Page 86 / 165 Scroll up to view Page 81 - 85
76
Chapter 8: Configuring the Wireless-G Router for 3G/UMTS Broadband
The Wireless Tab - Advanced Wireless Settings
Wireless-G Router for 3G/UMTS Broadband
sends the next DTIM with a DTIM Interval value. Its clients hear the beacons and awaken to receive the broadcast
and multicast messages. The default value is
1
.
Fragmentation Threshold
. This value specifies the maximum size for a packet before data is fragmented into
multiple packets. If you experience a high packet error rate, you may slightly increase the Fragmentation
Threshold. Setting the Fragmentation Threshold too low may result in poor network performance. Only minor
reduction of the default value is recommended. In most cases, it should remain at its default value of
2346
.
RTS Threshold
. Should you encounter inconsistent data flow, only minor reduction of the default value,
2347
, is
recommended. If a network packet is smaller than the preset RTS threshold size, the RTS/CTS mechanism will
not be enabled. The Router sends Request to Send (RTS) frames to a particular receiving station and negotiates
the sending of a data frame. After receiving an RTS, the wireless station responds with a Clear to Send (CTS)
frame to acknowledge the right to begin transmission. The RTS Threshold value should remain at its default value
of
2347
.
AP Isolation
. This isolates all wireless clients and wireless devices on your network from each other. Wireless
devices will be able to communicate with the Router but not with each other. To use this function, select
On
. AP
Isolation is
Off
by default.
Change these settings as described here, and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes.
Downloaded from
www.Manualslib.com
manuals search engine
Page 87 / 165
77
Chapter 8: Configuring the Wireless-G Router for 3G/UMTS Broadband
The Security Tab - Firewall
Wireless-G Router for 3G/UMTS Broadband
The Security Tab - Firewall
Firewall
Firewall Protection
. Enable this feature to employ Stateful Packet Inspection (SPI) for more detailed review of
data packets entering your network environment.
Block WAN Requests
Block Anonymous Internet Requests
. Use this feature to prevent your network from being “pinged,” or
detected, by other Internet users. The Block WAN Request feature also reinforces your network security by hiding
your network ports. Both functions of the Block WAN Request feature make it more difficult for outside users to
work their way into your network. This feature is enabled by default. Remove the checkmark to allow anonymous
Internet requests.
Filter Multicast
. Multicasting allows for multiple transmissions to specific recipients at the same time. If
multicasting is permitted, then the Router will allow IP multicast packets to be forwarded to the appropriate
computers. This feature is enabled by default. Remove the checkmark to disable this feature.
Filter Internet NAT Redirection
. This feature uses port forwarding to block access to local servers from local
networked computers. Click the checkbox to filter Internet NAT redirection, or remove the checkmark to disable
this feature.
Filter IDENT (Port 113)
. This feature keeps port 113 from being scanned by devices outside of your local
network. This feature is enabled by default. Remove the checkmark to disable this feature.
Change these settings as described here, and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes.
Figure 8-37: Security Tab - Firewall
Downloaded from
www.Manualslib.com
manuals search engine
Page 88 / 165
78
Chapter 8: Configuring the Wireless-G Router for 3G/UMTS Broadband
The Security Tab - VPN Passthrough
Wireless-G Router for 3G/UMTS Broadband
The Security Tab - VPN Passthrough
Use this screen to allow VPN tunnels using IPSec, PPTP, or L2TP protocols to pass through the Router’s firewall.
VPN Passthrough
IPSec Passthrough
. Internet Protocol Security (IPSec) is a suite of protocols used to implement secure exchange
of packets at the IP layer. To allow IPSec tunnels to pass through the Router, click
Enable
.
IPSec Passthrough is
enabled by default.
PPTP Passthrough
. Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be
tunneled through an IP network. To allow PPTP tunnels to pass through the Router, click
Enable
. PPTP
Passthrough is enabled by default.
L2TP Passthrough
. Layer 2 Tunneling Protocol is the method used to enable Point-to-Point sessions via the
Internet on the Layer 2 level. To allow L2TP tunnels to pass through the Router, click
Enable
. L2TP Passthrough is
enabled by default.
Change these settings as described here, and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes.
Figure 8-38: Security Tab - VPN Passthrough
Downloaded from
www.Manualslib.com
manuals search engine
Page 89 / 165
79
Chapter 8: Configuring the Wireless-G Router for 3G/UMTS Broadband
The Security Tab - VPN Passthrough
Wireless-G Router for 3G/UMTS Broadband
The Security Tab - PPTP Mobile
Login Status. To log in to PPTP Mobile, click
Connect
.
User Name. Enter your PPTP Mobile user name in the field.
Password. Enter your PPTP Mobile password in the field.
PPTP Server. Enter the name of the PPTP server.
Auto Connect. Select
Enable
to automatically connect to the server.
Keep Alive Option: Redial Period. This feature allows the Router will periodically check your Internet connection. If
you are disconnected, then the Router will automatically re-establish your connection. To use this option, select
Keep Alive
. In the
Redial Period
field, specify how often you want the Router to check the Internet connection. The
default Redial Period is
30
seconds.
The Security Tab - L2TP Mobile
Login Status. To log in to L2TP Mobile, click
Connect
.
User Name. Enter your L2TP Mobile user name in the field.
Password. Enter your L2TP Mobile password in the field.
L2TP Server. Enter the name of the L2TP server.
Auto Connect. Select
Enable
to automatically connect to the server.
Keep Alive Option: Redial Period. This feature allows the Router will periodically check your Internet connection. If
you are disconnected, then the Router will automatically re-establish your connection. To use this option, select
Keep Alive
. In the
Redial Period
field, specify how often you want the Router to check the Internet connection. The
default Redial Period is
30
seconds.
Figure 8-40: Security Tab - L2TP Mobile
Figure 8-39: Security Tab - PPTP Mobile
Downloaded from
www.Manualslib.com
manuals search engine
Page 90 / 165
80
Chapter 8: Configuring the Wireless-G Router for 3G/UMTS Broadband
The Access Restrictions Tab - Internet Access
Wireless-G Router for 3G/UMTS Broadband
The Access Restrictions Tab - Internet Access
The
Internet Access
screen allows you to block or allow specific kinds of Internet usage and traffic, such as
Internet access, designated services, websites, and inbound traffic during specific days and times.
Internet Access
Internet Access Policy
. Access can be managed by a policy. Use the settings on this screen to establish an
access policy (after the
Save Settings
button is clicked). Selecting a policy from the drop-down menu will
display that policy’s settings. To delete a policy, select that policy’s number and click the
Delete
button. To view
all the policies, click the
Summary
button. (Policies can be deleted from the
Summary
screen by selecting the
policy or policies and clicking the
Delete
button. To return to the Internet Access tab, click the
Close
button.)
Status
. Policies are disabled by default. To enable a policy, select the policy number from the drop-down menu,
and click the radio button beside
Enable
.
To create an Internet Access policy:
6.
Select a number from the
Internet Access Policy
drop-down menu.
7.
To enable this policy, click the radio button beside
Enable
.
8.
Enter a Policy Name in the field provided.
9.
Click the
Edit List of PCs
button to select which PCs will be affected by the policy. The
List of PCs
screen will
appear. You can select a PC by MAC Address or IP Address. You can also enter a range of IP Addresses if you
want this policy to affect a group of PCs. After making your changes, click the
Save Settings
button to apply
your changes or
Cancel Changes
to cancel your changes. Then click the
Close
button.
10. Click the appropriate option,
Deny
or
Allow
, depending on whether you want to block or allow Internet access
for the PCs you listed on the
List of PCs
screen.
11. Decide which days and what times you want this policy to be enforced. Select the individual days during
which the policy will be in effect, or select
Everyday
. Then enter a range of hours and minutes during which
the policy will be in effect, or select
24 Hours
.
12. You can filter access to various services accessed over the Internet, such as FTP or telnet, by selecting
services from the drop-down menus next to
Blocked Services
. Then enter the range of ports you want to filter.
If the service you want to block is not listed or you want to edit a service’s settings, then click the
Add/Edit
Service
button. Then the
Port Services
screen will appear.
Figure 8-41: Access Restrictions Tab - Internet Access
Downloaded from
www.Manualslib.com
manuals search engine

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top