Page 16 / 33 Scroll up to view Page 11 - 15
Chapter±3
Advanced Configuration
²2
W±reless-G Broadband Router
Perm±t Only
Select this to allow wireless access by MAC
Address. This button is not selected by default.
Ed±t MAC F±lter L±st
Click this to open the
MAC Address
Filter List
screen. On this screen, you can list users, by MAC
Address, to whom you wish to provide or block access. For
easy reference, click
W±reless Cl±ent MAC L±st
to display a list
of network users by MAC Address
.
MAC Address Filter List
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Wireless > Advanced Wireless Settings
This
Wireless > Advanced Wireless Settings
screen is used
to set up the Router’s advanced wireless functions. These
settings should only be adjusted by an expert administrator
as incorrect settings can reduce wireless performance.
Wireless > Advanced Wireless Settings
Advanced Wireless
Authent±cat±on Type
The default is set to
Auto
, which
allows either Open System or Shared Key authentication
to be used. With
Open System
authentication, the sender
and the recipient do NOT use a WEP key for authentication.
With
Shared Key
authentication, the sender and recipient
use a WEP key for authentication.
Bas±c Rate
The Basic Rate setting is not actually one rate
of transmission but a series of rates at which the Router
can transmit. The Router will advertise its Basic Rate to the
other wireless devices in your network, so they know which
rates will be used. The Router will also advertise that it will
automatically select the best rate for transmission. The
default setting is
Default
, when the Router can transmit
at all standard wireless rates (1-2Mbps, 5.5Mbps, 11Mbps,
18Mbps, and 24Mbps). Other options are
²-2Mbps
, for
use with older wireless technology, and
All
, when the
Router can transmit at all wireless rates. The Basic Rate
is not the actual rate of data transmission. If you want to
specify the Router’s rate of data transmission, configure
the Transmission Rate setting.
Transm±ss±on Rate
The rate of data transmission should
be set depending on the speed of your wireless network.
You can select from a range of transmission speeds, or you
can select
Auto
to have the Router automatically use the
fastest possible data rate and enable the Auto-Fallback
feature. Auto-Fallback will negotiate the best possible
connection speed between the Router and a wireless
client. The default value is
Auto
.
CTS Protect±on Mode
CTS (Clear-To-Send) Protection
Mode should remain disabled unless you are having severe
problems with your Wireless-G products not being able
to transmit to the Router in an environment with heavy
802.11b traffic. This function boosts the Router’s ability
to catch all Wireless-G transmissions but will severely
decrease performance.
Frame Burst
Enabling this option should provide your
network with greater performance, depending on the
manufacturer of your wireless products. To turn on the
Frame Burst option, select
Enable
. The default is
D±sable
.
Beacon Interval
The default value is
²00
. Enter a value
between 1 and 65,535 milliseconds. The Beacon Interval
value indicates the frequency interval of the beacon. A
beacon is a packet broadcast by the Router to synchronize
the wireless network.
DTIM Interval
This value, between 1 and 255, indicates
the interval of the Delivery Traffic Indication Message
(DTIM). A DTIM field is a countdown field informing
clients of the next window for listening to broadcast
and multicast messages. When the Router has buffered
broadcast or multicast messages for associated clients, it
sends the next DTIM with a DTIM Interval value. Its clients
Page 17 / 33
Chapter±3
Advanced Configuration
²3
W±reless-G Broadband Router
hear the beacons and awaken to receive the broadcast
and multicast messages. The default value is
²
.
Fragmentat±on
Threshold
This
value
specifies
the
maximum size for a packet before data is fragmented
into multiple packets. If you experience a high packet
error rate, you may slightly increase the Fragmentation
Threshold. Setting the Fragmentation Threshold too low
may result in poor network performance. Only minor
reduction of the default value is recommended. In most
cases, it should remain at its default value of
2346
.
RTS Threshold
Should you encounter inconsistent data
flow, only minor reduction of the default value,
234³
, is
recommended. If a network packet is smaller than the
preset RTS threshold size, the RTS/CTS mechanism will
not be enabled. The Router sends Request to Send (RTS)
frames to a particular receiving station and negotiates
the sending of a data frame. After receiving an RTS, the
wireless station responds with a Clear to Send (CTS) frame
to acknowledge the right to begin transmission. The RTS
Threshold value should remain at its default value of
234³
.
AP Isolat±on
This isolates all wireless clients and wireless
devices on your network from each other. Wireless devices
will be able to communicate with the Router but not with
each other. To use this function, select
On
. AP Isolation is
turned
Off
by default.
SecureEasySetup
This feature allows you to enable or
disable the SecureEasySetup feature. Select
D±sabled
to
disable the feature and turn off the button’s light. The
feature is
Enabled
by default.
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Security > Firewall
The
Security > Firewall
screen is used to configure a firewall
that can filter out various types of unwanted traffic on the
Router’s local network.
Security > Firewall
Firewall
F±rewall Protect±on
To use firewall protection, keep the
default selection,
Enable
. To turn off firewall protection,
select
D±sable
.
Block WAN Requests
Block
Anonymous
Internet
Requests
This
feature
makes it more difficult for outside users to work their
way into your network. This feature is selected
by default.
Deselect the feature to allow anonymous Internet
requests
.
F±lter
Mult±cast
Multicasting
allows
for
multiple
transmissions to specific recipients at the same time. If
multicasting is permitted, then the Router will allow IP
multicast packets to be forwarded to the appropriate
computers. This feature is selected by default. Deselect
this feature to disable it.
F±lter
Internet
NAT
Red±rect±on
This
feature
uses
port forwarding to block access to local servers from
local networked computers. Select
F±lter Internet NAT
Red±rect±on
to filter Internet NAT redirection. This feature
is not selected by default.
F±lter IDENT (Port ²²3)
This feature keeps port 113 from
being scanned by devices outside of your local network.
This feature is selected by default. Deselect this feature to
disable it.
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Security > VPN Passthrough
The
Security > VPN Passthrough
screen allows you to enable
VPN tunnels using IPSec, PPTP, or L2TP protocols to pass
through the Router’s firewall.
Security > VPN Passthrough
VPN Passthrough
IPSec Passthrough
Internet Protocol Security (IPSec) is
a suite of protocols used to implement secure exchange
of packets at the IP layer. To allow IPSec tunnels to pass
through the Router, keep the default,
Enable
.
Page 18 / 33
Chapter±3
Advanced Configuration
²4
W±reless-G Broadband Router
PPTP Passthrough
Point-to-Point Tunneling Protocol
(PPTP) allows the Point-to-Point Protocol (PPP) to be
tunneled through an IP network. To allow PPTP tunnels to
pass through the Router, keep the default,
Enable
.
L2TP Passthrough
Layer 2 Tunneling Protocol is the
method used to enable Point-to-Point sessions via the
Internet on the Layer 2 level. To allow L2TP tunnels to pass
through the Router, keep the default,
Enable
.
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Access Restrictions > Internet Access
The
Access Restrictions > Internet Access
screen allows you
to block or allow specific kinds of Internet usage and
traffic, such as Internet access, designated services, and
websites during specific days and times.
Access Restrictions > Internet Access
Internet Access
Internet Access Pol±cy
Access can be managed by a
policy. Use the settings on this screen to establish an
access policy (after
Save Sett±ngs
is clicked). Selecting a
policy from the drop-down menu will display that policy’s
settings. To delete a policy, select that policy’s number
and click
Delete
. To view all the policies, click
Summary
.
(Policies can be deleted from the
Summary
screen by
selecting the policy or policies and clicking
Delete
. To
return to the Internet Access tab, click
Close
.)
Internet Policy Summary
Status
Policies are disabled by default. To enable a policy,
select the policy number from the drop-down menu, and
select
Enable
.
To create an Internet Access policy:
Select a number from the
Internet Access Policy
drop-
down menu.
To enable this policy, select
Enable
.
Enter a Policy Name in the field provided.
Click
Ed±t L±st of PCs
to select which PCs will be affected
by the policy. The
List of PCs
screen appears. You can
select a PC by MAC Address or IP Address. You can also
enter a range of IP Addresses if you want this policy
to affect a group of PCs. After making your changes,
click
Save Sett±ngs
to apply your changes or
Cancel
Changes
to cancel your changes. Then click
Close
.
List of PCs
Select
the
appropriate
option,
Deny
or
Allow
,
depending on whether you want to block or allow
Internet access for the PCs you listed on the
List of PCs
screen.
Decide which days and what times you want this policy
to be enforced. Select the individual days during which
the policy will be in effect, or select
Everyday
. Then
enter a range of hours and minutes during which the
policy will be in effect, or select
24 Hours
.
Select any Blocked Services or Website Blocking you
wish to use.
Click
Save Sett±ngs
to save the policy’s settings, or
click
Cancel Changes
to cancel the policy’s settings.
1.
2.
3.
4.
5.
6.
7.
8.
Page 19 / 33
Chapter±3
Advanced Configuration
²5
W±reless-G Broadband Router
Blocked Services
You can filter access to various services accessed over the
Internet, such as FTP or telnet, by selecting services from
the drop-down menus next to
Blocked Services
. (You can
block up to 20 services.) Then enter the range of ports you
want to filter.
If the service you want to block is not listed or you want to
edit a service’s settings, then click
Add/Ed±t Serv±ce
. Then
the
Port Services
screen will appear.
Port Services
To add a service, enter the service’s name in the
Service
Name
field. Select its protocol from the
Protocol
drop-
down menu, and enter its range in the
Port Range
fields.
Then click
Add
.
To modify a service, select it from the list on the right.
Change its name, protocol setting, or port range. Then
click
Mod±fy
.
To delete a service, select it from the list on the right. Then
click
Delete
.
When you are finished making changes on the
Port
Services
screen, click
Apply
to save the changes. If you
want to cancel your changes, click
Cancel
. To close the
Port Services
screen and return to the
Access Restrictions
screen, click
Close
.
Website Blocking by URL Address
If you want to block websites with specific URL addresses,
enter each URL in a separate field next to
Website Blocking
by URL Address
.
Website Blocking by Keyword
If you want to block websites using specific keywords,
enter each keyword in a separate field next to
Website
Blocking by Keyword
.
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Applications and Gaming > Port Range
Forward
The
Applications & Gaming > Port Range Forward
screen
allows you to set up public services on your network, such as
web servers, ftp servers, e-mail servers, or other specialized
Internet applications. (Specialized Internet applications are
any applications that use Internet access to perform functions
such as videoconferencing or online gaming. Some Internet
applications may not require any forwarding.)
Applications and Gaming > Port Range Forward
Port Range Forward
To forward a port, enter the information on each line for
the criteria required.
Appl±cat±on
In this field, enter the name you wish to give
the application. Each name can be up to 12 characters.
Start/End
This is the port range. Enter the number that
starts the port range in the Start column and the number
that ends the range in the End column.
Protocol
Select the protocol used for this application,
either
TCP
or
UDP
, or
Both
.
IP Address
For each application, enter the IP Address of
the PC running the specific application.
Enable
Select
Enable
to enable port forwarding for the
relevant application.
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Applications & Gaming > Port Triggering
The
Applications & Gaming > Port Triggering
screen allows
the Router to watch outgoing data for specific port
numbers. The IP address of the computer that sends the
matching data is remembered by the Router, so that when
the requested data returns through the Router, the data is
pulled back to the proper computer by way of IP address
and port mapping rules.
Page 20 / 33
Chapter±3
Advanced Configuration
²6
W±reless-G Broadband Router
Applications and Gaming > Port Triggering
Port Triggering
Appl±cat±on
Enter the application name of the trigger.
Triggered Range
For each application, list the triggered port number range.
Check with the Internet application documentation for
the port number(s) needed.
Start Port
Enter the starting port number of the Triggered
Range.
End Port
Enter the ending port number of the Triggered
Range.
Forwarded Range
For each application, list the forwarded port number
range. Check with the Internet application documentation
for the port number(s) needed.
Start Port
Enter the starting port number of the
Forwarded Range.
End Port
Enter the ending port number of the Forwarded
Range.
Enable
Select
Enable
to enable port triggering for the
applicable application.
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Applications and Gaming > DMZ
The DMZ feature allows one network computer to be
exposed to the Internet for use of a special-purpose
service such as Internet gaming or videoconferencing.
DMZ hosting forwards all the ports at the same time to
one PC. The Port Range Forward feature is more secure
because it only opens the ports you want to have opened,
while DMZ hosting opens all the ports of one computer,
exposing the computer to the Internet.
Applications and Gaming > DMZ
DMZ
Any PC whose port is being forwarded must have its DHCP
client function disabled and should have a new static IP
address assigned to it because its IP address may change
when using the DHCP function.
To expose one PC, select
Enable
. Then, enter the
computer’s IP address in the
DMZ Host IP Address
field. This
feature is disabled by default.
Click
Save Sett±ngs
to apply your changes, or click
Cancel
Changes
to cancel your changes.
Applications and Gaming > QoS
Quality of Service (QoS) ensures better service to
high-priority
types
of
network
traffic,
which
may
involve
demanding,
real-time
applications,
such
as
videoconferencing.
There are three types of QoS available: Device Priority,
Ethernet Port Priority, and Application Priority.
QoS
Enable/D±sable
To enable QoS, select
Enable
. Otherwise,
select
D±sable
. QoS is disabled by default.
Upstream Bandw±dth
Select
Auto
or
Manual
from
the drop-down menu. Manual allows you to specify the
maximum outgoing bandwidth that applications can
utilize.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top