Page 36 / 92 Scroll up to view Page 31 - 35
30
Chapter 5: Configuring the Wireless-N Gigabit Gaming Router
The WIRELESS Tab - QoS
Wireless-N Gigabit Gaming Router
Host Internal Port Range
: Select the application port range that will apply the QoS rule.
If the rule will only
apply to one application port, enter the same port number in both the
From
and the
To
field.
Host External IP Range:
Enter the IP address range of the device that will receive traffic on the remote end of
the connection.
If there’s only one device on the remote end, enter the same IP address in the
From
and
To
field.
Host External Port Range
:
Enter the port range of the device that will receive traffic on the remote end of the
connection.
If there’s only one device on the remote end, enter the same port number in the
From
and
To
field.
Wireless QoS Rule List
This field will display the current custom rules that are applied by the router.
To edit the rule, click the
pencil
icon
next to the rule.
To delete the rule, click the
red circle
icon next to the rule.
Click
SAVE SETTINGS
when you have finished editing the Wireless QoS settings.
Click
CANCEL CHANGES
to
clear all fields and start over.
Page 37 / 92
31
Chapter 5: Configuring the Wireless-N Gigabit Gaming Router
The SECURITY Tab - FIREWALL
Wireless-N Gigabit Gaming Router
The SECURITY Tab - FIREWALL
The
FIREWALL
screen offers a firewall and filters that block specific Internet data types.
Firewall
Firewall Protection
. A firewall enhances network security and uses Stateful Packet Inspection (SPI) for more
detailed review of data packets entering your network. Select
Enable
to use a firewall,
or
Disable
to disable it.
Block WAN Request
Block WAN Requests
. When enabled, this feature keeps your network from being “pinged,” or detected, by other
Internet users. It also hides your network ports. Both make it more difficult for outside users to enter your
network. Click in the box to block anonymous internet requests.
When you have finished making changes to this screen, click
SAVE SETTINGS
to save the changes, or click
CANCEL CHANGES
to clear all fields and start over.
Figure 5-21: SECURITY Tab - FIREWALL
Page 38 / 92
32
Chapter 5: Configuring the Wireless-N Gigabit Gaming Router
The SECURITY Tab - VPN PASSTHROUGH
Wireless-N Gigabit Gaming Router
The SECURITY Tab - VPN PASSTHROUGH
The
VPN PASSTHROUGH
screen allows you to allow VPN tunnels usingPPPoE, IPSec, PPTP or L2TP protocols to
pass through the Router.
VPN Passthrough
PPPoE Passthrough
. PPPoe (Point-to-Point Protocol over Ethernet) allows a PPP session to be initiated on a
simple bridging Ethernet connected client. To allow PPPoE Passthrough, click the
Enable
button. To disable
PPPoE Passthrough, click the
Disable
button.
IPSec Passthrough
. IPSec (Internet Protocol Security) is a suite of protocols used to implement secure exchange
of packets at the IP layer. To allow IPSec Passthrough, click the
Enable
button. To disable IPSec Passthrough,
click the
Disable
button.
PPTP Passthrough
. PPTP (Point-to-Point Tunneling Protocol) allows the Point-to-Point (PPP) to be tunneled
through an IP network. To allow PPTP Passthrough, click the
Enable
button. To disable PPTP Passthrough, click
the
Disable
button.
L2TP Passthrough
. L2TP (Layer 2 Tunneling Protocol) is the method used to enable Point-to-Point sessions via
the Internet on the Layer 2 level. To allow L2TP tunnels to pass through the Router, click the
Enable
button. To
disable L2TP Passthrough, click the
Disable
button.
When you have finished making changes to this screen, click
SAVE SETTINGS
to save the changes, or click
CANCEL CHANGES
to clear all fields and start over.
Figure 5-22: SECURITY Tab - VPN PASSTHROUGH
ipsec
: a VPN protocol used to implement secure
exchange of packets at the IP layer.
pptp
: a VPN protocol that allows the Point to Point
Protocol (PPP) to be tunneled through an IP network.
This protocol is also used as a type of broadband
connection in Europe.
vpn
: a security measure to protect data as it leaves
one network and goes to another over the Internet.
pppoe
: a signaling protocol defined within PPPoE as
well as the encapsulation method.
Page 39 / 92
33
Chapter 5: Configuring the Wireless-N Gigabit Gaming Router
The ACCESS RESTRICTIONS Tab - INTERNET ACCESS POLICY
Wireless-N Gigabit Gaming Router
The ACCESS RESTRICTIONS Tab - INTERNET ACCESS POLICY
The
INTERNET ACCESS POLICY
screen allows you to block or allow specific kinds of Internet usage and traffic,
such as Internet access, designated services, websites, and inbound traffic during specific days and times.
Internet Access
Access Policy.
Select an access policy to see a summary of, or delete. Select a policy from the drop-down menu.
Click the
Delete This Entry
button or the
Summary
button. On the
Summary
screen, the policies are listed with
the following information: No., Policy Name, Access, Days, Time, and status (Enabled).
Apply Policy
Enter Policy Name
. Enter the Policy Name in the field provided and to enable.
Status
.Click for
Enabled
or
Disabled
.
Edit List.
Click this button to select which PCs will be affected by the policy. The
List of PCs
screen will appear.
You can select a PC by MAC address or IP address. You can also enter a range of IP addresses if you want this
policy to affect a group of PCs. Click the appropriate option,
Deny
or
Allow
, depending on whether you want to
block or allow Internet access for the PCs you listed on the
List of PCs
screen.
Access Restrictions
Deny
or
Allow.
Choose to have your policy block or allow internet access. Select specific days and times in the
Schedule section.
Schedule
Decide which days and what times you want this policy to be enforced.
Days
. Select
Everyday
or the individual days during which the policy will be in effect.
Times
. Select the times in which deny or allow internet access. Select
24 Hours
or
enter the hours, minutes and
AM or PM during which the policy will be in effect.
Web Blocking by URL Address
You can block up to four websites by specific URL addresses. Enter each URL in a separate field.
Figure 5-23: ACCESS RESTRICTION Tab - INTERNET
ACCESS POLICY
Page 40 / 92
34
Chapter 5: Configuring the Wireless-N Gigabit Gaming Router
The ACCESS RESTRICTIONS Tab - INTERNET ACCESS POLICY
Wireless-N Gigabit Gaming Router
Blocked Applications
Three applications can be blocked per Policy.
Applications/Blocked List
. You can filter access to various services accessed over the Internet, such as FTP or
telnet. From the Applications list, select the application you want to block. Then click the
>>
button to move it to
the Blocked List. To remove an application from the Blocked List, select it and click the
<<
button.
Application Name
. If the application you want to block is not listed or you want to edit a service’s settings, enter
the application’s name in the
Application Name
field.
Port Range
. For the named application, enter its range in the
Port Range
fields.
Protocol
. For the named application, select its protocol from the
Protocol
drop-down menu.
Once you have entered the applications, click the
Add
button. To modify a service, select it from the Application
list. Change its name, port range, and/or protocol setting. Then click the
Modify
button. To delete a service, select
it from the Application list. Then click the
Delete
button.
Click
SAVE Settings
to save your changes, or click
CANCEL CHANGES
to clear all fields and start over.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top