Page 36 / 69 Scroll up to view Page 31 - 35
E
|
3
Authentication Mode
It shows the active authentication mode for the
wireless connection.
Passphrase Key
It shows the passphrase key that is randomly generated by
the wireless router during the WPS process. You may need this information
when using a device which doesn’t support WPS.
WPS via Push Button
Press the button to start the WPS process. The router
will wait for the WPS request from the wireless devices within 2 minutes.
WPS via PIN
You can fill-in the PIN code of the wireless device and press the
button to start the WPS process. The router will wait for the WPS request
from the wireless device within 2 minutes.
Page 37 / 69
E
|
3
13
Firewall Settings
The Broadband router provides extensive firewall protection by restricting
connection parameters, thus limiting the risk of hacker attacks, and defending
against a wide array of common Internet attacks. However, for applications that
require unrestricted access to the Internet, you can configure a specific
client/server as a Demilitarized Zone (DMZ).
Note: To enable the Firewall settings select Enable and click Apply
Page 38 / 69
E
|
3
DMZ
If you have a client PC that cannot run an Internet application (e.g. Games)
properly from behind the NAT firewall, then you can open up the firewall
restrictions to unrestricted two-way Internet access by defining a DMZ Host.
The DMZ function allows you to re-direct all packets going to your WAN port
IP address to a particular IP address in your LAN. The difference between the
virtual server and the DMZ function is that the virtual server re-directs a
particular service/Internet application (e.g. FTP, websites) to a particular LAN
client/server, whereas DMZ re-directs all packets (regardless of services)
going to your WAN IP address to a particular LAN client/server.
Enable DMZ
Enable/disable DMZ
Public IP Address
The IP address of the WAN port or any other Public IP
addresses given to you by your ISP
Client PC IP Address
Fill-in the IP address of a particular host in your LAN
that will receive all the packets originally going to the WAN port/Public IP
address above.
Click
<Apply>
at the bottom of the screen to save the above configurations.
Page 39 / 69
E
|
3
Denial of Service (DoS)
The Broadband router's firewall can block common hacker attacks, including
Denial of Service, Ping of Death, Port Scan and Sync Flood. If Internet attacks
occur the router can log the events.
Ping of Death
Protections from Ping of Death attack
Discard Ping From WAN
The router’s WAN port will not respond to any Ping
requests
Port Scan
Protects the router from Port Scans.
Sync Flood
Protects the router from Sync Flood attack.
Page 40 / 69
E
|
3
Access
You can restrict users from accessing certain Internet applications/services
(e.g. Internet websites, email, FTP etc.), Access Control allows users to define
the traffic type permitted in your LAN. You can control which PC client can
have access to these services.
Deny
If you select “Deny” then all clients will be allowed to access Internet
accept for the clients in the list below.
Allow
If you select “Allow” then all clients will be denied to access Internet
accept for the PCs in the list below.
Filter client PCs by IP
Fill in “IP Filtering Table” to filter PC clients by IP.
Add PC
You can click Add PC to add an access control rule for users by IP
addresses.
Remove PC
If you want to remove some PCs from the "IP Filtering Table",
select the PC you want to remove in the table and then click “Delete
Selected". If you want to remove all PCs from the table, just click the "Delete
All" button.
Filter client PC by MAC
Check “Enable MAC Filtering” to enable MAC
Filtering.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top