose service
such as Internet gaming and videoconferencing. To use this feature, select
Enabled
. To disable the DMZ feature,
select
Disabled
.
DMZ Host IP Address
. To expose one PC, enter the computer’s IP address.
Click the
Save Settings
button to save the network settings or click the
Cancel Changes
button to undo your
changes.
MAC Address Clone
Some ISPs require that you register a MAC address. This feature “clones” your network adapter's MAC address
onto the Router, and prevents you from having to call your ISP to change the registered MAC address to the
Router's MAC address. The Router's MAC address is a 12-digit code assigned to a unique piece of hardware for
identification.
Mac Address Clone
. Enabled or Disabled.
Mac Address
. Enter the MAC Address registered with your ISP in this field.
Clone My PC’s MAC
button. When Mac Address clone is enabled, click this to copy the MAC address of the
network adapter in the computer that you are using to connect to the Web interface.
Figure 6-12: Mac Clone
Figure 6-11: DMZ Host
Downloaded from
www.Manualslib.com
manuals search engine
Page 32 / 105
23
Chapter 6: Setting Up and Configuring the Router
Setup Tab
4-Port Gigabit Security Router with VPN
Click
Save Settings
to save the MAC Cloning settings or click the
Cancel Changes
button to undo your changes.
Advanced Routing
Operating Mode
Select the Operating mode in which this Router will function.
Gateway
. This is the normal mode of operation. This allows all devices on your LAN to share the same WAN
(Internet) IP address. In Gateway mode, the NAT (Network Address Translation) mechanism is enabled.
Router
. You either need another Router to act as the Internet Gateway, or all PCs on your LAN must be assigned
(fixed) Internet IP addresses. In Router mode, the NAT mechanism is disabled.
Dynamic Routing
The Router's dynamic routing feature can be used to automatically adjust to physical changes in the network's
layout. The Router uses the dynamic RIP protocol. It determines the route that the network packets take based on
the fewest number of hops between the source and the destination. The RIP protocol regularly broadcasts routing
information to other routers on the network.
RIP (Routing Information Protocol)
: The Router, using the RIP protocol, calculates the most efficient route for
the network’s data packets to travel between the source and the destination, based upon the shortest paths.
RIP Send Packet Version
: Choose the TX protocol you want for transmitting data on the network: None, RIPv1,
RIPv2-Broadcast, or RIPv2-Multicast. This should match the version supported by other Routers on your LAN.
RIP Recv Packet Version
: Choose the RX protocol you want for receiving data from the network: None, RIPv1,
RIPv2, or Both RIPv1 and v2. This should match the version supported by other Routers on your LAN.
Static Routing
You will need to configure Static Routing if there are multiple routers installed on your network. The static routing
function determines the path that data follows over your network before and after it passes through the Router.
You can use static routing to allow different IP domain users to access the Internet through this device. This is an
advanced feature. Please proceed with caution.
This Router is also capable of dynamic routing (see the Dynamic Routing tab). In many cases, it is better to use
dynamic routing because the function will allow the Router to automatically adjust to physical changes in the
network's layout. In order to use static routing, the Router's DHCP settings must be disabled.
Figure 6-13: Advanced Routing
Figure 6-14: Routing Table Entry List
Downloaded from
www.Manualslib.com
manuals search engine
Page 33 / 105
24
Chapter 6: Setting Up and Configuring the Router
Setup Tab
4-Port Gigabit Security Router with VPN
To set up static routing, you should add routing entries in the Router's table that tell the device where to send all
incoming packets. All of your network routers should direct the default route entry to the Linksys Router.
Enter the following data to create a static route entry:
1.
Select Set Number
: Select the set number (routing table entry number) that you wish to view or configure. If
necessary, click Delete This Entry to clear the entry.
2.
Destination IP Address
: Enter the network address of the remote LAN segment. For a standard Class C IP
domain, the network address is the first three fields of the Destination LAN IP, while the last field should be
zero.
3.
Subnet Mask
: Enter the Subnet Mask used on the destination LAN IP domain. For Class C IP domains, the
Subnet Mask is 255.255.255.0.
4.
Gateway
: If this Router is used to connect your network to the Internet, then your gateway IP is the Router's
IP Address. If you have another router handling your network's Internet connection, enter the IP Address of
that router instead.
5.
Hop Count (max. 16)
: This value gives the number of nodes that a data packet passes through before
reaching its destination. A node is any device on the network, such as switches, PCs, etc.
Click the
Save Settings
button to save the Routing settings, click the
Cancel Changes
button to undo your
changes or click the
Show Routing Table
button to view the current routing table.
Time
Manually
If you wish to enter the time and date manually, select the
Date
from the drop-down fields and enter the hour,
minutes, and seconds in the
Time
field using 24 hour format (example 10:00pm would be entered 22:0:0).
Automatically
Time Zone
. Select the time zone for your location and your time setting is synchronized over the Internet.
Auto Daylight Saving. If your location observes daylight savings time, select the
Enable
option.
Figure 6-15: Time
Downloaded from
www.Manualslib.com
manuals search engine
Page 34 / 105
25
Chapter 6: Setting Up and Configuring the Router
Firewall Tab
4-Port Gigabit Security Router with VPN
Firewall Tab
From the Firewall Tab, you can configure the Router to deny or allow specific internal users from accessing the
Internet. You can also configure the Router to deny or allow specific Internet users from accessing the internal
servers. You can set up different packet filters for different users that are located on internal (LAN) side or
external (WAN) side based on their IP addresses or their network Port number.
Basic
SPI
Firewall Protection
: SPI (Stateful Packet Inspection), when enabled this feature will block DoS (Denial of
Service) attacks. A DoS attack does not attempt to steal data or damage your PCs, but overloads your Internet
connection so you can not use it.
Restrict WEB Features
Block. Place a checkmark next to the Web features that you wish to restrict.
Proxy
: If local users have access to WAN proxy servers, they may be able to circumvent the Router's
content filters and access Internet sites blocked by the Router. Denying Proxy will block access to any
WAN proxy servers.
Cookies
: A cookie is data stored on your PC and used by Internet sites when you interact with them, so
you may not want to deny cookies.
Java Applets
: Java is a programming language for websites. If you deny Java, you run the risk of not
having access to Internet sites created using this programming language.
ActiveX
: ActiveX is a Microsoft (Internet Explorer) programming language for websites. If you deny
ActiveX, you run the risk of not having access to Internet sites using this programming language. Also,
Windows Update uses ActiveX, so if this is blocked, Windows update will not work.
Block WAN Request
Block Anonymous Internet Requests
. Check this checkbox if you wish to have these filtered out.
Internet Access Policy
Access can be managed by a policy. Use the settings on this screen to establish an access policy. Selecting a
policy from the drop-down menu will display that policy's settings. You can then perform the following
operations:
Figure 6-16: Firewall Basic
Figure 6-17: Internet Access Policy
Downloaded from
www.Manualslib.com
manuals search engine
Page 35 / 105
26
Chapter 6: Setting Up and Configuring the Router
Firewall Tab
4-Port Gigabit Security Router with VPN
Create a Policy - see instructions below.
Delete the current policy - click the
Delete
button.
View all policies - click the
Summary
button. On the Summary screen, the policies are listed with the
following information: No., Policy Name, Days, Time, and a checkbox to delete (clear) the policy. To delete
a policy, check the checkbox in the Delete column, and click the Delete button
View or change the PCs covered by the current policy - click the
Edit List of PCs
button.
On the List of PCs screen, you can define PCs by MAC Address or IP Address. You can also enter a range of IP
Addresses if you want this policy to affect a group of PCs.
To create an Internet Access policy:
1.
Select the desired policy number from the
Internet Access Policy
drop-down menu.
2.
Enter a Policy Name in the field provided.
3.
To enable this policy, select the
Enable
option.
4.
Click the
Edit List of PCs
button to select which PCs will be affected by the policy. The List of PCs screen will
appear in a sub-window. You can select a PC by MAC Address or IP Address. You can also enter a range of IP
Addresses if you want this policy to affect a group of PCs. After making your changes, click the
Save Settings
button to apply your changes.
5.
Click the appropriate option,
Deny
or
Allow
, depending on whether you want to block or allow Internet access
for the PCs you listed on the List of PCs screen.
6.
Decide which Days and what Times you want this policy to be enforced. Select the individual days during
which the policy will be in effect, or select Everyday. Enter a range of hours and minutes during which the
policy will be in effect, or select 24 Hours.
7.
If you wish to block access to Web sites, use the
Website Blocking by URL Address
or
Website Blocking
by Keyword
feature.
Website Blocking by URL Address
. Enter the URL or Domain Name of the web sites you wish to block.
Website Blocking by Keyword
. Enter the keywords you wish to block in the fields provided. If any of
these Keywords appears in the URL of a web site, access to the site will be blocked. Note that only the
URL is checked, not the content of each Web page.
Figure 6-18: List of PC’s
Figure 6-19: Internet Policy Summary
Downloaded from
www.Manualslib.com
manuals search engine

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top