2
v1.1, March 2009
Wireless Security Options
........................................................................................
2-3
Manually Configuring Your Wireless Settings
.................................................................
2-4
Specifying Wireless Security
..........................................................................................
2-7
Wireless Station Access Control
..............................................................................
2-7
Restricting Access by MAC Address
........................................................................
2-8
Configuring WEP
....................................................................................................
2-10
Configuring WPA, WPA2, or WPA/WPA2
...............................................................
2-11
Advanced Wireless Settings
.........................................................................................
2-12
Using Push 'N' Connect (WPS) to Configure Your Wireless Network
..........................
2-13
Using a WPS Button to Add a WPS Client
.............................................................
2-14
Using PIN Entry to Add a WPS Client
....................................................................
2-15
Connecting Additional Wireless Client Devices After WPS Setup
................................
2-17
Adding More WPS Clients
......................................................................................
2-17
Adding Both WPS and Non-WPS Clients
..............................................................
2-17
Chapter 3
Protecting Your Network
Protecting Access to Your Wireless Router
....................................................................
3-1
Changing the Built-In Password
...............................................................................
3-1
Changing the Administrator Login Time-out
.............................................................
3-2
Configuring Basic Firewall Services
...............................................................................
3-2
Blocking Keywords, Sites, and Services
..................................................................
3-3
Firewall Rules
.................................................................................................................
3-5
Inbound Rules (Port Forwarding)
.............................................................................
3-6
Outbound Rules (Service Blocking)
.........................................................................
3-8
Order of Precedence for Rules
..............................................................................
3-10
Services
........................................................................................................................
3-10
Defining Services
...................................................................................................
3-11
Setting Times and Scheduling Firewall Services
..........................................................
3-11
Setting Your Time Zone
..........................................................................................
3-12
Scheduling Firewall Services
.................................................................................
3-13
Chapter 4
Managing Your Network
Backing Up, Restoring, or Erasing Your Settings
...........................................................
4-1
Backing Up the Configuration to a File
.....................................................................
4-1
Restoring the Configuration from a File
...................................................................
4-2