Page 21 / 57 Scroll up to view Page 16 - 20
Chapter±3
Advanced Configuration
20
W±reless-G Router for 3G/UMTS Broadband
Wireless Client List
This screen shows computers and other devices on
the wireless network. The list can be sorted by Client
Name, Interface, IP Address, MAC Address, and Status.
Select
Save to MAC Address F±lter L±st
for any device
you want to add to the MAC Address Filter List. Then
click
Add
.
To retrieve the most up-to-date information, click
Refresh
. To exit this screen and return to the
Wireless
MAC Filter
screen, click
Close
.
MAC 01-³0
Enter the MAC addresses of the devices
whose wireless access you want to block or allow.
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Wireless > Advanced Wireless Settings
This
Advanced Wireless Settings
screen is used to set up
the Router’s advanced wireless functions. These settings
should only be adjusted by an expert administrator as
incorrect settings can reduce wireless performance.
Wireless > Advanced Wireless Settings
Advanced Wireless
AP Isolat±on
This isolates all wireless clients and wireless
devices on your network from each other. Wireless devices
will be able to communicate with the Router but not
with each other. To use this function, select
Enabled
. AP
Isolation is disabled by default.
Frame Burst
Enabling this option should provide your
network with greater performance, depending on the
manufacturer of your wireless products. To use this option,
keep the default,
Enabled
. Otherwise, select
D±sabled
.
Authent±cat±on Type
The default is set to
Auto
, which
allows either Open System or Shared Key authentication
to be used. With Open System authentication, the sender
and the recipient do NOT use a WEP key for authentication.
With Shared Key authentication, the sender and recipient
use a WEP key for authentication. Select
Shared Key
to
only use Shared Key authentication.
Bas±c Rate
The Basic Rate setting is not actually one rate
of transmission but a series of rates at which the Router
can transmit. The Router will advertise its Basic Rate to
the other wireless devices in your network, so they know
which rates will be used. The Router will also advertise that
it will automatically select the best rate for transmission.
The default is
Default
, when the Router can transmit at
all standard wireless rates (1-2Mbps, 5.5Mbps, 11Mbps,
18Mbps, and 24Mbps). Other options are
1-2Mbps
, for
use with older wireless technology, and
All
, when the
Router can transmit at all wireless rates. The Basic Rate
is not the actual rate of data transmission. If you want to
specify the Router’s rate of data transmission, configure
the Transmission Rate setting.
Transm±ss±on Rate
The rate of data transmission should
be set depending on the speed of your wireless network.
You can select from a range of transmission speeds, or you
can select
Auto
to have the Router automatically use the
fastest possible data rate and enable the Auto-Fallback
feature. Auto-Fallback will negotiate the best possible
connection speed between the Router and a wireless
client. The default is
Auto
.
CTS Protect±on Mode
The Router will automatically
use CTS (Clear-To-Send) Protection Mode when your
Wireless-N and Wireless-G products are experiencing
severe problems and are not able to transmit to the
Router in an environment with heavy 802.11b traffic. This
function boosts the Router’s ability to catch all Wireless-
N and Wireless-G transmissions but will severely decrease
performance. The default is
Auto
.
Beacon Interval
Enter a value between 1 and 65,535
milliseconds. The Beacon Interval value indicates the
frequency interval of the beacon. A beacon is a packet
broadcast by the Router to synchronize the wireless
network. The default is
100
.
DTIM Interval
This value, between 1 and 255, indicates
the interval of the Delivery Traffic Indication Message
(DTIM). A DTIM field is a countdown field informing
clients of the next window for listening to broadcast
and multicast messages. When the Router has buffered
broadcast or multicast messages for associated clients, it
sends the next DTIM with a DTIM Interval value. Its clients
hear the beacons and awaken to receive the broadcast
and multicast messages. The default is
1
.
Fragmentat±on
Threshold
This
value
specifies
the
maximum size for a packet before data is fragmented
into multiple packets. If you experience a high packet
error rate, you may slightly increase the Fragmentation
Threshold. Setting the Fragmentation Threshold too low
may result in poor network performance. Only minor
reduction of the default value is recommended. In most
cases, it should remain at its default of
23²´
.
Page 22 / 57
Chapter±3
Advanced Configuration
21
W±reless-G Router for 3G/UMTS Broadband
RTS Threshold
Should you encounter inconsistent data
flow, only minor reduction of the default value,
23²µ
, is
recommended. If a network packet is smaller than the
preset RTS threshold size, the RTS/CTS mechanism will
not be enabled. The Router sends Request to Send (RTS)
frames to a particular receiving station and negotiates
the sending of a data frame. After receiving an RTS, the
wireless station responds with a Clear to Send (CTS) frame
to acknowledge the right to begin transmission. The RTS
Threshold value should remain at its default value of
23²µ
.
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Security > Firewall
The
Firewall
screen is used to configure a firewall that can
filter out various types of unwanted traffic on the Router’s
local network.
Security > Firewall
Firewall
SPI F±rewall Protect±on
To use firewall protection, keep
the default,
Enabled
. To turn off firewall protection, select
D±sabled
.
Internet Filter
F±lter Anonymous Internet Requests
This feature makes
it more difficult for outside users to work their way into
your network. This feature is selected
by default. Deselect
the feature to allow anonymous Internet requests
.
F±lter
Mult±cast
Multicasting
allows
for
multiple
transmissions to specific recipients at the same time. If
multicasting is permitted, then the Router will allow IP
multicast packets to be forwarded to the appropriate
computers. Select this feature to filter multicasting. This
feature is not selected by default.
F±lter Internet NAT Red±rect±on
This feature uses port
forwarding to block access to local servers from local
networked computers. Select this feature to filter Internet
NAT redirection. It is not selected by default.
F±lter IDENT (Port 113)
This feature keeps port 113 from
being scanned by devices outside of your local network.
This feature is selected by default. Deselect this feature to
disable it.
Web Filter
Proxy
Use of WAN proxy servers may compromise the
Gateway’s security. Denying Proxy will disable access to
any WAN proxy servers. Select this feature to enable proxy
filtering. Deselect the feature to allow proxy access
.
Java
Java is a programming language for websites. If you
deny Java, you run the risk of not having access to Internet
sites created using this programming language. Select
this feature to enable Java filtering. Deselect the feature
to allow Java usage
.
Act±veX
ActiveX is a programming language for websites.
If you deny ActiveX, you run the risk of not having access to
Internet sites created using this programming language.
Select this feature to enable ActiveX filtering. Deselect the
feature to allow ActiveX usage
.
Cook±es
A cookie is data stored on your computer and
used by Internet sites when you interact with them. Select
this feature to filter cookies. Deselect the feature to allow
cookie usage
.
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Security > VPN Passthrough
The
VPN Passthrough
screen allows you to enable VPN
tunnels using IPSec, PPTP, or L2TP protocols to pass through
the Router’s firewall.
Security > VPN Passthrough
VPN Passthrough
IPSec Passthrough
Internet Protocol Security (IPSec) is
a suite of protocols used to implement secure exchange
of packets at the IP layer. To allow IPSec tunnels to pass
through the Router, keep the default,
Enabled
.
PPTP Passthrough
Point-to-Point Tunneling Protocol
(PPTP) allows the Point-to-Point Protocol (PPP) to be
tunneled through an IP network. To allow PPTP tunnels to
pass through the Router, keep the default,
Enabled
.
Page 23 / 57
Chapter±3
Advanced Configuration
22
W±reless-G Router for 3G/UMTS Broadband
L2TP Passthrough
Layer 2 Tunneling Protocol is the
method used to enable Point-to-Point sessions via the
Internet on the Layer 2 level. To allow L2TP tunnels to pass
through the Router, keep the default,
Enabled
.
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Security > PPTP Mobile
The
PPTP Moblie
screen allows you to enable PPTP Mobile
server information to pass through the Router’s firewall.
Security > PPTP Mobile
Log±n Status
To log in to PPTP Mobile, click Connect.
Username
Enter your PPTP Mobile username in the
field.
Password
Enter your PPTP Mobile password in the field.
PPTP Server
Enter the name of the PPTP server.
Auto Connect
Select Enable to automatically connect to
the server.
Keep Al±ve: Red±al Per±od
If you select this option,
you can specify how often the Router will periodically
check your
mobile network
connection. If you are
disconnected, then the Router will automatically re-
establish your connection. To use this option, select
Keep Al±ve
.
Security > L2TP Mobile
The
L2TP Moblie
screen allows you to enable L2TP Mobile
server information to pass through the Router’s firewall.
Security > L2TP Mobile
Log±n Status
To log in to L2TP Mobile, click Connect.
Username
Enter your L2TP Mobile username in the field.
Password
Enter your L2TP Mobile password in the field.
L2TP Server
Enter the name of the L2TP server.
Auto Connect
Select Enable to automatically connect to
the server.
Keep Al±ve: Red±al Per±od
If you select this option,
you can specify how often the Router will periodically
check your
mobile network
connection. If you are
disconnected, then the Router will automatically re-
establish your connection. To use this option, select
Keep Al±ve
.
Page 24 / 57
Chapter±3
Advanced Configuration
23
W±reless-G Router for 3G/UMTS Broadband
Access Restrictions > Internet Access
The
Internet Access
screen allows you to block or allow
specific kinds of Internet usage and traffic, such as Internet
access, designated services, and websites during specific
days and times.
Access Restrictions > Internet Access
Internet Access Policy
Access Pol±cy
Access can be managed by a policy. Use the
settings on this screen to establish an access policy (after
Save Sett±ngs
is clicked). Selecting a policy from the drop-
down menu will display that policy’s settings. To delete a
policy, select that policy’s number and click
Delete Th±s
Pol±cy
. To view all the policies, click
Summary
.
Summary
The policies are listed with the following information: No.,
Policy Name, Access, Days, Time, and status (Enabled). To
enable a policy, select
Enabled
. To delete a policy, click
Delete
. Click
Save Sett±ngs
to save your changes, or click
Cancel Changes
to cancel your changes. To return to the
Internet Access Policy
screen, click
Close
.
Summary
Status
Policies are disabled by default. To enable a policy,
select the policy number from the drop-down menu, and
select
Enabled
.
To create a policy, follow steps 1-11. Repeat these steps to
create additional policies, one at a time.
Select a number from the
Access Policy
drop-down
menu.
Enter a Policy Name in the field provided.
To enable this policy, select
Enabled
.
Click
Ed±t L±st
to select which PCs will be affected by
the policy. The
List of PCs
screen appears. You can
select a PC by MAC address or IP address. You can also
enter a range of IP addresses if you want this policy to
affect a group of PCs. After making your changes, click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes. Then click
Close
.
List of PCs
Select
the
appropriate
option,
Deny
or
Allow
,
depending on whether you want to block or allow
Internet access for the PCs you listed on the
List of PCs
screen.
1.
2.
3.
4.
5.
Page 25 / 57
Chapter±3
Advanced Configuration
W±reless-G Router for 3G/UMTS Broadband
Decide which days and what times you want this policy
to be enforced. Select the individual days during which
the policy will be in effect, or select
Everyday
. Then
enter a range of hours and minutes during which the
policy will be in effect, or select
2² Hours
.
You can block websites with specific URL addresses.
Enter each URL in a separate
Website Blocking by URL
Address
field.
You can also block websites using specific keywords.
Enter each keyword in a separate
Website Blocking by
Keyword
field.
You can filter access to various services accessed
over the Internet, such as FTP or telnet. (You
can block up to three applications per policy.)
From the Applications list, select the application you
want to block. Then click the
>>
button to move it to
the Blocked List. To remove an application from the
Blocked List, select it and click the
<<
button.
If the application you want to block is not listed
or you want to edit a service’s settings, enter the
application’s name in the
Application Name
field. Enter
its range in the
Port Range
fields. Select its protocol
from the
Protocol
drop-down menu. Then click
Add
.
To
modify
a
service,
select
it
from
the
Application
list.
Change
its
name,
port
range,
and/or protocol setting. Then click
Mod±fy
.
To delete a service, select it from the Application list.
Then click
Delete
.
Click
Save Sett±ngs
to save the policy’s settings. To
cancel the policy’s settings, click
Cancel Changes
.
6.
7.
8.
9.
10.
11.
Applications and Gaming > Single Port
Forwarding
The
Single Port Forwarding
screen allows you to customize
port services for common applications on this screen.
When users send these types of requests to your network via
the Internet, the Router will forward those requests to the
appropriate servers (computers). Before using forwarding,
you should assign static IP addresses to the designated
servers (use the DHCP Reservation feature on the
Basic Setup
screen).
Applications and Gaming > Single Port Forwarding
Single Port Forwarding
Common applications are available for the first five
entries. Select the appropriate application. Then enter the
IP address of the server that should receive these requests.
Select
Enabled
to activate this entry.
For additional applications, complete the following fields:
Appl±cat±on Name
Enter the name you wish to give the
application. Each name can be up to 12 characters.
External Port
Enter the external port number used by
the server or Internet application. Check with the Internet
application documentation for more information.
Internal Port
Enter the internal port number used by
the server or Internet application. Check with the Internet
application documentation for more information.
Protocol
Select the protocol used for this application,
either
TCP
or
UDP
, or
Both
.
To IP Address
For each application, enter the IP address
of the PC that should receive the requests. If you assigned
a static IP address to the PC, then you can click
DHCP
Reservat±on
on the
Basic Setup
screen to look up its static
IP address.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top