Page 31 / 100 Scroll up to view Page 26 - 30
24
Chapter 5: Configuring the Wireless-G Broadband Router
The Wireless Tab - Wireless MAC Filter
Wireless-G Broadband Router with SpeedBooster
The Wireless Tab - Wireless MAC Filter
Wireless access can be filtered by using the MAC addresses of the wireless devices transmitting within your
network’s radius.
Wireless MAC Filter
. To filter wireless users by MAC Address, either permitting or blocking access, click
Enable
.
If you do not wish to filter users by MAC Address, select
Disable
.
Prevent
. Clicking this button will block wireless access by MAC Address.
Permit Only
. Clicking this button will allow wireless access by MAC Address.
Edit MAC Address Filter List
. Clicking this button will open the MAC Address Filter List. On this screen, you can
list users, by MAC Address, to whom you wish to provide or block access. For easy reference, click the
Wireless
Client MAC List
button to display a list of network users by MAC Address.
Change these settings as described here and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes.
Figure 5-22: MAC Address Filter List
Figure 5-21: Wireless Tab - Wireless MAC Filter
Downloaded from
www.Manualslib.com
manuals search engine
Page 32 / 100
25
Chapter 5: Configuring the Wireless-G Broadband Router
The Wireless Tab - Advanced Wireless Settings
Wireless-G Broadband Router with SpeedBooster
The Wireless Tab - Advanced Wireless Settings
This tab is used to set up the Router’s advanced wireless functions. These settings should only be adjusted by an
expert administrator as incorrect settings can reduce wireless performance.
Authentication Type
. The default is set to
Auto
, which allows either Open System or Shared Key authentication
to be used. With
Open System
authentication, the sender and the recipient do NOT use a WEP key for
authentication. With
Shared Key
authentication, the sender and recipient use a WEP key for authentication.
Basic Rate
. The Basic Rate setting is not actually one rate of transmission but a series of rates at which the
Router can transmit. The Router will advertise its Basic Rate to the other wireless devices in your network, so
they know which rates will be used. The Router will also advertise that it will automatically select the best rate
for transmission. The default setting is
Default
, when the Router can transmit at all standard wireless rates
(1-2Mbps, 5.5Mbps, 11Mbps, 18Mbps, and 24Mbps). Other options are
1-2Mbps
, for use with older wireless
technology, and
All
, when the Router can transmit at all wireless rates. The Basic Rate is not the actual rate of
data transmission. If you want to specify the Router’s rate of data transmission, configure the Transmission Rate
setting.
Transmission Rate
. The rate of data transmission should be set depending on the speed of your wireless
network. You can select from a range of transmission speeds, or you can select
Auto
to have the Router
automatically use the fastest possible data rate and enable the Auto-Fallback feature. Auto-Fallback will
negotiate the best possible connection speed between the Router and a wireless client. The default value is
Auto
.
CTS Protection Mode
. CTS (Clear-To-Send) Protection Mode should remain disabled unless you are having
severe problems with your Wireless-G products not being able to transmit to the Router in an environment with
heavy 802.11b traffic. This function boosts the Router’s ability to catch all Wireless-G transmissions but will
severely decrease performance.
Frame Burst
. Enabling this option should provide your network with greater performance, depending on the
manufacturer of your wireless products. If you are not sure how to use this option, keep the default,
Disable
.
Beacon Interval
. The default value is
100
. Enter a value between 1 and 65,535 milliseconds. The Beacon Interval
value indicates the frequency interval of the beacon. A beacon is a packet broadcast by the Router to synchronize
the wireless network.
DTIM Interval
. This value, between 1 and 255, indicates the interval of the Delivery Traffic Indication Message
(DTIM). A DTIM field is a countdown field informing clients of the next window for listening to broadcast and
multicast messages. When the Router has buffered broadcast or multicast messages for associated clients, it
sends the next DTIM with a DTIM Interval value. Its clients hear the beacons and awaken to receive the broadcast
and multicast messages. The default value is
1
.
Figure 5-23: Wireless Tab - Advanced Wireless Settings
beacon interval
: data transmitted on your wireless
network that keeps the network synchronized
cts
(clear to send): a signal sent by a wireless
device, signifying that it is ready to receive data
dtim
: a message included in data packets
that can increase wireless efficiency.
wep
(wired equivalent privacy): a method of
encrypting network data transmitted on a
wireless network for greater security
Downloaded from
www.Manualslib.com
manuals search engine
Page 33 / 100
26
Chapter 5: Configuring the Wireless-G Broadband Router
The Wireless Tab - Advanced Wireless Settings
Wireless-G Broadband Router with SpeedBooster
Fragmentation Threshold
. This value specifies the maximum size for a packet before data is fragmented into
multiple packets. If you experience a high packet error rate, you may slightly increase the Fragmentation
Threshold. Setting the Fragmentation Threshold too low may result in poor network performance. Only minor
reduction of the default value is recommended. In most cases, it should remain at its default value of
2346
.
RTS Threshold
. Should you encounter inconsistent data flow, only minor reduction of the default value,
2347
, is
recommended. If a network packet is smaller than the preset RTS threshold size, the RTS/CTS mechanism will
not be enabled. The Router sends Request to Send (RTS) frames to a particular receiving station and negotiates
the sending of a data frame. After receiving an RTS, the wireless station responds with a Clear to Send (CTS)
frame to acknowledge the right to begin transmission. The RTS Threshold value should remain at its default value
of
2347
.
Change these settings as described here and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes.
fragmentation
: breaking a packet into smaller units
when transmitting over a network medium that
cannot support the original size of the packet.
Downloaded from
www.Manualslib.com
manuals search engine
Page 34 / 100
27
Chapter 5: Configuring the Wireless-G Broadband Router
The Security Tab - Firewall
Wireless-G Broadband Router with SpeedBooster
The Security Tab - Firewall
Firewall Protection
. Enable this feature to employ Stateful Packet Inspection (SPI) for more detailed review of
data packets entering your network environment.
Block WAN Requests
. Enable the Block WAN Request feature by checking the box beside
Block Anonymous
Internet Requests
and you can prevent your network from being “pinged,” or detected, by other Internet users.
The Block WAN Request feature also reinforces your network security by hiding your network ports. Both
functions of the Block WAN Request feature make it more difficult for outside users to work their way into your
network. This feature is enabled by default.
Change these settings as described here and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes.
The Security Tab - VPN Passthrough
Use the settings on this tab to allow VPN tunnels using IPSec, PPTP, or L2TP protocols to pass through the
Router’s firewall.
IPSec Pass-through
. Internet Protocol Security (IPSec) is a suite of protocols used to implement secure
exchange of packets at the IP layer. To allow IPSec tunnels to pass through the Router, click
Enable
.
IPSec Pass-
Through is enabled by default.
PPTP Pass-through
. Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be
tunneled through an IP network. To allow PPTP tunnels to pass through the Router, click
Enable
. PPTP Pass-
Through is enabled by default.
L2TP Pass-through
. Layer 2 Tunneling Protocol is the method used to enable Point-to-Point sessions via the
Internet on the Layer 2 level. To allow L2TP tunnels to pass through the Router, click
Enable
. L2TP Pass-Through
is enabled by default.
Change these settings as described here and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes.
Figure 5-24: Security Tab - Firewall
Figure 5-25: Security Tab - VPN Passthrough
firewall
: a set of related programs located at a
network gateway server that protects the resources
of a network from users from other networks.
ipsec
: a VPN protocol used to implement
secure exchange of packets at the IP layer
pptp
: a VPN protocol that allows the Point to Point Protocol
(PPP) to be tunneled through an IP network. This protocol is
also used as a type of broadband connection in Europe
vpn
: a Vsecurity measure to protect data as it leaves
one network and goes to another over the Internet
Downloaded from
www.Manualslib.com
manuals search engine
Page 35 / 100
28
Chapter 5: Configuring the Wireless-G Broadband Router
The Access Restrictions Tab - Parental Control
Wireless-G Broadband Router with SpeedBooster
The Access Restrictions Tab - Parental Control
(This service is available in the United States and Canada ONLY.)
The
Parental Control
screen allows you to sign up and manage your Linksys Parental Controls account. The
Linksys Parental Control Service* gives you powerful tools to control the availability of Internet services, access,
and features, customizable for each member of your family. For more information, refer to “Chapter 6: Using the
Linksys Parental Control Service.”
The Linksys Parental Control Service supersedes the Router’s Internet Access Policies. In other words, if you are
using the Linksys Parental Control Service, then the Internet Access Policies on the Access Restrictions Tab -
Internet Access screen will be disabled.
To sign up or manage your Linksys Parental Controls account, you will need an active Internet connection.
Enable/Disable
. If you want to use the Linksys Parental Control feature, click the
Enable
radio button. If you
want to disable the Linksys Parental Control feature, click the
Disable
radio button.
Sign Up for Parental Control Service
. To sign up for a free trial of the Linksys Parental Control Service, click
this link. You will be automatically taken to a website where you can create your account. For more information,
refer to “Chapter 6: Using the Linksys Parental Control Service.”
More info
. If you would like more information about the Linksys Parental Control Service, click the
More info
button.
Status
. Displayed here is the status of your Linksys Parental Controls account.
Manage Account
. If you have already set up your Parental Controls account, click the
Manage Account
button
to access it and make changes.
Change these settings as described here and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes. * Available in US and Canada only.
Figure 5-26: Access Restrictions Tab - Parental Control
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top