background image

Advanced Wireless Settings 

This screen allows you to configure the advanced settings for the Wireless Router. The 
Wireless-N Router adopts several new parameters to adjust the channel bandwidth and 
guard intervals to improve the data rate dynamically. Linksys recommends to let your 
Wireless Router automatically adjust the parameters for maximum data throughput.   

 

 

Advanced Settings 

You can change the following advanced parameters (some only for Wireless-N) for this 
Wireless Router.   

Channel Bandwidth

. You can select the channel bandwidth manually for Wireless-N 

connections. When it is set to 20MHz, only the 20MHz channel is used. When it is set to 
40MHz, Wireless-N connections will use 40MHz channel but Wireless-B and Wireless-G 
will still use 20MHz channel. When it is set to Auto, it allows wireless clients to negotiate 
the bandwidth to use. The default is 20MHz.     

Guard Interval

. You can select the guard interval manually for Wireless-N connections. 

The two options are 

Short (400ns)

 and 

Long (800ns)

. The default is 

Auto

.   

CTS Protection Mode

. CTS (Clear-To-Send) Protection Mode function boosts the 

Wireless Router’s ability to catch all wireless transmissions, but will severely decrease 
performance. Keep the default setting, 

Auto

, so the Wireless Router can use this feature 

as needed, when the Wireless-N/G products are not able to transmit to the Wireless 
Router in an environment with heavy 802.11b traffic. Select 

Disabled

 if you want to 

permanently disable this feature.   

Beacon Interval. 

  This value indicates the frequency interval of the beacon. A beacon is 

a packet broadcast by the Wireless Router to keep the network synchronized. A beacon 
includes the wireless networks service area, the Wireless Router address, the Broadcast 
destination addresses, a time stamp, Delivery Traffic Indicator Maps, and the Traffic 
Indicator Message (TIM). The default is 

100 

ms.  

DTIM Interval

. This value indicates how often the Wireless Router sends out a Delivery 

Traffic Indication Message (DTIM). Lower settings result in more efficient networking, 
while preventing your PC from dropping into power-saving sleep mode. Higher settings 
allow your PC to enter sleep mode, thus saving power, but interferes with wireless 
transmissions. The default is 

ms.  

RTS Threshold. 

  This setting determines how large a packet can be before the Wireless 

Summary of Contents for Linksys WRVS4400N

Page 1: ...Specifications are subject to change without notice Linksys is a registered trademark or trademark of Cisco ...

Page 2: ...ng this Guide This checkmark means there is a note of interest and is something you should pay special attention to while using the Router This exclamation point means there is a caution or warning and is something that could damage your property or the Router This question mark provides you with a reminder about something you might need to do while using the Router In addition to these symbols th...

Page 3: ...1 Welcome 1 What s in this Guide 2 Chapter 2 Networking and Security Basics 4 An Introduction to LANs 4 The Use of IP Addresses 5 The Intrusion Prevention System IPS 7 Chapter 3 Planning Your Virtual Private Network VPN 9 Why do I need a VPN 9 ...

Page 4: ...Know the Router 12 The Front Panel 12 The Back Panels 14 Antennas and Positions 15 Chapter 5 Connecting the Router 16 Overview 16 Connection Instructions 17 Placement Options 18 Chapter 6 Setting Up and Configuring the Router 20 Overview 20 ...

Page 5: ...based Utility 21 How to Navigate the Utility 21 Setup Tab 25 Wireless Tab 38 Firewall Tab 47 VPN Tab 58 QoS Tab 65 Administration Tab 67 IPS Tab 72 L2 Switch Tab 76 Status Tab 80 Appendix A Troubleshooting 85 Frequently Asked Questions 95 ...

Page 6: ...kVPN Software 100 Using the Linksys QuickVPN Software 101 Appendix C Configuring a Gateway to Gateway IPSec Tunnel 103 Overview 103 Before You Begin 103 Configuring the VPN Settings for the VPN Routers 104 Configuring the Key Management Settings 106 Configuring PC 1 and PC 2 107 Appendix D Finding the MAC Address and IP Address for ...

Page 7: ... XP Instructions 108 For the Router s Web based Utility 109 Appendix E Trend Micro ProtectLink Gateway Service 110 Appendix F Glossary 110 Appendix G Specifications 116 Appendix H Warranty Information 119 Appendix I Regulatory Information 120 Appendix J Contact Information 126 ...

Page 8: ...gure 5 4 Connect the Power 17 Figure 5 5 The Stand Option 18 Figure 5 6 Stand 18 Figure 5 7 Mounting Dimensions 19 Figure 5 8 Wall Mounting Hardware 19 Figure 6 1 Router s IP Address 21 Figure 6 2 Login Screen for Web based Utility 21 Figure 6 1 Setup IP Versions 25 Figure 6 2 Setup WAN DHCP 26 Figure 6 3 Setup WAN Static IP 26 Figure 6 4 Setup WAN PPPoE 27 Figure 6 5 Setup WAN PPTP 27 Figure 6 6 ...

Page 9: ...less Connection Control 44 Figure 6 27 Select MAC Address from Wireless Client List 44 Figure 6 28 Wireless Advanced Wireless Settings 45 Figure 6 29 Firewall Basic Settings 47 Figure 6 30 Firewall IP Based ACL 49 Figure 6 31 Firewall IP Based ACL pre defined services 49 Figure 6 32 Firewall IP Based ACL Service definition 50 Figure 6 33 Firewall Edit IP ACL Rule 50 Figure 6 34 Firewall Internet A...

Page 10: ...Figure 6 60 IPS Report 74 Figure 6 61 IPS Log Raw Data 74 Figure 6 62 IPS Information 75 Figure 6 63 L2 Switch VLAN 76 Figure 6 64 L2 Switch RADIUS 77 Figure 6 65 L2 Switch RADIUS 77 Figure 6 66 L2 Switch Port Settings 78 Figure 6 67 L2 Switch Cable Diagnostics 79 Figure 6 68 Status WAN Gateway 80 Figure 6 69 Status LAN 81 Figure 6 70 LAN DHCP Client Table 81 Figure 6 71 LAN ARP Table 81 Figure 6 ...

Page 11: ...kVPN Software Change Password 102 Figure C 1 Diagram of Gateway to Gateway VPN Tunnel 103 Figure C 2 Login Screen 104 Figure C 3 VPN IPsec VPN Configuration 104 Figure C 4 Advanced IPsec VPN Tunnel Settings 106 Figure C 5 Auto IKE Advanced Settings Screen 106 Figure D 1 IP Configuration Screen 108 Figure D 2 MAC Address Adapter Address 108 Figure D 3 MAC Address Physical Address 109 Figure D 4 MAC...

Page 12: ...stopped in real time while passing through the Router Users are encouraged to update their IPS signature file to stay current on stopping malicious worms The SPI Firewall provides deep packet inspection to analyze packets in network layer IP and transport layer TCP UDP to block illegal packet transactions Users can also use IP based ACL to limit traffic to a specific source destination and protoco...

Page 13: ...iguring a Gateway to Gateway IPSec Tunnel This appendix describes how to configure an IPSec VPN Tunnel between two VPN Routers Appendix D Finding the MAC Address and IP Address for your Ethernet Adapter This appendix describes how to find the MAC address for your computer s Ethernet adapter so you can use the MAC filtering and or MAC address cloning feature of the Router It also explains how to fi...

Page 14: ... the web server ftp server or other Internet LAN the computers and networking products that applications and if allowed it will forward the packet to the appropriate PC on the LAN side make up your local network Multiple Wireless N Gigabit Security Routers can also be used to connect multiple LANs together This usually applies to a medium sized or larger company where you want to divide your netwo...

Page 15: ...wo IP addresses one for the LAN and one for the Internet In this User Guide you ll see references to the Internet IP address and the LAN IP address Since the Router uses NAT technology the only IP address that can be seen from the Internet for your network is the Router s Internet IP address However even this Internet IP address can be hidden on the Internet by suppressing PING response A static I...

Page 16: ... type called Point to Point Protocol over Ethernet PPPoE PPPoE is similar to a dial up connection which establishes a PPP session with an ISP server through the DSL connection The server will also provide the Router with a dynamic IP address to establish a connection to the Internet A DHCP server can either be located on a designated PC on the network or another network device such as the Router T...

Page 17: ... your client PCs and servers running various operating systems including Windows Linux and Solaris from network worm attacks However this system does not prevent viruses attached emails The signature file is the heart of the IPS system It is similar to the Virus definition files on your PC s Anti Virus programs IPS uses this file to match against packets coming in to the Router and performs action...

Page 18: ...onger protect that data At this point your data becomes open to hackers using a variety of methods to steal not only the data you are transmitting but also your network login and security data Some of the most common methods are as follows 1 MAC Address Spoofing Packets transmitted over a network either your local network or the Internet are preceded by a packet header These packet headers contain...

Page 19: ...SL runs over HTTP sessions IPsec provides better data throughput and SSL offers ease of use without the need of VPN client applications The Wireless N Gigabit Security Router supports IPsec VPN for maximum throughput on data security VPN was created as a cost effective alternative to using a private dedicated leased line for a private network Using industry standard encryption and authentication t...

Page 20: ... example of a computer to VPN Router VPN In her hotel room a traveling businesswoman dials up her ISP Her notebook computer has the Linksys VPN client software which is configured with her office s IP address She accesses the Linksys VPN client software and connects to the VPN Router at the central office As VPNs utilize the Internet distance is not a factor Using the VPN the businesswoman now has...

Page 21: ......

Page 22: ... flashes green when an external attack is detected The IPS LED flashes red when an internal attack is detected WIRELESS Green The WIRELESS LED lights up when the wireless module is enabled The LED is off when the wireless module is disabled The WIRELESS LED flashes green when the data is transmitting or receiving on the wireless module 1 4 ETHERNET Green For each port there are three LEDs If the c...

Page 23: ...outer and have tried all other troubleshooting measures press and hold in the Reset button for 10 seconds This will restore the factory defaults and clear all of the Router s settings such as port forwarding or a new password Ports INTERNET The INTERNET port connects to a cable or DSL modem 1 4 ETHERNET The four ETHERNET ports connect to network devices such as PCs print servers or additional swit...

Page 24: ......

Page 25: ...nformation Once you have the setup information for your specific type of Internet connection then you can begin installation and setup of the Router Ethernet Adapter 1 1 Before you begin make sure that all of your hardware is powered off including the Router PCs hubs switches and cable or DSL modem 2 Connect one end of an Ethernet network cable to one of the numbered ports on the back of the Route...

Page 26: ... mount options are explained in further detail below Stand Option 1 1 Locate the Router s left side panel 2 2 The Router includes two stands With the two large prongs facing outward insert the short prongs into the little slots in the Router and push the stand upward until it snaps into place Repeat this step with the other stand Now that the hardware installation is complete proceed to Chapter 6 ...

Page 27: ...ere you want to mount the Wireless Router and install two screws that are 2 9 16 in 64 5mm apart 3 3 Line up the Wireless Router so that the wall mount slots line up with the two screws Figure 5 7 Mounting Dimensions 4 4 Place the wall mount slots over the screws and slide the Wireless Router down until the screws fit snugly into the wall mount slots Now that the hardware installation is complete ...

Page 28: ...Configuring the Wireless N Router for directions on how to set up the Wireless N Router ...

Page 29: ...lect the Management screen Change the access password for the Router s Web based Utility The default username and password are admin Most users will also customize their wireless settings Wireless On the Wireless screen change the default SSID on the Basic Settings Tab Select the level of security under the Security Settings Tab and complete the options for the selected security mode When the appr...

Page 30: ...o the Internet to use a special purpose service such as Internet gaming or video conferencing MAC Address Clone Some ISPs require that you register a MAC address This feature clones your network adapter s MAC address onto the Router which prevents you from having to call your ISP to change the registered MAC address to the Router s MAC address Advanced Routing Select the Router s operation mode ei...

Page 31: ... block complete Internet access or to specific URLs from the Router Single Port Forwarding Use this screen to set up public services or other specialized Internet applications with a single port on your network Port Range Forwarding Use this screen to set up public services or other specialized Internet applications on your network using a port range Port Range Triggering Use this screen to set up...

Page 32: ...applications Report Provides reports of network traffic and malicious attacks Information Provides the signature file version and the Protection Scope of the IPS system L2 Switch You will use this tab to configure layer 2 switching features on the 4 port Ethernet Switch LAN ports only Create VLAN Virtual Local Area Network VLAN assignment is done on this screen VLAN Port Assignment Virtual Local A...

Page 33: ...plays the following color coded status information on the Router s Ethernet ports Green Indicates that the port has a connection Black Indicates that the port has no connection Network Setting Status LAN IP Displays the IP address of the Router s LAN interface WAN IP Displays the IP address of the Router s WAN interface If this address was assigned using DHCP click DHCP Release to release the addr...

Page 34: ... VPN Summary Click the IPSec VPN Summary hyperlink to display the VPN Summary screen Tunnel s Used Displays the number of VPN tunnels currently being used Tunnel s Available Displays the number of VPN tunnels that are available Log Setting Status E mail If this displays Email cannot be sent because you have not specified an outbound SMTP server address then you have not set up the mail server Clic...

Page 35: ...ure you will need to sign up for a DDNS service Internet Connection Type The Router supports six connection types Each WAN Setup screen and available options will differ depending on what kind of connection type you select Automatic Configuration DHCP By default the Router s Configuration Type is set to Automatic Configuration DHCP The Router will get its IP address from a DHCP server of the ISP M...

Page 36: ...m Server IP Address to resolve host name to IP address mapping PPPoE Most DSL based ISPs use PPPoE Point to Point Protocol over Ethernet to establish Internet connections If you are connected to the Internet through a DSL line check with your ISP to see if they use PPPoE If they do you will have to enable PPPoE User Name and Password Enter the User Name and Password provided by your ISP for PPPoE ...

Page 37: ...is option is disabled by default Keep Alive Redial period This option allows the Router will periodically check your Internet connection If you are disconnected then the Router will automatically re establish your connection To use this option click the option next to Keep Alive In the Redial Period field you specify how often you want the Router to check the Internet connection This option is ena...

Page 38: ...activity Connect on Demand enables the Router to automatically re establish your connection as soon as you attempt to access the Internet again If you wish to activate Connect on Demand click the Connect on Demand option and enter the number of minutes you want to have elapsed before your Internet connection terminates in the Max Idle Time field Use this option to minimize your DSL connection time...

Page 39: ...o activate Connect on Demand click the Connect on Demand option and enter the number of minutes you want to have elapsed before your Internet connection terminates in the Max Idle Time field Use this option to minimize your DSL connection time if it is charged based on time This option is disabled by default Keep Alive Redial period If you select this option the Router will periodically check your...

Page 40: ...ernet connection has been terminated due to inactivity Connect on Demand enables the Router to automatically re establish your connection as soon as you attempt to access the Internet again If you wish to activate Connect on Demand click the Connect on Demand option and enter the number of minutes you want to have elapsed before your Internet connection terminates in the Max Idle Time field Use th...

Page 41: ... cable ISPs require a domain name as identification You may need to check with your ISP to see if your broadband Internet service is configured with a domain name In most cases you can leave this field blank MTU MTU is the Maximum Transmission Unit It specifies the largest packet size permitted for Internet transmission Select Manual if you want to manually enter the largest packet size that is tr...

Page 42: ...y DynDNS org then select DynDNS org from the drop down menu If your DDNS service is provided by TZO com then select TZO com from the drop down menu To disable DDNS Service select Disabled DynDNS org User Name Password and Host Name Enter the User Name Password and Host Name of the account you set up with DynDNS org Status The status of the DDNS service connection is displayed here TZO com E mail A...

Page 43: ...uld NOT use the TZO software to perform this IP address update Connect button When DDNS is enabled the Connect button is displayed Use this button to manually update your IP address information on the DDNS server The Status area on this screen also updates Click the Save Settings button to save the network settings or click the Cancel Changes button to undo your changes ...

Page 44: ...eserved IP between 1 and 254 Server Settings DHCP The Router can be used as your network s DHCP Dynamic Host Configuration Protocol server which automatically assigns an IP address to each PC on your network Unless you already have one it is highly recommended that you leave the Router enabled as a DHCP server DHCP Server DHCP is enabled by default If you already have a DHCP server on your network...

Page 45: ... to DNS in Windows networks If you use a WINS server enter that server s IP Address here Otherwise leave this blank Static IP Mapping Static IP Mapping is used to bind a specific IP address to a specific MAC address This helps external WAN users to access LAN servers that are advertised through NAPT port forwarding You can define up to 50 entries Static IPAddress Enter the IP address to be mapped ...

Page 46: ...Click the Save Settings button to save the network settings or click the Cancel Changes button to undo your changes ...

Page 47: ...t can only forward a maximum of 10 ranges of ports DMZ Hosting This feature allows one local PC to be exposed to the Internet for use of a special purpose service such as Internet gaming and video conferencing To use this feature select Enable To disable the DMZ feature select Disable DMZ Host IPAddress To expose one PC enter the computer s IP address Click the Save Settings button to save the net...

Page 48: ...hexadecimal number assigned to a unique piece of hardware for identification Mac Address Clone Select Enabled or Disabled Mac Address Enter the MAC Address registered with your ISP in this field Clone My PC s MAC button When Mac Address Clone is enabled click this to copy the MAC address of the network adapter in the computer that you are using to connect to the Web based utility Click Save Settin...

Page 49: ...be used to automatically establish a routing table through a database exchange with peer routers running the same routing protocol The Router supports RIP Routing Information Protocol versions 1 2 RIP Routing Information Protocol The Router using the RIP protocol calculates the most efficient route for the network s data packets to travel between the source and the destination based upon the short...

Page 50: ...ddress is the first three fields of the Destination LAN IP the last field should be zero 3 Subnet Mask Enter the Subnet Mask used on the destination LAN IP domain For Class C IP domains the Subnet Mask is 255 255 255 0 4 Gateway If this Router is used to connect your network to the Internet then your gateway IP is the Router s IP Address If you have another router handling your network s Internet ...

Page 51: ...ou wish to use a Network Time Protocol server to set the time and date select this option then complete the following fields Time Zone Select the time zone for your location and your setting synchronizes over the Internet with public NTP Network Time Protocol Servers Auto Daylight Saving If your location observes daylight savings time select the Enable option User Defined NTP Server If you want to...

Page 52: ...m any other 6to4 gateway By enabling this Access Control you can have a better control which IPv6 clouds this router is connecting to A list of IP addresses can be entered in the Access List Those should be the IPv4 addresses of the remote 6to4 gateways Permit following sites Allow only a limited set of 6to4 gateways to establish tunnel with our router Up to 20 sites can be configured and they can...

Page 53: ......

Page 54: ...d of 54Mbps Wireless B clients cannot be connected in this mode N Only Only Wireless N client devices can be connected at Wireless N data rates with a maximum speed of 300Mbps B G Mixed Both Wireless B and Wireless G client devices can be connected at their respective data rates Wireless N devices can be connected at Wireless G data rates G N Mixed Both Wireless G and Wireless N client devices can...

Page 55: ... not exceed 32 alphanumeric characters and may be any keyboard character Make sure this setting is the same for all devices in your wireless network The default SSID name is linksys n SSID Broadcast This option allows the SSID to be broadcast on your network You may want to enable this function while configuring your network but make sure that you disable it when you are finished With this enabled...

Page 56: ... Service Refer to the appropriate instructions below after you select the Authentication Type and SSID Interoperability settings To disable wireless security completely select Disabled The default is Disabled Wireless Isolation between SSID w o VLAN When disabled wireless PCs that are associated to the same network name SSID can see and transfer files between each other By enabling this feature Wi...

Page 57: ...h instructs the Wireless Router how often it should change the encryption keys The default is 3600 seconds WPA2 Personal Mixed This security mode supports the transition from WPA Personal to WPA2 Personal You can have client devices that use either WPA Personal or WPA2 Personal The Wireless Router will automatically choose the encryption algorithm used by each client device Encryption Mixed Mode a...

Page 58: ...DIUS server The default is 1812 Shared Key Enter the Shared Secret key used by the Wireless Router and RADIUS server Key Renewal Enter a Key Renewal Timeout period which instructs the Wireless Router how often it should change the encryption keys The default is 3600 seconds WPA2 Enterprise This option features WPA2 used in coordination with a RADIUS server for client authentication This should onl...

Page 59: ...se the encryption algorithm used by each client device Encryption Mixed Mode automatically chooses TKIP or AES for data encryption RADIUS Server Enter the RADIUS server s IP address RADIUS Port Enter the port number used by the RADIUS server The default is 1812 Shared Key Enter the Shared key used by the Wireless Router and RADIUS server Key Renewal Enter a Key Renewal Timeout period which instruc...

Page 60: ...manually enter WEP keys then complete the fields provided Each WEP key can consist of the letters A through F and the numbers 0 through 9 It should be 10 characters in length for 64 bit encryption or 26 characters in length for 128 bit encryption Tx Key Select one of the keys to be used for data encryption when you manually enter multiple WEP keys Change these settings as described here and click ...

Page 61: ...ent devices You can either prevent specific devices from connecting to the Wireless Router or you can allow only specific client devices to connect to the Wireless Router The client devices are specified by their MAC addresses The default is to allow only specific client devices Wireless Client List Instead of manually entering the MAC addresses of each client the Wireless Router provides a conven...

Page 62: ...sses of the wireless client devices you want to control Change these settings as described here and click Save Settings to apply your changes or click Cancel Changes to cancel your changes Help information is displayed on the right hand side of the screen ...

Page 63: ...nd Protection Mode function boosts the Wireless Router s ability to catch all wireless transmissions but will severely decrease performance Keep the default setting Auto so the Wireless Router can use this feature as needed when the Wireless N G products are not able to transmit to the Wireless Router in an environment with heavy 802 11b traffic Select Disabled if you want to permanently disable t...

Page 64: ...g of 2346 If you encounter inconsistent data flow only minor modifications are recommended Change these settings as described here and click Save Settings to apply your changes or click Cancel Changes to cancel your changes Help information is displayed on the right hand side of the screen and click More for additional details ...

Page 65: ...VLAN standard AP Management VLAN Define the VLAN ID used for management VLAN ID Enter the VLAN ID QoS U APSD WMM Power Save Select Enabled or Disabled as required WMM Wi Fi Multimedia is a QoS feature defined by WiFi Alliance before IEEE 802 11e was finalized Now it is part of IEEE 802 11e When it is enabled it provides four priority queues for different types of traffic It automatically maps the ...

Page 66: ...lect Auto or Manual as required Remote Access Point s MAC Address You can either enter the MAC address directly or if the other AP is on line you can click the Site Survey button and select from a list of available APs Change these settings as described here and click Save Settings to apply your changes or click Cancel Changes to cancel your changes Help information is displayed on the right hand ...

Page 67: ...rnet DOS attacks are making your Router s CPU busy such that it cannot provide services to regular traffic The default Is Enable Block WAN Request When enabled the Router will ignore PING Request from the Internet so it seems to be hidden The default is Enable Remote Management When enabled the Router will allow the Web based Utility to be accessed from the Internet The default is Disable Multicas...

Page 68: ...having access to Internet sites using this programming language Also Windows Update uses ActiveX so if this is blocked Windows update will not work Access to Proxy HTTP Server If local users have access to WAN proxy servers they may be able to circumvent the Router s content filters and access Internet sites blocked by the Router Denying Proxy will block access to any WAN proxy servers Change thes...

Page 69: ...atched If any of conditions are not met the rule will not be used to check against packets The following are descriptions on each of the fields in the ACL Table Page Selections You can select specific page of ACL list from the drop down menu to be displayed Or you can navigate them page by page through Previous Page and Next Page button Priority This defines the order on which rule is checked agai...

Page 70: ...this button to go to Edit IPACL Rule screen and modify this rule Delete button Use this button to delete the ACL rule from the list To add a new rule to the ACL rule table click Add New Rule and the Edit IP ACL Rule screen appears Follow the instructions in the section below to create a new ACL rule To disable all the rules without deleting them click Disable All Rules To delete all the rules from...

Page 71: ...nding IP addresses To apply the rule to a subnet select Net and enter the IP address and subnet mask Destination To apply the rule to one destination IP address select Single from the drop down menu then enter the address in the field To apply the rule to all destination IP addresses select ANY from the drop down menu To apply the rule to a range of IP addresses select Range and enter the starting...

Page 72: ...olicy and what URLs or Keywords to apply this policy Use the settings on this screen to establish an access policy Selecting a policy from the drop down menu will display that policy s settings You can then perform the following operations Create a Policy see instructions below Delete the current policy click the Delete button View all policies click the Summary button On the Summary screen the po...

Page 73: ... of PCs screen will appear in a sub window You can select a PC by MAC Address or IP Address You can also enter a range of IP Addresses if you want this policy to affect a group of PCs After making your changes click the Save Settings button to apply your changes 5 Click the appropriate option Deny or Allow depending on whether you want to block or allow Internet access for the PCs you listed on th...

Page 74: ...b sites you wish to block Website Blocking by Keyword Enter the keywords you wish to block in the fields provided If any of these Keywords appears in the URL of a web site access to the site will be blocked Note that only the URL is checked not the content of each Web page 8 Click the Save Settings button to save the policy settings Click Cancel Changes to cancel any changes you have entered ...

Page 75: ...e External Port number If it is different the Router performs a Port Translation so that the port number used by Internet users is different from the port number used by the server or Internet application For example you could configure your Web Server to accept connections on both port 80 standard and port 8080 Then enable Port Forwarding set the External Port to 80 and the Internal Port to 8080 ...

Page 76: ...is is the beginning of the port range Enter the beginning of the range of port numbers external ports used by the server or Internet application Check with the software documentation of the Internet application for more information if necessary End This is the end of the port range Enter the end of the range of port numbers external ports used by the server or Internet application Check with the s...

Page 77: ... used by outgoing traffic Check with the Internet application documentation for the port number s needed In the first field enter the starting port number of the Triggered Range In the second field enter the ending port number of the Triggered Range Forwarded Range For each application list the forwarded port number range These are the ports used by incoming traffic Check with the Internet applica...

Page 78: ...36 bit that you chose in the VPN IPSec VPN screen Local Group Displays the IP address and subnet of the local group Remote Group Displays the IP address and subnet of the remote group Remote Gateway Displays the IP address of the remote gateway Tunnel Test Click Connect to verify the tunnel status the test result is updated in the Status column If the tunnel is connected you can disconnect the IPS...

Page 79: ... the start time of the most recent VPN session for the specified VPN Client End Time Displays the end time of a VPN session if the VPN Client has disconnected Duration Displays the total connection time of the latest VPN session Disconnect Check the Disconnect checkbox at the end of each row in the VPN Clients Table and click the Disconnect button to disconnect a VPN Client session ...

Reviews: