vi
Contents
Chapter 3
Wireless Configuration
Considerations For A Wireless Network
.........................................................................
3-1
Implement Appropriate Security
...............................................................................
3-1
Observe Placement and Range Guidelines
.............................................................
3-1
Wireless Settings
............................................................................................................
3-2
Using the Wireless Access by MAC Address Feature
.............................................
3-4
Configuring Wired Equivalent Privacy (WEP)
..........................................................
3-6
Configuring WEP (Wired Equivalent Privacy)
.................................................................
3-7
Chapter 4
Protecting Your Network
Protecting Access to Your DG824M Wireless ADSL Modem Gateway
..........................
4-1
Configuring Basic Firewall Services
...............................................................................
4-3
Blocking Keywords, Sites, and Services
..................................................................
4-3
Rules
..............................................................................................................................
4-5
Inbound Rules (Port Forwarding)
.............................................................................
4-7
Inbound Rule Example: A Local Public Web Server
..........................................
4-7
Inbound Rule Example: Allowing Videoconference from Restricted Addresses 4-9
Considerations for Inbound Rules
.....................................................................
4-9
Outbound Rules (Service Blocking)
.......................................................................
4-10
Outbound Rule Example: Blocking Instant Messenger
...................................
4-10
Order of Precedence for Rules
..............................................................................
4-12
Services
........................................................................................................................
4-13
Setting Times and Scheduling Firewall Services
..........................................................
4-14
Chapter 5
Managing Your Network
Backing Up, Restoring, or Erasing Your Settings
...........................................................
5-1
Upgrading the Gateway’s Firmware
...............................................................................
5-3
Network Management Information
.................................................................................
5-5
Viewing Gateway Status and Usage Statistics
.........................................................
5-5
Viewing Attached Devices
........................................................................................
5-9
Viewing, Selecting, and Saving Logged Information
..............................................
5-10
Selecting What Information to Log
..................................................................
5-11
Saving Log Files on a Server
..........................................................................
5-12
Examples of log messages
....................................................................................
5-12