Page 71 / 122 Scroll up to view Page 66 - 70
TL-MR3220
3G/3.75G Wireless Lite N Router
-64-
Click the
Disabled All
button to make all entries disabled.
Click the
Delete All
button to delete all entries
)
Note:
1)
When the trigger connection is released, the according opening ports will be closed.
2)
Each rule allowed to be used only by one host on LAN synchronously. The trigger
connection of other hosts on LAN will be refused.
3)
Incoming Port Range cannot overlap each other.
4.8.3 DMZ
Choose menu “
Forwarding
DMZ
”, you can view and configure DMZ host in the screen
(shown in Figure 4-41).The DMZ host feature allows one local host to be exposed to the
Internet for a special-purpose service such as Internet gaming or videoconferencing. DMZ host
forwards all the ports at the same time. Any PC whose port is being forwarded must have its
DHCP client function disabled and should have a new static IP Address assigned to it because
its IP Address may be changed when using the DHCP function.
Figure 4-41
DMZ
To assign a computer or server to be a DMZ server:
1.
Click the
Enable
radio button
2.
Enter the local host IP Address in the
DMZ Host IP Address
field
3.
Click the
Save
button.
)
Note
:
After you set the DMZ host, the firewall related to the host will not work.
4.8.4 UPnP
Choose menu “
Forwarding
UPnP
”, you can view the information about
UPnP
(Universal Plug
and Play) in the screen (shown in Figure 4-42).The UPnP feature allows the devices, such as
Internet computers, to access the local host resources or devices as needed. UPnP devices
can be automatically discovered by the UPnP service application on the LAN.
Downloaded from
www.Manualslib.com
manuals search engine
Page 72 / 122
TL-MR3220
3G/3.75G Wireless Lite N Router
-65-
Figure 4-42
UPnP Setting
¾
Current UPnP Status -
UPnP can be enabled or disabled by clicking the
Enable
or
Disable
button. As allowing this may present a risk to security, this feature is enabled by
default.
¾
Current UPnP Settings List -
This table displays the current UPnP information.
z
App Description -
The description provided by the application in the UPnP request
z
External Port
-
External port, which the router opened for the application.
z
Protocol -
Shows which type of protocol is opened.
z
Internal Port
-
Internal port, which the router opened for local host.
z
IP Address
-
The UPnP device that is currently accessing the router.
z
Status -
The port’s status displayed here. “Enabled” means that port is still active.
Otherwise, the port is inactive.
Click
Refresh
to update the Current UPnP Settings List.
4.9
Security
Figure 4-43
The Security menu
There are four submenus under the Security menu as shown in Figure 4-43:
Basic Security
,
Advanced Security
,
Local Management
and
Remote Management.
Click any of them, and
you will be able to configure the corresponding function.
Downloaded from
www.Manualslib.com
manuals search engine
Page 73 / 122
TL-MR3220
3G/3.75G Wireless Lite N Router
-66-
4.9.1 Basic Security
Choose menu “
Security
Basic Security
”, you can configure the basic security in the
screen as shown in Figure 4-37.
Figure 4-44
Basic Security
¾
Firewall -
A firewall protects your network from the outside world. Here you can enable or
disable the Router’s firewall.
z
SPI Firewall -
SPI (Stateful Packet Inspection, also known as dynamic packet filtering)
helps to prevent cyber attacks by tracking more state per session. It validates that the
traffic passing through the session conforms to the protocol. SPI Firewall is enabled by
factory default. If you want all the computers on the LAN exposed to the outside world,
you can disable it.
¾
VPN -
VPN Passthrough must be enabled if you want to allow VPN tunnels using IPSec,
PPTP, or L2TP protocols to pass through the Router’s firewall.
z
PPTP Passthrough -
Point-to-Point Tunneling Protocol (PPTP) allows the
Point-to-Point Protocol (PPP) to be tunneled through an IP network. To allow PPTP
tunnels to pass through the Router, keep the default,
Enabled
.
z
L2TP Passthrough
-
Layer 2 Tunneling Protocol (L2TP) is the method used to enable
Point-to-Point sessions via the Internet on the Layer 2 level. To allow L2TP tunnels to
pass through the Router, keep the default,
Enabled
.
z
IPSec Passthrough
-
Internet Protocol Security (IPSec) is a suite of protocols for
ensuring private, secure communications over Internet Protocol (IP) networks, through
Downloaded from
www.Manualslib.com
manuals search engine
Page 74 / 122
TL-MR3220
3G/3.75G Wireless Lite N Router
-67-
the use of cryptographic security services. To allow IPSec tunnels to pass through the
Router, keep the default,
Enabled
.
¾
ALG -
It is recommended to enable Application Layer Gateway (ALG) because ALG allows
customized Network Address Translation (NAT) traversal filters to be plugged into the
gateway to support address and port translation for certain application layer "control/data"
protocols such as FTP, TFTP, H323 etc.
z
FTP ALG -
To allow FTP clients and servers to transfer data across NAT, keep the
default
Enable.
z
TFTP ALG -
To allow TFTP clients and servers to transfer data across NAT, keep the
default
Enable.
z
H323 ALG -
To allow Microsoft NetMeeting clients to communicate across NAT, keep
the default
Enable
.
Click the
Save
button to save your settings.
4.9.2 Advanced Security
Choose menu “
Security
Advanced Security
”, you can protect the Router from being
attacked by TCP-SYN Flood, UDP Flood and ICMP-Flood in the screen as shown in Figure
4-45.
Downloaded from
www.Manualslib.com
manuals search engine
Page 75 / 122
TL-MR3220
3G/3.75G Wireless Lite N Router
-68-
Figure 4-45
Advanced Security
¾
Packets Statistics Interval (5~60) -
The default value is 10. Select a value between 5
and 60 seconds from the drop-down list. The Packets Statistics Interval value indicates
the time section of the packets statistics. The result of the statistics is used for analysis by
SYN Flood, UDP Flood and ICMP-Flood.
¾
DoS Protection -
Denial of Service protection. Check the Enable or Disable button to
enable or disable the DoS protection function. Only when it is enabled, will the flood filters
be enabled.
)
Note:
Dos Protection will take effect only when the
Traffic Statistics
in “
System Tool
Traffic
Statistics
” is enabled.
¾
Enable ICMP-FLOOD Attack Filtering
-
Enable or Disable the ICMP-FLOOD Attack
Filtering.
¾
ICMP-FLOOD Packets Threshold (5~3600)
-
The default value is 50. Enter a value
between 5
~
3600. When the current ICMP-FLOOD Packets number is beyond the set
value, the Router will startup the blocking function immediately.
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top