Page 16 / 38 Scroll up to view Page 11 - 15
Chapter±4
Advanced Configuration
W±reless-G ADSL Gateway w±th SpeedBooster
Access
. If you do not wish to filter users by MAC address,
keep the default,
Allow All
.
Prevent l±sted computers from access±ng the w±reless
network
Select this
to block wireless access by MAC
address. This setting is selected by default.
Perm±t only l±sted computers to access the w±reless
network
Select this to allow wireless access by MAC
address.
Update F±lter L±st
Click this to open the
MAC  Address 
Filter List 
screen.
MAC Address Filter List
MAC Address Filter List
MAC 01-20
Enter the MAC addresses of the devices
whose wireless access you want to block or allow.
W±reless Cl±ent MAC L±st
Click this to open the
Wireless Client List
screen.
Wireless Client List
Wireless Client List
This screen lists the MAC addresses of the wireless
devices. Select
Enable MAC F±lter
for any device you
want to add to the MAC Address Filter List. Then click
Update F±lter L±st
.
To retrieve the most up-to-date information, click
Refresh
. To exit this screen and return to the
Wireless 
MAC Filter List
screen, click
Close
.
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Wireless > Advanced Wireless Settings
This
Advanced Wireless Settings
screen is used to set up the
Gateway’s advanced wireless functions. These settings
should only be adjusted by an expert administrator as
incorrect settings can reduce wireless performance.
Wireless > Advanced Wireless Settings
Advanced Wireless
Authent±cat±on Type
The default is
Auto
, which allows
either Open System or Shared Key authentication to be
used. With Open System authentication, the sender and
the recipient do NOT use a WEP key for authentication.
With Shared Key authentication, the sender and recipient
use a WEP key for authentication. Select
Shared Key
to
only use Shared Key authentication.
Control TX Rate
The Control TX Rate should be set
depending on the speed of your wireless network. Select
from a range of transmission speeds, or keep the default,
Auto
. When the Auto setting is selected, the Gateway
automatically uses the fastest possible data rate and
enables the Auto-Fallback feature, which negotiates the
best possible connection speed between the Gateway
and a wireless device.
W±reless Afterburner
To improve wireless performance
when the Gateway is used with devices that support
SpeedBooster, keep the default,
Enable
. Otherwise, select
D±sable
.
Beacon Interval
Enter a value between 1 and 65,535
milliseconds. The Beacon Interval value indicates the
frequency interval of the beacon. A beacon is a packet
broadcast by the Gateway to synchronize the wireless
network(s). The default value is
100
.
DTIM Interval
This value, between 1 and 255, indicates
the interval of the Delivery Traffic Indication Message
(DTIM). A DTIM field is a countdown field informing
clients of the next window for listening to broadcast and
multicast messages. When the Gateway has buffered
broadcast or multicast messages for associated clients, it
Downloaded from
www.Manualslib.com
manuals search engine
Page 17 / 38
Chapter±4
Advanced Configuration
W±reless-G ADSL Gateway w±th SpeedBooster
sends the next DTIM with a DTIM Interval value. Its clients
hear the beacons and awaken to receive the broadcast
and multicast messages. The default value is
1
.
Fragmentat±on
Threshold
This
value
specifies
the
maximum size for a packet before data is fragmented
into multiple packets. If you experience a high packet
error rate, you may slightly increase the Fragmentation
Threshold. Setting the Fragmentation Threshold too low
may result in poor network performance. Only minor
reduction of the default value is recommended. In most
cases, it should remain at its default value of
23²´
.
RTS
Threshold
Should
you
encounter
inconsistent
data flow, only minor reduction of the default,
23²´
, is
recommended. If a network packet is smaller than the
preset RTS threshold size, the RTS/CTS mechanism will
not be enabled. The Gateway sends Request to Send (RTS)
frames to a particular receiving station and negotiates
the sending of a data frame. After receiving an RTS, the
wireless station responds with a Clear to Send (CTS) frame
to acknowledge the right to begin transmission. The RTS
Threshold value should remain at its default value of
23²´
.
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Security > Firewall
The
Firewall
screen is used to configure a firewall that
can filter out various types of unwanted traffic on the
Gateway’s local network.
Security > Firewall
Firewall
SPI F±rewall Protect±on
To use firewall protection,
keep the default selection,
Enable
. To turn off firewall
protection, select
D±sable
.
Additional Filters
F±lter Proxy
Use of WAN proxy servers may compromise
the Gateway’s security. Denying Proxy will disable access
to any WAN proxy servers. Select
F±lter Proxy
to enable
proxy filtering. Deselect the feature to allow proxy access
.
F±lter Java Applets
Java is a programming language for
websites. If you deny Java, you run the risk of not having
access to Internet sites created using this programming
language. Select
F±lter Java Applets
to enable Java
filtering. Deselect the feature to allow Java usage
.
F±lter Cook±es
A cookie is data stored on your computer
and used by Internet sites when you interact with them.
Select
F±lter Cook±es
to filter cookies. Deselect the feature
to allow cookie usage
.
F±lter Act±veX
ActiveX is a programming language for
websites. If you deny ActiveX, you run the risk of not having
access to Internet sites created using this programming
language. Select
F±lter Act±veX
to enable ActiveX filtering.
Deselect the feature to allow ActiveX usage
.
Block WAN Requests
Block
Anonymous
Internet
Requests
This
feature
makes it more difficult for outside users to work their
way into your network. This feature is selected
by default.
Deselect the feature to allow anonymous Internet
requests
.
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Security > VPN Passthrough
The
VPN  Passthrough
screen allows you to enable VPN
tunnels using IPSec, PPTP, or L2TP protocols to pass through
the Gateway’s firewall.
Security > VPN Passthrough
VPN Passthrough
IPSec Passthrough
Internet Protocol Security (IPSec) is
a suite of protocols used to implement secure exchange
of packets at the IP layer. To allow IPSec tunnels to pass
through the Gateway, keep the default,
Enable
.
PPTP Passthrough
Point-to-Point Tunneling Protocol
(PPTP) allows the Point-to-Point Protocol (PPP) to be
tunneled through an IP network. To allow PPTP tunnels to
pass through the Gateway, keep the default,
Enable
.
Downloaded from
www.Manualslib.com
manuals search engine
Page 18 / 38
Chapter±4
Advanced Configuration
W±reless-G ADSL Gateway w±th SpeedBooster
L2TP Passthrough
Layer 2 Tunneling Protocol is the
method used to enable Point-to-Point sessions via the
Internet on the Layer 2 level. To allow L2TP tunnels to pass
through the Gateway, keep the default,
Enable
.
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Access Restrictions > Internet Access Policy
The
Internet  Access  Policy
screen allows you to block or
allow specific kinds of Internet usage and traffic, such as
Internet access, designated services, and websites during
specific days and times.
Access Restrictions > Internet Access Policy
Internet Access Policy
Internet Access Pol±cy
Access can be managed by a
policy. Use the settings on this screen to establish an
access policy (after
Save Sett±ngs
is clicked). Selecting a
policy from the drop-down menu will display that policy’s
settings. To delete a policy, select that policy’s number
and click
Delete
. To view all the policies, click
Summary
.
Summary
The policies are listed with the following information: No.,
Policy Name, Days, and Time of Day. To delete a policy,
select
Delete
. To return to the
Internet Access Policy
screen,
click
Close
.
Summary
Status
Policies are disabled by default. To enable a policy,
select the policy number from the drop-down menu, and
select
Enable
.
To create a policy, follow steps 1-11. Repeat these steps to
create additional policies, one at a time.
Select a number from the
Internet Access Policy
drop-
down menu.
To enable this policy, select
Enable
.
Enter a Policy Name in the field provided.
Click
Ed±t L±st of PCs
to select which computers will be
affected by the policy. The
Internet Access PC List 
screen
appears. You can select a computer by MAC address or
IP address. You can also enter a range of IP addresses
if you want this policy to affect a group of computers.
After making your changes, click
Save Sett±ngs
to
apply your changes, or click
Cancel Changes
to cancel
your changes. Then click
Close
.
Internet Access PC List
1.
2.
3.
4.
Downloaded from
www.Manualslib.com
manuals search engine
Page 19 / 38
Chapter±4
Advanced Configuration
18
W±reless-G ADSL Gateway w±th SpeedBooster
Select
the
appropriate
option,
Deny
or
Allow
,
depending on whether you want to block or allow
Internet access for the computers you selected on the
Internet Access PC List
screen.
Decide which days and what times you want this policy
to be enforced. Select the individual days during which
the policy will be in effect, or select
Everyday
. Then
enter a range of hours and minutes during which the
policy will be in effect, or select
2² Hours
.
You can block websites with specific URL addresses.
Enter each URL in a separate
Website Blocking by URL 
Address
field.
You can also block websites using specific keywords.
Enter each keyword in a separate
Website Blocking by 
Keyword
field.
You can filter access to various services accessed over
the Internet, such as FTP or telnet.
From the Blocked Services list, select the service you
want to block. The port numbers and protocol for the
selected service are automatically displayed.
If the service you want is not listed, select
User-
Def±ned
. Enter its port numbers in the fields provided.
Then select its protocol:
ICMP
,
TCP
,
UDP
, or
TCP &
UDP
from the drop-down menu.
Click
Save Sett±ngs
to save the policy’s settings. To
cancel the policy’s settings, click
Cancel Changes
.
Applications and Gaming > Single Port
Forwarding
The
 Single Port Forwarding
screen allows you to customize
port services for common applications on this screen.
When users send these types of requests to your network via
the Internet, the Gateway will forward those requests to the
appropriate servers (computers). Before using forwarding,
you should assign static IP addresses to the designated
servers.
5.
6.
7.
8.
9.
10.
11.
Applications and Gaming > Single Port Forwarding
Single Port Forwarding
To forward a port, enter the information on each line for
the criteria required.
Appl±cat±on
Enter the name you wish to give the
application. Each name can be up to 12 characters.
External Port
Enter the external port number used by
the server or Internet application. Check with the Internet
application documentation for more information.
Internal Port
Enter the internal port number used by
the server or Internet application. Check with the Internet
application documentation for more information.
Protocol
Select the protocol used for this application,
either
TCP
or
UDP
, or
Both
.
IP Address
For each application, enter the IP address of
the computer that should receive the requests.
Enabled
For each application, select
Enabled
to enable
port forwarding.
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Applications and Gaming > Port Range
Forwarding
The
  Port  Range  Forwarding
screen allows you to set up
public services on your network, such as web servers,
ftp servers, e-mail servers, or other specialized Internet
applications. (Specialized Internet applications are any
applications that use Internet access to perform functions
such as videoconferencing or online gaming. Some Internet
applications may not require any forwarding.)
Downloaded from
www.Manualslib.com
manuals search engine
Page 20 / 38
Chapter±4
Advanced Configuration
19
W±reless-G ADSL Gateway w±th SpeedBooster
When users send these types of requests to your network via
the Internet, the Gateway will forward those requests to the
appropriate servers (computers). Before using forwarding,
you should assign static IP addresses to the designated
servers.
If you need to forward all ports to one computer, click the
DMZ
tab.
Applications and Gaming > Port Range Forwarding
Port Range Forwarding
To forward a port range, enter the information on each
line for the criteria required.
Appl±cat±on
In this field, enter the name you wish to give
the application. Each name can be up to 12 characters.
Port Range Start and End
Enter the number or range of
port(s) used by the server or Internet applications. Check
with the Internet application documentation for more
information.
Protocol
Select the protocol used for this application,
either
TCP
or
UDP
, or
Both
.
IP Address
For each application, enter the IP address of
the computer running the specific application.
Enable
Select
Enable
to enable port forwarding for the
applications you have defined.
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Applications & Gaming > Port Range
Triggering
The
Port  Range  Triggering
screen allows the Gateway to
watch outgoing data for specific port numbers. The IP
address of the computer that sends the matching data is
remembered by the Gateway, so that when the requested
data returns through the Gateway, the data is pulled back
to the proper computer by way of IP address and port
mapping rules.
Applications and Gaming > Port Range Triggering
Port Range Triggering
To trigger a port range, enter the information on each line
for the criteria required.
Appl±cat±on Name
Enter the application name of the
trigger.
Tr±ggered Range Start Port and End Port
For each
application, enter the starting and ending port numbers of
the triggered port number range. Check with the Internet
application
documentation
for
the
port
number(s)
needed.
Forwarded Range Start Port and End Port
For each
application, enter the starting and ending port numbers
of the forwarded port number range. Check with the
Internet application documentation for the port number(s)
needed.
Enabled
Select
Enabled
to enable port triggering for the
applications you have defined.
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Applications and Gaming > DMZ
The DMZ feature allows one network computer to be
exposed to the Internet for use of a special-purpose
service such as Internet gaming or videoconferencing.
DMZ hosting forwards all the ports at the same time to
one PC. The Port Range Forwarding feature is more secure
Downloaded from
www.Manualslib.com
manuals search engine

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top