Page 36 / 61 Scroll up to view Page 31 - 35
TR-69
As a bidirectional SOAP/HTTP-based protocol, it provides the communication between
customer-premises equipment (CPE) and Auto Configuration Servers (ACS). It includes
both a safe auto configuration and the control of other CPE management functions within
an integrated framework. In the course of the boom of the broadband market, the
number of different Internet access possibilities grew as well (e.g. modems, routers,
gateways, set-top box, VoIP-phones). At the same time the configuration of this
equipment became more complicated -- too complicated for the end-users. For this
reason the TR-069 standard was developed. It provides the possibility of auto
configuration of these access types. The technical specifications are managed and
published by the Broadband Forum. Using TR-069, the terminals can get in contact with
the Auto Configuration Servers (ACS) and establish the configuration automatically.
Accordingly other service functions can be provided. TR-069 is the current standard for
activation of terminals in the range of DSL broadband market.
Page 37 / 61
Firewall
The Broadband router provides extensive firewall protection by restricting connection
parameters, thus limiting the risk of hacker attacks, and defending against a wide array
of common Internet attacks. However, for applications that require unrestricted access to
the Internet, you can configure a specific client/server as a Demilitarized Zone (DMZ).
ACL
This page is used to IP addresses for Access Control. If ACL is enabled only the IP
Addresses that are in the ACL Table can access the CPE.
Page 38 / 61
IP Filter
Click “Add a rule” to add a filtering rule.
Enable
: Select to enable IP filter rule.
Source IP
: The source IP address or range of packets to be monitored.
Subnet Mask
: It is the destination IP addresses based on above destination subnet IP
Source Port
: This Port or Port Ranges defines the port allowed to be used by the
Remote/WAN to connect to the application. Default is set from range 0 ~ 65535. It is
recommended that this option be configured by an advanced user.
Destination IP
: This is the destination subnet IP address.
Subnet Mask
: It is the destination IP addresses based on above destination subnet IP
Destination Port
: This is the Port or Port Ranges that defines the application.
Page 39 / 61
When you finish, click ‘Submit’ to save the settings made.
IP Filter Listing
#
: Item number.
Enable
: Whether the connection is currently active.
Src IP Mask
: The source IP address or range of packets to be monitored.
Dest IP Mask
: This is the destination subnet IP address.
Protocol
: It is the packet protocol type used by the application, select either TCP or UDP
or ICMP
Src port
: This Port or Port Ranges defines the port allowed to be used by the
Remote/WAN to connect to the application. Default is set from range 0 ~ 65535. It is
recommended that this option be configured by an advanced user.
Dest Port
: This is the Port or Port Ranges that defines the application.
Page 40 / 61
URL Filter
Here it’s poss
ible to block certain websites.
Enter the website you wish to block and make sure the rule is active.
Click ‘Save’ to app
ly the new rule.
DMZ
The DMZ Host is a local computer exposed to the Internet. When setting a particular
internal IP Address as the DMZ Host, all incoming packets will be checked by the firewall
and NAT algorithms then passed to the DMZ Host.
Enable DMZ and enter the IP address for which you want unrestricted access to the
internet in the DMZ Host IP address. Click Apply to save and apply the settings.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top