Page 41 / 116 Scroll up to view Page 36 - 40
Wireless-G Broadband Router with 2 Phone Ports
33
Chapter 5: Configuring the Router
The Security Tab - Firewall
The Security Tab - Firewall
When you click the Security tab, you will see the
Firewall
screen. You can use this screen to enable a variety of
web filters, which will enhance the firewall protecting your network.
Web Filters
Filter Proxy
. Use of WAN proxy servers may compromise the Gateway's security. Denying Filter Proxy will
disable access to any WAN proxy servers. To enable proxy filtering, click the checkbox.
Filter Java Applets
. Java is a programming language for websites. If you deny Java Applets, you run the risk of
not having access to Internet sites created using this programming language. To enable Java Applet filtering,
click the checkbox.
Filter Pop-Ups
. When you use the Internet, sometimes unwanted pop-up screens may appear on your screen.
To enable pop-up filtering, click the checkbox.
Filter Cookies
. A cookie is data stored on your computer and used by Internet sites when you interact with
them. To enable cookie filtering, click the checkbox.
Filter ActiveX
. ActiveX is a programming language for websites. If you deny ActiveX, you run the risk of not
having access to Internet sites created using this programming language. To enable ActiveX filtering, click the
checkbox.
When you have finished making changes on this screen, click the
Save Settings
button to save the changes, or
click the
Cancel Changes
button to undo your changes.
Figure 5-20: Security Tab - Firewall
Page 42 / 116
Wireless-G Broadband Router with 2 Phone Ports
34
Chapter 5: Configuring the Router
The Security Tab - VPN Passthrough
The Security Tab - VPN Passthrough
Use the settings on this tab to allow VPN tunnels using IPSec, PPPoE, or PPTP protocols to pass through the
Router’s firewall.
IPSec Pass-through
. Internet Protocol Security (IPSec) is a suite of protocols used to implement secure
exchange of packets at the IP layer. To allow IPSec tunnels to pass through the Router, click
Enable
.
IPSec
Pass-Through is enabled by default.
PPPoE Pass-through
. Point-to-Point over Ethernet (PPoE) allows your PCs to use the PPPoE client software
provide by your ISP. Some ISPs may request that you use this feature on th Router. To allow PPPoE tunnels to
pass through the Router, click
Enable
. PPPoE Pass-Through is enabled by default.
PPTP Pass-through
. Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be
tunneled through an IP network. To allow PPTP tunnels to pass through the Router, click
Enable
. PPTP Pass-
Through is enabled by default.
Change these settings as described here and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes.
Figure 5-21: Security Tab - VPN
Passthrough
Page 43 / 116
Wireless-G Broadband Router with 2 Phone Ports
35
Chapter 5: Configuring the Router
The Access Restrictions Tab - Filter
The Access Restrictions Tab - Filter
Filters can block specific internal users from accessing the Internet, anonymous Internet requests, and/or
multicasting.
Filter IP Address Range
You can create up to five different IP Address filters. To set up a filter, enter the IP address you wish to filter in
the field provided. Users who have filtered IP addresses will not be able to access the Internet at all.
Filter Port Range
You can create up to five different Port Range filters. To filter users by network port number, select the protocol
you want to filter,
TCP
,
UDP
, or
Both
, from the
Protocol
drop-down menu. Enter the port numbers you want to
filter in the
Start
and
End
fields. Users connected to the Router will no longer be able to access any port number
listed there.
Filter MAC Address
This feature blocks computers with specific MAC addresses from going out to the Internet. For information on
obtaining a MAC address, go to “Appendix C: Finding the MAC Address and IP Address for Your Ethernet
Adapter.” To set the MAC filter, click the
Edit MAC Filter Setting
button.
Edit MAC Filter Setting
. Click the
Edit MAC Filter Setting
button. Select the range of MAC address entries in
the drop-down box. In each
mac
field, enter the MAC address you want to filter.
Click the
Apply
button before
closing the window. To cancel changes, click the
Undo
button.
Figure 5-22: Access Restrictions Tab -
Filter
Figure 5-23: Filtered MAC Address
Page 44 / 116
Wireless-G Broadband Router with 2 Phone Ports
36
Chapter 5: Configuring the Router
The Access Restrictions Tab - Filter
Block WAN Requests
Use these features to enhance your network’s security and filter multicasting.
Block Anonymous Internet Requests
. This keeps your network from being “pinged” or detected and
reinforces your network security by hiding your network ports, so it is more difficult for intruders to work their
way into your network. Select
Enabled
to block anonymous Internet requests, or
Disabled
to allow anonymous
Internet requests.
Filter Multicast
. Multicasting allows for multiple transmissions to specific recipients at the same time. If
multicasting is permitted, then the Router will allow IP multicast packets to be forwarded to the appropriate
computers. Select
Enabled
to filter multicasting, or
Disabled
to disable this feature.
When you have finished making changes to this screen, click the
Save Settings
button to save the changes, or
click the
Cancel Changes
button to undo your changes.
Page 45 / 116
Wireless-G Broadband Router with 2 Phone Ports
37
Chapter 5: Configuring the Router
The Applications & Gaming Tab - Port Range Forwarding
The Applications & Gaming Tab - Port Range Forwarding
When you click the Applications & Gaming tab, you will see the
Port Range Forwarding
screen. Port Range
Forwarding sets up public services on your network, such as web servers, ftp servers, e-mail servers, or other
specialized Internet applications. (Specialized Internet applications are any applications that use Internet
access to perform functions such as videoconferencing or online gaming. Some Internet applications may not
require any forwarding.) When users send this type of request to your network via the Internet, the Router will
forward those requests to the appropriate PC.
Before using forwarding, you should assign a static IP address to the designated PC.
If you need to forward all ports to one PC, click the
DMZ
tab.
Port Range Forwarding
Port Range
To add a server using Port Range Forwarding, complete the following fields:
Application
. Enter the name of the application.
Start and End
. Enter the number or range of external port(s) used by the server or Internet application. Check
with the Internet application software documentation for more information.
Protocol
. Select the protocol
TCP
or
UDP
, or select
Both
.
IP Address
. Enter the IP address of the server that you want the Internet users to be able to access. To find the
IP address, go to “Appendix C: Finding the MAC Address and IP Address for Your Ethernet Adapter.”
Figure 5-24: Applications & Gaming Tab -
Port Range Forwarding
ip
(internet protocol): a protocol used to
send data over a network.
ip address
: the address used to identify a
computer or device on a network.
tcp
: a network protocol for transmitting
data that requires acknowledgement from
the recipient of data sent.
udp
: a network protocol for transmitting
data that does not require
acknowledgement from the recipient of
the data that is sent.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top