Page 41 / 71 Scroll up to view Page 36 - 40
35
Chapter 5: Configuring the Wireless-G Cable Gateway
The Access Restrictions Tab
Wireless-G Cable Gateway
Filter Internet Traffic Tab
This screen is used to filter or block ports from Internet access by IP address or Port Range.
IP Address Range
To set up a filter using IP addresses, enter the range of IP addresses you wish to filter in the
Start
and
End
fields.
Users who have filtered IP addresses will not be able to access the Internet at all. If you only want to filter one IP
address instead of a range of IP addresses, enter the same value into both fields. For instance, if you wish to filter
the PC with the IP address of 192.168.0.5, enter 5 into both fields on one line: 192.168.0.5 ~ 192.168.0.5.
Port Range
Enter the port numbers you want to filter in the
Start
and
End
fields. To filter users by network port number, select
the protocol you want to filter,
TCP
,
UDP
, or
Both
, from the
Protocol
drop-down menu. Users connected to the
Gateway will no longer be able to access any port number listed there.
Click the
Enable
checkbox for each filter you want the Gateway to use.
When finished making your changes on this tab, click the
Save Settings
button to save these changes, or click
the
Cancel Changes
button to undo your changes.
Figure 5-23: Filter Internet Traffic
Page 42 / 71
36
Chapter 5: Configuring the Wireless-G Cable Gateway
The Applications and Gaming Tab
Wireless-G Cable Gateway
The Applications and Gaming Tab
Port Range Forwarding
The
Port Forwarding
screen sets up public services on your network, such as web servers, ftp servers, e-mail
servers, or other specialized Internet applications. (Specialized Internet applications are any applications that use
Internet access to perform functions such as videoconferencing or online gaming. Some Internet applications
may not require any forwarding.)
When users send this type of request to your network via the Internet, the Gateway will forward those requests to
the appropriate computer. Any computer whose port is being forwarded should have its DHCP client function
disabled and should have a new static IP address assigned to it because its IP address may change when using
the DHCP function.
Application. Enter the name you wish to give each application.
Start and End. Enter the starting and ending numbers of the port range you wish to forward.
Protocol. Select the type of protocol you wish to use for each application:
TCP
,
UDP
, or
Both
.
IP Address. Enter the IP Address of the system to which the traffic should be forwarded.
Click the
Enable
checkbox for each port forwarding setting you want the Gateway to use.
When finished making your changes on this tab, click the
Save Settings
button to save these changes, or click
the
Cancel Changes
button to undo your changes.
Figure 5-24: Port Range Forwarding
Page 43 / 71
37
Chapter 5: Configuring the Wireless-G Cable Gateway
The Applications and Gaming Tab
Wireless-G Cable Gateway
Port Triggering
Port Triggering is used for special applications that can request a port to be opened on demand. For this feature,
the Gateway will watch outgoing data for specific port numbers. The Gateway will remember the IP address of the
computer that sends a transmission requesting data, so that when the requested data returns through the
Gateway, the data is pulled back to the proper computer by way of IP address and port mapping rules.
Application. Enter the name you wish to give each application.
Start Port and End Port. Enter the starting and ending Triggered Range numbers and the Incoming Forwarded
Range numbers of the port(s) you wish to forward.
Protocol. Select the type of protocol you wish to use for each application:
TCP
,
UDP
, or
Both
.
Click the
Enable
checkbox for each port triggering setting you want the Gateway to use.
When finished making your changes on this tab, click the
Save Settings
button to save these changes, or click
the
Cancel Changes
button to undo your changes.
DMZ
The DMZ screen allows one local user to be exposed to the Internet for use of a special-purpose service such as
Internet gaming and videoconferencing through DMZ Hosting. DMZ hosting forwards all the ports for one
computer at the same time, which differs from Port Range Forwarding, which can only forward a maximum of
10 ranges of ports.
DMZ Hosting. This feature allows one local user to be exposed to the Internet for use of a special-purpose
service such as Internet gaming and videoconferencing. To use this feature, select
Enable
. To disable DMZ,
select
Disable
.
DMZ Host IP Address. To expose one computer, enter the computer’s IP address. To get the IP address of a
computer, refer to “Appendix C: Finding the MAC Address and IP Address for Your Ethernet Adapter.”
When finished making your changes on this tab, click the
Save Settings
button to save these changes, or click
the
Cancel Changes
button to undo your changes.
Figure 5-26: DMZ
Figure 5-25: Port Triggering
Page 44 / 71
38
Chapter 5: Configuring the Wireless-G Cable Gateway
The Administration Tab
Wireless-G Cable Gateway
The Administration Tab
Security Tab
The
Security
screen allows you to change the Gateway’s access settings as well as configure the UPnP (Universal
Plug and Play) and Reporting features.
Security
To ensure the Gateway’s security, you will be asked for your password when you access the Gateway’s Web-
based Utility. The default password is
admin
.
Gateway Password. It is recommended that you change the default password to one of your choice.
Re-enter to confirm. Re-enter the Gateway’s new Password to confirm it.
Remote Administration. When enabled, the Web-based Utility can be accessed from the Internet. To connect,
type
in the web browser’s
Address
field, but replace 127.0.0.1 with the WAN (Internet)
IP address of the Gateway.
Administration Port. Enter the port number you will use to remotely access the Gateway. The default is
8080
.
UPnP
UPnP allows Windows XP to automatically configure the Gateway for various Internet applications, such as
gaming and videoconferencing.
UPnP. To enable UPnP, click
Enable
.
Reporting
E-Mail Alerts. To enable E-Mail Alerts, click
Enable
.
Your E-Mail Address. Enter the e-mail address that will receive alert logs in the field provided.
Your SMTP Server Name. Enter the IP Address of the SMTP server.
Logs
You can view security events and have logs e-mailed to you.
Figure 5-27: Security
Page 45 / 71
39
Chapter 5: Configuring the Wireless-G Cable Gateway
The Administration Tab
Wireless-G Cable Gateway
To send the logs, click the
E-mail Log
button. To clear the log entries displayed on this screen, click the
Clear
Log
button.
When finished making your changes on this tab, click the
Save Settings
button to save these changes, or click
the
Cancel Changes
button to undo your changes.
Diagnostics Tab
Use this screen to run a ping test.
Ping Test
Ping Test Parameters
Ping Target. Enter the IP Address that you want to ping in the field provided. This can be either a local (LAN) IP
or an Internet (WAN) IP address.
Ping Size. Enter the size of the ping packets you want to use.
Number of Pings. Enter the number of times that you want to ping.
Ping Interval. Enter the ping interval in milliseconds.
Ping Timeout. Enter the timeout period in milliseconds.
Ping Result. The results of the ping test will be shown here.
Click the
Start Test
button to start the Ping Test. Click the
Abort
Test
button to stop the test. Click the
Refresh
button to refresh the screen. Click the
Clear Results
button to clear the screen.
Figure 5-28: Ping Test

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top