Page 26 / 122 Scroll up to view Page 21 - 25
22
Chapter 5
Bandwidth Control
1 )
IP Range:
Enter the IP address. The field can be single IP
address or IP address range according to your demands.
When you configure the single IP address, the computer
with
this
IP
address
will
get
independent
given
bandwidth. When you configure the IP address range, all
computers in the range will share the given bandwidth.
2 )
Port Range:
Keep the default settings. The default port
range of TCP protocol or UDP protocol is from 1 to 65535.
3 )
Protocol:
Keep the default setting. Or you can choose the
TCP protocol or UDP protocol or both of them.
4 )
Priority:
Keep the default setting. You can change the
value if you want to first guarantee the bandwidth for
one computer. The smaller value has the higher priority.
5 )
Upstream/Downstream:
Enter the bandwidth according
to your division.
6 ) Check to enable this entry and click
OK
to save the
settings.
Follow the steps above to add a rule for the other computer.
And then you will get the following table.
Page 27 / 122
23
Chapter 5
Bandwidth Control
Now you and your roommate have an independent bandwidth.
Done!
Page 28 / 122
Chapter
6
Network Security
This chapter guides you on how to protect your home network from unauthorized
users by implementing these three network security functions. You can block or allow
specific client devices to access your wireless network using MAC Filtering, or using
Access Control for wired and wireless networks, or you can prevent ARP spoofing and
ARP attacks using IP & MAC Binding.
MAC Filtering
Access Control
IP & MAC Binding
Page 29 / 122
25
Chapter 6
Network Security
6° 1°
MAC Filtering
This function exploits the uniqueness of the MAC (Medium Access Control) address,
a unique 12-digit hexadecimal address (for example, D8:5D:4C:B4:46:EA) of every
network device, to determine if the device can or cannot access your wireless network.
Prevent unauthorized users from accessing my wireless network
by utilizing the network device’s MAC address and IP address.
For example
, I have a computer that is connected to my wireless
network. Now, an unknown device (an intruder) is also using my
wireless network, which affects my Internet speed. I would like
to control my wireless network with the following capabilities:
• My computer is always allowed to access the wireless network.
• The unknown device is not allowed to access the wireless
network.
• I don’t have to keep changing my wireless password as often.
Visit
http://tplinkmodem.net
, and log in with the password
you set for the router.
Go to
Advanced
>
Wireless
>
MAC Filtering
and enable
Wireless MAC Filtering
.
Select the filtering rule to either block (recommended) or
allow the device(s) in the list.
To block
/
allow specific device(s)
1 ) Select
Below wireless access only from the devices in the
below list
or
Allow wireless access only from the devices
in the below list
and click
Save
.
2 ) Click
Add
.
I want to:
How can I
do that?
Page 30 / 122
26
Chapter 6
Network Security
3 ) Click
View Existing Device
to display the existing online
device. Then select the device(s) in the table. The
MAC Address of the selected devices will be added
automatically.
4 ) Enter the
Description
of the device.
5 ) Select the checkbox to enable this entry, and click
OK
.
Now MAC Filtering is implemented to protect your wireless
network.
6° 2°
Access Control
Access Control is used to block or allow specific client devices to access your network
(via wired or wireless) based on a list of blocked devices (Blacklist) or a list of allowed
devices (Whitelist).
Block or allow specific client devices to access my network (via
wired or wireless).
Visit
http://tplinkmodem.net
, and log in with the password
you set for the router.
Go to
Advanced
>
Security
>
Access Control
and enable
Access Control.
Done!
I want to:
How can I
do that?

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top