Page 21 / 72 Scroll up to view Page 16 - 20
Chapter µ
Configuring the Wireless-G Router
±¶
Wireless-G VPN Router with RangeBooster
using 64-bit WEP encryption, the key must be exactly 10
hexadecimal characters in length. If you are using 128-bit
WEP encryption, the key must be exactly 26 hexadecimal
characters in length. Valid hexadecimal characters are “0”
to “9” and “A” to “F”.
When you have finished making changes to the screen,
click
Save Settings
to save the changes, or click
Cancel
Changes
to undo your changes. For help information,
click
More
.
WEP
WEP is a basic encryption method, which is not as secure
as WPA. To indicate which WEP key to use, select the
appropriate
Default  Transmit  Key
number. Then, select
the level of WEP encryption,
¶´ bits (±0 hex digits)
or
±²8 bits (²¶ hex digits)
. Higher encryption levels offer
higher levels of security, but due to the complexity of the
encryption, they may decrease network performance.
Wireless Security - WEP
Instead of manually entering WEP keys, you can enter
a Passphrase to generate one or more WEP keys. The
Passphrase is case-sensitive and should have no more
than 32 alphanumeric characters. If you want to use
a Passphrase, enter it in the
Passphrase
field and click
Generate
.
If you want to enter the WEP key(s) manually, then enter
it in the
Key 1-4
field(s). (Do not leave a field blank, and do
not enter all zeroes; they are not valid key values.) If you are
using 64-bit WEP encryption, the key must be exactly 10
hexadecimal characters in length. If you are using 128-bit
WEP encryption, the key must be exactly 26 hexadecimal
characters in length. Valid hexadecimal characters are “0”
to “9” and “A” to “F”.
When you have finished making changes to the screen,
click
Save Settings
to save the changes, or click
Cancel
Changes
to undo your changes. For help information,
click
More
.
Wireless > Wireless Network Access
This screen allows you to control access to your wireless
network for each SSID.
Wireless > Wireless Network Access
Wireless Network Access
Access List
To allow the designated computers to
access your network, select
Permit to access
. To block
the designated computers from accessing your wireless
network, select
Prevent from accessing
. Click
Disabled
to disable the access function.
MAC ±-±¶
Enter the MAC addresses of the designated
computers. For a more convenient way to add MAC
addresses, click
Select MAC Address From Networked
Computers
. The
Networked Computers 
screen will appear.
Select the MAC addresses you want. Then click
Select
.
Click
Refresh
if you want to refresh the screen. Click
Close
to return to the previous screen.
Networked Computers
When you have finished making changes to the screen,
click
Save Settings
to save the changes, or click
Cancel
Changes
to undo your changes. For help information,
click
More
.
Page 22 / 72
Chapter µ
Configuring the Wireless-G Router
±·
Wireless-G VPN Router with RangeBooster
Wireless > Advanced Wireless Settings
Wireless > Advanced Wireless Settings
This tab is used to set up the Router’s advanced wireless
functions. These settings should only be adjusted by an
advanced user as incorrect settings can reduce wireless
performance.
Advanced Wireless Settings
AP Isolation
This isolates all wireless clients and wireless
devices on your network from each other. Wireless devices
will be able to communicate with the Router but not with
each other. To use this function, click
Enabled
. AP Isolation
is disabled by default.
Basic Rate
The Basic Rate setting is not actually one rate
of transmission but a series of rates at which the Router
can transmit. The Router will advertise its Basic Rate to the
other wireless devices in your network, so they know which
rates will be used. The Router will also advertise that it will
automatically select the best rate for transmission. The
default setting is
Default
, when the Router can transmit
at all standard wireless rates (1-2Mbps, 5.5Mbps, 11Mbps,
18Mbps, and 24Mbps). Other options are
±-²Mbps
, for
use with older wireless technology, and
All
, when the
Router can transmit at all wireless rates. The Basic Rate
is not the actual rate of data transmission. If you want to
specify the Router’s rate of data transmission, configure
the Transmission Rate setting.
Transmission Power
The amount of transmission power
should be set so that the Router uses only as much
power as needed to reach the farthest device in your
wireless network. This can help prevented unwanted
eavesdropping on your wireless network. You can select
from a range of power levels, from
Full
,
Half
,
Quarter
,
Eighth
, or
Min
. The default setting is
Full
.
CTS Protection Mode
CTS (Clear-To-Send) Protection
Mode’s default setting is
Auto
. The Router will automatically
use CTS Protection Mode when your Wireless-G products
are experiencing severe problems and are not able to
transmit to the Router in an environment with heavy
802.11b traffic. This function boosts the Router’s ability
to catch all Wireless-G transmissions but will severely
decrease performance.
Beacon Interval
The default value is
±00
. Enter a value
between 1 and 65,535 milliseconds. The Beacon Interval
value indicates the frequency interval of the beacon. A
beacon is a packet broadcast by the Router to synchronize
the wireless network.
DTIM Interval
The default value is
³
. This value, between
1 and 255, indicates the interval of the Delivery Traffic
Indication Message (DTIM). A DTIM field is a countdown
field informing clients of the next window for listening to
broadcast and multicast messages. When the Router has
buffered broadcast or multicast messages for associated
clients, it sends the next DTIM with a DTIM Interval value.
Its clients hear the beacons and awaken to receive the
broadcast and multicast messages.
Fragmentation Threshold
In most cases, this value
should remain at its default value of
²³´¶
. It specifies the
maximum size for a packet before data is fragmented into
multiple packets. If you experience a high packet error rate,
you may slightly increase the Fragmentation Threshold.
Setting the Fragmentation Threshold too low may result
in poor network performance. Only minor reduction of
the default value is recommended.
RTS Threshold
The RTS Threshold value should remain at
its default value,
²³´·
. Should you encounter inconsistent
data flow, only minor reduction of the default value, 2347,
is recommended. If a network packet is smaller than the
preset RTS threshold size, the RTS/CTS mechanism will
not be enabled. The Router sends Request to Send (RTS)
frames to a particular receiving station and negotiates
the sending of a data frame. After receiving an RTS, the
wireless station responds with a Clear to Send (CTS) frame
to acknowledge the right to begin transmission.
When you have finished making changes to the screen,
click
Save Settings
to save the changes, or click
Cancel
Changes
to undo your changes. For help information,
click
More
.
Wireless > WDS
Wireless > WDS
Page 23 / 72
Chapter µ
Configuring the Wireless-G Router
±8
Wireless-G VPN Router with RangeBooster
This tab is used for Wireless Distribution System (WDS).
WDS will ONLY work with SSID1. Make sure that the
channel and security settings are the same for all WDS
enabled devices.
WDS allows a wireless signal to be repeated by a repeater.
This mode allows a wireless client to connect to the Router
through a repeater, such as WAP54GP or WAP54GPE, when
operating in the Repeater Mode. This mode allows you to
extend the coverage of the Router by using up to three
repeaters. Select
Auto Select
to enable the remote access
point when operating in Repeater Mode or select
Manual
and enter the MAC address of the repeater.
Click the
Site Survey
button to view the available access
points.
When you have finished making changes to the screen,
click
Save Settings
to save the changes, or click
Cancel
Changes
to undo your changes. For help information,
click
More
.
Firewall
The Firewall tab is used to control access to the Internet by
users of your internal network.
Firewall > General
The Router’s firewall enhances the security of your
network. You can implement a Stateful Packet Inspection
(SPI) firewall, block anonymous Internet requests, and
enable block mechanisms.
Firewall > General
DoS Prevention
Denial of Service (DoS) Prevention
checks incoming packets before allowing them to enter
your network. To use this feature, select
Enabled
from
the drop-down menu. If you do not want DoS Prevention,
select
Disabled
.
Internet Block
Block Anonymous Internet Requests
This keeps your
network from being “pinged” or detected and reinforces
your network security by hiding your network ports, so it
is more difficult for intruders to work their way into your
network. Click the checkbox to block anonymous Internet
requests.
Block Multicast
Multicasting allows a transmission to
be forwarded automatically to multiple recipients at the
same time. When Block Multicast is disabled (multicasting
is permitted), the Router allows IP multicast packets to be
forwarded to the appropriate computers in the LAN. Click
the checkbox to filter out multicasting.
Web Block
Proxy
Use of WAN proxy servers may compromise the
Router’s security. Denying Filter Proxy will disable access
to any WAN proxy servers. To enable proxy filtering, click
the checkbox next to this option.
Java
Java is a programming language for websites. If you
deny Java applets, you run the risk of not having access to
Internet sites created using this programming language.
To enable Java applet filtering, click the checkbox next to
this option.
ActiveX
ActiveX is a programming language for websites.
If you deny ActiveX, you run the risk of not having access to
Internet sites created using this programming language.
To enable ActiveX filtering, click the checkbox
next to this
option.
Cookies
A cookie is data stored on your PC and used
by Internet sites when you interact with them. To enable
cookie filtering, click the checkbox next to this option.
SIP Application Layer Gateway
This option allows VoIP
phones to operate behind a NAT router. To enable this
feature, select
Enable
from the drop-down menu.
When you have finished making changes to the screen,
click
Save Settings
to save the changes, or click
Cancel
Changes
to undo your changes. For help information,
click
More
.
Firewall > Port Forwarding
Firewall > Port Forwarding
Page 24 / 72
Chapter µ
Configuring the Wireless-G Router
±9
Wireless-G VPN Router with RangeBooster
The
Port Forwarding
screen sets up public services on your
network, such as web servers, ftp servers, e-mail servers,
or other specialized Internet applications. (Specialized
Internet applications are any applications that use Internet
access to perform functions such as videoconferencing
or online gaming. Some Internet applications may not
require any forwarding.)
When users send this type of request to your network via
the Internet, the Router will forward those requests to the
appropriate PC. Any PC whose port is being forwarded
must have its DHCP client function disabled and must
have a new static IP address assigned to it because its IP
address may change when using the DHCP function.
Application Name
Enter the name you wish to give the
application. Each name can be up to 12 characters.
Port Range Start/End
This is the port range. Enter the
number that starts the port range under
Start
and the
number that ends the range under
End
.
Protocol
Enter the protocol used for this application,
either
TCP
or
UDP
, or
Both
.
IP Address
For each application, enter the IP Address of
the PC running the specific application.
Enabled
Click the
Enabled
checkbox to enable port
forwarding for the relevant application.
When you have finished making changes to the screen,
click
Save Settings
to save the changes, or click
Cancel
Changes
to undo your changes. For help information,
click
More
.
Firewall > Port Triggering
Firewall > Port Triggering
Port Triggering is used for special Internet applications
whose outgoing ports differ from the incoming ports.
For this feature, the Router will watch outgoing data for
specific port numbers. The Router will remember the
IP address of the computer that sends a transmission
requesting data, so that when the requested data returns
through the Router, the data is pulled back to the proper
computer by way of IP address and port mapping rules.
Application
In this field, enter the name you wish to give
the application. Each name can be up to 12 characters.
Triggered Range Start Port/End Port
Enter the number
that starts the triggered port range under
Start Port
and
the number that ends the range under
End Port
.
Forwarded Range Start Port/End Port
Enter the number
that starts the forwarded port range under
Start Port
and
the number that ends the range under
End Port
.
Protocol
Enter the protocol used for this application,
either
TCP
or
UDP
, or
Both
.
Enabled
Click the
Enabled
checkbox to enable port
triggering for the relevant application.
When you have finished making changes to the screen,
click
Save Settings
to save the changes, or click
Cancel
Changes
to undo your changes. For help information,
click
More
.
Firewall > DMZ
The
DMZ
screen allows one local PC to be exposed to
the Internet for use of a special-purpose service such as
Internet gaming and videoconferencing through Software
DMZ. Whereas Port Range Forwarding can only forward a
maximum of 10 ranges of ports, DMZ hosting forwards all
the ports for one PC at the same time.
Firewall > DMZ
Software DMZ
This feature allows one local PC to be
exposed to the Internet for use of a special-purpose service
such as Internet gaming and videoconferencing. To use
this feature, select
Enabled
. To disable the Software DMZ
feature, select
Disabled
.
DMZ Host IP Address
To expose one PC, enter the
computer’s IP address.
When you have finished making changes to the screen,
click
Save Settings
to save the changes, or click
Cancel
Changes
to undo your changes. For help information,
click
More
.
Page 25 / 72
Chapter µ
Configuring the Wireless-G Router
²0
Wireless-G VPN Router with RangeBooster
Firewall > Access Restriction
The
Access Restriction
screen allows you to block or allow
specific kinds of Internet usage and traffic during specific
days and times.
Firewall > Access Restriction
Internet Access Policy
Access can be managed by a
policy. Use the settings on this screen to establish an
access policy (after
Save Settings
is clicked). Selecting a
policy from the drop-down menu will display that policy’s
settings. To delete a policy, select that policy’s number
and click
Delete
. To view all the policies, click
Summary
.
Status
Policies are disabled by default. To enable a policy,
select the policy number from the drop-down menu, and
click the radio button beside
Enable
.
To create an Internet Access Policy:
Select a number from the
Internet Access Policy
drop-
down menu.
To enable this policy, click the
Enable
radio button.
Enter a Policy Name in the field provided.
Decide which days and what times you want this policy
to be enforced. Select the individual days during which
the policy will be in effect. Then enter a range of hours
and minutes during which the policy will be in effect,
or select
²´ Hours
.
You can block access to various services accessed over
the Internet, such as FTP or telnet, by specifying the
TCP/UDP port or the protocol number.
Click
Save Settings
to save the policy settings you have
entered. Click
Cancel Changes
to cancel any changes you
have entered. For help information, click
More
.
1.
2.
3.
4.
5.
Firewall > URL Filtering
URL filtering is used to block access to specific sites on the
Internet.
Firewall > URL Filtering
To create a URL filtering policy:
Select a number from the
URL  Filtering  Policy
drop-
down menu.
Enter a Policy Name in the field provided.
To enable this policy, select
Enabled
from the Status
menu.
Enter the
Start IP Address
and
End IP Address
that will
be affected by the policy. After making your changes,
click
Save Settings
to apply your changes.
In the
URL String
field, enter the URL of the Internet site
that this policy will block access to.
Click
Save Settings
to save the policy’s settings. To
cancel the policy’s settings, click
Cancel Changes
.
Click
Save Settings
to save the policy settings you have
entered. Click
Cancel Changes
to cancel any changes you
have entered. For help information, click
More
.
VPN
Virtual Private Networking (VPN) is a security measure
that creates a secure connection between two remote
locations. The security is created by the very specific
settings for the connection. The VPN Tab allows you to
configure your VPN settings to make your network more
secure.
VPN > VPN Client Access
The Router offers a QuickVPN Client utility for Windows
2000 or XP. If the Router has clients using this utility,
then you can designate the QuickVPN clients and their
passwords on the
VPN > VPN Client Access
screen.
1.
2.
3.
4.
5.
6.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top