Page 16 / 52 Scroll up to view Page 11 - 15
Chapter 3
Advanced Configuration
15
Wireless-N Gigabit Router
for Remote Authentication Dial-In User Service.) These
six are briefly discussed here. For detailed instructions
on configuring wireless security for the Router, refer to
“Chapter 2: Wireless Security.”
Wireless Security
Security Mode
Select the security method for your wireless network. If
you do not want to use wireless security, keep the default,
Disabled
.
WPA Personal
NOTE:
If you are using WPA, always remember
that each device in your wireless network MUST
use the same WPA method and shared key, or
else the network will not function properly.
Security Mode > WPA Personal
Passphrase
Enter a Passphrase of 8-63 characters.
Key Renewal
Enter a Key Renewal period, which instructs
the Router how often it should change the encryption keys.
The default Group Key Renewal period is
3600
seconds.
WPA2 Personal
Security Mode > WPA2 Personal
Encryption
WPA2 supports two encryption methods,
TKIP and AES, with dynamic encryption keys. Select the
type of algorithm,
AES
or
TKIP or AES
. The default is
TKIP
or AES
.
Passphrase
Enter a Passphrase of 8-63 characters.
Key Renewal
Enter a Key Renewal period, which instructs
the Router how often it should change the encryption keys.
The default Group Key Renewal period is
3600
seconds.
WPA Enterprise
This option features WPA used in coordination with a
RADIUS server. (This should only be used when a RADIUS
server is connected to the Router.)
Security Mode > WPA Enterprise
RADIUS Server
Enter the IP Address of the RADIUS
server.
RADIUS Port
Enter the port number of the RADIUS
server. The default value is
1812
.
Shared Secret
Enter the key shared between the Router
and the server.
Key Renewal
Enter a Key Renewal period, which instructs
the Router how often it should change the encryption
keys. The default Key Renewal period is
3600
seconds.
WPA2 Enterprise
This option features WPA2 used in coordination with a
RADIUS server. (This should only be used when a RADIUS
server is connected to the Router.)
Security Mode > WPA2 Enterprise
Encryption
WPA2 supports two encryption methods,
TKIP and AES, with dynamic encryption keys. Select the
Page 17 / 52
Chapter 3
Advanced Configuration
16
Wireless-N Gigabit Router
type of algorithm,
AES
or
TKIP or AES
. The default is
TKIP
or AES
.
RADIUS Server
Enter the IP Address of the RADIUS
server.
RADIUS Port
Enter the port number of the RADIUS
server. The default value is
1812
.
Shared Secret
Enter the key shared between the Router
and the server.
Key Renewal
Enter a Key Renewal period, which instructs
the Router how often it should change the encryption
keys. The default Key Renewal period is
3600
seconds.
RADIUS
This option features WEP used in coordination with a
RADIUS server. (This should only be used when a RADIUS
server is connected to the Router.)
Security Mode > RADIUS
IMPORTANT:
If you are using WEP encryption,
always remember that each device in your
wireless network MUST use the same WEP
encryption method and encryption key, or else
your wireless network will not function properly.
RADIUS Server
Enter the IP Address of the RADIUS
server.
RADIUS Port
Enter the port number of the RADIUS
server. The default value is
1812
.
Shared Secret
Enter the key shared between the Router
and the server.
Encryption
Select
a
level
of
WEP
encryption,
40/64 bits (10 hex digits)
or
104/128 bits (26 hex digits)
.
The default is
40/64 bits (10 hex digits)
.
Passphrase
Enter a Passphrase to automatically generate
WEP keys. Then click
Generate
.
Key 1-4
If you did not enter a Passphrase, enter the WEP
key(s) manually.
TX Key
Select which TX (Transmit) Key to use. The default
is
1
.
WEP
WEP is a basic encryption method, which is not as secure
as WPA.
Security Mode > WEP
Encryption
Select
a
level
of
WEP
encryption,
40/64 bits (10 hex digits)
or
104/128 bits (26 hex digits)
.
The default is
40/64 bits (10 hex digits)
.
Passphrase
Enter a Passphrase to automatically generate
WEP keys. Then click
Generate
.
Key 1-4
If you did not enter a Passphrase, enter the WEP
key(s) manually.
TX Key
Select which TX (Transmit) Key to use. The default
is
1
.
Click
Save Settings
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Wireless > Wireless MAC Filter
Wireless access can be filtered by using the MAC addresses of
the wireless devices transmitting within your network’s radius.
Page 18 / 52
Chapter 3
Advanced Configuration
17
Wireless-N Gigabit Router
Wireless > Wireless MAC Filter
Wireless MAC Filter
Enabled/Disabled
To filter wireless users by MAC Address,
either permitting or blocking access, select
Enabled
. If you
do not wish to filter users by MAC Address, keep the default
setting,
Disabled
.
Access Restriction
Prevent
Select this
to block wireless access by MAC
Address. This button is selected by default.
Permit
Select this to allow wireless access by MAC
Address. This button is not selected by default.
MAC Address Filter List
Wireless Client List
Click this to open the
Wireless Client
List
screen.
Wireless Client List
Wireless Client List
This screen shows computers and other devices on
the wireless network. The list can be sorted by Client
Name, Interface, IP Address, MAC Address, and Status.
Select
Save to MAC Address Filter List
for any device
you want to add to the MAC Address Filter List. Then
click
Add
.
To retrieve the most up-to-date information, click
Refresh
. To exit this screen and return to the
Wireless
MAC Filter
screen, click
Close
.
MAC 01-50
Enter the MAC addresses of the devices
whose wireless access you want to block or allow.
Click
Save Settings
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Wireless > Advanced Wireless Settings
This
Advanced Wireless Settings
screen is used to set up
the Router’s advanced wireless functions. These settings
should only be adjusted by an expert administrator as
incorrect settings can reduce wireless performance.
Wireless > Advanced Wireless Settings
Advanced Wireless
AP Isolation
This isolates all wireless clients and wireless
devices on your network from each other. Wireless devices
will be able to communicate with the Router but not
with each other. To use this function, select
Enabled
. AP
Isolation is disabled by default.
Frame Burst
Enabling this option should provide your
network with greater performance, depending on the
manufacturer of your wireless products. To use this option,
keep the default,
Enabled
. Otherwise, select
Disabled
.
Authentication Type
The default is set to
Auto
, which
allows either Open System or Shared Key authentication
to be used. With Open System authentication, the sender
and the recipient do NOT use a WEP key for authentication.
Page 19 / 52
Chapter 3
Advanced Configuration
18
Wireless-N Gigabit Router
With Shared Key authentication, the sender and recipient
use a WEP key for authentication. Select
Shared Key
to
only use Shared Key authentication.
Basic Rate
The Basic Rate setting is not actually one rate
of transmission but a series of rates at which the Router
can transmit. The Router will advertise its Basic Rate to the
other wireless devices in your network, so they know which
rates will be used. The Router will also advertise that it will
automatically select the best rate for transmission. The
default setting is
Default
, when the Router can transmit
at all standard wireless rates (1-2Mbps, 5.5Mbps, 11Mbps,
18Mbps, and 24Mbps). Other options are
1-2Mbps
, for
use with older wireless technology, and
All
, when the
Router can transmit at all wireless rates. The Basic Rate
is not the actual rate of data transmission. If you want to
specify the Router’s rate of data transmission, configure
the Transmission Rate setting.
Transmission Rate
The rate of data transmission should
be set depending on the speed of your wireless network.
You can select from a range of transmission speeds, or you
can select
Auto
to have the Router automatically use the
fastest possible data rate and enable the Auto-Fallback
feature. Auto-Fallback will negotiate the best possible
connection speed between the Router and a wireless
client. The default is
Auto
.
N Transmission Rate
The rate of data transmission
should be set depending on the speed of your Wireless-N
networking. You can select from a range of transmission
speeds, or you can select
Auto
to have the Router
automatically use the fastest possible data rate and enable
the Auto-Fallback feature. Auto-Fallback will negotiate the
best possible connection speed between the Router and a
wireless client. The default is
Auto
.
CTS Protection Mode
The Router will automatically
use CTS (Clear-To-Send) Protection Mode when your
Wireless-N and Wireless-G products are experiencing
severe problems and are not able to transmit to the
Router in an environment with heavy 802.11b traffic. This
function boosts the Router’s ability to catch all Wireless-
N and Wireless-G transmissions but will severely decrease
performance. The default is
Auto
.
Beacon Interval
Enter a value between 1 and 65,535
milliseconds. The Beacon Interval value indicates the
frequency interval of the beacon. A beacon is a packet
broadcast by the Router to synchronize the wireless
network. The default value is
100
.
DTIM Interval
This value, between 1 and 255, indicates
the interval of the Delivery Traffic Indication Message
(DTIM). A DTIM field is a countdown field informing
clients of the next window for listening to broadcast
and multicast messages. When the Router has buffered
broadcast or multicast messages for associated clients, it
sends the next DTIM with a DTIM Interval value. Its clients
hear the beacons and awaken to receive the broadcast
and multicast messages. The default value is
1
.
Fragmentation
Threshold
This
value
specifies
the
maximum size for a packet before data is fragmented
into multiple packets. If you experience a high packet
error rate, you may slightly increase the Fragmentation
Threshold. Setting the Fragmentation Threshold too low
may result in poor network performance. Only minor
reduction of the default value is recommended. In most
cases, it should remain at its default value of
2346
.
RTS Threshold
Should you encounter inconsistent data
flow, only minor reduction of the default value,
2347
, is
recommended. If a network packet is smaller than the
preset RTS threshold size, the RTS/CTS mechanism will
not be enabled. The Router sends Request to Send (RTS)
frames to a particular receiving station and negotiates
the sending of a data frame. After receiving an RTS, the
wireless station responds with a Clear to Send (CTS) frame
to acknowledge the right to begin transmission. The RTS
Threshold value should remain at its default value of
2347
.
Click
Save Settings
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Security > Firewall
The
Firewall
screen is used to configure a firewall that can
filter out various types of unwanted traffic on the Router’s
local network.
Security > Firewall
Firewall
SPI Firewall Protection
To use firewall protection,
keep the default selection,
Enabled
. To turn off firewall
protection, select
Disabled
.
Internet Filter
Filter
Anonymous
Internet
Requests
This
feature
makes it more difficult for outside users to work their
way into your network. This feature is selected
by default.
Page 20 / 52
Chapter 3
Advanced Configuration
19
Wireless-N Gigabit Router
Deselect the feature to allow anonymous Internet
requests
.
Filter
Multicast
Multicasting
allows
for
multiple
transmissions to specific recipients at the same time. If
multicasting is permitted, then the Router will allow IP
multicast packets to be forwarded to the appropriate
computers. Select this feature to filter multicasting. This
feature is not selected by default.
Filter Internet NAT Redirection
This feature uses port
forwarding to block access to local servers from local
networked computers. Select this feature to filter Internet
NAT redirection. It is not selected by default.
Filter IDENT (Port 113)
This feature keeps port 113 from
being scanned by devices outside of your local network.
This feature is selected by default. Deselect this feature to
disable it.
Web Filter
Proxy
Use of WAN proxy servers may compromise the
Gateway’s security. Denying Proxy will disable access to
any WAN proxy servers. Select this feature to enable proxy
filtering. Deselect the feature to allow proxy access
.
Java
Java is a programming language for websites. If you
deny Java, you run the risk of not having access to Internet
sites created using this programming language. Select
this feature to enable Java filtering. Deselect the feature
to allow Java usage
.
ActiveX
ActiveX is a programming language for websites.
If you deny ActiveX, you run the risk of not having access to
Internet sites created using this programming language.
Select this feature to enable ActiveX filtering. Deselect the
feature to allow ActiveX usage
.
Cookies
A cookie is data stored on your computer and
used by Internet sites when you interact with them. Select
this feature to filter cookies. Deselect the feature to allow
cookie usage
.
Click
Save Settings
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Security > VPN Passthrough
The
VPN Passthrough
screen allows you to enable VPN
tunnels using IPSec, PPTP, or L2TP protocols to pass through
the Router’s firewall.
Security > VPN Passthrough
VPN Passthrough
IPSec Passthrough
Internet Protocol Security (IPSec) is
a suite of protocols used to implement secure exchange
of packets at the IP layer. To allow IPSec tunnels to pass
through the Router, keep the default,
Enabled
.
PPTP Passthrough
Point-to-Point Tunneling Protocol
(PPTP) allows the Point-to-Point Protocol (PPP) to be
tunneled through an IP network. To allow PPTP tunnels to
pass through the Router, keep the default,
Enabled
.
L2TP Passthrough
Layer 2 Tunneling Protocol is the
method used to enable Point-to-Point sessions via the
Internet on the Layer 2 level. To allow L2TP tunnels to pass
through the Router, keep the default,
Enabled
.
Click
Save Settings
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Access Restrictions > Internet Access
The
Internet Access
screen allows you to block or allow
specific kinds of Internet usage and traffic, such as Internet
access, designated services, and websites during specific
days and times.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top