Page 16 / 38 Scroll up to view Page 11 - 15
Chapter±3
Advanced Configuration
14
W±reless-N Broadband Router
Security Mode > WPA2 Enterprise
Encrypt±on
WPA2 supports two encryption methods,
TKIP and AES, with dynamic encryption keys. Select the
type of algorithm,
AES
or
TKIP or AES
. The default is
TKIP
or AES
.
RADIUS Server
Enter the IP Address of the RADIUS
server.
RADIUS Port
Enter the port number of the RADIUS
server. The default value is
1812
.
Shared Secret
Enter the key shared between the Router
and the server.
Key Renewal
Enter a Key Renewal period, which instructs
the Router how often it should change the encryption
keys. The default Key Renewal period is
²600
seconds.
RADIUS
This option features WEP used in coordination with a
RADIUS server. (This should only be used when a RADIUS
server is connected to the Router.)
Security Mode > RADIUS
IMPORTANT:
If you are using WEP encryption,
always remember that each device in your
wireless network MUST use the same WEP
encryption method and encryption key, or else
your wireless network will not function properly.
RADIUS Server
Enter the IP Address of the RADIUS
server.
RADIUS Port
Enter the port number of the RADIUS
server. The default value is
1812
.
Shared Secret
Enter the key shared between the Router
and the server.
Encrypt±on
Select
a
level
of
WEP
encryption,
40/64 b±ts (10 hex d±g±ts)
or
104/128 b±ts (26 hex d±g±ts)
.
The default is
40/64 b±ts (10 hex d±g±ts)
.
Passphrase
Enter a Passphrase to automatically generate
WEP keys. Then click
Generate
.
Key 1-4
If you did not enter a Passphrase, enter the WEP
key(s) manually.
TX Key
Select which TX (Transmit) Key to use. The default
is
1
.
WEP
WEP is a basic encryption method, which is not as secure
as WPA.
Security Mode > WEP
Encrypt±on
Select
a
level
of
WEP
encryption,
40/64 b±ts (10 hex d±g±ts)
or
104/128 b±ts (26 hex d±g±ts)
.
The default is
40/64 b±ts (10 hex d±g±ts)
.
Passphrase
Enter a Passphrase to automatically generate
WEP keys. Then click
Generate
.
Key 1-4
If you did not enter a Passphrase, enter the WEP
key(s) manually.
TX Key
Select which TX (Transmit) Key to use. The default
is
1
.
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Page 17 / 38
Chapter±3
Advanced Configuration
W±reless-N Broadband Router
Wireless > Wireless MAC Filter
Wireless access can be filtered by using the MAC addresses of
the wireless devices transmitting within your network’s radius.
Wireless > Wireless MAC Filter
Wireless MAC Filter
Enabled/D±sabled
To filter wireless users by MAC Address,
either permitting or blocking access, select
Enabled
. If you
do not wish to filter users by MAC Address, keep the default
setting,
D±sabled
.
Access Restriction
Prevent
Select this
to block wireless access by MAC
Address. This button is selected by default.
Perm±t
Select this to allow wireless access by MAC
Address. This button is not selected by default.
MAC Address Filter List
W±reless Cl±ent L±st
Click this to open the
Wireless Client
List
screen.
Wireless Client List
Wireless Client List
This screen shows computers and other devices on
the wireless network. The list can be sorted by Client
Name, Interface, IP Address, MAC Address, and Status.
Select
Save to MAC Address F±lter L±st
for any device
you want to add to the MAC Address Filter List. Then
click
Add
.
To retrieve the most up-to-date information, click
Refresh
. To exit this screen and return to the
Wireless
MAC Filter
screen, click
Close
.
MAC 01-³0
Enter the MAC addresses of the devices
whose wireless access you want to block or allow.
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Wireless > Advanced Wireless Settings
This
Advanced Wireless Settings
screen is used to set up
the Router’s advanced wireless functions. These settings
should only be adjusted by an expert administrator as
incorrect settings can reduce wireless performance.
Wireless > Advanced Wireless Settings
Advanced Wireless
AP Isolat±on
This isolates all wireless clients and wireless
devices on your network from each other. Wireless devices
will be able to communicate with the Router but not
Page 18 / 38
Chapter±3
Advanced Configuration
16
W±reless-N Broadband Router
with each other. To use this function, select
Enabled
. AP
Isolation is disabled by default.
Frame Burst
Enabling this option should provide your
network with greater performance, depending on the
manufacturer of your wireless products. To use this option,
keep the default,
Enabled
. Otherwise, select
D±sabled
.
Authent±cat±on Type
The default is set to
Auto
, which
allows either Open System or Shared Key authentication
to be used. With Open System authentication, the sender
and the recipient do NOT use a WEP key for authentication.
With Shared Key authentication, the sender and recipient
use a WEP key for authentication. Select
Shared Key
to
only use Shared Key authentication.
Bas±c Rate
The Basic Rate setting is not actually one rate
of transmission but a series of rates at which the Router
can transmit. The Router will advertise its Basic Rate to the
other wireless devices in your network, so they know which
rates will be used. The Router will also advertise that it will
automatically select the best rate for transmission. The
default setting is
Default
, when the Router can transmit
at all standard wireless rates (1-2Mbps, 5.5Mbps, 11Mbps,
18Mbps, and 24Mbps). Other options are
1-2Mbps
, for
use with older wireless technology, and
All
, when the
Router can transmit at all wireless rates. The Basic Rate
is not the actual rate of data transmission. If you want to
specify the Router’s rate of data transmission, configure
the Transmission Rate setting.
Transm±ss±on Rate
The rate of data transmission should
be set depending on the speed of your wireless network.
You can select from a range of transmission speeds, or you
can select
Auto
to have the Router automatically use the
fastest possible data rate and enable the Auto-Fallback
feature. Auto-Fallback will negotiate the best possible
connection speed between the Router and a wireless
client. The default is
Auto
.
N Transm±ss±on Rate
The rate of data transmission
should be set depending on the speed of your Wireless-N
networking. You can select from a range of transmission
speeds, or you can select
Auto
to have the Router
automatically use the fastest possible data rate and enable
the Auto-Fallback feature. Auto-Fallback will negotiate the
best possible connection speed between the Router and a
wireless client. The default is
Auto
.
CTS Protect±on Mode
The Router will automatically
use CTS (Clear-To-Send) Protection Mode when your
Wireless-N and Wireless-G products are experiencing
severe problems and are not able to transmit to the
Router in an environment with heavy 802.11b traffic. This
function boosts the Router’s ability to catch all Wireless-
N and Wireless-G transmissions but will severely decrease
performance. The default is
Auto
.
Beacon Interval
Enter a value between 1 and 65,535
milliseconds. The Beacon Interval value indicates the
frequency interval of the beacon. A beacon is a packet
broadcast by the Router to synchronize the wireless
network. The default value is
100
.
DTIM Interval
This value, between 1 and 255, indicates
the interval of the Delivery Traffic Indication Message
(DTIM). A DTIM field is a countdown field informing
clients of the next window for listening to broadcast
and multicast messages. When the Router has buffered
broadcast or multicast messages for associated clients, it
sends the next DTIM with a DTIM Interval value. Its clients
hear the beacons and awaken to receive the broadcast
and multicast messages. The default value is
1
.
Fragmentat±on
Threshold
This
value
specifies
the
maximum size for a packet before data is fragmented
into multiple packets. If you experience a high packet
error rate, you may slightly increase the Fragmentation
Threshold. Setting the Fragmentation Threshold too low
may result in poor network performance. Only minor
reduction of the default value is recommended. In most
cases, it should remain at its default value of
2²46
.
RTS Threshold
Should you encounter inconsistent data
flow, only minor reduction of the default value,
2²4´
, is
recommended. If a network packet is smaller than the
preset RTS threshold size, the RTS/CTS mechanism will
not be enabled. The Router sends Request to Send (RTS)
frames to a particular receiving station and negotiates
the sending of a data frame. After receiving an RTS, the
wireless station responds with a Clear to Send (CTS) frame
to acknowledge the right to begin transmission. The RTS
Threshold value should remain at its default value of
2²4´
.
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Security > Firewall
The
Firewall
screen is used to configure a firewall that can
filter out various types of unwanted traffic on the Router’s
local network.
Security > Firewall
Page 19 / 38
Chapter±3
Advanced Configuration
W±reless-N Broadband Router
Firewall
SPI F±rewall Protect±on
To use firewall protection,
keep the default selection,
Enabled
. To turn off firewall
protection, select
D±sabled
.
Internet Filter
F±lter
Anonymous
Internet
Requests
This
feature
makes it more difficult for outside users to work their
way into your network. This feature is selected
by default.
Deselect the feature to allow anonymous Internet
requests
.
F±lter
Mult±cast
Multicasting
allows
for
multiple
transmissions to specific recipients at the same time. If
multicasting is permitted, then the Router will allow IP
multicast packets to be forwarded to the appropriate
computers. Select this feature to filter multicasting. This
feature is not selected by default.
F±lter Internet NAT Red±rect±on
This feature uses port
forwarding to block access to local servers from local
networked computers. Select this feature to filter Internet
NAT redirection. It is not selected by default.
F±lter IDENT (Port 11²)
This feature keeps port 113 from
being scanned by devices outside of your local network.
This feature is selected by default. Deselect this feature to
disable it.
Web Filter
Proxy
Use of WAN proxy servers may compromise the
Gateway’s security. Denying Proxy will disable access to
any WAN proxy servers. Select this feature to enable proxy
filtering. Deselect the feature to allow proxy access
.
Java
Java is a programming language for websites. If you
deny Java, you run the risk of not having access to Internet
sites created using this programming language. Select
this feature to enable Java filtering. Deselect the feature
to allow Java usage
.
Act±veX
ActiveX is a programming language for websites.
If you deny ActiveX, you run the risk of not having access to
Internet sites created using this programming language.
Select this feature to enable ActiveX filtering. Deselect the
feature to allow ActiveX usage
.
Cook±es
A cookie is data stored on your computer and
used by Internet sites when you interact with them. Select
this feature to filter cookies. Deselect the feature to allow
cookie usage
.
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Security > VPN Passthrough
The
VPN Passthrough
screen allows you to enable VPN
tunnels using IPSec, PPTP, or L2TP protocols to pass through
the Router’s firewall.
Security > VPN Passthrough
VPN Passthrough
IPSec Passthrough
Internet Protocol Security (IPSec) is
a suite of protocols used to implement secure exchange
of packets at the IP layer. To allow IPSec tunnels to pass
through the Router, keep the default,
Enabled
.
PPTP Passthrough
Point-to-Point Tunneling Protocol
(PPTP) allows the Point-to-Point Protocol (PPP) to be
tunneled through an IP network. To allow PPTP tunnels to
pass through the Router, keep the default,
Enabled
.
L2TP Passthrough
Layer 2 Tunneling Protocol is the
method used to enable Point-to-Point sessions via the
Internet on the Layer 2 level. To allow L2TP tunnels to pass
through the Router, keep the default,
Enabled
.
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Access Restrictions > Internet Access
The
Internet Access
screen allows you to block or allow
specific kinds of Internet usage and traffic, such as Internet
access, designated services, and websites during specific
days and times.
Page 20 / 38
Chapter±3
Advanced Configuration
18
W±reless-N Broadband Router
Access Restrictions > Internet Access
Internet Access Policy
Access Pol±cy
Access can be managed by a policy. Use the
settings on this screen to establish an access policy (after
Save Sett±ngs
is clicked). Selecting a policy from the drop-
down menu will display that policy’s settings. To delete a
policy, select that policy’s number and click
Delete Th±s
Pol±cy
. To view all the policies, click
Summary
.
Summary
The policies are listed with the following information: No.,
Policy Name, Access, Days, Time, and status (Enabled). To
enable a policy, select
Enabled
. To delete a policy, click
Delete
. Click
Save Sett±ngs
to save your changes, or click
Cancel Changes
to cancel your changes. To return to the
Internet Access Policy
screen, click
Close
.
Summary
Status
Policies are disabled by default. To enable a policy,
select the policy number from the drop-down menu, and
select
Enabled
.
To create a policy, follow steps 1-11. Repeat these steps to
create additional policies, one at a time.
Select a number from the
Access Policy
drop-down
menu.
Enter a Policy Name in the field provided.
To enable this policy, select
Enabled
.
Click
Ed±t L±st
to select which PCs will be affected by
the policy. The
List of PCs
screen appears. You can
select a PC by MAC address or IP address. You can also
enter a range of IP addresses if you want this policy to
affect a group of PCs. After making your changes, click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes. Then click
Close
.
List of PCs
Select
the
appropriate
option,
Deny
or
Allow
,
depending on whether you want to block or allow
Internet access for the PCs you listed on the
List of PCs
screen.
Decide which days and what times you want this policy
to be enforced. Select the individual days during which
the policy will be in effect, or select
Everyday
. Then
enter a range of hours and minutes during which the
policy will be in effect, or select
24 Hours
.
You can block websites with specific URL addresses.
Enter each URL in a separate
URL
field.
You can also block websites using specific keywords.
Enter each keyword in a separate
Keyword
field.
1.
2.
3.
4.
5.
6.
7.
8.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top