Page 36 / 107 Scroll up to view Page 31 - 35
29
Chapter 5: Configuring the Wireless-G Broadband Router with 2 Phone Ports
The Security Tab - Firewall
Wireless-G Broadband Router with 2 Phone Ports
The Security Tab - Firewall
Firewall Protection
. This feature employs Stateful Packet Inspection (SPI) for a more detailed review of data
packets entering your network environment. Select
Enable
to use this feature. Select
Disable
to disable it.
Block WAN Requests
. Enable the Block WAN Request feature by checking the box beside
Block Anonymous
Internet Requests
and you can prevent your network from being “pinged,” or detected, by other Internet users.
The Block WAN Request feature also reinforces your network security by hiding your network ports. Both
functions of the Block WAN Request feature make it more difficult for outside users to work their way into your
network. This feature is enabled by default. Select
Disabled
to allow anonymous Internet requests.
Filter Multicast
. Multicasting allows for multiple transmissions to specific recipients at the same time. If
multicasting is permitted, then the Router will allow IP multicast packets to be forwarded to the appropriate
computers. Select
Enabled
to filter multicasting, or
Disabled
to disable this feature.
Filter Internet NAT Redirection
. This feature uses port forwarding to block access to local servers from local
networked computers. Select
Enabled
to filter Internet NAT redirection, or
Disabled
to disable this feature.
Filter IDENT (Port 113)
. This feature keeps port 113 from being scanned by devices outside of your local
network. Select
Enabled
to filter port 113, or
Disabled
to disable this feature.
Change these settings as described here and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes.
The Security Tab - VPN Passthrough
Use the settings on this tab to allow VPN tunnels using IPSec, PPTP, or L2TP protocols to pass through the
Router’s firewall.
IPSec Pass-through
. Internet Protocol Security (IPSec) is a suite of protocols used to implement secure
exchange of packets at the IP layer. To allow IPSec tunnels to pass through the Router, click
Enable
.
IPSec Pass-
Through is enabled by default.
PPTP Pass-through
. Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be
tunneled through an IP network. To allow PPTP tunnels to pass through the Router, click
Enable
. PPTP Pass-
Through is enabled by default.
L2TP Pass-through
. Layer 2 Tunneling Protocol is the method used to enable Point-to-Point sessions via the
Internet on the Layer 2 level. To allow L2TP tunnels to pass through the Router, click
Enable
. L2TP Pass-Through
is enabled by default.
Figure 5-27: Security Tab - Firewall
Figure 5-28: Security Tab - VPN Passthrough
Downloaded from
www.Manualslib.com
manuals search engine
Page 37 / 107
30
Chapter 5: Configuring the Wireless-G Broadband Router with 2 Phone Ports
The Access Restrictions Tab - Internet Access
Wireless-G Broadband Router with 2 Phone Ports
Figure 5-29: Access Restrictions Tab - Internet Access
Figure 5-30: Internet Policy Summary
Figure 5-31: List of PCs
Change these settings as described here and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes.
The Access Restrictions Tab - Internet Access
The
Internet Access
screen allows you to block or allow specific kinds of Internet usage and traffic, such as
Internet access, designated services, websites, and inbound traffic during specific days and times.
Internet Access Policy
. Access can be managed by a policy. Use the settings on this screen to establish an
access policy (after the
Save Settings
button is clicked). To delete a policy, select that policy’s number and click
the
Delete
button. To view all the policies, click the
Summary
button. (Policies can be deleted from the
Summary
screen by selecting the policy or policies and clicking the
Delete
button. To return to the Internet Access tab, click
the
Close
button.)
Status
. Policies are disabled by default. To enable a policy, select the policy number from the drop-down menu,
and click the radio button beside
Enable
.
You can create two kinds of policies, one kind to manage Internet access and another kind to manage inbound
traffic.
To create an Internet Access policy:
1.
Select a number from the
Internet Access Policy
drop-down menu.
2.
To enable this policy, click the radio button beside
Enable
.
3.
Enter a Policy Name in the field provided.
4.
Click the
Edit List of PCs
button to select which PCs will be affected by the policy. The
List of PCs
screen will
appear. You can select a PC by MAC Address or IP Address. You can also enter a range of IP Addresses if you
want this policy to affect a group of PCs. After making your changes, click the
Save Settings
button to apply
your changes or
Cancel Changes
to cancel your changes. Then click the
Close
button.
5.
Click the appropriate option,
Deny
or
Allow
, depending on whether you want to block or allow Internet access
for the PCs you listed on the
List of PCs
screen.
6.
Decide which days and what times you want this policy to be enforced. Select the individual days during
which the policy will be in effect, or select
Everyday
. Then enter a range of hours and minutes during which
the policy will be in effect, or select
24 Hours
.
Downloaded from
www.Manualslib.com
manuals search engine
Page 38 / 107
31
Chapter 5: Configuring the Wireless-G Broadband Router with 2 Phone Ports
The Access Restrictions Tab - Internet Access
Wireless-G Broadband Router with 2 Phone Ports
7.
You can filter access to various services accessed over the Internet, such as FTP or telnet, by selecting
services from the drop-down menus next to
Blocked Services
. (You can block up to 20 services.)
Then enter the range of ports you want to filter.
If the service you want to block is not listed or you want to edit a service’s settings, then click the
Add/Edit
Service
button. Then the
Port Services
screen will appear.
To add a service, enter the service’s name in the
Service Name
field. Select its protocol from the
Protocol
drop-down menu, and enter its range in the
Port Range
fields. Then click the
Add
button.
To modify a service, select it from the list on the right. Change its name, protocol setting, or port range. Then
click the
Modify
button.
To delete a service, select it from the list on the right. Then click the
Delete
button.
When you are finished making changes on the
Port Services
screen, click the
Apply
button to save changes.
If you want to cancel your changes, click the
Cancel
button. To close the
Port Services
screen and return to
the
Access Restrictions
screen, click the
Close
button.
8.
If you want to block websites with specific URL addresses, enter each URL in a separate field next to
Website
Blocking by URL Address
.
9.
If you want to block websites using specific keywords, enter each keyword in a separate field next to
Website
Blocking by Keyword
.
10. Click the
Save Settings
button to save the policy’s settings. To cancel the policy’s settings, click the
Cancel
Changes
button.
Change these settings as described here and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes.
Figure 5-32: Port Services
Downloaded from
www.Manualslib.com
manuals search engine
Page 39 / 107
32
Chapter 5: Configuring the Wireless-G Broadband Router with 2 Phone Ports
The Applications and Gaming Tab - Port Range Forward
Wireless-G Broadband Router with 2 Phone Ports
The Applications and Gaming Tab - Port Range Forward
The Applications and Gaming Tab allows you to set up public services on your network, such as web servers, ftp
servers, e-mail servers, or other specialized Internet applications. (Specialized Internet applications are any
applications that use Internet access to perform functions such as videoconferencing or online gaming. Some
Internet applications may not require any forwarding.)
To forward a port, enter the information on each line for the criteria required. The criteria are described here.
Application
. In this field, enter the name you wish to give the application. Each name can be up to 12 characters.
Start/End
. This is the port range. Enter the number that starts the port range under
Start
and the number that
ends the range under
End
.
Protocol
. Enter the protocol used for this application, either
TCP
or
UDP
, or
Both
.
IP Address
. For each application, enter the IP Address of the PC running the specific application.
Enable
. Click the
Enable
checkbox to enable port forwarding for the relevant application.
Change these settings as described here and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes.
Figure 5-33: Applications and Gaming Tab - Port
Range Forward
Downloaded from
www.Manualslib.com
manuals search engine
Page 40 / 107
33
Chapter 5: Configuring the Wireless-G Broadband Router with 2 Phone Ports
The Applications & Gaming Tab - Port Triggering
Wireless-G Broadband Router with 2 Phone Ports
The Applications & Gaming Tab - Port Triggering
The
Port Triggering
screen allows the Router to watch outgoing data for specific port numbers. The IP address of
the computer that sends the matching data is remembered by the Router, so that when the requested data
returns through the Router, the data is pulled back to the proper computer by way of IP address and port mapping
rules.
Port Triggering
Application
. Enter the application name of the trigger.
Triggered Range
For each application, list the triggered port number range. Check with the Internet application documentation for
the port number(s) needed.
Start Port
. Enter the starting port number of the Triggered Range.
End Port
. Enter the ending port number of the Triggered Range.
Forwarded Range
For each application, list the forwarded port number range. Check with the Internet application documentation for
the port number(s) needed.
Start Port
. Enter the starting port number of the Forwarded Range.
End Port
. Enter the ending port number of the Forwarded Range.
Change these settings as described here and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes.
Figure 5-34: Applications and Gaming Tab -
Port Triggering
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top