Page 76 / 134 Scroll up to view Page 71 - 75
68
Chapter 6: Setting Up and Configuring the Router
Administration Tab
Wireless-N Gigabit Security Router with VPN
Change these settings as described here and click
Save Settings
to apply your changes, or click
Cancel
Changes
to cancel your changes. Help information is displayed on the right-hand side of the screen, and click
More
for additional details.
Log
This screen provides you options on how you want to manage your system logs. The Wireless Router provides
four categories of event logging (Firewall, VPN, System, and ACL). You can configure the Wireless Router to send
the event log to you through e-mail, upload the log to syslog server, or view the log locally on the Wireless Router.
Email Alerts
. If enabled, an e-mail will be sent when the number of DoS events exceeds the defined threshold or
the total events number exceed 100. If enabled, the e-mail address information (below) must be provided.
Denial of Service Thresholds
. Enter the number of DoS (Denial of Service) attacks that need to be detected (and
blocked) by the software firewall before an e-mail alert is sent. The minimum value is 20, the maximum value is
100. Note that if IPS has been enabled, IPS would block DoS attacks before they reach the firewall. In that case,
please check the
IPS Report
to know event details.
SMTP Mail Server
. Enter the address (domain name) or IP address of the SMTP (Simple Mail Transport Protocol)
server you use for outgoing e-mails.
Email Address for Alert Logs
. Enter the e-mail address the log is to be sent to.
Return Email Address
. The e-mail will show this address as the sender's address.
Enable Syslog
. Select
Enable
if you want to use this feature.
Syslog Server
. Enter the IP Address in the Syslog Server field when Enable Syslog is checked.
Local Log
. Enable this if you want to see the log locally on the Wireless Router.
View Log
button. If
Local Log
is enabled, click
View Log
to view the event log on the Wireless Router.
Change these settings as described here and click
Save Settings
to apply your changes, or click
Cancel
Changes
to cancel your changes. Help information is displayed on the right-hand side of the screen, and click
More
for additional details.
Figure 6-50: Administration - Log
Figure 6-51: View Log pop-up window
Downloaded from
www.Manualslib.com
manuals search engine
Page 77 / 134
69
Chapter 6: Setting Up and Configuring the Router
Administration Tab
Wireless-N Gigabit Security Router with VPN
Diagnostics
Ping Test Parameters
Ping Target IP
. Enter the IP address or URL that you want to ping.
Ping Size
. Enter the size of the packet you want to use.
Number of Pings
. Enter the number of times you wish to ping the target device.
Ping Interval
. Enter the time period (in milliseconds) between each ping.
Ping Timeout
. Enter the desired time period (in milliseconds). If a response is not received within the defined
ping period, the ping is considered to have failed.
Start Test
button. Click this button to begin the test. A new screen will appear and display the test results. A
summary of the PING results will be shown on the bottom of this screen.
Ping Result
. It displays the Ping status.
Traceroute Test Parameters
TraceRoute Target
. Enter the IP address or Host name to perform the traceroute testing.
Start Test
button. Click this button to begin the test. A new screen will appear and display the test results.
Figure 6-52: Administration - Diagnostics
Figure 6-53: Ping Test Screen
Downloaded from
www.Manualslib.com
manuals search engine
Page 78 / 134
70
Chapter 6: Setting Up and Configuring the Router
Administration Tab
Wireless-N Gigabit Security Router with VPN
Config Management
Save Configuration
Save Configuration to File
button. Click this button to save your Wireless Router’s current configuration to a file
on your PC. Enter the file name on the Windows screen that appears.
Restore Configuration
Select a previously saved configuration file to restore the configuration to the Wireless Router. This could be
helpful if you want to use the same configuration on a new hardware or after resetting to the factory defaults. You
can either enter the file path name yourself or use the
Browse
button to select a file from the Windows file
system.
Browse
button. Click this button to select a previously saved configuration from the Windows file system.
Load
button. Click this button to start the restoration process.
Figure 6-54: Trace Route Test Screen
Figure 6-55: Administration - Config
Management
Downloaded from
www.Manualslib.com
manuals search engine
Page 79 / 134
71
Chapter 6: Setting Up and Configuring the Router
Administration Tab
Wireless-N Gigabit Security Router with VPN
Factory Defaults
Restore Factory Defaults
. Click this button to reset all configuration settings to their default values. All settings
that have been saved will be lost when the default settings are restored. After clicking the button, another screen
will appear. Click
OK
to continue. Another screen will appear while the system reboots.
Firmware Upgrade
To upgrade firmware, download the latest firmware for the product from Linksys.com, extract it to your computer,
and perform the steps below:
1.
File
. Type in the name of the extracted firmware upgrade file or click
Browse
to locate the file from the file
system.
2.
Start to Upgrade
. Once you have selected the appropriate file, click the
Start to Upgrade
button and follow
the on-screen instructions to upgrade your firmware.
Figure 6-56: Administration - Factory Default
Figure 6-57: Administration - Firmware
Upgrade
Downloaded from
www.Manualslib.com
manuals search engine
Page 80 / 134
72
Chapter 6: Setting Up and Configuring the Router
IPS Tab
Wireless-N Gigabit Security Router with VPN
IPS Tab
The Wireless Router supports advanced Intrusion Prevention Systems (IPS), which is an integral part of the
self-defending strategy. It allows you to stay current on the latest threats so that malicious or damaging traffic is
accurately identified, classified, and stopped in realtime. You can use IPS together with Firewall, IP based ACL,
and IPsec VPN to achieve maximum securities. The IPS is hardware-accelerated on this Wireless Router.
Configure IPS functions on this screen after enabling IPS.
Configuration
IPS Function
. Enable or Disable the IPS Function as desired.
Abnormally Detection
HTTP
. Web attacks use weaknesses on HTTP protocol to trigger the buffer overflow on Web servers. The
default is Disable.
FTP
. FTP attacks use weaknesses on FTP protocol to generate illegal FTP commands to the FTP server.
The default is Disable.
TELNET
. Telnet attacks use weakness on TELNET protocol to execute illegal commands on the TELNET
server. The default is Disable.
RPC
. Remote Procedure Call allows attackers to issue illegal commands to be executed on RPC server.
The default is Disable
Signature Update
. To protect your local network from the latest Internet threats, you are encouraged to upgrade
the IPS Signature file bi-weekly. First, you need to download the Signature file from www.linksys.com to your PC.
Then you can select this file by clicking the
Browse
button. Use the
Upgrade
button to start an upgrade.
Browse
button
. Enter the path name of the new signature file In the field provided, or click the
Browse
button to
find this file from your Windows file system.
Update
button
. After you have selected the file, click this button to start an upgrade.
Change these settings as described here and click
Save Settings
to apply your changes, or click
Cancel
Changes
to cancel your changes. Help information is displayed on the right-hand side of the screen, and click
More
for additional details.
Figure 6-58: IPS - Configuration
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top