Page 16 / 41 Scroll up to view Page 11 - 15
Chapter±4
Advanced Configuration
²2
W±reless-N ADSL2+ Gateway
Security Mode > WPA2-Enterprise
Encrypt±on
The method is
TKIP or AES
.
RADIUS Server
Enter the IP address of the RADIUS server.
RADIUS Port
Enter the port number of the RADIUS server.
Shared Key
Enter the key shared between the device
and its RADIUS server.
Key Renewal
Enter the Key Renewal period, which tells
the device how often it should change the dynamic
encryption keys.
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
WPA-Enterprise (WPA2-Enterprise recommended)
WPA-Enterprise features WPA used with a RADIUS server.
(This method should only be used when the device is
connected to a RADIUS server.)
Security Mode > WPA-Enterprise
Encrypt±on.
The method is
TKIP or AES
.
RADIUS Server
Enter the RADIUS server’s IP address.
RADIUS Port
Enter the RADIUS server’s port number.
Shared Key
Enter the key shared between the device
and its RADIUS server.
Key Renewal
Enter the Key Renewal period, which tells
the device how often it should change the dynamic
encryption keys.
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
RADIUS (WPA2-Enterprise recommended)
Security Mode > RADIUS
This option features WEP used in coordination with a
RADIUS server. (This should only be used when a RADIUS
server is connected to the device.)
RADIUS Server
Enter the IP address of the RADIUS
server.
RADIUS Port
Enter the port number of the RADIUS
server.
Shared Key
Enter the key shared between the device
and its RADIUS server.
Encrypt±on
Select the appropriate level of encryption,
40/64-b±t (²0 hex d±g±ts)
or
²04/²28-b±t (26 hex d±g±ts)
.
A higher level of encryption is more secure.
Passphrase
Instead of manually entering WEP keys, you
can enter a Passphrase. It is case-sensitive and should not be
longer than 32 alphanumeric characters. (This Passphrase
function is compatible with Linksys wireless products only
and cannot be used with Windows XP Zero Configuration.
If you want to communicate with non-Linksys wireless
products or Windows XP Zero Configuration, make a note
of the WEP keys generated, and enter the appropriate one
manually in the wireless computer or client.) If you want
to use a Passphrase, then enter it in the Passphrase field
and click the
Generate
button.
Keys ²-4
If you are not using a Passphrase, then manually
enter a set of values. (Do not leave a key field blank, and
do not enter all zeroes; they are not valid key values.) If
you are using 40/64-bit WEP encryption, the key must be
exactly 10 hexadecimal characters in length. If you are
using 104/128-bit WEP encryption, the key must be exactly
26 hexadecimal characters in length. Valid hexadecimal
characters are “0”-“9” and “A”-“F”.
TX Key
To indicate which WEP key to use, select a default
Transmit (TX) Key number.
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Page 17 / 41
Chapter±4
Advanced Configuration
²3
W±reless-N ADSL2+ Gateway
WEP (
WPA2-Personal recommended
)
Security Mode > WEP
Encrypt±on
Select a level of WEP encryption,
64-b±t
or
²28-b±t
.
Passphrase
Enter a Passphrase to automatically generate
WEP keys. Then click
Generate
.
NOTE:
The WEP Passphrase is compatible with
Linksys wireless products only. If you are use non-
Linksys products, manually enter the appropriate
WEP key on those devices.
Key ²-4
If you did not enter a Passphrase, enter the WEP
key(s) manually.
TX Key
Select which TX (Transmit) Key to use. The default
is
²
.
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Wireless > Wireless MAC Filter
Wireless access can be filtered by using the MAC addresses
of the wireless devices transmitting within your network’s
radius.
Wireless > Wireless MAC Filter
Wireless MAC Filter
To filter wireless users by MAC Address, either permitting
or blocking access, click
Enable.
If you do not wish to filter
users by MAC Address, select
D±sable
.
Access Restrictions
Block
Click this button to block wireless access from the
devices listed on this screen.
Perm±t
Click this button to allow wireless access by the
devices listed on this screen.
MAC Address Filter List
Click
W±reless Cl±ent L±st
to display the
Wireless Client List
screen. This screen lists the computers and other devices
on the wireless network sorted by IP address. You can also
sort the list by Client Name, Interface, MAC Address, or
Status, by using the
To Sort By
drop-down menu.
Page 18 / 41
Chapter±4
Advanced Configuration
²4
W±reless-N ADSL2+ Gateway
Wireless Client List
To add a device to the MAC Address Filter List, click the
device’s
Add to MAC F±lter L±st
checkbox, then click
Add
. To retrieve the most up-to-date information, click
Refresh
. To exit this screen and return to the
Wireless MAC 
Filter
screen, click
Close
.
MAC 0²-³0
Enter the MAC addresses of the devices
whose wireless access you want to block or allow.
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Wireless > Advanced Wireless Settings
The
Advanced Wireless Settings
screen is used to set up the
Gateway’s advanced wireless functions. These settings
should only be adjusted by an expert administrator as
incorrect settings can reduce wireless performance.
Wireless > Advanced Wireless Settings
Advanced Wireless
AP Isolat±on
This isolates all wireless clients and wireless
devices on your network from each other. Wireless devices
will be able to communicate with the Gateway but not
with each other. To use this function, click
Enable
. AP
Isolation is disabled by default.
Authent±cat±on Type
The default is
Auto
, which allows
either Open System or Shared Key authentication to be
used. With Open System authentication, the sender and
the recipient do NOT use a WEP key for authentication.
With Shared Key authentication, the sender and recipient
use a WEP key for authentication. Select
Shared Key
to
only use Shared Key authentication.
Bas±c Rate
The Basic Rate setting is not actually one rate
of transmission but a series of rates at which the device
can transmit. The device will advertise its Basic Rate to the
other wireless devices in your network, so they know which
rates will be used. The device will also advertise that it will
automatically select the best rate for transmission. The
default setting is
Default
, when the device can transmit
at all standard wireless rates (1-2Mbps, 5.5Mbps, 11Mbps,
18Mbps, and 24Mbps). Other options are
²-2Mbps
, for use
with older wireless technology, and
All
, when the device
can transmit at all wireless rates.
Transm±ss±on Rate
The rate of data transmission should
be set depending on the speed of your wireless network.
You can select from a range of transmission speeds, or you
can select
Auto
to have the device automatically use the
fastest possible data rate and enable the Auto-Fallback
feature. Auto-Fallback will negotiate the best possible
connection speed between the device and a wireless
client. The default setting is
Auto
.
N Transm±ss±on Rate
The rate of data transmission
should be set depending on the speed of your Wireless-N
networking. You can select from a range of transmission
speeds, or you can select
Auto
to have the device
automatically use the fastest possible data rate and enable
the Auto-Fallback feature. Auto-Fallback will negotiate the
best possible connection speed between the device and a
wireless client. The default setting is
Auto
.
CTS Protect±on Mode
CTS (Clear-To-Send) Protection
Mode’s default setting is
D±sable
. Select
Auto
so the device
will automatically use CTS Protection Mode when your
Wireless-N and Wireless-G products are experiencing severe
problems and are not able to transmit to the device in an
environment with heavy 802.11b traffic. This function boosts
the device’s ability to catch all Wireless-N and Wireless-G
transmissions but will severely decrease performance.
Beacon Interval
Enter a value between 1 and 65,535
milliseconds. The Beacon Interval value indicates the
frequency interval of the beacon. A beacon is a packet
broadcast by the Gateway to synchronize the wireless
network(s). The default value is
²00
.
DTIM Interval
This value, between 1 and 255, indicates
the interval of the Delivery Traffic Indication Message
(DTIM). A DTIM field is a countdown field informing
clients of the next window for listening to broadcast and
multicast messages. When the Gateway has buffered
broadcast or multicast messages for associated clients, it
sends the next DTIM with a DTIM Interval value. Its clients
hear the beacons and awaken to receive the broadcast
and multicast messages. The default value is
²
.
Fragmentat±on
Threshold
This
value
specifies
the
maximum size for a packet before data is fragmented
Page 19 / 41
Chapter±4
Advanced Configuration
²³
W±reless-N ADSL2+ Gateway
into multiple packets. If you experience a high packet
error rate, you may slightly increase the Fragmentation
Threshold. Setting the Fragmentation Threshold too low
may result in poor network performance. Only minor
reduction of the default value is recommended. In most
cases, it should remain at its default value of
2346
.
RTS
Threshold
Should
you
encounter
inconsistent
data flow, only minor reduction of the default,
2346
, is
recommended. If a network packet is smaller than the
preset RTS threshold size, the RTS/CTS mechanism will
not be enabled. The Gateway sends Request to Send (RTS)
frames to a particular receiving station and negotiates
the sending of a data frame. After receiving an RTS, the
wireless station responds with a Clear to Send (CTS) frame
to acknowledge the right to begin transmission. The RTS
Threshold value should remain at its default value of
2346
.
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Security > Firewall
The
Firewall
screen is used to configure a firewall that
can filter out various types of unwanted traffic on the
Gateway’s local network.
Security > Firewall
Firewall
SPI F±rewall Protect±on
To use firewall protection,
keep the default selection,
Enable
. To turn off firewall
protection, select
D±sable
.
Filters
F±lter Proxy
Use of WAN proxy servers may compromise
the Gateway’s security. Denying Proxy will disable access
to any WAN proxy servers. Select
F±lter Proxy
to enable
proxy filtering. Deselect the feature to allow proxy access
.
F±lter Java Applets
Java is a programming language for
websites. If you deny Java, you run the risk of not having
access to Internet sites created using this programming
language. Select
F±lter Java Applets
to enable Java
filtering. Deselect the feature to allow Java usage
.
F±lter Cook±es
A cookie is data stored on your computer
and used by Internet sites when you interact with them.
Select
F±lter Cook±es
to filter cookies. Deselect the feature
to allow cookie usage
.
F±lter Act±veX
ActiveX is a programming language for
websites. If you deny ActiveX, you run the risk of not having
access to Internet sites created using this programming
language. Select
F±lter Act±veX
to enable ActiveX filtering.
Deselect the feature to allow ActiveX usage
.
Block WAN Requests
Block
Anonymous
Internet
Requests
This
feature
makes it more difficult for outside users to work their way
into your network. This feature is selected
by default.
Deselect the feature to allow anonymous Internet requests.
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Security > VPN Passthrough
The
VPN  Passthrough
screen allows you to enable VPN
tunnels using IPSec, PPTP, or L2TP protocols to pass through
the Gateway’s firewall.
Security > VPN Passthrough
VPN Passthrough
IPSec Passthrough
Internet Protocol Security (IPSec) is
a suite of protocols used to implement secure exchange
of packets at the IP layer. To allow IPSec tunnels to pass
through the Gateway, keep the default,
Enable
.
PPTP Passthrough
Point-to-Point Tunneling Protocol
(PPTP) allows the Point-to-Point Protocol (PPP) to be
tunneled through an IP network. To allow PPTP tunnels to
pass through the Gateway, keep the default,
Enable
.
L2TP Passthrough
Layer 2 Tunneling Protocol is the
method used to enable Point-to-Point sessions via the
Internet on the Layer 2 level. To allow L2TP tunnels to pass
through the Gateway, keep the default,
Enable
.
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Page 20 / 41
Chapter±4
Advanced Configuration
²6
W±reless-N ADSL2+ Gateway
Access Restrictions > Internet Access Policy
The
Internet  Access  Policy
screen allows you to block or
allow specific kinds of Internet usage and traffic, such as
Internet access, designated services, and websites during
specific days and times.
Access Restrictions > Internet Access Policy
Internet Access Policy
Internet Access Pol±cy
Access can be managed by a
policy. Use the settings on this screen to establish an
access policy (after
Save Sett±ngs
is clicked). Selecting a
policy from the drop-down menu will display that policy’s
settings. To delete a policy, select that policy’s number
and click
Delete
. To view all the policies, click
Summary
.
Summary
The policies are listed with the following information: No.,
Policy Name, Days, and Time of Day. To delete a policy,
select
Delete
. To return to the
Internet Access Policy
screen,
click
Close
.
Summary
Status
Policies are disabled by default. To enable a policy,
select its number from the drop-down menu, and select
Enable
.
To create a policy, follow steps 1-10. Repeat these steps to
create additional policies, one at a time.
Select a number from the
Internet Access Policy
drop-
down menu.
To enable this policy, select
Enable
.
Enter a Policy Name in the field provided.
Click
Ed±t L±st of Computers
to select which computers
will be affected by the policy. The
Internet Access PC List 
screen appears. You can select a computer by MAC
address or IP address. You can also enter a range of
IP addresses if you want this policy to affect a group
of computers. After making your changes, click
Save
Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes. Then click
Close
.
Internet Access PC List
Specify the Access Restriction to apply to the computers
you selected in step 4. Select
Deny
to block Internet
access, or
Allow
to allow Internet access.
Specify when this policy will be in effect. Select the
days: individual days of the week, or
Every Day
. Then
select the time span within each day: specific start and
end times using the
From
and
To
fields, or
24 Hours
.
To block websites by URL address, enter each URL in a
separate
Website Blocking by URL Address
field.
To block websites using keywords, enter each keyword
in a separate
Website Blocking by Keyword
field.
You can filter access to various services accessed over
the Internet, such as FTP or telnet. From the
Blocked 
Services
list, select the service you want to block; the
port numbers and protocol for the selected service are
automatically displayed. If the service you want is not
listed, select
User-Def±ned
; enter its port numbers in
the fields provided; then select its protocol:
ICMP
,
TCP
,
UDP
, or
TCP & UDP
from the drop-down menu.
Click
Save Sett±ngs
to save the policy’s settings. To
cancel the policy’s settings, click
Cancel Changes
.
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top