LINKSYS HGA5S-3 Wireless-G VPN Broadband Router User Manual Book

LINKSYS LLC Wireless-G VPN Broadband Router Book

Users Manual Part 2

Download: LINKSYS HGA5S-3 Wireless-G VPN Broadband Router User Manual Book
Mirror Download [FCC.gov]LINKSYS HGA5S-3 Wireless-G VPN Broadband Router User Manual Book
Document ID489900
Application IDnZPr4MRNMwy6R0DA1Mnrxg==
Document DescriptionUsers Manual Part 2
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize259.18kB (3239767 bits)
Date Submitted2004-11-19 00:00:00
Date Available2004-11-19 00:00:00
Creation Date2004-11-17 18:08:44
Producing SoftwareAcrobat Distiller 5.0.5 (Windows)
Document Lastmod2004-11-17 18:09:14
Document TitleBook Template.book
Document CreatorFrameMaker 7.0
Document Author: rebecca

Wireless-G VPN Broadband Router
Figure 5-8: IP Address
Chapter 5: Configuring the PCs
Configuring Windows XP PCs
17
Wireless-G VPN Broadband Router
Chapter 6: Configuring the Router
Overview
Linksys recommends using the Setup CD-ROM for first-time installation of the Router and setting up additional
computers. If you do not wish to run the Setup Wizard on the Setup CD-ROM, then follow the steps in this chapter
and use the Router’s web-based utility to configure the Router. This chapter will describe each web page in the
Utility and each page’s key functions. The utility can be accessed via your web browser through use of a
computer connected to the Router. For a basic network setup, most users only have to use the following screens
of the Utility:
• Basic Setup. On the Basic Setup screen, enter the settings provided by your ISP.
• Management. Click the Administration tab and then the Management tab. The Router’s default password is
admin. To secure the Router, change the Password from its default.
There are seven main tabs: Setup, Wireless, Security, Access Restrictions, Applications & Gaming,
Administration, and Status. Additional tabs will be available after you click one of the main tabs.
Setup
Note: The Router is designed to function
properly after connecting the Router to your
network. This chapter is provided solely for
those who wish to perform more advanced
Have You: Enabled TCP/IP on your PCs? PCs
communicate over the network with this
protocol. Refer to Appendix D: Windows Help for
more information on TCP/IP.
Note: For added security, you should change
the password through the Administration
screen of the web-based utility.
• Basic Setup. Enter the Internet connection and network settings on this screen.
• DDNS. To enable the Router’s Dynamic Domain Name System (DDNS) feature, complete the fields on this
screen.
• MAC Address Clone. If you need to clone a MAC address onto the Router, use this screen.
• Advanced Routing. On this screen, you can alter Network Address Translation (NAT), Dynamic Routing, and
Static Routing configurations.
NAT (Network Address Translation): NAT
technology translates IP addresses of a local area
network to a different IP address for the Internet.
• Hot Spot. Register with your Hot Spot service provider on this screen.
Wireless
• Basic Wireless Settings. You can choose your Wireless Network Mode and Wireless Security on this screen.
• Wireless Network Access. This screen displays your network access list.
Chapter 6: Configuring the Router
Overview
18
Wireless-G VPN Broadband Router
• Advanced Wireless Settings. On this screen you can access the Advanced Wireless features of Authentication
Type, Basic Data Rates, Control Tx Rates, Beacon Interval, DTIM Interval, RTS Threshold, and Fragmentation
Threshold.
Beacon Interval :The frequency interval of the
beacon, which is a packet broadcast by a
router to synchronize a wireless network.
Security
• Filter. To block specific users from Internet access, you can set up IP address, port, and MAC address filtering
on the Filter screen.
DTIM (Delivery Traffic Indication Message):
A message included in data packets that can
increase wireless efficiency.
• VPN. To enable or disable IPSec, L2TP, and/or PPTP Pass-through, and set up VPN tunnels, use this screen.
• 802.1x. Use this screen to set up RADIUS authentication.
Access Restrictions
• Access Restriction. This screen allows you to prevent or permit only certain users from attaching to your
network.
Applications & Gaming
• Port Range Forwarding. To set up public services or other specialized Internet applications on your network,
click this tab.
RTS (Request To Send): A packet sent when a
computer has data to transmit. The computer
will wait for a CTS (Clear To Send) message
before sending data.
Fragmentation: Breaking a packet into smaller
units when transmitting over a network medium
that cannot support the original size of the
packet.
• Port Triggering. To set up triggered ranges and forwarded ranges for Internet applications, click this tab.
• UPnP Forwarding. Use this screen to alter UPnP forwarding settings.
• DMZ. To allow one local user to be exposed to the Internet for use of special-purpose services, use this
screen.
Administration
• Management. On this screen, alter router access privileges and UPnP settings.
• Log. If you want to view or save activity logs, click this tab.
• Diagnostics. Use this screen to check the connection between your Router and PC.
• Factory Defaults. If you want to restore the Router’s factory defaults, then use this screen.
• Firmware Upgrade. Click this tab if you want to upgrade the Router’s firmware.
Chapter 6: Configuring the Router
Overview
19
Wireless-G VPN Broadband Router
Status
• Router. This screen provides status information about the Router.
• Local Network. This provides status information about the local network.
How to Access the Web-based Utility
To access the web-based utility, launch Internet Explorer or Netscape Navigator, and enter the Router’s default IP
address, 192.168.1.1, in the Address field. Then press Enter.
A password request page, shown in Figure 6-1 will appear. (non-Windows XP users will see a similar screen.)
Enter admin (the default user name) in the User Name field, and enter admin (the default password) in the
Password field. Then click the OK button.
Figure 6-1: Password Screen
The Setup Tab
The Basic Setup Tab
The first screen that appears is the Basic Setup tab. (See Figure 6-2.) This tab allows you to change the Router's
general settings. Change these settings as described here and click the Save Settings button to save your
changes or Cancel Changes to cancel your changes.
Internet Setup
• Internet Connection Type. The Router supports four connection types: Automatic Configuration - DHCP (the
default connection type), PPPoE, Static IP, and PPTP. Each Basic Setup screen and available features will
differ depending on what kind of connection type you select.
Automatic Configuration - DHCP
By default, the Router’s Configuration Type is set to Automatic Configuration - DHCP, and it should be kept
only if your ISP supports DHCP or you are connecting through a dynamic IP address.
Figure 6-2: Setup Tab/DHCP Internet Connection Type
Chapter 6: Configuring the Router
How to Access the Web-based Utility
20
Wireless-G VPN Broadband Router
Static (See Figure 6-3.)
If you are required to use a permanent IP address to connect to the Internet, then select Static IP.
• IP Address. This is the Router’s IP address, when seen from the WAN, or the Internet. Your ISP will provide
you with the IP Address you need to specify here.
• Subnet Mask. This is the Router’s Subnet Mask, as seen by external users on the Internet (including your
ISP). Your ISP will provide you with the Subnet Mask.
• Default Gateway. Your ISP will provide you with the Default Gateway Address, which is the ISP server’s IP
address.
• Primary DNS. (Required) and Secondary DNS (Optional). Your ISP will provide you with at least one DNS
(Domain Name System) Server IP Address.
When finished making your changes on this tab, click the Save Settings button to save these changes, or
click the Cancel Changes button to undo your changes.
PPPoE (See Figure 6-4.)
Figure 6-3: Static Internet Connection Type
Some DSL-based ISPs use PPPoE (Point-to-Point Protocol over Ethernet) to establish Internet connections. If
you are connected to the Internet through a DSL line, check with your ISP to see if they use PPPoE. If they do,
you will have to enable PPPoE.
• User Name and Password. Enter the User Name and Password provided by your ISP.
• Connect on Demand: Max Idle Time. You can configure the Router to cut the Internet connection after it
has been inactive for a specified period of time (Max Idle Time). If your Internet connection has been
terminated due to inactivity, Connect on Demand enables the Router to automatically re-establish your
connection as soon as you attempt to access the Internet again. If you wish to activate Connect on
Demand, click the radio button. In the Max Idle Time field, enter the number of minutes you want to have
elapsed before your Internet connection terminates.
• Keep Alive Option: Redial Period. If you select this option, the Router will periodically check your Internet
connection. If you are disconnected, then the Router will automatically re-establish your connection. To
use this option, click the radio button next to Keep Alive. In the Redial Period field, you specify how often
you want the Router to check the Internet connection. The default Redial Period is 30 seconds.
When finished making your changes on this tab, click the Save Settings button to save these changes, or
click the Cancel Changes button to undo your changes.
Figure 6-4: PPPoE Internet Connection Type
Chapter 6: Configuring the Router
The Setup Tab
21
Wireless-G VPN Broadband Router
PPTP (See Figure 6-5.)
Point to Point Tunneling Protocol (PPTP) is a service that applies to connections in Europe only (see Figure 68).
• Internet IP Address. This is the Router’s IP address, when seen from the Internet. Your ISP will provide you
with the IP Address you need to specify here.
• Subnet Mask. This is the Router’s Subnet Mask, as seen by external users on the Internet (including your
ISP). Your ISP will provide you with the Subnet Mask.
• Default Gateway. Your ISP will provide you with the Default Gateway Address.
• User Name and Password. Enter the User Name and Password provided by your ISP.
• Connect on Demand: Max Idle Time. You can configure the Router to cut the Internet connection after it
has been inactive for a specified period of time (Max Idle Time). If your Internet connection has been
terminated due to inactivity, Connect on Demand enables the Router to automatically re-establish your
connection as soon as you attempt to access the Internet again. If you wish to activate Connect on
Demand, click the radio button. In the Max Idle Time field, enter the number of minutes you want to have
elapsed before your Internet connection terminates.
• Keep Alive Option: Redial Period. If you select this option, the Router will periodically check your Internet
connection. If you are disconnected, then the Router will automatically re-establish your connection. To
use this option, click the radio button next to Keep Alive. To use this option, click the radio button next to
Keep Alive. In the Redial Period field, you specify how often you want the Router to check the Internet
connection. The default Redial Period is 30 seconds.
Figure 6-5: PPTP Internet Connection Type
When finished making your changes on this tab, click the Save Settings button to save these changes, or
click the Cancel Changes button to undo your changes.
Optional Settings (Required by some ISPs)
• Host Name and Domain Name. These fields allow you to supply a host and domain name for the Router. Some
ISPs require these names as identification. You may have to check with your ISP to see if your broadband
Internet service has been configured with a host and domain name. In most cases, leaving these fields blank
will work.
• MTU. The MTU (Maximum Transmission Unit) setting specifies the largest packet size permitted for network
transmission. Select Enabled and enter the value desired. It is recommended that you leave this value in the
Chapter 6: Configuring the Router
The Setup Tab
22
Wireless-G VPN Broadband Router
1200 to 1500 range. For most DSL users, it is recommended to use the value 1492. By default, MTU is set at
1500 when disabled.
Network Setup
• Gateway IP. The values for the Router’s Local IP Address and Subnet Mask are shown here. In most cases,
keeping the default values will work.
• Local IP Address. The default value is 192.168.1.1.
• Subnet Mask. The default value is 255.255.255.0.
• Network Address Server Settings (DHCP). A Dynamic Host Configuration Protocol (DHCP) server
automatically assigns an IP address to each PC on your network for you. Unless you already have one, it is
highly recommended that you leave the Router enabled as a DHCP server.
• Local DHCP Server. DHCP is already enabled by factory default. If you already have a DHCP server on your
network, set the Router’s DHCP option to Disable. If you disable DHCP, remember to assign a static IP
address to the Router.
• Start IP Address. Enter a value for the DHCP server to start with when issuing IP addresses. This value
must be 192.168.1. 2 or greater, because the default IP address for the Router is 192.168.1.1.
• Number of Address. Enter the maximum number of PCs that you want the DHCP server to assign IP
addresses to. This number cannot be greater than 253. In order to determine the DHCP IP Address range,
add the starting IP address (e.g., 100) to the number of DHCP users. By default, as shown in Figure 6-9,
add 100 to 50, and the range is 192.168.1.100 to 192.168.1.149.
• DHCP Address Range. The range of DHCP addresses is displayed here.
• Time Setting. This is where you set the time for your Router. You can set the time and date manually or
automatically, by setting the time zone.
When finished making your changes on this tab, click the Save Settings button to save these changes, or click
the Cancel Changes button to undo your changes.
Chapter 6: Configuring the Router
The Setup Tab
23
Wireless-G VPN Broadband Router
The DDNS Tab
The Router offers a Dynamic Domain Name System (DDNS) feature. DDNS lets you assign a fixed host and domain
name to a dynamic Internet IP address. It is useful when you are hosting your own website, FTP server, or other
server behind the Router.
Before you can use this feature, you need to sign up for DDNS service at one of two DDNS service providers,
DynDNS.org or TZO.com.
DDNS
DDNS Service. If your DDNS service is provided by DynDNS.org, then select DynDNS.org in the drop-down menu.
(See Figure 6-6.) If your DDNS service is provided by TZO, then select TZO.com. (See Figure 6-7.) The features
available on the DDNS screen will vary, depending on which DDNS service provider you use.
DynDNS.org
• User Name, Password, and Host Name. Enter the User Name, Password, and Host Name of the account you
set up with DynDNS.org.
• Internet IP Address. The Router’s current Internet IP Address is displayed here. Because it is dynamic, it will
change.
• Status. The status of the DDNS service connection is displayed here.
Figure 6-6: DynDNS.org
When finished making your changes on this tab, click the Save Settings button to save these changes, or click
the Cancel Changes button to undo your changes.
TZO.com Tab
• Email Address, TZO Password Key, and Domain Name. Enter the Email Address, TZO Password Key, and
Domain Name of the service you set up with TZO.
• Internet IP Address. The Router’s current Internet IP Address is displayed here. Because it is dynamic, this will
change.
• Status. The status of the DDNS service connection is displayed here.
When finished making your changes on this tab, click the Save Settings button to save these changes, or click
the Cancel Changes button to undo your changes.
Figure 6-7: TZO.com
Chapter 6: Configuring the Router
The Setup Tab
24
Wireless-G VPN Broadband Router
MAC Address Clone Tab (See Figure 6-8.)
The Router’s MAC address is a 12-digit code assigned to a unique piece of hardware for identification, like a
social security number. If your ISP requires MAC address registration, find your adapter’s MAC address by
following the instructions in “Appendix D: Finding the MAC Address and IP Address for Your Ethernet Adapter.”
MAC Clone
• MAC Clone Service. To use MAC address cloning, select Enable.
• MAC Address. To manually clone a MAC address, enter the 12 digits of your adapter’s MAC address in the onscreen fields (see Figure 6-25). Then click the Save Settings button.
• Clone My MAC Address. If you want to clone the MAC address of the PC you are currently using to configure
the Router, then click the Clone My MAC Address button. The Router will automatically detect your PC’s
MAC address, so you do NOT have to call your ISP to change the registered MAC address to the Router’s MAC
address. It is recommended that the PC registered with the ISP is used to open the MAC Address Clone tab.
Figure 6-8: MAC Address Clone
When finished making your changes on this tab, click the Save Settings button to save these changes, or click
the Cancel Changes button to undo your changes.
Advanced Routing Tab
The Advanced Routing screen allows you to configure the dynamic routing and static routing settings. (See Figure
6-9.)
Advanced Routing
• Operating Mode. Select Gateway or Router for the Operating Mode from the drop-down menu.
• Dynamic Routing. With Dynamic Routing you can enable the Router to automatically adjust to physical
changes in the network’s layout. The Router, using the RIP protocol, determines the network packets’ route
based on the fewest number of hops between the source and the destination. The RIP protocol regularly
broadcasts routing information to other routers on the network.
• Receive RIP Version To use dynamic routing for reception of network data, select the protocol you want: RIP1
or RIP2.
• Transmit RIP Version. To use dynamic routing for transmission of network data, select the protocol you want:
RIP1, RIP1-Compatible, or RIP2.
Chapter 6: Configuring the Router
The Setup Tab
Figure 6-9: Advanced Routing
25
Wireless-G VPN Broadband Router
Static Routing
If the Router is connected to more than one network, it may be necessary to set up a static route between them.
A static route is a pre-determined pathway that network information must travel to reach a specific host or
network. To create a static route, change the following settings:
• Select Number. Select the number of the static route from the drop-down menu. The Router supports up to
20 static route entries.
• Delete This Entry. If you need to delete a route, select its number from the drop-down menu, and click the
Delete Entry button.
• LAN IP Address. The LAN IP Address is the address of the remote network or host to which you want to assign
a static route. Enter the IP address of the host for which you wish to create a static route. If you are building a
route to an entire network, be sure that the network portion of the IP address is set to 0. For example, the
Router’s standard IP address is 192.168.1.1. Based on this address, the address of the routed network is
192.168.1, with the last digit determining the Router’s place on the network. Therefore you would enter the IP
address 192.168.1.0 if you wanted to route to the Router’s entire network, rather than just to the Router.
• Subnet Mask. The Subnet Mask (also known as the Network Mask) determines which portion of an IP address
is the network portion, and which portion is the host portion. Take, for example, a network in which the
Subnet Mask is 255.255.255.0. This determines (by using the values 255) that the first three numbers of a
network IP address identify this particular network, while the last digit (from 1 to 254) identifies the specific
host.
Figure 6-10: Routing Table
• Default Gateway. This IP address should be the IP address of the gateway device that allows for contact
between the Router and the remote network or host.
• metric. This determines the maximum number of steps between network nodes that data packets will travel.
A node is any device on the network, such as PCs, print servers, routers, etc.
• Interface. Select LAN & Wireless or Internet, depending on the location of the static route’s final destination.
• Show Routing Table. Click the Show Routing Table button to open a screen displaying how data is routed
through your LAN. For each route, the Destination LAN IP address, Subnet Mask, Default Gateway, and
Interface are displayed. Click the Refresh button to update the information. See Figure 6-10.
When finished making your changes on this tab, click the Save Settings button to save these changes, or click
the Cancel Changes button to undo your changes.
Chapter 6: Configuring the Router
The Setup Tab
26
Wireless-G VPN Broadband Router
The Wireless Tab
Basic Wireless Settings (See Figure 6-11.)
This screen allows you to choose your wireless network mode and wireless security.
Wireless Network
• Wireless Network Mode. If you have Wireless-G and 802.11b devices in your network, then keep the default
setting, Mixed. If you have only Wireless-G devices, select G-Only. If you want to disable wireless
networking, select Disable.
• Wireless Network Name. Enter the Wireless Network Name (SSID) into the field. The SSID is the network
name shared among all devices in a wireless network. The SSID must be identical for all devices in the
wireless network. It is case-sensitive and must not exceed 32 alphanumeric characters, which may be any
keyboard character. For added security, Linksys recommends that you change the default SSID (linksys) to a
unique name of your choice.
• Wireless Channel. Select the appropriate channel from the list provided to correspond with your network
settings, between 1 and 11 (in North America). All devices in your wireless network must use the same
channel in order to function correctly.
Chapter 6: Configuring the Router
The Wireless Tab
Figure 6-11: Basic Wireless
27
Wireless-G VPN Broadband Router
Wireless Security
• Wireless SSID Broadcast. When wireless clients survey the local area for wireless networks to associate with,
they will detect the SSID broadcast by the Router. To broadcast the Router's SSID, keep the default setting,
Enabled. If you do not want to broadcast the Router's SSID, then select Disabled.
• WEP. An acronym for Wired Equivalent Privacy, WEP is an encryption method used to protect your wireless
data communications. WEP uses 64-bit or 128-bit keys to provide access control to your network and
encryption security for every data transmission. To decode data transmissions, all devices-Wireless-G and
802.11b-in a network must use an identical WEP key. Higher encryption levels offer higher levels of security,
but due to the complexity of the encryption, they may decrease network performance. To enable WEP
encryption, click the Enabled radio button. Then click the Edit WEP Settings button to configure the WEP
settings. To disable WEP encryption, keep the default setting, Disabled.
WEP (See Figure 6-12.)
The WEP screen allows you to configure your WEP settings. WEP encryption should always be enabled to
increase the security of your wireless network. Default Transmit Key Select which WEP key (1-4) will be used
when the Router sends data. Make sure the receiving device is using the same key.
• WEP Encryption. Select the level of WEP encryption you wish to use, 64-bit 10 hex digits or 128-bit 26 hex
digits. Higher encryption levels offer higher levels of security, but due to the complexity of the encryption,
they may decrease network performance.
• Passphrase. Instead of manually entering WEP keys, you can enter a Passphrase. This Passphrase is used to
generate one or more WEP keys. It is case-sensitive and should not be longer than 16 alphanumeric
characters. (This Passphrase function is compatible with Linksys wireless products only. If you want to
communicate with non-Linksys wireless products, enter the WEP key manually on the non-Linksys wireless
products.) After you enter the Passphrase, click the Generate button to create WEP keys.
• Keys 1-4. WEP keys enable you to create an encryption scheme for wireless LAN transmissions. If you are not
using a Passphrase, then manually enter a set of values. (Do not leave a key field blank, and do not enter all
zeroes. These are not valid key values.)
Figure 6-12: WEP
If you are using 64-bit WEP encryption, then the key must be exactly 10 hexadecimal characters in length. If
you are using 128-bit WEP encryption, then the key must be exactly 26 hexadecimal characters in length.
Valid hexadecimal characters are “0”-“9” and “A”-“F”.
When finished making your changes on this tab, click the Save Settings button to save these changes, or click
the Cancel Changes button to undo your changes.
Chapter 6: Configuring the Router
The Wireless Tab
28
Wireless-G VPN Broadband Router
Wireless Network Access (See Figure 6-13.)
Wireless Network Access. If this function is enabled, only the computers on the list will be allowed access to the
wireless network. To add a computer to the network, click the Permit to access button, and enter the MAC
address in the fields. Click the Select MAC Address From Networked Computers button, and the screen in
Figure 6-15 will appear.
Select the MAC Address from the list and click the Select button.
To prevent access, click the Prevent from accessing button, then click Select MAC Address from the list.
From the screen in Figure 6-14, select the MAC Address from the list, and click the Select button.
Click the Refresh button if you want to refresh the screen. Click the Close button to return to th previous screen.
When finished making your changes on this tab, click the Save Settings button to save these changes, or click
the Cancel Changes button to undo your changes.
Figure 6-13: Wireless Network Access
Figure 6-14: Networked Computers
Chapter 6: Configuring the Router
The Wireless Tab
29
Wireless-G VPN Broadband Router
Advanced Wireless Settings (See Figure 6-15.)
On this screen you can access the Advanced Wireless features, including Authentication Type, Basic Data Rates,
Control Tx Rates, Beacon Interval, DTIM Interval, RTS Threshold, and Fragmentation Threshold.
• Authentication Type. The default is set to Auto, which allows either Open System or Shared Key
authentication to be used. For Open System authentication, the sender and the recipient do NOT use a WEP
key for authentication. For Shared Key authentication, the sender and recipient use a WEP key for
authentication. If you want to use only Shared Key authentication, then select Shared Key.
• Basic Data Rates. Select 1-2 Mbps, All, or Default, from the drop-down menu.
• Control Tx Rates. The default transmission rate is Auto. The range is from 1 to 54Mbps. The rate of data
transmission should be set depending on the speed of your wireless network. You can select from a range of
transmission speeds, or keep the default setting, Auto, to have the Router automatically use the fastest
possible data rate and enable the Auto-Fallback feature. Auto-Fallback will negotiate the best possible
connection speed between the Router and a wireless client.
• Beacon Interval. The default value is 100. Enter a value between 1 and 65,535 milliseconds. The Beacon
Interval value indicates the frequency interval of the beacon. A beacon is a packet broadcast by the Router to
synchronize the wireless network.
Figure 6-15: Advanced Wireless Settings
• DTIM Interval The default value is 3. This value, between 1 and 255 milliseconds, indicates the interval of the
Delivery Traffic Indication Message (DTIM). A DTIM field is a countdown field informing clients of the next
window for listening to broadcast and multicast messages. When the Router has buffered broadcast or
multicast messages for associated clients, it sends the next DTIM with a DTIM Interval value. Its clients hear
the beacons and awaken to receive the broadcast and multicast messages.
• RTS Threshold This value should remain at its default setting of 2347. The range is 0-2347 bytes. Should you
encounter inconsistent data flow, only minor modifications are recommended. If a network packet is smaller
than the preset RTS threshold size, the RTS/CTS mechanism will not be enabled. The Router sends Request to
Send (RTS) frames to a particular receiving station and negotiates the sending of a data frame. After receiving
an RTS, the wireless station responds with a Clear to Send (CTS) frame to acknowledge the right to begin
transmission.
• Fragmentation Threshold This value should remain at its default setting of 2346. The range is 256-2346
bytes. It specifies the maximum size for a packet before data is fragmented into multiple packets. If you
experience a high packet error rate, you may slightly increase the Fragmentation Threshold. Setting the
Fragmentation Threshold too low may result in poor network performance. Only minor modifications of this
value are recommended.
Chapter 6: Configuring the Router
The Wireless Tab
30
Wireless-G VPN Broadband Router
The Security Tab
Firewall
When you click the Security tab, you will see the Firewall screen (see Figure 6-16). This screen contains Filters
and Block WAN Requests. Filters block specific internal users from accessing the Internet and block anonymous
Internet requests and/or multicasting.
• Firewall. To add Firewall Protection, click Enabled. If you do not want Firewall Protection, click Disabled.
• Filter Proxy. Use of WAN proxy servers may compromise the Router's security. Denying Filter Proxy will
disable access to any WAN proxy servers. To enable proxy filtering, click Enabled.
• Filter Cookies. A cookie is data stored on your PC and used by Internet sites when you interact with them. To
enable cookie filtering, click Enabled.
• Filter Java Applets. Java is a programming language for websites. If you deny Java Applets, you run the risk
of not having access to Internet sites created using this programming language. To enable Java Applet
filtering, click Enabled.
Figure 6-16: Firewall
• Filter ActiveX. ActiveX is a programming language for websites. If you deny ActiveX, you run the risk of not
having access to Internet sites created using this programming language. To enable ActiveX filtering, click
Enabled.
• Filter Multicast. Multicasting allows for multiple transmissions to specific recipients at the same time. If
multicasting is permitted, then the Router will allow IP multicast packets to be forwarded to the appropriate
computers. Select Enabled to filter multicasting, or Disabled to disable this feature.
• Block Anonymous Internet Requests. This keeps your network from being “pinged” or detected and
reinforces your network security by hiding your network ports, so it is more difficult for intruders to work their
way into your network. Select Enabled to block anonymous Internet requests, or Disabled to allow
anonymous Internet requests.
When finished making your changes on this tab, click the Save Settings button to save these changes, or click
the Cancel Changes button to undo your changes.
Chapter 6: Configuring the Router
The Security Tab
31

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.4
Linearized                      : No
Encryption                      : Standard V1.2 (40-bit)
User Access                     : Print, Copy, Fill forms, Extract, Assemble, Print high-res
Modify Date                     : 2004:11:17 18:09:14+08:00
Create Date                     : 2004:11:17 18:08:44+08:00
Title                           : Book Template.book
Author                          : rebecca
Creator                         : FrameMaker 7.0
Producer                        : Acrobat Distiller 5.0.5 (Windows)
Page Count                      : 15
Mod Date                        : 2004:11:17 18:09:14+08:00
Creation Date                   : 2004:11:17 18:08:44+08:00
Metadata Date                   : 2004:11:17 18:09:14+08:00
Has XFA                         : No
EXIF Metadata provided by EXIF.tools
FCC ID Filing: Q87-HGA5S-3

Navigation menu