Page 16 / 37 Scroll up to view Page 11 - 15
Chapter±3
Advanced Configuration
²2
RangePlus W±reless Router
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Wireless > Wireless MAC Filter
Wireless access can be filtered by using the MAC addresses of
the wireless devices transmitting within your network’s radius.
Wireless > Wireless MAC Filter
Wireless MAC Filter
Enabled/D±sabled
To filter wireless users by MAC Address,
either permitting or blocking access, select
Enabled
. If you
do not wish to filter users by MAC Address, keep the default
setting,
D±sabled
.
Access Restriction
Prevent
Select this
to block wireless access by MAC
Address. This button is selected by default.
Perm±t
Select this to allow wireless access by MAC
Address. This button is not selected by default.
MAC Address Filter List
W±reless Cl±ent L±st
Click this to open the
Wireless Client 
List
screen.
Wireless Client List
Wireless Client List
This screen shows computers and other devices on
the wireless network. The list can be sorted by Client
Name, Interface, IP Address, MAC Address, and Status.
Select
Save to MAC Address F±lter L±st
for any device
you want to add to the MAC Address Filter List. Then
click
Add
.
To retrieve the most up-to-date information, click
Refresh
. To exit this screen and return to the
Wireless 
MAC Filter
screen, click
Close
.
MAC ²-50
Enter the MAC addresses of the devices whose
wireless access you want to block or allow.
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Wireless > Advanced Wireless Settings
This
Advanced  Wireless  Settings
screen is used to set up
the Router’s advanced wireless functions. These settings
should only be adjusted by an expert administrator as
incorrect settings can reduce wireless performance.
Wireless > Advanced Wireless Settings
Page 17 / 37
Chapter±3
Advanced Configuration
²3
RangePlus W±reless Router
Advanced Wireless
AP Isolat±on
This isolates all wireless clients and wireless
devices on your network from each other. Wireless devices
will be able to communicate with the Router but not
with each other. To use this function, select
Enabled
. AP
Isolation is disabled by default.
Frame Burst
Enabling this option should provide your
network with greater performance, depending on the
manufacturer of your wireless products. To use this option,
keep the default,
Enabled
. Otherwise, select
D±sabled
.
Authent±cat±on Type
The default is set to
Auto
, which
allows either Open System or Shared Key authentication
to be used. With Open System authentication, the sender
and the recipient do NOT use a WEP key for authentication.
With Shared Key authentication, the sender and recipient
use a WEP key for authentication. Select
Shared Key
to
only use Shared Key authentication.
Bas±c Rate
The Basic Rate setting is not actually one rate
of transmission but a series of rates at which the Router
can transmit. The Router will advertise its Basic Rate to the
other wireless devices in your network, so they know which
rates will be used. The Router will also advertise that it will
automatically select the best rate for transmission. The
default setting is
Default
, when the Router can transmit
at all standard wireless rates (1-2Mbps, 5.5Mbps, 11Mbps,
18Mbps, and 24Mbps). Other options are
²-2Mbps
, for
use with older wireless technology, and
All
, when the
Router can transmit at all wireless rates. The Basic Rate
is not the actual rate of data transmission. If you want to
specify the Router’s rate of data transmission, configure
the Transmission Rate setting.
Transm±ss±on Rate
The rate of data transmission should
be set depending on the speed of your wireless network.
You can select from a range of transmission speeds, or you
can select
Auto
to have the Router automatically use the
fastest possible data rate and enable the Auto-Fallback
feature. Auto-Fallback will negotiate the best possible
connection speed between the Router and a wireless
client. The default is
Auto
.
N Transm±ss±on Rate
The rate of data transmission
should be set depending on the speed of your Wireless-N
networking. You can select from a range of transmission
speeds, or you can select
Auto
to have the Router
automatically use the fastest possible data rate and enable
the Auto-Fallback feature. Auto-Fallback will negotiate the
best possible connection speed between the Router and a
wireless client. The default is
Auto
.
CTS Protect±on Mode
The Router will automatically
use CTS (Clear-To-Send) Protection Mode when your
Wireless-N and Wireless-G products are experiencing
severe problems and are not able to transmit to the
Router in an environment with heavy 802.11b traffic. This
function boosts the Router’s ability to catch all Wireless-
N and Wireless-G transmissions but will severely decrease
performance. The default is
Auto
.
Beacon Interval
Enter a value between 20 and 999
milliseconds. The Beacon Interval value indicates the
frequency interval of the beacon. A beacon is a packet
broadcast by the Router to synchronize the wireless
network. The default value is
²00
.
DTIM Interval
This value, between 1 and 255, indicates
the interval of the Delivery Traffic Indication Message
(DTIM). A DTIM field is a countdown field informing
clients of the next window for listening to broadcast
and multicast messages. When the Router has buffered
broadcast or multicast messages for associated clients, it
sends the next DTIM with a DTIM Interval value. Its clients
hear the beacons and awaken to receive the broadcast
and multicast messages. The default value is
²
.
Fragmentat±on
Threshold
This
value
specifies
the
maximum size for a packet before data is fragmented
into multiple packets. If you experience a high packet
error rate, you may slightly increase the Fragmentation
Threshold. Setting the Fragmentation Threshold too low
may result in poor network performance. Only minor
reduction of the default value is recommended. In most
cases, it should remain at its default value of
2346
.
RTS Threshold
Should you encounter inconsistent data
flow, only minor reduction of the default value,
234³
, is
recommended. If a network packet is smaller than the
preset RTS threshold size, the RTS/CTS mechanism will
not be enabled. The Router sends Request to Send (RTS)
frames to a particular receiving station and negotiates
the sending of a data frame. After receiving an RTS, the
wireless station responds with a Clear to Send (CTS) frame
to acknowledge the right to begin transmission. The RTS
Threshold value should remain at its default value of
234³
.
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Security > Firewall
The
Firewall
screen is used to configure a firewall that can
filter out various types of unwanted traffic on the Router’s
local network.
Page 18 / 37
Chapter±3
Advanced Configuration
²4
RangePlus W±reless Router
Security > Firewall
Firewall
SPI F±rewall Protect±on
To use firewall protection,
keep the default selection,
Enabled
. To turn off firewall
protection, select
D±sabled
.
Internet Filter
F±lter
Anonymous
Internet
Requests
This
feature
makes it more difficult for outside users to work their
way into your network. This feature is selected
by default.
Deselect the feature to allow anonymous Internet
requests
.
F±lter
Mult±cast
Multicasting
allows
for
multiple
transmissions to specific recipients at the same time. If
multicasting is permitted, then the Router will allow IP
multicast packets to be forwarded to the appropriate
computers. Select this feature to filter multicasting. This
feature is not selected by default.
F±lter Internet NAT Red±rect±on
This feature uses port
forwarding to block access to local servers from local
networked computers. Select this feature to filter Internet
NAT redirection. It is not selected by default.
F±lter IDENT (Port ²²3)
This feature keeps port 113 from
being scanned by devices outside of your local network.
This feature is selected by default. Deselect this feature to
disable it.
Web Filter
Proxy
Use of WAN proxy servers may compromise the
Gateway’s security. Denying Proxy will disable access to
any WAN proxy servers. Select this feature to enable proxy
filtering. Deselect the feature to allow proxy access
.
Java
Java is a programming language for websites. If you
deny Java, you run the risk of not having access to Internet
sites created using this programming language. Select
this feature to enable Java filtering. Deselect the feature
to allow Java usage
.
Act±veX
ActiveX is a programming language for websites.
If you deny ActiveX, you run the risk of not having access to
Internet sites created using this programming language.
Select this feature to enable ActiveX filtering. Deselect the
feature to allow ActiveX usage
.
Cook±es
A cookie is data stored on your computer and
used by Internet sites when you interact with them. Select
this feature to filter cookies. Deselect the feature to allow
cookie usage
.
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Security > VPN Passthrough
The
VPN  Passthrough
screen allows you to enable VPN
tunnels using IPSec, PPTP, or L2TP protocols to pass through
the Router’s firewall.
Security > VPN Passthrough
VPN Passthrough
IPSec Passthrough
Internet Protocol Security (IPSec) is
a suite of protocols used to implement secure exchange
of packets at the IP layer. To allow IPSec tunnels to pass
through the Router, keep the default,
Enabled
.
PPTP Passthrough
Point-to-Point Tunneling Protocol
(PPTP) allows the Point-to-Point Protocol (PPP) to be
tunneled through an IP network. To allow PPTP tunnels to
pass through the Router, keep the default,
Enabled
.
L2TP Passthrough
Layer 2 Tunneling Protocol is the
method used to enable Point-to-Point sessions via the
Internet on the Layer 2 level. To allow L2TP tunnels to pass
through the Router, keep the default,
Enabled
.
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Access Restrictions > Internet Access Policy
The
Internet  Access  Policy
screen allows you to block or
allow specific kinds of Internet usage and traffic, such as
Internet access, designated services, and websites during
specific days and times.
Page 19 / 37
Chapter±3
Advanced Configuration
²5
RangePlus W±reless Router
Access Restrictions > Internet Access Policy
Internet Access Policy
Access Pol±cy
Access can be managed by a policy. Use the
settings on this screen to establish an access policy (after
Save Sett±ngs
is clicked). Selecting a policy from the drop-
down menu will display that policy’s settings. To delete a
policy, select that policy’s number and click
Delete Th±s
Pol±cy
. To view all the policies, click
Summary
.
Summary
The policies are listed with the following information: No.,
Policy Name, Access, Days, Time, and status (Enabled). To
enable a policy, select
Enabled
. To delete a policy, click
Delete
. Click
Save Sett±ngs
to save your changes, or click
Cancel Changes
to cancel your changes. To return to the
Internet Access Policy
screen, click
Close
.
Summary
Status
Policies are disabled by default. To enable a policy,
select the policy number from the drop-down menu, and
select
Enabled
.
To create a policy, follow steps 1-11. Repeat these steps to
create additional policies, one at a time.
Select a number from the
Access  Policy
drop-down
menu.
Enter a Policy Name in the field provided.
To enable this policy, select
Enabled
.
Click
Ed±t L±st
to select which PCs will be affected by
the policy. The
List  of  PCs
screen appears. You can
select a PC by MAC address or IP address. You can also
enter a range of IP addresses if you want this policy to
affect a group of PCs. After making your changes, click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes. Then click
Close
.
List of PCs
Select
the
appropriate
option,
Deny
or
Allow
,
depending on whether you want to block or allow
Internet access for the PCs you listed on the
List of PCs
screen.
1.
2.
3.
4.
5.
Page 20 / 37
Chapter±3
Advanced Configuration
²6
RangePlus W±reless Router
Decide which days and what times you want this policy
to be enforced. Select the individual days during which
the policy will be in effect, or select
Everyday
. Then
enter a range of hours and minutes during which the
policy will be in effect, or select
24 Hours
.
You can block websites with specific URL addresses.
Enter each URL in a separate
Website Blocking by URL 
Address
field.
You can also block websites using specific keywords.
Enter each keyword in a separate
Website Blocking by 
Keyword
field.
You can filter access to various services accessed
over the Internet, such as FTP or telnet. (You
can block up to three applications per policy.)
From the Applications list, select the application you
want to block. Then click the
>>
button to move it to
the Blocked List. To remove an application from the
Blocked List, select it and click the
<<
button.
If the application you want to block is not listed
or you want to edit a service’s settings, enter the
application’s name in the
 Application Name
field. Enter
its range in the
Port Range
fields. Select its protocol
from the
Protocol
drop-down menu. Then click
Add
.
To
modify
a
service,
select
it
from
the
Application
list.
Change
its
name,
port
range,
and/or protocol setting. Then click
Mod±fy
.
To delete a service, select it from the Application list.
Then click
Delete
.
Click
Save Sett±ngs
to save the policy’s settings. To
cancel the policy’s settings, click
Cancel Changes
.
Applications and Gaming > Single Port
Forwarding
The
 Single Port Forwarding
screen allows you to customize
port services for common applications on this screen.
When users send these types of requests to your network via
the Internet, the Router will forward those requests to the
appropriate servers (computers). Before using forwarding,
you should assign static IP addresses to the designated
servers (use the DHCP Reservation feature on the
Basic Setup
screen).
6.
7.
8.
9.
10.
11.
Applications and Gaming > Single Port Forwarding
Single Port Forwarding
Common applications are available for the first five
entries. Select the appropriate application. Then enter the
IP address of the server that should receive these requests.
Select
Enabled
to activate this entry.
For additional applications, complete the following fields:
Appl±cat±on Name
Enter the name you wish to give the
application. Each name can be up to 12 characters.
External Port
Enter the external port number used
by the server or application on the Internet. Check
with the Internet application documentation for more
information.
Internal Port
Enter the internal port number used by the
server or application on the Local Area Network (LAN).
Check with the Internet application documentation for
more information.
Protocol
Select the protocol used for this application,
either
TCP
or
UDP
, or
Both
.
To IP Address
For each application, enter the IP address
of the PC that should receive the requests. If you assigned
a static IP address to the PC, then you can click
DHCP
Reservat±on
on the
Basic Setup
screen to look up its static
IP address.
Enabled
For each application, select
Enabled
to enable
port forwarding.
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Applications and Gaming > Port Range
Forwarding
The
  Port  Range  Forwarding
screen allows you to set up
public services on your network, such as web servers,

Rate

4.7 / 5 based on 3 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top