Page 31 / 87 Scroll up to view Page 26 - 30
25
Chapter 5: Configuring the Wireless-G Broadband Router
The Wireless Tab - Advanced Wireless Settings
Wireless-G Broadband Router with SRX400
RTS Threshold
. Should you encounter inconsistent data flow, only minor reduction of the default value,
2347
, is
recommended. If a network packet is smaller than the preset RTS threshold size, the RTS/CTS mechanism will
not be enabled. The Router sends Request to Send (RTS) frames to a particular receiving station and negotiates
the sending of a data frame. After receiving an RTS, the wireless station responds with a Clear to Send (CTS)
frame to acknowledge the right to begin transmission. The RTS Threshold value should remain at its default value
of
2347
.
Preamble Type
. The preamble defines the length of the CRC block for communication between the Router and
the roaming Network Card. (High network traffic areas should use the shorter preamble type.) Select the
appropriate preamble type,
Long
(default) or
Short
.
Network Density
. This setting is a reflection of the Router’s range. Setting the density to
Low
provides you with
a greater range. Setting the density to
High
gives you a lower range. The default setting is
Low
.
Compression
. This feature provides real-time hardware data compression, so pre-compressed frames are used,
with no impact on the Router’s processor. Data throughput is thereby increased. To use compression, select
Enable
. The default setting is
Disable
.
Concatenation
. This feature allows data from several packets to be merged into one. Overhead is removed, so
data throughput is increased, particularly at higher data transmission rates. If you do not want to use
concatenation, select
Disable
. The default setting is
Enable
.
Change these settings as described here and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes.
rts
(request to send): a networking method of coordinating
large packets through the RTS Threshold setting.
Page 32 / 87
26
Chapter 5: Configuring the Wireless-G Broadband Router
The Security Tab - Firewall
Wireless-G Broadband Router with SRX400
The Security Tab - Firewall
Use this screen to configure the firewall and VPN pass through settings.
Firewall
Firewall Protection
. Enable this feature to employ Stateful Packet Inspection (SPI) for more detailed review of
data packets entering your network environment.
Block WAN Request
Block WAN Ping
. Enable the Block WAN Ping feature by checking the box beside
Block WAN Ping
and you can
prevent your network from being “pinged,” or detected, by other Internet users. The Block WAN Ping feature also
reinforces your network security by hiding your network ports. Both functions of the Block WAN Ping feature
make it more difficult for outside users to work their way into your network. This feature is enabled by default.
VPN Pass Through
These settings allow VPN tunnels using PPTP, IPSec, or L2TP protocols to pass through the Router’s firewall.
PPTP Pass through
. Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be
tunneled through an IP network. To allow PPTP tunnels to pass through the Router, click
Enable
.
IPSec Pass through
. Internet Protocol Security (IPSec) is a suite of protocols used to implement secure
exchange of packets at the IP layer. To allow IPSec tunnels to pass through the Router, click
Enable
.
L2TP Pass through
. Layer 2 Tunneling Protocol (L2TP) is the method used to enable Point-to-Point sessions via
the Internet on the Layer 2 level. To allow L2TP tunnels to pass through the Router, click
Enable
.
Change these settings as described here and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes.
Figure 5-24: Security Tab - Firewall
firewall
: a set of related programs located at a
network gateway server that protects the resources
of a network from users from other networks.
Page 33 / 87
27
Chapter 5: Configuring the Wireless-G Broadband Router
The Access Restrictions Tab - Internet Access
Wireless-G Broadband Router with SRX400
The Access Restrictions Tab - Internet Access
The
Internet Access
screen allows you to block or allow specific kinds of Internet usage and traffic, such as
Internet access, designated services, websites, and inbound traffic during specific days and times.
Internet Access
Internet Access Policy
. Access can be managed by a policy. Use the settings on this screen to establish an
access policy (after the
Save Settings
button is clicked). Selecting a policy from the drop-down menu will
display that policy’s settings. To delete a policy, select that policy’s number and click the
Delete
button. To view
all the policies, click the
Summary
button. (Policies can be deleted from the
Summary
screen by selecting the
policy or policies and clicking the
Delete
button. To return to the Internet Access tab, click the
Close
button.)
Status
. Policies are disabled by default. To enable a policy, select the policy number from the drop-down menu,
and click the radio button beside
Enable
.
You can create a policy to manage Internet access.
To create an Internet Access policy:
1.
Select a number from the
Internet Access Policy
drop-down menu.
2.
To enable this policy, click the radio button beside
Enable
.
3.
Enter a Policy Name in the field provided.
4.
Click the
Edit List of PCs
button to select which PCs will be affected by the policy. The
List of PCs
screen will
appear. You can select a PC by MAC Address or IP Address. You can also enter a range of IP Addresses if you
want this policy to affect a group of PCs. After making your changes, click the
Save Settings
button to apply
your changes or
Cancel Changes
to cancel your changes. Then click the
Close
button.
Figure 5-25: Access Restrictions Tab - Internet Access
Figure 5-26: Internet Policy Summary
Page 34 / 87
28
Chapter 5: Configuring the Wireless-G Broadband Router
The Access Restrictions Tab - Internet Access
Wireless-G Broadband Router with SRX400
5.
Click the appropriate option,
Deny
or
Allow
, depending on whether you want to block or allow Internet access
for the PCs you listed on the
List of PCs
screen (shown in Figure 5-26).
6.
Decide which days and what times you want this policy to be enforced. Select the individual days during
which the policy will be in effect, or select
Everyday
. Then enter a range of hours and minutes during which
the policy will be in effect, or select
24 Hours
.
7.
You can filter access to various services accessed over the Internet, such as FTP or telnet, by selecting
services from the drop-down menus next to
Blocked Services
. Then enter the range of ports you want to filter.
If the service you want to block is not listed or you want to edit a service’s settings, then click the
Add/Edit
Service
button. Then the
Port Services
screen will appear.
To add a service, enter the service’s name in the
Service Name
field. Select its protocol from the
Protocol
drop-down menu, and enter its range in the
Port Range
fields. Then click the
Add
button.
To modify a service, select it from the list on the right. Change its name, protocol setting, or port range. Then
click the
Modify
button.
To delete a service, select it from the list on the right. Then click the
Delete
button.
When you are finished making changes on the
Port Services
screen, click the
Apply
button to save changes.
If you want to cancel your changes, click the
Cancel
button. To close the
Port Services
screen and return to
the
Access Restrictions
screen, click the
Close
button.
8.
If you want to block websites with specific URL addresses, enter each URL in a separate field next to
Website
Blocking by URL Address
.
9.
If you want to block websites using specific keywords, enter each keyword in a separate field next to
Website
Blocking by Keyword
.
10. Click the
Save Settings
button to save the policy’s settings. To cancel the policy’s settings, click the
Cancel
Changes
button.
Figure 5-28: Port Services
ftp
: a protocol used to transfer files over a TCP/IP network
telnet
: a user command and TCP/IP
protocol used for accessing remote PCs
url
: the address of a file located on the Internet
Figure 5-27: List of PCs
Page 35 / 87
29
Chapter 5: Configuring the Wireless-G Broadband Router
The Applications and Gaming Tab - Port Range Forward
Wireless-G Broadband Router with SRX400
The Applications and Gaming Tab - Port Range Forward
The Applications and Gaming Tab allows you to set up public services on your network, such as web servers, ftp
servers, e-mail servers, or other specialized Internet applications. (Specialized Internet applications are any
applications that use Internet access to perform functions such as videoconferencing or online gaming. Some
Internet applications may not require any forwarding.)
Port Range Forward
To forward a port, enter the necessary information.
Port Range
Application
. In this field, enter the name you wish to give the application. Each name can be up to 12 characters.
Start/End
. This is the port range. Enter the number that starts the port range under
Start
and the number that
ends the range under
End
.
Protocol
. Enter the protocol used for this application, either
TCP
or
UDP
, or
Both
.
IP Address
. For each application, enter the IP Address of the PC running the specific application.
Enable
. Click the
Enable
checkbox to enable port forwarding for the relevant application.
Change these settings as described here and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes.
Figure 5-29: Applications and Gaming Tab - Port Range
Forward

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top