Page 31 / 74 Scroll up to view Page 26 - 30
Chapter 2: WEB Configuration
26
Advanced
1. Options
This page allows you to enable/disable some features of the Wireless Gateway.
Fig. 17
z
WAN Blocking
prevents others on the WAN side from being able to ping your gateway. With WAN
Blocking enabled, your gateway will not respond to pings it receives, effectively “hiding” your
gateway.
z
Ipsec PassThrough
enables IpSec type packets to pass WAN
Ù
LAN. IpSec (IP Security) is a
security mechanism used in Virtual Private Networks (VPNs).
z
PPTP PassThrough
enables PPTP type packets to pass WAN
Ù
LAN. PPTP (Point to Point
Tunneling Protocol) is another mechanism sometimes used in VPNs.
z
Remote Config Management
makes the configuration web pages in your gateway accessible from
the WAN side. Note that page access is limited to only those who know the gateway access password.
When accessing your gateway from a remote location, your must use HTTP port 8080 and the WAN
IP address of the gateway. For example, if the WAN IP address is 157.254.5.7, you would navigate to
to reach your gateway.
z
Multicast Enable
enables multicast traffic to pass WAN
Ù
LAN. You may need to enable this to see
some types of broadcast streaming and content on the Internet.
z
UPnP
Universal Plug and Play (UPnP) helps devices, such as Internet appliances and computers,
access the network and connect to other devices as needed. UPnP devices can automatically discover
Illustrations contained in this document are for representation only.
Page 32 / 74
Chapter 2: WEB Configuration
27
the services from other registered UPnP devices on the network.
z
NatSip Alg Enable
feature enabled by default. While ALG could help in solving NAT related problems in client
LAN side. An ALG understands the protocol used by the specific applications that it supports and does a protocol
packet-inspection of SIP traffic through it. A NAT router with inbuilt SIP ALG can re-write information within the
SIP messages (SIP headers and SDP body) making possible signaling and audio traffic between LAN client and
outside SIP endpoint.
2. IP Filtering
This page enables you to enter the IP address ranges of PCs on your LAN that you don’t want to have outbound access to
the WAN. These PCs can still communicate with each other on your LAN, but packets they originate to WAN addresses
are blocked by the gateway.
Fig. 18
Illustrations contained in this document are for representation only.
Page 33 / 74
Chapter 2: WEB Configuration
28
3. MAC Filtering
This page enables you to enter the MAC address of specific PCs on your LAN that you wish to NOT have
outbound access to the WAN. As with IP filtering, these PCs can still communicate with each other
through the gateway, but packets they send to WAN addresses are blocked.
Fig. 19
Illustrations contained in this document are for representation only.
Page 34 / 74
Chapter 2: WEB Configuration
29
4. Port Filtering
This page allows you to enter ranges of destination ports (applications) that you don’t want your LAN
PCs to send packets to. Any packets your LAN PCs send to these destination ports will be blocked. For
example, you could block access to worldwide web browsing (http = port 80) but still allow email service
(SMTP port 25 and POP-3 port 110). To enable port filtering, set Start Port and End Port for each range,
and click Apply. To block only one port, set both Start and End ports the same.
Fig. 20
Illustrations contained in this document are for representation only.
Page 35 / 74
Chapter 2: WEB Configuration
30
5. Forwarding
For LAN
Ù
WAN communications, the gateway normally only allows you to originate an IP connection
with a PC on the WAN; it will ignore attempts of the WAN PC to originate a connection onto your PC.
This protects you from malicious attacks from outsiders. However, sometimes you may wish for anyone
outside to be able to originate a connection to a particular PC on your LAN if the destination port
(application) matches one you specify.
This page allows you to specify up to 10 such rules. For example, to specify that outsiders should have
access to an FTP server you have running at 192.168.0.5, create a rule with that address and Start Port
=20 and End Port =21 (FTP port ranges) and Protocol = TCP (FTP runs over TCP and the other transport
protocol, UDP), and click Apply. This will cause inbound packets that match to be forwarded to that PC
rather than blocked. As these connections are not tracked, no entry is made for them in the Connection
Table. The same IP address can be entered multiple times with different
ports.
Fig. 21
Illustrations contained in this document are for representation only.

Rate

124.8 / 5 based on 304 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top