Page 16 / 50 Scroll up to view Page 11 - 15
Chapter 3
Advanced Configuration
12
Wireless-G Home Router with SpeedBurst
authentication, the sender and the recipient do NOT
use a WEP key for authentication. With Shared Key
authentication, the sender and recipient use a WEP key for
authentication. Select
Shared Key
to only use Shared Key
authentication.
Basic Rate
The Basic Rate setting is not actually one
rate of transmission but a series of rates at which the
Router can transmit. (The Basic Rate is not the actual rate
of data transmission. If you want to specify the Router’s
rate of data transmission, configure the Transmission
Rate setting.) The Router will advertise its Basic Rate to
the other wireless devices in your network, so they know
which rates will be used. The Router will also advertise that
it will automatically select the best rate for transmission.
The default setting is
Default
, when the Router can
transmit at all standard wireless rates (1-2 Mbps, 5.5 Mbps,
11 Mbps, 18 Mbps, and 24Mbps). Select
1-2 Mbps
for
use with older wireless technology. Select
All
, when the
Router can transmit at all wireless rates.
Transmission Rate
The Transmission setting is available
if the Network Mode is Mixed, Wireless-G Only, or
Wireless-B Only. The rate of data transmission should be
set depending on the speed of your wireless network.
Select from a range of transmission speeds, or keep the
default,
Auto
, to have the Router automatically use the
fastest possible data rate and enable the Auto-Fallback
feature. Auto-Fallback will negotiate the best possible
connection speed between the Router and a wireless
client.
CTS Protection Mode
The Router automatically uses CTS
(Clear-To-Send) Protection Mode when your Wireless-G
devices are experiencing severe problems and are not able
to transmit to the Router in an environment with heavy
802.11b traffic. This option boosts the Router’s ability to
catch all Wireless-G transmissions but severely decreases
performance. To use this option, keep the default,
Auto
.
To disable this option, select
Disabled
.
Beacon Interval
Enter a value between 1 and 65,535
milliseconds. The Beacon Interval value indicates the
frequency interval of the beacon. A beacon is a packet
broadcast by the Router to synchronize the wireless
network. The default is
100
milliseconds.
DTIM Interval
This value, between 1 and 255, indicates
the interval of the Delivery Traffic Indication Message
(DTIM). A DTIM field is a countdown field informing
clients of the next window for listening to broadcast
and multicast messages. When the Router has buffered
broadcast or multicast messages for associated clients, it
sends the next DTIM with a DTIM Interval value. Its clients
hear the beacons and awaken to receive the broadcast
and multicast messages. The default value is
1
.
Fragmentation
Threshold
This
value
specifies
the
maximum size for a packet before data is fragmented
into multiple packets. If you experience a high packet
error rate, you may slightly increase the Fragmentation
Threshold. Setting the Fragmentation Threshold too low
may result in poor network performance. Only minor
reduction of the default value is recommended. In most
cases, it should remain at its default value of
2346
.
RTS Threshold
Should you encounter inconsistent data
flow, only minor reduction of the default value,
2347
, is
recommended. If a network packet is smaller than the
preset RTS threshold size, the RTS/CTS mechanism will
not be enabled. The Router sends Request to Send (RTS)
frames to a particular receiving station and negotiates
the sending of a data frame. After receiving an RTS, the
wireless station responds with a Clear to Send (CTS) frame
to acknowledge the right to begin transmission. The RTS
Threshold value should remain at its default value of
2347
.
Click
Save Settings
to apply your changes, or click
Cancel
Changes
to clear your changes.
Security > Firewall
The
Firewall
screen is used to configure a firewall that can
filter out various types of unwanted traffic on the Router’s
local network.
Security > Firewall
Firewall
SPI Firewall Protection
To use firewall protection,
keep the default selection,
Enabled
. To turn off firewall
protection, select
Disabled
.
Internet Filter
For the following options, select the option to enable it, or
deselect the option to disable it.
Filter Anonymous Internet Requests
This feature makes
it more difficult for outside users to work their way into
your network. This feature is enabled
by default. Deselect
this option to allow anonymous Internet requests
.
Page 17 / 50
Chapter 3
Advanced Configuration
13
Wireless-G Home Router with SpeedBurst
Filter
Multicast
Multicasting
allows
for
multiple
transmissions to specific recipients at the same time. If
multicasting is permitted, then the Router will allow IP
multicast packets to be forwarded to the appropriate
computers. Select this option to filter multicasting. This
option is disabled by default.
Filter Internet NAT Redirection
This feature uses port
forwarding to block access to local servers from local
networked computers. Select this option to filter Internet
NAT redirection. This option is disabled by default.
Filter IDENT (Port 113)
This feature keeps port 113 from
being scanned by devices outside of your local network.
This feature is enabled by default. Deselect this option to
disable it.
Web Filter
For the following options, select the option to enable it, or
deselect the option to disable it.
Proxy
Use of WAN proxy servers may compromise the
Gateway’s security. Denying Proxy will disable access to
any WAN proxy servers. Select this option to enable proxy
filtering. This option is disabled by default.
Java
Java is a programming language for websites. If you
deny Java, you run the risk of not having access to Internet
sites created using this programming language. Select
this option to enable Java filtering. This option is disabled
by default.
ActiveX
ActiveX is a programming language for websites.
If you deny ActiveX, you run the risk of not having access to
Internet sites created using this programming language.
Select this option to enable ActiveX filtering. This option
is disabled by default.
Cookies
A cookie is data stored on your computer and
used by Internet sites when you interact with them. Select
this option to filter cookies. This option is disabled by
default.
Click
Save Settings
to apply your changes, or click
Cancel
Changes
to clear your changes.
Security > VPN Passthrough
The
VPN Passthrough
screen allows you to enable VPN
tunnels using IPSec, PPTP, or L2TP protocols to pass through
the Router’s firewall.
Security > VPN Passthrough
VPN Passthrough
IPSec Passthrough
Internet Protocol Security (IPSec) is
a suite of protocols used to implement secure exchange
of packets at the IP layer. To allow IPSec tunnels to pass
through the Router, keep the default,
Enabled
.
PPTP Passthrough
Point-to-Point Tunneling Protocol
(PPTP) allows the Point-to-Point Protocol (PPP) to be
tunneled through an IP network. To allow PPTP tunnels to
pass through the Router, keep the default,
Enabled
.
L2TP Passthrough
Layer 2 Tunneling Protocol is the
method used to enable Point-to-Point sessions via the
Internet on the Layer 2 level. To allow L2TP tunnels to pass
through the Router, keep the default,
Enabled
.
Click
Save Settings
to apply your changes, or click
Cancel
Changes
to clear your changes.
Page 18 / 50
Chapter 3
Advanced Configuration
14
Wireless-G Home Router with SpeedBurst
Access Restrictions > Internet Access
The
Internet Access
screen allows you to block or allow
specific kinds of Internet usage and traffic, such as Internet
access, designated services, and websites during specific
days and times.
Access Restrictions > Internet Access
Internet Access Policy
Access Policy
Access can be managed by a policy. Use
the settings on this screen to establish an access policy
(after
Save Settings
is clicked). Selecting a policy from
the drop-down menu will display that policy’s settings. To
delete a policy, select that policy’s number and click
Delete
This Entry
. To view all the policies, click
Summary
.
Summary
The policies are listed with the following information: No.,
Policy Name, Days, and Time of Day. To delete a policy,
select the policy’s
Delete
option, and then click
Delete
.
To return to the
Internet Access Policy
screen, click
Close
.
Summary
Status
Policies are disabled by default. To enable a policy,
select the policy number from the drop-down menu, and
select
Enabled
.
To create a policy, follow steps 1-11. Repeat these steps to
create additional policies, one at a time.
1. Select a number from the
Access Policy
drop-down
menu.
2.
Enter a Policy Name in the field provided.
3.
To enable this policy, select
Enabled
.
4. Click
Edit List
to select which computers will be
affected by the policy. The
Internet Access PC List
screen
appears. You can select a computer by MAC address or
IP address. You can also enter a range of IP addresses
if you want this policy to affect a group of computers.
After making your changes, click
Save Settings
to
apply your changes, or click
Cancel Changes
to clear
your changes. Then click
Close
.
Internet Access PC List
Page 19 / 50
Chapter 3
Advanced Configuration
15
Wireless-G Home Router with SpeedBurst
5. Select
the
appropriate
option,
Deny
or
Allow
,
depending on whether you want to block or allow
Internet access for the computers you listed on the
Internet Access PC List
screen.
6.
Decide which days and what times you want this policy
to be enforced. Select the individual days during which
the policy will be in effect, or select
Everyday
. Then
enter a range of hours and minutes during which the
policy will be in effect, or select
24 Hours
.
7. You can block websites with specific URL addresses.
Enter each URL in a separate
Website Blocking by URL
Address
field.
8.
You can also block websites using specific keywords.
Enter each keyword in a separate
Website Blocking by
Keyword
field.
9. You can filter access to various services accessed
over the Internet, such as FTP or telnet. (You
can block up to three applications per policy.)
From the Applications list, select the application you
want to block. Then click the
>>
button to move it to
the Blocked List. To remove an application from the
Blocked List, select it and click the
<<
button.
10. If the application you want to block is not listed or you
want to edit a service’s settings, enter the application’s
name in the
Application Name
field. Enter its range
in the
Port Range
fields. Select its protocol from the
Protocol
drop-down menu. Then click
Add
.
To modify a service, select it from the Application list.
Change its name, port range, and/or protocol setting.
Then click
Modify
.
To delete a service, select it from the Application list.
Then click
Delete
.
11. Click
Save Settings
to save the policy’s settings, or
click
Cancel Changes
to clear the changes.
Applications and Gaming > Single Port
Forwarding
The
Single Port Forwarding
screen allows you to customize
port services for common applications on this screen.
When users send these types of requests to your network via
the Internet, the Router will forward those requests to the
appropriate servers (computers). Before using forwarding,
you should assign static IP addresses to the designated
servers (use the DHCP Reservation feature on the
Basic Setup
screen; refer to
DHCP Reservation
,
page 7
).
Applications and Gaming > Single Port Forwarding
Single Port Forwarding
Common applications are available for the first five
entries. Select the appropriate application. Then enter the
IP address of the server that should receive these requests.
Select
Enabled
to activate this entry.
For additional applications, complete the following fields:
Application Name
Enter the name you wish to give the
application. Each name can be up to 12 characters.
External Port
Enter the external port number used by
the server or Internet application. Check with the Internet
application documentation for more information.
Internal Port
Enter the internal port number used by
the server or Internet application. Check with the Internet
application documentation for more information.
Protocol
Select the protocol(s) used for this application,
TCP
,
UDP
, or
Both
.
To IP Address
For each application, enter the IP address
of the computer that should receive the requests. If you
assigned a static IP address to the computer, then you
can look up its IP address; click
DHCP Reservation
on the
Basic Setup
screen (r
efer to
DHCP Reservation
,
page 7
).
Enabled
For each application, select
Enabled
to enable
port forwarding.
Click
Save Settings
to apply your changes, or click
Cancel
Changes
to clear your changes.
Page 20 / 50
Chapter 3
Advanced Configuration
16
Wireless-G Home Router with SpeedBurst
Applications and Gaming > Port Range
Forwarding
The
Port Range Forwarding
screen allows you to set up
public services on your network, such as web servers,
ftp servers, e-mail servers, or other specialized Internet
applications. (Specialized Internet applications are any
applications that use Internet access to perform functions
such as videoconferencing or online gaming. Some Internet
applications may not require any forwarding.)
When users send these types of requests to your network via
the Internet, the Router will forward those requests to the
appropriate servers (computers). Before using forwarding,
you should assign static IP addresses to the designated
servers (use the DHCP Reservation feature on the
Basic Setup
screen; refer to
DHCP Reservation
,
page 7
).
If you need to forward all ports to one computer, click the
DMZ
tab.
Applications and Gaming > Port Range Forwarding
Port Range Forwarding
To forward a port, enter the information on each line for
the criteria required.
Application Name
In this field, enter the name you
wish to give the application. Each name can be up to 12
characters.
Start~End Port
Enter the number or range of port(s)
used by the server or Internet applications. Check with the
Internet application documentation for more information.
Protocol
Select the protocol(s) used for this application,
TCP
,
UDP
, or
Both
.
To IP Address
For each application, enter the IP address
of the computer that should receive the requests. If you
assigned a static IP address to the computer, then you
can look up its IP address; click
DHCP Reservation
on the
Basic Setup
screen (r
efer to
DHCP Reservation
,
page 7
).
Enabled
Select
Enabled
to enable port forwarding for
the applications you have defined.
Click
Save Settings
to apply your changes, or click
Cancel
Changes
to clear your changes.
Applications & Gaming > Port Range
Triggering
The
Port Range Triggering
screen allows the Router to
watch outgoing data for specific port numbers. The IP
address of the computer that sends the matching data is
remembered by the Router, so that when the requested
data returns through the Router, the data is pulled back
to the proper computer by way of IP address and port
mapping rules.
Applications and Gaming > Port Range Triggering
Port Range Triggering
Application Name
Enter the application name of the
trigger.
Triggered Range
For each application, enter the starting
and ending port numbers of the triggered port number
range. Check with the Internet application documentation
for the port number(s) needed.
Forwarded
Range
For
each
application,
enter
the
starting and ending port numbers of the forwarded
port number range. Check with the Internet application
documentation for the port number(s) needed.
Enabled
Select
Enabled
to enable port triggering for the
applications you have defined.
Click
Save Settings
to apply your changes, or click
Cancel
Changes
to clear your changes.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top