Page 36 / 100 Scroll up to view Page 31 - 35
29
Chapter 5: Configuring the Wireless-G Broadband Router
The Access Restrictions Tab - Internet Access
Wireless-G Broadband Router with SpeedBooster
The Access Restrictions Tab - Internet Access
The
Internet Access
screen allows you to block or allow specific kinds of Internet usage and traffic, such as
Internet access, designated services, websites, and inbound traffic during specific days and times.
Internet Access Policy
. Access can be managed by a policy. Use the settings on this screen to establish an
access policy (after the
Save Settings
button is clicked). Selecting a policy from the drop-down menu will
display that policy’s settings. To delete a policy, select that policy’s number and click the
Delete
button. To view
all the policies, click the
Summary
button. (Policies can be deleted from the
Summary
screen by selecting the
policy or policies and clicking the
Delete
button. To return to the Internet Access tab, click the
Close
button.)
Status
. Policies are disabled by default. To enable a policy, select the policy number from the drop-down menu,
and click the radio button beside
Enable
.
You can create two kinds of policies, one kind to manage Internet access and another kind to manage inbound
traffic.
To create an Internet Access policy:
1.
Select a number from the
Internet Access Policy
drop-down menu.
2.
To enable this policy, click the radio button beside
Enable
.
3.
Enter a Policy Name in the field provided.
4.
Click the
Edit List
button to select which PCs will be affected by the policy. The
List of PCs
screen will appear.
You can select a PC by MAC Address or IP Address. You can also enter a range of IP Addresses if you want this
policy to affect a group of PCs. After making your changes, click the
Save Settings
button to apply your
changes or
Cancel Changes
to cancel your changes. Then click the
Close
button.
5.
Click the appropriate option,
Deny
or
Allow
, depending on whether you want to block or allow Internet access
for the PCs you listed on the
List of PCs
screen.
6.
Decide which days and what times you want this policy to be enforced. Select the individual days during
which the policy will be in effect, or select
Everyday
. Then enter a range of hours and minutes during which
the policy will be in effect, or select
24 Hours
.
Figure 5-27: Access Restrictions Tab - Internet Access
Figure 5-28: Internet Policy Summary
Figure 5-29: List of PCs
Downloaded from
www.Manualslib.com
manuals search engine
Page 37 / 100
30
Chapter 5: Configuring the Wireless-G Broadband Router
The Access Restrictions Tab - Internet Access
Wireless-G Broadband Router with SpeedBooster
7.
You can filter access to various services accessed over the Internet, such as FTP or telnet, by selecting
services from the drop-down menus next to
Blocked Services
. (You can block up to 20 services.)
Then enter the range of ports you want to filter.
If the service you want to block is not listed or you want to edit a service’s settings, then click the
Add/Edit
Service
button. Then the
Port Services
screen will appear.
To add a service, enter the service’s name in the
Service Name
field. Select its protocol from the
Protocol
drop-down menu, and enter its range in the
Port Range
fields. Then click the
Add
button.
To modify a service, select it from the list on the right. Change its name, protocol setting, or port range. Then
click the
Modify
button.
To delete a service, select it from the list on the right. Then click the
Delete
button.
When you are finished making changes on the
Port Services
screen, click the
Apply
button to save changes.
If you want to cancel your changes, click the
Cancel
button. To close the
Port Services
screen and return to
the
Access Restrictions
screen, click the
Close
button.
8.
If you want to block websites with specific URL addresses, enter each URL in a separate field next to
Website
Blocking by URL Address
.
9.
If you want to block websites using specific keywords, enter each keyword in a separate field next to
Website
Blocking by Keyword
.
10. Click the
Save Settings
button to save the policy’s settings. To cancel the policy’s settings, click the
Cancel
Changes
button.
Figure 5-30: Port Services
ftp
: a protocol used to transfer files over a TCP/IP network
telnet
: a user command and TCP/IP
protocol used for accessing remote PCs
url
: the address of a file located on the Internet
Downloaded from
www.Manualslib.com
manuals search engine
Page 38 / 100
31
Chapter 5: Configuring the Wireless-G Broadband Router
The Applications and Gaming Tab - Port Range Forward
Wireless-G Broadband Router with SpeedBooster
The Applications and Gaming Tab - Port Range Forward
The Applications and Gaming Tab allows you to set up public services on your network, such as web servers, ftp
servers, e-mail servers, or other specialized Internet applications. (Specialized Internet applications are any
applications that use Internet access to perform functions such as videoconferencing or online gaming. Some
Internet applications may not require any forwarding.)
To forward a port, enter the information on each line for the criteria required. Descriptions of each criteria are
described here.
Application
. In this field, enter the name you wish to give the application. Each name can be up to 12 characters.
Start/End
. This is the port range. Enter the number that starts the port range under
Start
and the number that
ends the range under
End
.
Protocol
. Enter the protocol used for this application, either
TCP
or
UDP
, or
Both
.
IP Address
. For each application, enter the IP Address of the PC running the specific application.
Enable
. Click the
Enable
checkbox to enable port forwarding for the relevant application.
Change these settings as described here and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes.
Figure 5-31: Applications and Gaming Tab -
Port Range Forward
ip
(internet protocol): a protocol
used to send data over a network
ip address
: the address used to identify
a computer or device on a network
tcp
: a network protocol for transmitting data that requires
acknowledgement from the recipient of data sent
udp
: a network protocol for transmitting data
that does not require acknowledgement from
the recipient of the data that is sent.
Downloaded from
www.Manualslib.com
manuals search engine
Page 39 / 100
32
Chapter 5: Configuring the Wireless-G Broadband Router
The Applications and Gaming Tab - DMZ
Wireless-G Broadband Router with SpeedBooster
The Applications and Gaming Tab - DMZ
The DMZ feature allows one network user to be exposed to the Internet for use of a special-purpose service such
as Internet gaming or videoconferencing. DMZ hosting forwards all the ports at the same time to one PC. The Port
Range Forward feature is more secure because it only opens the ports you want to have opened, while DMZ
hosting opens all the ports of one computer, exposing the computer to the Internet.
Any PC whose port is being forwarded must have its DHCP client function disabled and should have a new static
IP address assigned to it because its IP address may change when using the DHCP function.
To expose one PC, select
Enable
. Then, enter the computer's IP address in the
DMZ Host IP Address
field.
Change these settings as described here and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes.
Figure 5-32: Applications and Gaming Tab - DMZ
Downloaded from
www.Manualslib.com
manuals search engine
Page 40 / 100
33
Chapter 5: Configuring the Wireless-G Broadband Router
The Administration Tab - Management
Wireless-G Broadband Router with SpeedBooster
The Administration Tab - Management
This section of the Administration tab allows the network’s administrator to manage specific Router functions for
access and security.
Local Router Access
. You can change the Router’s password from here. Enter a new Router password and then
type it again in the
Re-enter to confirm
field to confirm.
Remote Router Access
. To access the Router remotely, from outside the network, verify that
Enable
is selected.
Then, enter the port number that will be open to outside access. You will need to enter the Router’s password
when accessing the Router this way, as usual.
UPnP
. When using UPnP features, select
Enable
. As allowing this may present a risk to security, this feature is
disabled by default.
Change these settings as described here and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes.
The Administration Tab - Log
The Router can keep logs of all traffic for your Internet connection. To disable the Log function, keep the default
setting,
Disable
. To monitor traffic between the network and the Internet, select
Enable
. When you wish to view
the logs, click
Incoming Log
or
Outgoing Log
, depending on which you wish to view.
Change these settings as described here and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes.
Figure 5-33: Administration Tab - Management
Figure 5-34: Administration Tab - Log
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top