Page 66 / 139 Scroll up to view Page 61 - 65
55
Advanced_Inbound Filter
When you use the Virtual Server, Gaming, or Remote Administration features to open
specific ports to traffic from the Internet, you could be increasing the exposure of your LAN
to cyber attacks from the Internet. In these cases, you can use Inbound Filters to limit that
exposure by specifying the IP addresses of internet hosts that you trust to access your LAN
through the ports that you have opened. You might, for example, only allow access to a
game server on your home LAN from the computers of friends whom you have invited to
play the games on that server.
Inbound Filters can be used for limiting access to a server on your network to a system or
group of systems. Filter rules can be used with Virtual Server, Gaming, or Remote
Administration features. Each filter can be used for several functions; for example a "Game
Clan" filter might allow all of the members of a particular gaming group to play several
different games for which gaming entries have been created. At the same time an "Admin"
filter might only allows systems from your office network to access the WAN admin pages
and an FTP server you use at home. If you add an IP address to a filter, the change is
effected in all of the places where the filter is used.
Page 67 / 139
56
Add/Edit Inbound Filter Rule
Here you can add entries to the Inbound Filter Rules List below, or edit existing
entries.
Name
Enter a name for the rule that is meaningful to you.
Action
The rule can either Allow or Deny messages.
Source IP Range
Define the ranges of Internet addresses this rule applies to. For a single IP
address, enter the same address in both the
Start
and
End
boxes. Up to eight
Page 68 / 139
57
ranges can be entered. The
Enable
checkbox allows you to turn on or off
specific entries in the list of ranges.
Save
Saves the new or edited Inbound Filter Rule in the following list. When finished
updating the Inbound Filter Rules List, you must still click the
Save Settings
button at the top of the page to make the changes effective and permanent.
Inbound Filter Rules List
The section lists the current Inbound Filter Rules. An Inbound Filter Rule can be
changed by clicking the Edit icon, or deleted by clicking the Delete icon. When you
click the Edit icon, the item is highlighted, and the "Edit Inbound Filter Rule" section
is activated for editing.
In addition to the filters listed here, two predefined filters are available wherever
inbound filters can be applied:
Allow All
Permit any WAN user to access the related capability.
Deny All
Prevent all WAN users from accessing the related capability. (LAN users are
not affected by Inbound Filter Rules.)
Page 69 / 139
58
Advanced_Advanced Wireless
Transmit Power
Normally the wireless transmitter operates at 100% power. In some circumstances,
however, there might be a need to isolate specific frequencies to a smaller area. By
reducing the power of the radio, you can prevent transmissions from reaching
beyond your corporate/home office or designated wireless area.
Beacon Period
Beacons are packets sent by a wireless router to synchronize wireless devices.
Specify a Beacon Period value between 20 and 1000. The default value is set to 100
milliseconds.
RTS Threshold
This setting should remain at its default value of 2346. If you encounter inconsistent
data flow, only minor modifications to the value are recommended.
Page 70 / 139
59
Fragmentation Threshold
This setting should remain at its default value of 2346. Setting the Fragmentation
value too low may result in poor performance.
DTIM Interval
A DTIM is a countdown informing clients of the next window for listening to broadcast
and multicast messages. When the wireless router has buffered broadcast or
multicast messages for associated clients, it sends the next DTIM with a DTIM
Interval value. Wireless clients detect the beacons and awaken to receive the
broadcast and multicast messages. The default value is 1. Valid settings are
between 1 and 255.
Short GI
Using a short (400ns) guard interval can increase throughput. However, it can also
increase error rate in some installations, due to increased sensitivity to
radio-frequency reflections. Select the option that works best for your installation.
Extra Wireless Protection
Extra protection for neighboring 11b wireless networks. Turn this option off to reduce
the adverse effect of legacy wireless networks on 802.11ng performance.
WDS Enable
When WDS is enabled, this access point functions as a wireless repeater and is able
to wirelessly communicate with other APs via WDS links. Note that WDS is
incompatible with WPA -- both features cannot be used at the same time. A WDS
link is bidirectional; so this AP must know the MAC Address (creates the WDS link)
of the other AP, and the other AP must have a WDS link back to this AP. Make sure
the APs are configured with same channel number.
WDS AP MAC Address
Specifies one-half of the WDS link. The other AP must also have the MAC address
of this AP to create the WDS link back to this AP. Enter a MAC address for each of
the other APs that you want to connect with WDS.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top