Page 81 / 134 Scroll up to view Page 76 - 80
73
Chapter 6: Setting Up and Configuring the Router
IPS Tab
Wireless-N Gigabit Security Router with VPN
P2P/IM
This tab allows the system administrator to set up policies on using P2P or IM software across the Internet.
Peer to Peer
When users download files from the Internet by Peer to Peer (P2P) software, the WAN port bandwidth will be
occupied. You can enable the blocking to the following P2P software applications. The defaults are
non-block
for
the following applications:
GNUTELLA(EZPEER), FASTTRACK, KURO, EDONKEY2000, BITTORRECT, DIRECTCONNECT, PIGO, and WINMX.
Instant Messenger
Users might use IM software to chat with friends or transferring files (bandwidth hogging). You can enable the
blocking to the following IM software applications. The defaults are
non-block
for the following applications.
MSN, ICQ, YAHOO MESSEGER, SKYPE, IRC, ODIGO, REDIFF, GOOGLE TALK, and IM QQ.
Change these settings as described here and click
Save Settings
to apply your changes, or click
Cancel
Changes
to cancel your changes. Help information is displayed on the right-hand side of the screen, and click
More
for additional details.
Figure 6-59: IPS - P2P / IM
Downloaded from
www.Manualslib.com
manuals search engine
Page 82 / 134
74
Chapter 6: Setting Up and Configuring the Router
IPS Tab
Wireless-N Gigabit Security Router with VPN
Report
This screen provides the network history status, including network traffic and attack counts, through diagram
and tables.
Report Diagram: Twenty-four hour diagram displays network traffic and attacks.
Attacker
Displays the IP Address of attackers and the frequency (number of times) of the attacks in a table.
Attacked Category
Displays the category (type) of attack and the frequency (number of times) of the attacks in a table.
Click the
View Log
button to view the log.
Figure 6-60: IPS - Report
Figure 6-61: IPS Log Raw Data
Downloaded from
www.Manualslib.com
manuals search engine
Page 83 / 134
75
Chapter 6: Setting Up and Configuring the Router
IPS Tab
Wireless-N Gigabit Security Router with VPN
Information
Signature Version
. The Signature Version displays the version of the signature patterns file loaded in the
Wireless Router that protects against malicious threats.
Last Time Upload
. This displays when the signature patterns file in the Wireless Router were last updated.
Protect Scope
. Displays a list of the categories of attacks that the IPS feature in the Router protects against.
Those includes DoS/DDoS, Buffer Overflow, Web Attack, Scan, Trojan Horse, and IM / P2P.
Figure 6-62: IPS - Information
Downloaded from
www.Manualslib.com
manuals search engine
Page 84 / 134
76
Chapter 6: Setting Up and Configuring the Router
L2 Switch Tab
Wireless-N Gigabit Security Router with VPN
L2 Switch Tab
The Layer 2 Switch Tab provides configurations to the layer 2 switching features on the four Ethernet LAN ports of
the Wireless Router. They include VLAN, port configuration, cable diagnostics, and RADIUS authentication.
VLAN
VLAN Configuration
The Wireless Router supports Port-based VLAN. You can assign each port to one of the four VLANs or VLAN Trunk.
The VLAN tags are attached internally inside the switch. No packets will leave the switch with VLAN tags.
VLANs are broadcast and multicast domains. Broadcast and multicast traffic is transmitted only within the VLAN
in which the traffic is generated. The Wireless Router currently supports only one IP subnet so PCs on different
VLANs cannot communicate with each other. PCs connected to the VLAN Trunk port can be accessed on all
VLANs.
Trunk Port
. Select one of the LAN ports to accept traffic from and to all VLANs. The default is
None
.
Change these settings as described here and click
Save Settings
to apply your changes, or click
Cancel
Changes
to cancel your changes. Help information is displayed on the right-hand side of the screen, and click
More
for additional details.
Figure 6-63: L2 Switch - VLAN
Downloaded from
www.Manualslib.com
manuals search engine
Page 85 / 134
77
Chapter 6: Setting Up and Configuring the Router
L2 Switch Tab
Wireless-N Gigabit Security Router with VPN
RADIUS
RADIUS mode provides authentication on devices connecting to the LAN ports. It requires installation of a RADIUS
server on your local network.
Mode
. Select
Enabled
or
Disabled
, as desired.
RADIUS IP
. Enter the RADIUS server IP address.
RADIUS UDP Port
. Identifies the UDP port. The UDP port is used to verify the RADIUS server authentication.
RADIUS Secret
. Indicates the Key string used for authenticating and encrypting all RADIUS communications
between the Wireless Router and the RADIUS server. This key must match the RADIUS server’s configuration.
Administration State
. Specifies if each port needs RADIUS authentication. The defaults are
Force Authorized
so no authentication is needed. The possible field values are:
Auto
. The controlled port state is set by the
RADIUS Mode
.
Force Authorized
. The controlled port state is set to Force-Authorized (forward traffic). All connections
can be made.
Force Unauthorized
. The controlled port state is set to Force-Unauthorized (discard traffic). All
connections are blocked.
Parameters
button. Click this button to configure RADIUS re-authentication and timeout period for
re-authentication and EAP.
Change these settings as described here and click
Save Settings
to apply your changes, or click
Cancel
Changes
to cancel your changes. Help information is displayed on the right-hand side of the screen, and click
More
for additional details.
Figure 6-64: L2 Switch - RADIUS
Figure 6-65: L2 Switch - RADIUS
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top