Page 76 / 131 Scroll up to view Page 71 - 75
Security
76
R6200v2 Smart WiFi Router
can usually determine this information by contacting the publisher of the application or user
groups or news groups.
To enable port triggering:
1.
Select
ADVANCED > Advanced Setup > Port Forwarding/Port Triggering
.
2.
Select the
Port Triggering
radio button.
3.
Clear the
Disable Port Triggering
check box.
Note:
If the Disable Port Triggering check box is selected after you
configure port triggering, port triggering is disabled. However, any
port triggering configuration information you added to the router is
retained even though it is not used.
4.
In the Port Triggering Time-out field, enter a value up to 9999 minutes.
This value controls the inactivity timer for the designated inbound ports. The inbound
ports close when the inactivity time expires. The time-out value is required so that the
router can determine when the application has terminated.
To add a port triggering service:
1.
On the Port Forwarding/Port Triggering screen, click the
Add Service
button.
Page 77 / 131
Security
77
R6200v2 Smart WiFi Router
2.
In the Service Name field, type a descriptive service name.
3.
In the Service User list, select
Any,
or select
Single address
and enter the IP address of
one computer.
Any
(the default), allows any computer on the Internet to use this service.
Single address
restricts the service to a particular computer.
4.
Select the service type, either
TCP
or
UDP
or
TCP/UDP
(both). If you are not sure, select
TCP/UDP.
5.
In the Triggering Port field, enter the number of the outbound traffic port that will trigger the
inbound ports to open.
6.
Enter the inbound connection port information in the Connection Type, Starting Port, and
Ending Port fields.
7.
Click the
Apply
button.
The service appears in the Port Triggering Portmap table.
8.
Make sure that you enable port triggering so that the service that you added will be used.
Schedule Blocking
You can specify the days and time that you want to block Internet access.
To schedule blocking:
1.
Select
ADVANCED > Security > Schedule
.
2.
Set up the schedule for blocking keywords and services.
Days to Block
. Select days on which you want to apply blocking by selecting the
appropriate check boxes, or select the
Every Day
check box to select the check
boxes for all days.
Time of Day to Block
. Select a start and end time in 24-hour format, or select the
All
Day
check box for 24-hour blocking.
Page 78 / 131
Security
78
R6200v2 Smart WiFi Router
3.
Select your time zone from the list. If you use daylight savings time, select the
Automatically adjust for daylight savings time
check box.
4.
Click the
Apply
button.
Your settings are saved.
Set Up Security Event Email Notifications
To receive logs and alerts by email, provide your email information in the E-mail screen, and
specify which alerts you want to receive and how often.
To set up email notifications:
1.
Select
ADVANCED > Security >
E-mail
.
2.
Select the
Turn E-mail Notification On
check box.
3.
In the Your Outgoing Mail Server field, enter the name of your ISP’s outgoing (SMTP) mail
server (such as mail.myISP.com).
You might be able to find this information in the configuration screen of your email
program. If you leave this field blank, log and alert messages are not sent.
4.
Enter the email address to which logs and alerts are sent in the Send to This E-mail Address
field.
This email address is also used for the From address. If you leave this field blank, log and
alert messages are not sent.
5.
If your outgoing email server requires authentication, select the
My Mail Server requires
authentication
check box. Fill in the User Name and Password fields for the outgoing email
server.
6.
(Optional) Select the
Send Alerts Immediately
check box.
Email alerts are sent immediately when someone attempts to visit a blocked site.
7.
(Optional) Fill in the fields in the Send logs according to this schedule section of the screen.
Page 79 / 131
Security
79
R6200v2 Smart WiFi Router
Logs are sent automatically. If the log fills up before the specified time, the log is emailed.
After the log is sent, the log is cleared from the router memory. If the router cannot email
the log file, the log buffer might fill up. In this case, the router overwrites the log and
discards its contents.
8.
Click the
Apply
button.
Your settings are saved.
Page 80 / 131
80
8
8.
Administration
Managing your network
This chapter describes the router settings for administering and maintaining your router and
home network.
This chapter includes the following sections:
Update the Router Firmware
View Router Status
View Logs
Manage the Configuration File
Change the Password
Password Recovery
For information about upgrading or checking the status of your router over the Internet, see
Remote Management
on page
103. For information about monitoring Internet traffic, see
Traffic
Meter
on page
114.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top