Page 46 / 185 Scroll up to view Page 41 - 45
Wireless Settings
46
N600 Wireless Dual Band Gigabit ADSL2+ Modem Router DGND3700
Change WPA Security Option and Passphrase:
1.
In the Security Options sections, select the WPA options you want.
Figure 18.
WPA2-PSK Security Encryption
2.
In the Passphrase field that displays when you select a WPA security option, enter the
network keys (passphrases) that you want to use. They are text strings from 8 to 63
characters (in the preceding figure, HomeNetwork1 and HomeNetwork2 are used as
examples).
Set WPA-802.1x Server and Passphrase:
1.
In the Security Options section, select
WPA-802.1x
to display the following fields:
Figure 19.
WPA-802.1x Settings
2.
In the Radius Server Name/IP Address field, enter the name or IP address of the RADIUS
server on your LAN. This is a required field.
3.
In the Radius Port field, enter the port number used for connections to the RADIUS server.
The default port is 1812.
4.
In the Shared Key field, enter the RADIUS server passphrase for client logins. The router
has to have this passphrase to log in to the RADIUS server as a client.
Set WEP Encryption and Passphrase:
When configuring WEP from a wireless computer, you lose your wireless connection when
you click Apply. You have to either configure your wireless adapter to match the wireless
modem router WEP settings or access the wireless modem router from a wired computer.
Note:
WEP encryption is available only when the Mode setting is Up to 54
Mbps.
Downloaded from
www.Manualslib.com
manuals search engine
Page 47 / 185
Wireless Settings
47
N600 Wireless Dual Band Gigabit ADSL2+ Modem Router DGND3700
1.
In the Security Options section, select
WEP
to display the following screen:
Figure 20.
WEP Security Encryption section
2.
Select the authentication type. The default is Automatic. Other choices are Open System
(any client can authenticate itself to the network) and Shared Key (a passphrase and a
four-way challenge is needed for authentication).
3.
Select the encryption strength setting, either 64 bit or 128 bit.
4.
Enter the four data encryption keys either manually or automatically. These values have to
be identical on all computers and access points in your network.
Automatic. Enter a word or group of printable characters in the Passphrase field, and
click
Generate
. The four key fields are automatically populated with key values.
Manual. The number of hexadecimal digits that you enter depends on the encryption
strength setting:
-
For 64-bit WEP, enter 10 hexadecimal digits (any combination of 0–9, a–f, or
A–F).
-
For 128-bit WEP, enter 26 hexadecimal digits (any combination of 0–9, a–f, or
A–F).
5.
Select the radio button for the key you want to make active.
Make sure that you understand how the WEP key settings are configured in your wireless
adapter. Wireless adapter configuration utilities such as the one in Windows XP allow one
key entry, which has to match the default key you set in the wireless modem router.
6.
Click
Save
to save your settings or click
Apply
so your changes to take effect immediately.
Downloaded from
www.Manualslib.com
manuals search engine
Page 48 / 185
48
4
4.
Security Settings
Keeping unwanted content out of your network
This chapter explains how to use the basic firewall features of the wireless modem router to
prevent objectionable content from reaching the PCs and other devices connected to your
network.
This chapter contains the following sections:
Keyword Blocking of HTTP Traffic
Firewall Rules to Control Network Access
Configure Services
Set the Time Zone
Schedule Firewall Services
Enable Security Event Email Notification
Log the Network Activity
Downloaded from
www.Manualslib.com
manuals search engine
Page 49 / 185
Security Settings
49
N600 Wireless Dual Band Gigabit ADSL2+ Modem Router DGND3700
Keyword Blocking of HTTP Traffic
Use keyword blocking to prevent certain types of HTTP traffic from accessing your network.
The blocking can be always or according to a scheduled.
To set up keyword blocking:
1.
Select
Content Filtering >
Block Sites
.
Figure 21.
Block Sites screen
.
2.
Select one of the keyword blocking options:
Per Schedule
. Turn on keyword blocking according to the Schedule screen settings.
Always
. Turn on keyword blocking all the time, independent of the Schedule screen.
3.
In the Keyword field, enter a keyword or domain, click
Add Keyword,
and click
Apply
.
The Keyword list supports up to 32 entries. Here are some sample entries:
Specify .com if you want to allow only sites with domain suffixes such as .edu or .gov.
Enter a period (
.
) to block all Internet browsing access.
Delete a Keyword or Domain
To delete a keyword or domain:
1.
Select the keyword you want to delete from the list.
2.
Click
Delete Keyword
and click
Apply
to save your changes.
Specify a Trusted Computer
You can exempt one trusted computer from blocking and logging. The computer you exempt
has to have a fixed IP address.
Downloaded from
www.Manualslib.com
manuals search engine
Page 50 / 185
Security Settings
50
N600 Wireless Dual Band Gigabit ADSL2+ Modem Router DGND3700
To specify a trusted computer:
1.
In the
Trusted IP Address
field, enter the IP address.
2.
Click
Apply
to save your changes.
Firewall Rules to Control Network Access
By default your router blocks any inbound traffic from the Internet to your computers except
for replies to your outbound traffic. You might need to create exceptions to this rule to allow
remote computers to access a server on your local network or to allow certain applications
and games to work correctly. Your router provides port forwarding and port triggering for
creating these exceptions.
This section covers the following topics:
Remote Computer Access Basics
Port Triggering to Open Incoming Ports
Port Forwarding to Permit External Host Communications
How Port Forwarding Differs from Port Triggering
Configure Port Forwarding to Local Servers
Configure Port Triggering
Remote Computer Access Basics
When a computer on your network needs to access a computer on the Internet, your
computer sends your router a message containing the source and destination address and
process information. Before forwarding your message to the remote computer, your router
has to modify the source information and create and track the communication session so that
replies can be routed back to your computer.
Here is an example of normal outbound traffic and the resulting inbound responses:
1.
You open a browser and your operating system assigns port number 5678 to this
browser session.
2.
You type http://www.example.com into the URL field, and your computer creates a web page
request message with the following address and port information. The request message is
sent to your router.
Source address
. Your computer’s IP address.
Source port number
. 5678, which is the browser session.
Destination address
. The IP address of www.example.com, which your computer finds
by asking a DNS server.
Destination port number
. 80, which is the standard port number for a web server
process.
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top