Page 36 / 83 Scroll up to view Page 31 - 35
30
Chapter 5: Configuring the Compact Wireless-G Broadband Router
The Access Restrictions Tab - Internet Access Policy
Compact Wireless-G Broadband Router
Figure 5-25: Access Restrictions Tab - Summary
Figure 5-26: Access Restrictions Tab - Internet Access
PCs List
On the
Internet Access PCs List
screen, you can select a PC by MAC Address or IP Address. You can also enter a
range of IP Addresses if you want this policy to affect a group of PCs. After making your changes, click the
Save
Settings
button to apply your changes or
Cancel Changes
to cancel your changes. Click the
Close
button to exit
this screen.
To create an Internet Access policy:
1.
Select a number from the
Access Policy
drop-down menu.
2.
Enter a Policy Name in the field provided.
3.
To enable this policy, select
Enable
from the
Status
drop-down menu.
4.
Click the
Edit List
button to select which PCs will be affected by the policy. The
Internet Access PCs List
screen will appear. You can select a PC by MAC Address or IP Address. You can also enter a range of IP
Addresses if you want this policy to affect a group of PCs. After making your changes, click the
Save Settings
button to apply your changes or
Cancel Changes
to cancel your changes. Then click the
Close
button.
5.
Click the appropriate option,
Deny
or
Allow
, depending on whether you want to block or allow Internet access
for the PCs you listed on the
List of PCs
screen.
6.
Decide which days and what times you want this policy to be enforced. Select the individual days during
which the policy will be in effect, or select
Everyday
. Then enter a range of hours and minutes during which
the policy will be in effect, or select
24 Hours
.
7.
You can filter access to various applications accessed over the Internet, such as FTP or telnet, by selecting up
to three applications from the drop-down menus next to
Blocked Application Port
.
The Block Services menu offers a choice of ten preset applications. For the preset applications you select, the
appropriate range of ports will automatically be displayed. Click the
>>
button to add to the Blocked Services
list.
If the application you want to block is not listed or you want to edit an application’s settings, then create a
new one by entering a Service Name, Protocol, and Port Range. Then, click
Add
.
8.
You can also block access by URL address by entering it in the
Website Blocking by URL
Address field or by
Keyword by entering it in the
Website Blocking by Keyword
field.
9.
Click the
Save Settings
button to save the policy’s settings. To cancel the policy’s settings, click the
Cancel
Changes
button.
Downloaded from
www.Manualslib.com
manuals search engine
Page 37 / 83
31
Chapter 5: Configuring the Compact Wireless-G Broadband Router
The Applications and Gaming Tab - Port Range Forwarding
Compact Wireless-G Broadband Router
The Applications and Gaming Tab - Port Range Forwarding
The
Port Range Forwarding
screen allows you to set up public services on your network, such as web servers, ftp
servers, e-mail servers, or other specialized Internet applications. (Specialized Internet applications are any
applications that use Internet access to perform functions such as videoconferencing or online gaming. Some
Internet applications may not require any forwarding.)
Before using forwarding, you should assign static IP addresses to the designated PCs.
Port Range Forwarding
To forward a port, enter the information on each line for the criteria required. Descriptions of each criteria are
described here.
Application Name
. Each drop-down menu offers a choice of ten preset applications (select
None
if you do not
want to use any of the preset applications). Select up to five preset applications. For custom applications, enter
the name of your application in one of the available fields.
The preset applications are among the most widely used Internet applications. They include the following:
DNS
(Domain Name System). The way that Internet domain names are located and translated into IP addresses. A
domain name is a meaningful and easy-to-remember “handle” for an Internet address.
Finger
. A UNIX command widely used on the Internet to find out information about a particular user, such as a
telephone number, whether the user is currently logged on, and the last time the user was logged on. The person
being “fingered” must have placed his or her profile on the system in order for the information to be available.
Fingering requires entering the full user@domain address.
FTP
(File Transfer Protocol). A protocol used to transfer files over a TCP/IP network (Internet, UNIX, etc.). For
example, after developing the HTML pages for a website on a local machine, they are typically uploaded to the
web server using FTP.
POP3
(Post Office Protocol 3). A standard mail server commonly used on the Internet. It provides a message store
that holds incoming e-mail until users log on and download it. POP3 is a simple system with little selectivity. All
pending messages and attachments are downloaded at the same time. POP3 uses the SMTP messaging protocol.
SMTP
(Simple Mail Transfer Protocol). The standard e-mail protocol on the Internet. It is a TCP/IP protocol that
defines the message format and the message transfer agent (MTA), which stores and forwards the mail.
tcp
: a network protocol for transmitting data
that requires acknowledgement from the
recipient of data sent.
udp
: a network protocol for transmitting data
that does not require acknowledgement from
the recipient of the data that is sent.
Figure 5-27: Applications and Gaming Tab - Port
Range Forwarding
Downloaded from
www.Manualslib.com
manuals search engine
Page 38 / 83
32
Chapter 5: Configuring the Compact Wireless-G Broadband Router
The Applications and Gaming Tab - Port Range Forwarding
Compact Wireless-G Broadband Router
SNMP
(Simple Network Management Protocol). A widely used network monitoring and control protocol. Data is
passed from SNMP agents, which are hardware and/or software processes reporting activity in each network
device (hub, router, bridge, etc.) to the workstation console used to oversee the network. The agents return
information contained in a MIB (Management Information Base), which is a data structure that defines what is
obtainable from the device and what can be controlled (turned off, on, etc.).
Telnet
. A terminal emulation protocol commonly used on Internet and TCP/IP-based networks. It allows a user at
a terminal or computer to log onto a remote device and run a program.
TFTP
(Trivial File Transfer Protocol). A version of the TCP/IP FTP protocol that has no directory or password
capability.
Web.
The Internet.
Start/End
. This is the port range. Enter the port number or range of external ports used by the server or Internet
application. Check with the software documentation of the Internet application for more information.
Protocol
. Select the protocol(s) used for this application,
TCP
and/or
UDP
.
To IP Address
. For each application, enter the IP address of the PC running the specific application.
Enabled
. Click the
Enabled
checkbox to enable port forwarding for the relevant application.
Change these settings as described here and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes. Help information is shown on the right-hand side of the screen.
Downloaded from
www.Manualslib.com
manuals search engine
Page 39 / 83
33
Chapter 5: Configuring the Compact Wireless-G Broadband Router
The Applications & Gaming Tab - Port Range Triggering
Compact Wireless-G Broadband Router
The Applications & Gaming Tab - Port Range Triggering
The
Port Range Triggering
screen allows the Router to watch outgoing data for specific port numbers. The IP
address of the computer that sends the matching data is remembered by the Router, so that when the requested
data returns through the Router, the data is pulled back to the proper computer by way of IP address and port
mapping rules.
Port Range Triggering
Application Name
. Enter the application name of the trigger.
Triggered Range
. For each application, list the triggered port number range. Check with the Internet application
documentation for the port number(s) needed. In the first field, enter the starting port number of the Triggered
Range. In the second field, enter the ending port number of the Triggered Range.
Forwarded Range
. For each application, list the forwarded port number range. Check with the Internet
application documentation for the port number(s) needed. In the first field, enter the starting port number of the
Forwarded Range. In the second field, enter the ending port number of the Forwarded Range.
Enabled
. Click the
Enabled
checkbox to enable port range triggering for the relevant application.
Change these settings as described here and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes. Help information is shown on the right-hand side of the screen.
Figure 5-28: Applications and Gaming Tab -
Port Triggering
Downloaded from
www.Manualslib.com
manuals search engine
Page 40 / 83
34
Chapter 5: Configuring the Compact Wireless-G Broadband Router
The Applications and Gaming Tab - DMZ
Compact Wireless-G Broadband Router
The Applications and Gaming Tab - DMZ
The DMZ feature allows one network user to be exposed to the Internet for use of a special-purpose service such
as Internet gaming or videoconferencing. DMZ hosting forwards all the ports at the same time to one PC. The Port
Range Forwarding feature is more secure because it only opens the ports you want to have opened, while DMZ
hosting opens all the ports of one computer, exposing the computer to the Internet.
Any PC whose port is being forwarded must have its DHCP client function disabled and should have a new static
IP address assigned to it because its IP address may change when using the DHCP function.
DMZ
To expose one PC, select
Enable
, then enter a WAN IP Address or Host IP Address in the field.
Wan IP Address
. The Internet IP address of the computer you want to expose.
Host IP Address
. Enter the IP address of the computer you want to expose.
Change these settings as described here and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes. Help information is shown on the right-hand side of the screen.
Figure 5-29: Applications and Gaming Tab - DMZ
Downloaded from
www.Manualslib.com
manuals search engine

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top