Page 16 / 39 Scroll up to view Page 11 - 15
Chapter 4
Advanced Configuration
15
Wireless-G ADSL Home Gateway
Wireless > Wireless Access
Wireless access can be filtered by using the MAC addresses
of the wireless devices transmitting within your network’s
radius.
Wireless > Wireless Access
Wireless Network Access
Allow All/Restrict Access
To filter wireless users by MAC
address, either permitting or blocking access, select
Restrict
Access
. If you do not wish to filter users by MAC address,
keep the default,
Allow All
.
Prevent listed computers from accessing the wireless
network
Select this to block wireless access by MAC
address. This setting is selected by default.
Permit only listed computers to access the wireless
network
Select this to allow wireless access by MAC
address.
Edit MAC Address Access List
Click this to open the
MAC
Address Filter List
screen.
MAC Address Filter List
MAC Address Filter List
MAC 01-20
Enter the MAC addresses of the devices
whose wireless access you want to block or allow.
Wireless Client MAC List
Click this to open the
Wireless Client List
screen.
Wireless Client List
Wireless Client List
This screen lists the MAC addresses of the wireless
devices. Select
Enable MAC Filter
for any device you
want to add to the MAC Address Filter List. Then click
Update Filter List
.
To retrieve the most up-to-date information, click
Refresh
. To exit this screen and return to the
Wireless
MAC Filter List
screen, click
Close
.
Click
Save Settings
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Wireless > Advanced Wireless Settings
The
Advanced Wireless Settings
screen is used to set up the
Gateway’s advanced wireless functions. These settings
should only be adjusted by an expert administrator as
incorrect settings can reduce wireless performance.
Wireless > Advanced Wireless Settings
Advanced Wireless
Wireless-G Settings
Authentication Type
The default is
Auto
, which allows
either Open System or Shared Key authentication to be
used. With Open System authentication, the sender and
the recipient do NOT use a WEP key for authentication.
With Shared Key authentication, the sender and recipient
Page 17 / 39
Chapter 4
Advanced Configuration
16
Wireless-G ADSL Home Gateway
use a WEP key for authentication. Select
Shared Key
to
only use Shared Key authentication.
Control TX Rate
The Control TX Rate should be set
depending on the speed of your wireless network. Select
from a range of transmission speeds, or keep the default,
Auto
. When the Auto setting is selected, the Gateway
automatically uses the fastest possible data rate and
enables the Auto-Fallback feature, which negotiates the
best possible connection speed between the Gateway
and a wireless device.
Beacon Interval
Enter a value between 1 and 65,535
milliseconds. The Beacon Interval value indicates the
frequency interval of the beacon. A beacon is a packet
broadcast by the Gateway to synchronize the wireless
network(s). The default value is
100
.
DTIM Interval
This value, between 1 and 255, indicates
the interval of the Delivery Traffic Indication Message
(DTIM). A DTIM field is a countdown field informing
clients of the next window for listening to broadcast and
multicast messages. When the Gateway has buffered
broadcast or multicast messages for associated clients, it
sends the next DTIM with a DTIM Interval value. Its clients
hear the beacons and awaken to receive the broadcast
and multicast messages. The default value is
1
.
Fragmentation
Threshold
This
value
specifies
the
maximum size for a packet before data is fragmented
into multiple packets. If you experience a high packet
error rate, you may slightly increase the Fragmentation
Threshold. Setting the Fragmentation Threshold too low
may result in poor network performance. Only minor
reduction of the default value is recommended. In most
cases, it should remain at its default value of
2346
.
RTS
Threshold
Should
you
encounter
inconsistent
data flow, only minor reduction of the default,
2347
, is
recommended. If a network packet is smaller than the
preset RTS threshold size, the RTS/CTS mechanism will
not be enabled. The Gateway sends Request to Send (RTS)
frames to a particular receiving station and negotiates
the sending of a data frame. After receiving an RTS, the
wireless station responds with a Clear to Send (CTS) frame
to acknowledge the right to begin transmission. The RTS
Threshold value should remain at its default value of
2347
.
Click
Save Settings
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Security > Firewall
The
Firewall
screen is used to configure a firewall that
can filter out various types of unwanted traffic on the
Gateway’s local network.
Security > Firewall
Firewall
Firewall Protection
To use firewall protection, keep the
default selection,
Enable
. To turn off firewall protection,
select
Disable
.
Additional Filters
Filter Proxy
Use of WAN proxy servers may compromise
the Gateway’s security. Denying Proxy will disable access
to any WAN proxy servers. Select
Filter Proxy
to enable
proxy filtering. Deselect the feature to allow proxy access
.
Filter Java Applets
Java is a programming language for
websites. If you deny Java, you run the risk of not having
access to Internet sites created using this programming
language. Select
Filter Java Applets
to enable Java
filtering. Deselect the feature to allow Java usage
.
Filter Cookies
A cookie is data stored on your computer
and used by Internet sites when you interact with them.
Select
Filter Cookies
to filter cookies. Deselect the feature
to allow cookie usage
.
Filter ActiveX
ActiveX is a programming language for
websites. If you deny ActiveX, you run the risk of not having
access to Internet sites created using this programming
language. Select
Filter ActiveX
to enable ActiveX filtering.
Deselect the feature to allow ActiveX usage
.
Block WAN Requests
Block
Anonymous
Internet
Requests
This
feature
makes it more difficult for outside users to work their way
into your network. This feature is selected
by default.
Deselect the feature to allow anonymous Internet requests.
View Log
To view the logs, click
View Log
.
Page 18 / 39
Chapter 4
Advanced Configuration
17
Wireless-G ADSL Home Gateway
View Log
Log
Type
Select from the following:
ALL
,
System Log
,
Access Log
,
Firewall Log,
VPN Log, UPnP Log,
Incoming Log, or Outgoing Log
.
Click
Refresh
to update the log. Click
Clear
to clear all
the information that is displayed. Click
Previous Page
to view the previous page of information. Click
Next
Page
to view the next page of information.
Click
Save Settings
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Security > VPN Passthrough
The
VPN Passthrough
screen allows you to enable VPN
tunnels using IPSec, PPPoE, PPTP, or L2TP protocols to pass
through the Gateway’s firewall.
Security > VPN Passthrough
VPN Passthrough
IPSec Passthrough
Internet Protocol Security (IPSec) is
a suite of protocols used to implement secure exchange
of packets at the IP layer. To allow IPSec tunnels to pass
through the Gateway, keep the default,
Enable
.
PPPoE Passthrough
Point-to-Point over Ethernet (PPPoE)
allows PPPoE to be tunneled through an IP network. To
allow PPPoE tunnels to pass through the Gateway, keep
the default,
Enable
.
PPTP Passthrough
Point-to-Point Tunneling Protocol
(PPTP) allows the Point-to-Point Protocol (PPP) to be
tunneled through an IP network. To allow PPTP tunnels to
pass through the Gateway, keep the default,
Enable
.
L2TP Passthrough
Layer 2 Tunneling Protocol is the
method used to enable Point-to-Point sessions via the
Internet on the Layer 2 level. To allow L2TP tunnels to pass
through the Gateway, keep the default,
Enable
.
Click
Save Settings
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Access Restrictions > Internet Access
The
Internet Access
screen allows you to block or allow
specific kinds of Internet usage and traffic, such as Internet
access, designated services, and websites during specific
days and times.
Access Restrictions > Internet Access
Internet Access
Internet Access Policy
Access can be managed by a
policy. Use the settings on this screen to establish an
access policy (after
Save Settings
is clicked). Selecting a
policy from the drop-down menu will display that policy’s
settings. To delete a policy, select that policy’s number
and click
Delete
. To view all the policies, click
Summary
.
Summary
The policies are listed with the following information: No.,
Policy Name, Days, and Time of Day. To delete a policy,
select
Delete
. To return to the
Internet Access Policy
screen,
click
Close
.
Page 19 / 39
Chapter 4
Advanced Configuration
18
Wireless-G ADSL Home Gateway
Summary
Status
Policies are disabled by default. To enable a policy,
select its number from the drop-down menu, and select
Enable
.
To create a policy, follow steps 1-10. Repeat these steps to
create additional policies, one at a time.
Select a number from the
Internet Access Policy
drop-
down menu.
To enable this policy, select
Enable
.
Enter a Policy Name in the field provided.
Click
Edit List of PCs
to select which computers will be
affected by the policy. The
Internet Access PC List
screen
appears. You can select a computer by MAC address or
IP address. You can also enter a range of IP addresses
if you want this policy to affect a group of computers.
After making your changes, click
Save Settings
to
apply your changes, or click
Cancel Changes
to cancel
your changes. Then click
Close
.
Internet Access Computer List
Specify the Access Restriction to apply to the computers
you selected in step 4. Select
Deny
to block Internet
access, or
Allow
to allow Internet access.
Specify when this policy will be in effect. Select the
days: individual days of the week, or
Everyday
. Then
select the time span within each day: specific start and
end times using the
From
and
To
fields, or
24 Hours
.
To block websites by URL address, enter each URL in a
separate
Website Blocking by URL Address
field.
1.
2.
3.
4.
5.
6.
7.
To block websites using keywords, enter each keyword
in a separate
Website Blocking by Keyword
field.
You can filter access to various services accessed
over the Internet, such as FTP or telnet. From the
Blocked
Services
list, select the service you want
to block; the port numbers and protocol for the
selected service are automatically displayed.
If the service you want is not listed, then add it;
enter its port numbers in the fields provided; then
select its protocol:
ICMP
,
TCP
,
UDP
, or
TCP & UDP
from the drop-down menu. Then click
Add
.
If you want to modify the service you added, select it, and
them make your changes. Then click
Modify
.
If
you
want
to
delete
a
service
you
added, select it, and then click
Delete
.
When your changes have been made, click
Save
Settings
.
Blocked Services List
Click
Save Settings
to save the policy’s settings. To
cancel the policy’s settings, click
Cancel Changes
.
Applications and Gaming > Single Port
Forwarding
The
Single Port Forwarding
screen allows you to customize
port services for common applications.
8.
9.
10.
Page 20 / 39
Chapter 4
Advanced Configuration
19
Wireless-G ADSL Home Gateway
Applications and Gaming > Single Port Forwarding
When users send these types of requests to your network
via the Internet, the Gateway will forward those requests
to the appropriate servers (computers). Before using
forwarding, you should assign static IP addresses to the
designated servers.
Single Port Forwarding
To forward a port, enter the information on each line for
the criteria required.
Application
Enter the name you wish to give the
application. Each name can be up to 12 characters.
External and Internal Port
Enter the external and
internal port numbers.
Protocol
Select the protocol used for this application,
either
TCP
or
UDP
.
IP Address
For each application, enter the IP address of
the computer that should receive the requests.
Enabled
For each application, select
Enabled
to enable
port forwarding.
Click
Save Settings
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Applications and Gaming > Port Range
Forwarding
The
Port Range Forwarding
screen allows you to set up
public services on your network, such as web servers,
ftp servers, e-mail servers, or other specialized Internet
applications. (Specialized Internet applications are any
applications that use Internet access to perform functions
such as videoconferencing or online gaming. Some Internet
applications may not require any forwarding.)
Applications and Gaming > Port Range Forwarding
When users send these types of requests to your network via
the Internet, the Gateway will forward those requests to the
appropriate servers (computers). Before using forwarding,
you should assign static IP addresses to the designated
servers.
If you need to forward all ports to one computer, click the
DMZ
tab.
Port Range Forwarding
To forward a port range, enter the information on each
line for the criteria required.
Application
In this field, enter the name you wish to give
the application. Each name can be up to 12 characters.
Port Range Start and End
Enter the number or range of
port(s) used by the server or Internet applications. Check
with the Internet application documentation for more
information.
Protocol
Select the protocol used for this application,
either
TCP
or
UDP
, or
Both
.
IP Address
For each application, enter the IP address of
the computer running the specific application.
Enabled
Select
Enabled
to enable port forwarding for
the applications you have defined.
Click
Save Settings
to apply your changes, or click
Cancel
Changes
to cancel your changes.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top