
Chapter 3
Advanced Configuration
6
Wireless ADSL2+ Modem Router
Security > VPN Passthrough
The
VPN Passthrough
screen allows you to configure the
device’s VPN passthrough feature. This feature lets VPN
tunnels using the IPSec, L2TP, or PPTP protocols to pass
through the device’s firewall.
Access Restrictions Tab
The Access Restrictions tab allows you to configure
the Internet access restrictions for each device in your
network.
For detailed information on the Access Restrictions tab,
refer to the Utility’s online help pages.
Access Restrictions > Internet Access Policy
The
Internet Access Policy
screen allows you to define
policies that are used to block or allow specific kinds
of Internet usage and traffic, such as Internet access,
designated applications, websites, and inbound traffic
during specific days and times, and for a specified list of
devices in your network.
Applications & Gaming Tab
The Applications & Gaming tab allows you to configure
functions such as port forwarding and quality of service
that may be necessary for special applications such as
hosting web servers, ftp servers, and e-mail servers on on
your network, or other specialized internet applications
such as videoconferencing or online gaming.
For detailed information on the Applications & Gaming
tab, refer to the Utility’s online help pages.
Applications & Gaming > Single Port Forwarding
The
Single Port Forwarding
screen allows you to set up
port forwarding for a single port. You should assign static
IP addresses to the destination computers before you use
this feature.
Applications & Gaming > Port Range Forwarding
The
Port Range Forwarding
screen allows you to set up
port forwarding for a range of ports. You should assign
static IP addresses to the destination computers before
you use this feature.
Applications & Gaming > Port Range Triggering
The
Port Range Triggering
screen allows you to set up port
triggering. When port triggering is configured, the device
watches for specified port numbers in outgoing data.
When a match is found, the device records the sending
computer’s IP address so that when the requested data
returns, it can be sent to the proper computer.
Applications & Gaming > DMZ
The
DMZ
screen allows you to expose one network user
to the Internet for use of a special-purpose service such
as Internet gaming or video conferencing. DMZ hosting
forwards all the ports at the same time to one computer.
You should assign static IP addresses to the destination
computers before you use this feature.
Applications & Gaming > QoS
The
QoS
screen allows you to specify priorities for different
types of traffic. Lower priority traffic will be slowed down
to allow greater throughput or less delay for high priority
traffic.
Administration Tab
The Administration tab allows you to configure the device’s
administrative functions.
For detailed information on the Administration tab, refer
to the Utility’s online help pages.
Administration > Management
The
Management
screen allows you to manage specific
functions for access and security.
NOTE ON CISCO WEB ASSISTANT OPTION
(not on all models):
If you see an “error code
404” message (indicating that you entered an
invalid web address), the Cisco Web Assistant
will appear and automatically run a search
based on the keywords in the web address. This
feature can be enabled or disabled from this
screen.
NOTE ON TREND MICRO OPTION (not on all
models):
Trend Micro ProtectLink Gateway
is a hosted security service that stops spam
and filters URLS to prevent unwanted content
from passing through your router. The Email
Protection is the hosted messaging security
solution provided by Trend Micro InterScan
Messaging Hosted Security (IMHS). This feature
can be enabled or disabled from this screen.
Administration > Reporting
The
Reporting
screen allows you to configure system event
logging and to configure sending of e-mail alerts when a
Denial of Service attack is detected.