Page 46 / 128 Scroll up to view Page 41 - 45
37
Chapter 4: Configuring the Gateway
The Security Tab
Wireless-G ADSL Gateway with 2 Phone Ports
Click the
Connect
button to connect your VPN tunnel. Click
View Logs
to view system, UPnP, VPN, firewall,
access, or all logs.Click the
Advanced Settings
button and the Advanced IPSec VPN Tunnel Setup screen will
appear.
When finished making your changes on this tab, click the
Save Settings
button to save these changes, or click
the
Cancel Changes
button to undo your changes.
Advanced VPN Tunnel Setup
From the Advanced IPSec VPN Tunnel Setup screen you can adjust the settings for specific VPN tunnels.
Phase 1
Phase 1 is used to create a security association (SA), often called the IKE SA. After Phase 1 is completed, Phase 2
is used to create one or more IPSec SAs, which are then used to key IPSec sessions.
Operation Mode
. There are two modes:
Main
and
Aggressive
, and they exchange the same IKE payloads in
different sequences. Main mode is more common; however, some people prefer Aggressive mode because it is
faster. Main mode is for normal usage and includes more authentication requirements than Aggressive mode.
Main mode is recommended because it is more secure. No matter which mode is selected, the VPN Gateway will
accept both Main and Aggressive requests from the remote VPN device.
Encryption
. Select the length of the key used to encrypt/decrypt ESP packets. There are two choices:
DES
and
3DES
. 3DES is recommended because it is more secure.
Authentication
. Select the method used to authenticate ESP packets. There are two choices:
MD5
and
SHA
. SHA
is recommended because it is more secure.
Group
. There are two Diffie-Hellman Groups to choose from:
768-bit
and
1024-bit.
Diffie-Hellman refers to a
cryptographic technique that uses public and private keys for encryption and decryption.
Key Life Time
. In the Key Lifetime field, you may optionally select to have the key expire at the end of a time
period of your choosing.
Enter the number of seconds you’d like the key to be used until a re-key negotiation
between each endpoint is completed.
Phase 2
Encryption
. The encryption method selected in Phase 1 will be displayed.
Authentication
. The authentication method selected in Phase 1 will be displayed.
PFS
. The status of PFS will be displayed.
Figure 4-30: System Log
Figure 4-31: Advanced VPN Tunnel Setup
Downloaded from
www.Manualslib.com
manuals search engine
Page 47 / 128
38
Chapter 4: Configuring the Gateway
The Security Tab
Wireless-G ADSL Gateway with 2 Phone Ports
Group
. There are two Diffie-Hellman Groups to choose from: 768-bit and 1024-bit. Diffie-Hellman refers to a
cryptographic technique that uses public and private keys for encryption and decryption.
Key Life Time
. The number in the Key Lifetime field, shows the amount of seconds the key will be used until a re-
key negotiation is completed.
Other Setting
NAT Traversal.
NetBIOS broadcast. Check the box next to NetBIOS broadcast to enable NetBIOS traffic to pass through the
VPN tunnel.
Anti-replay. Check the box next to Anti-replay to enable the Anti-replay protection. This feature keeps track of
sequence numbers as packets arrive, ensuring security at the IP packet-level.
Keep-Alive. If you select this option, the Gateway will periodically check your Internet connection. If you are
disconnected, then the Gateway will automatically re-establish your connection.
Check this box to block unauthorized IP addresses. Enter in the field to specify how many times IKE must fail
before blocking that unauthorized IP address. Enter the length of time that you specify (in seconds) in the
field.
When finished making your changes on this tab, click the
Save Settings
button to save these changes, or click
the
Cancel Changes
button to undo your changes. For further help on this tab, click the
Help
button.
Downloaded from
www.Manualslib.com
manuals search engine
Page 48 / 128
39
Chapter 4: Configuring the Gateway
The Access Restrictions Tab
Wireless-G ADSL Gateway with 2 Phone Ports
The Access Restrictions Tab
Parental Control
(This service is available in the United States and Canada ONLY.)
The
Parental Control
screen allows you to sign up and manage your Linksys Parental Controls account. The
Linksys Parental Control Service* gives you powerful tools to control the availability of Internet services, access,
and features, customizable for each member of your family. For more information, refer to
Chapter 5: Using the
Linksys Parental Control Service
.
The Linksys Parental Control Service supersedes the Router’s Internet Access Policies. In other words, if you are
using the Linksys Parental Control Service, then the Internet Access Policies on the Access Restrictions Tab -
Internet Access screen will be disabled.
To sign up or manage your Linksys Parental Controls account, you will need an active Internet connection.
Enable/Disable
. If you want to use the Linksys Parental Control feature, click the
Enable
radio button. If you want
to disable the Linksys Parental Control feature, click the
Disable
radio button.
Sign Up for Parental Control Service
. To sign up for a free trial of the Linksys Parental Control Service, click this
link. You will be automatically taken to a website where you can create your account. For more information, refer
to
Chapter 5: Using the Linksys Parental Control Service
.
More info
. If you would like more information about the Linksys Parental Control Service, click the
More info
button.
Status
. Displayed here is the status of your Linksys Parental Controls account.
Manage Account
. If you have already set up your Parental Controls account, click the
Manage Account
button
to access it and make changes.
Change these settings as described here and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes.
* Available in US and Canada only.
Figure 4-32: Access Restrictions Tab - Parental Control
Downloaded from
www.Manualslib.com
manuals search engine
Page 49 / 128
40
Chapter 4: Configuring the Gateway
The Access Restrictions Tab
Wireless-G ADSL Gateway with 2 Phone Ports
Internet Access
The
Internet Access
tab allows you to block or allow specific kinds of Internet usage. You can set up Internet
access policies for specific computers and set up filters by using network port numbers.
Internet Access Policy
. Multiple Filters can be saved as Internet Access Policies. When you wish to edit one,
select the number of the Policy from the drop-down menu. The tab will change to reflect the settings of this
Policy. If you wish to delete this Policy, click the
Delete
button. To see a summary of all Policies, click the
Summary
button.
The summaries are listed on this screen with their name and settings. To return to the
Internet Access
tab, click
the
Close
button.
Enter Policy Name
. Policies are created from the fields presented here.
To create an Internet Access policy:
1.
Enable the policy by selecting
Enable
next to
Status
.
2.
Enter a Policy Name in the field provided. Select
Internet Access
as the Policy Type.
3.
Click the
Edit List of PCs
button. This will open the List of PCs screen. From this screen, you can enter the IP
address or MAC address of any computer to which this policy will apply. You can even enter ranges of
computers by IP address. Click the
Save Settings
button to save your settings, the
Cancel Changes
button
to undo any changes and return to the
Internet Access
tab.
Figure 4-33: Access Restrictions Tab - Internet Access
Figure 4-34: Internet Policy Summary
Downloaded from
www.Manualslib.com
manuals search engine
Page 50 / 128
41
Chapter 4: Configuring the Gateway
The Access Restrictions Tab
Wireless-G ADSL Gateway with 2 Phone Ports
4.
If you wish to Deny or Allow Internet access for those computers you listed on the List of PCs screen, click the
option.
5.
You can filter access to various services accessed over the Internet, such as FTP or Telnet, by selecting a
service from the drop-down menus next to Blocked Services. If a service isn’t listed, you can click the
Add/
Edit Service
button to open the Port Services screen and add a service to the list. You will need to enter a
Service name, as well as the Protocol and Port Range used by the service.
6.
By selecting the appropriate setting next to Days and Time, choose when Internet access will be filtered.
7.
Click the
Save Settings
button to activate the policy.
Internet Access can also be filtered by URL Address, the address entered to access Internet sites, by entering the
address in one of the Website Blocking by URL Address fields. If you do not know the URL Address, filtering can
be done by Keyword by entering a keyword in one of the Website Blocking by Keyword fields.
When finished making your changes on this tab, click the
Save Settings
button to save these changes, or click
the
Cancel Changes
button to undo your changes.
Figure 4-35: List of PCs
Figure 4-36: Port Services
Downloaded from
www.Manualslib.com
manuals search engine

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top