Page 31 / 80 Scroll up to view Page 26 - 30
25
Chapter 6: Configuring the Wireless-G Broadband Router with RangeBooster
The Security Tab - Firewall
Wireless-G Broadband Router with RangeBooster
The Security Tab - Firewall
The
Firewall
screen offers filters that block specific Internet data types and block anonymous Internet requests.
Select the checkbox to enable a feature.
Firewall
SPI Firewall Protection
. Enable this feature to employ Stateful Packet Inspection (SPI) for more detailed review
of data packets entering your network environment.
Internet Filter
Filter Anonymous Internet Requests
. When enabled, this feature keeps your network from being “pinged,” or
detected, by other Internet users. It also reinforces your network security by hiding your network ports. Both
functions of this feature make it more difficult for outside users to work their way into your network. This feature
is enabled by default. Select
Disabled
to allow anonymous Internet requests.
Filter Multicast
. Multicasting allows for multiple transmissions to specific recipients at the same time. If
multicasting is permitted, then the Router will allow IP multicast packets to be forwarded to the appropriate
computers. Select
Enabled
to filter multicasting, or
Disabled
to disable this feature.
Filter Internet NAT Redirection
. This feature uses port forwarding to block access to local servers from local
networked computers. Select
Enabled
to filter Internet NAT redirection, or
Disabled
to disable this feature.
Filter IDENT (Port 113)
. This feature keeps port 113 from being scanned by devices outside of your local
network. Select
Enabled
to filter port 113, or
Disabled
to disable this feature.
Web Filters
Proxy
. Use of WAN proxy servers may compromise the Gateway's security. Denying Filter Proxy will disable
access to any WAN proxy servers. To enable proxy filtering, click the checkbox.
Java
. Java is a programming language for websites. If you deny Java, you run the risk of not having access to
Internet sites created using this programming language. To enable Java filtering, click the checkbox.
ActiveX
. ActiveX is a programming language for websites. If you deny ActiveX, you run the risk of not having
access to Internet sites created using this programming language. To enable ActiveX filtering, click the checkbox.
Cookies
. A cookie is data stored on your computer and used by Internet sites when you interact with them. To
enable cookie filtering, click the checkbox.
Figure 5-30: Security Tab - Firewall
Page 32 / 80
26
Chapter 6: Configuring the Wireless-G Broadband Router with RangeBooster
The Security Tab - VPN Passthrough
Wireless-G Broadband Router with RangeBooster
Figure 5-32: Access Restrictions Tab - Internet Access
Policy
Change these settings as described here and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes.
The Security Tab - VPN Passthrough
Use the settings on this tab to allow VPN tunnels using IPSec, L2TP, or PPTP protocols to pass through the
Router’s firewall.
IPSec Pass-through
. Internet Protocol Security (IPSec) is a suite of protocols used to implement secure
exchange of packets at the IP layer. To allow IPSec tunnels to pass through the Router, click
Enable
.
IPSec Pass-
Through is enabled by default.
L2TP Pass-through
. Layer 2 Tunneling Protocol is the method used to enable Point-to-Point sessions via the
Internet on the Layer 2 level. To allow L2TP tunnels to pass through the Router, click
Enable
. L2TP Pass-Through
is enabled by default.
PPTP Pass-through
. Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be
tunneled through an IP network. To allow PPTP tunnels to pass through the Router, click
Enable
. PPTP Pass-
Through is enabled by default.
Change these settings as described here and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes.
The Access Restrictions Tab - Internet Access Policy
The
Internet Access Policy
screen allows you to block or allow specific kinds of Internet usage and traffic, such as
Internet access, designated services, and websites during specific days and times.
Internet Access Policy
Access Policy
. Access can be managed by a policy. Use the settings on this screen to establish an access policy
(after the
Save Settings
button is clicked). Selecting a policy from the drop-down menu will display that policy’s
settings. To delete a policy, select that policy’s number and click the
Delete This Policy
button. To view all the
policies, click the
Summary
button.
On the
Summary
screen, the policies are listed with the following information: No., Policy Name, Access, Days,
Time, and status (Enabled) to view. To delete a policy, click its
Delete
button. Click the
Save Settings
button to
save your changes, or click the
Cancel Changes
button to cancel your changes. To return to the Internet Access
Policy tab, click the
Close
button.
Figure 5-31: Security Tab - VPN Passthrough
Page 33 / 80
27
Chapter 6: Configuring the Wireless-G Broadband Router with RangeBooster
The Access Restrictions Tab - Internet Access Policy
Wireless-G Broadband Router with RangeBooster
To create an Internet Access policy:
1.
Select a number from the
Access Policy
drop-down menu.
2.
Enter a Policy Name in the field provided.
3.
To enable this policy, click
Enabled
.
4.
Click the
Edit List
button to select which PCs will be affected by the policy. The
Internet Access PCs List
screen will appear. You can select a PC by MAC Address or IP Address. You can also enter a range of IP
Addresses if you want this policy to affect a group of PCs. After making your changes, click the
Save Settings
button to apply your changes or
Cancel Changes
to cancel your changes. Then click the
Close
button.
5.
Click the appropriate option,
Deny
or
Allow
, depending on whether you want to block or allow Internet access
for the PCs you listed on the
List of PCs
screen.
6.
Decide which days and what times you want this policy to be enforced. Select the individual days during
which the policy will be in effect, or select
Everyday
. Then enter a range of hours and minutes during which
the policy will be in effect, or select
24 Hours
.
7.
You can also block access by URL address by entering it in the
Website Blocking by URL
Address field or by
Keyword by entering it in the
Website Blocking by Keyword
field. Click the
>>
button to add a selection to the
Blocked Applications list.
8.
You can filter access to various applications accessed over the Internet, such as FTP or telnet, by selecting up
to three applications from the drop-down menus under
Applications
.
If the application you want to block is not listed or you want to edit an application’s settings, then create a
new one by entering an Application Name, Port Range, and Protocol. Then, click
Add
.
Click the
Save Settings
button to save the policy’s settings. To cancel the policy’s settings, click the
Cancel
Changes
button.
Figure 5-34: List of PCs
Figure 5-33: Internet Policy Summary
Page 34 / 80
28
Chapter 6: Configuring the Wireless-G Broadband Router with RangeBooster
The Applications and Gaming Tab - Single Port Forwarding
Wireless-G Broadband Router with RangeBooster
The Applications and Gaming Tab - Single Port Forwarding
Single Port Forwarding
The Single Port Forwarding screen provides options for customization of port services for common applications.
When users send this type of request to your network via the Internet, the Router will forward those requests to
the appropriate computer. Any computer whose port is being forwarded should have its DHCP client function
disabled and should have a new static IP address assigned to it because its IP address may change when using
the DHCP function.
Select the pre-configured Application, or manually enter it in the field. Then, enter the External and Internal Port
numbers in the fields. Select the type of protocol you wish to use for each application:
TCP
,
UDP
, or
Both
. Enter
the IP Address in the field. Click
Enabled
to enable Forwarding for the chosen application.
When finished making your changes on this tab, click the
Save Settings
button to save these changes, or click
the
Cancel Changes
button to undo your changes.
Figure 5-35: Applications and Gaming Tab - Single Port
Forwarding
Page 35 / 80
29
Chapter 6: Configuring the Wireless-G Broadband Router with RangeBooster
The Applications and Gaming Tab - Port Range Forwarding
Wireless-G Broadband Router with RangeBooster
The Applications and Gaming Tab - Port Range Forwarding
The Applications and Gaming Tab allows you to set up public services on your network, such as web servers, ftp
servers, e-mail servers, or other specialized Internet applications. (Specialized Internet applications are any
applications that use Internet access to perform functions such as videoconferencing or online gaming. Some
Internet applications may not require any forwarding.)
To forward a port, enter the information on each line for the criteria required. The criteria are described here.
Application Name
. In this field, enter the name you wish to give the application. Each name can be up to 12
characters.
Start
~
End Port
. This is the port range. Enter the number that starts the port range under
Start
and the number
that ends the range under
End
.
Protocol
. Enter the protocol used for this application, either
TCP
or
UDP
, or
Both
.
To IP Address
. For each application, enter the IP Address of the PC running the specific application.
Enable
. Click the
Enable
checkbox to enable port forwarding for the relevant application.
Change these settings as described here and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes.
Figure 5-36: Applications and Gaming Tab - Port Range
Forward

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top