background image

 

 

98 

www.encore-usa.com 

3.4.7 

Firewall 

This page displays the full details about firewall holes in your router --  ports that accept 

unsolicited messages from the WAN. 

 

 
 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Содержание EN2HWI-N3

Страница 1: ...VER Product specifications size and shape are subject to change without notice and actual product appearance may differ from that depicted herein All trademarks and brand names are the properties of t...

Страница 2: ...frastructure Mode 12 2 INSTALLATION 13 2 1 HARDWARE CONNECTION 13 2 2 LOGIN TO THE WEB BASED CONFIGURATION UTILITY 14 3 WEB BASED CONFIGURATION 18 3 1 BASIC 19 3 1 1 Internet Settings 19 Internet Conn...

Страница 3: ...Wireless Settings 41 WEP Wired Equivalent Privacy 43 WPA Personal Wi Fi Protected Access 45 WPA Enterprise Wi Fi Protected Access 802 1x 47 3 2 ADVANCED 49 3 2 1 Advanced Wireless 49 3 2 2 Virtual Ser...

Страница 4: ...heck 89 3 3 7 Schedules 90 3 4 STATUS 91 3 4 1 Wireless Status 91 3 4 2 Logs Status 93 3 4 3 Statistics 94 3 4 4 WISH Session Status 94 3 4 5 Routing 96 3 4 6 Internet Session Status 96 3 4 7 Firewall...

Страница 5: ...ess channel The robust signal travels farther maintaining wireless connections up to 3 times farther than standard 802 11g eliminates dead spots and extends network range To protect the data and priva...

Страница 6: ...account and provides a type of firewall by hiding internal IP addresses for keeping hacker out Hide SSID Avoid unallowable users sharing bandwidth increases efficiency of the network Firewall supports...

Страница 7: ...de x 1 1 3 Safety Guidelines In order to reduce the risk of fire electric shock and injury please adhere to the following safety guidelines Carefully follow the instructions in the User Manual and als...

Страница 8: ...7 www encore usa com 1 4 Wireless SOHO Router Description Rear Panel Power Switch LAN Ports Power Jack WAN Internet Port...

Страница 9: ...8 www encore usa com Front Panel WPS button LED panel Antenna Antenna Connector...

Страница 10: ...port WLAN LED This LED will light up once the RF wireless LAN feature is enabled Power LED This LED will light up once the power cable is connected to the DC connector WPS button 1 5 seconds Activate...

Страница 11: ...ts serving customers and processing information d Frequently changed environments Show rooms meeting rooms retail stores and manufacturing sites where frequently rearrange the workplace e Small Office...

Страница 12: ...l or SOHO LANs b Infrastructure for enterprise LANs a Ad hoc peer to peer Mode This is the simplest network configuration with several computers equipped with the PC Cards that form a wireless network...

Страница 13: ...n between two computers has to be via the AP It doesn t matter if the AP is stand alone or wired to an Ethernet network If used in stand alone the AP can extend the range of independent wireless LANs...

Страница 14: ...3 WAN connection Connect Ethernet cable between WAN port of your DSL CABLE modem WAN port of EN2HWI N3 Make sure your DSL Cable modem is already setup and working well Contact your ISP Internet Servi...

Страница 15: ...aptop is already equipped with a Network Interface Card and properly working Click on START select Control Panel From the Control Panel Window select Network Connections Windows XP 2 Right click Use t...

Страница 16: ...to Highlight the Internet Protocol TCP IP then click Properties button 4 Select the General tab The EN2HWI N3 supports DHCP Client function select both Obtain an IP address automatically and Obtain DN...

Страница 17: ...etup CD into the CD ROM drive the setup screen will automatically appear Click the Setup Wizard button and then follow the on screen instructions The final Setup Page as below Click the OK button to o...

Страница 18: ...ith out the Setup CD open your web browser and then type in http 192 168 10 1 exactly in address field 7 Input the Username and Password and the click Login button to navigate into the EN2HWI N3 confi...

Страница 19: ...ttings wireless settings and WAN settings 2 Advanced This menu includes virtual server special applications port forwarding routing access control web filter MAC address filter firewall WPS etc 3 Tool...

Страница 20: ...res of the EN2WI N3 IMPORTANT NOTICE Click on the Internet Settings to begin the process Internet Settings Page contains various settings related to WAN Internet service Usually you only need to confi...

Страница 21: ...type if your internet connection requires a user name and password Most DSL modems use this type of connection o PPTP Point to Point Tunneling Protocol Choose this connection type if your ISP requires...

Страница 22: ...casting This option is normally turned off and should remain off as long as the WAN side DHCP server correctly provides an IP address to the router However if the router cannot obtain an IP address fr...

Страница 23: ...hen the IP address in the next field is required IP Address Enter the IP address if the Static IP is selected User Name Enter the username which is provided by your ISP Password Enter the password whi...

Страница 24: ...AP Address Mode PPTP can be used with a dynamic or static IP address If you select the Dynamic IP radio button then the IIP address in the next field is not required However if you select the Static I...

Страница 25: ...is inactive for certain time designated here the internet connection will be automatically dropped Static IP Address Configuration If your ISP has assigned a fixed public IP address for you to use en...

Страница 26: ...s a parameter that determines the largest packet size in bytes that the router will send to the WAN If LAN devices send larger packets the router will break them into smaller packets Ideally you shoul...

Страница 27: ...g Respond and then you can specify the Inbound Filter and choose whether to Allow All or Deny All Multicast Streams Enable Multicast Streams checking the box if you have multicast streaming service on...

Страница 28: ...his wizard will guide you in the configuration of the wireless network settings such as the SSID and security WEP WPA Click the Wireless Network Setup Wizard button to configure the basic functionalit...

Страница 29: ...Click on the Next button to continue The wizard has automatically configured the SSID and security mode for the device Click on the Save button to complete the setup Manual Network Setup If you selec...

Страница 30: ...to continue Enter the Wireless Network Name SSID for the EN2HWI N3 The SSID is a unique named shared amongst all the points of the wireless network The SSID must be identical on all points of the wir...

Страница 31: ...f your wireless adapters support WPA o GOOD Select this option if your wireless adapters support WEP o NONE Select this option if you do not want to activate any security features Select one of wirele...

Страница 32: ...nnected to a local network downstream from another router Bridge Mode In this mode the device functions as a bridge between the network on its WAN port and the devices on its LAN port and those connec...

Страница 33: ...he upstream router Primary Secondary DNS Enter the IP address of the DNS server To save configuration changes click the Apply button Router Mode In this mode the device functions as a NAT router and i...

Страница 34: ...and you have a LAN side laptop with a name of USER1 that laptop will be known as USER1 EN2HWI N3 Note however the entered domain name can be overwritten by the one obtained from the router s upstream...

Страница 35: ...Enable Accept RIP Updates only if operation of your network requires updates from other routers and if you have assured the security of RIP messages on your network RIP Operating mode The EN2HWI N3 s...

Страница 36: ...ages Only routers with the same RIP password can share routes via RIP RIP passwords serve more as a mechanism to limit route sharing rather than as a security mechanism You might use RIP passwords for...

Страница 37: ...router is properly configured and this option is enabled the DHCP Server will manage the IP addresses and other network configuration information for computers and other devices connected to your Loc...

Страница 38: ...from the router s DHCP server as expected this option can remain disabled However if one of the computers on the LAN fails to obtain an IP address from the router s DHCP server it may have an old DHC...

Страница 39: ...r it is preferred you try Mixed Mode operation first This setting has no effect if the Learn NetBIOS information from WAN is activated Point to Point Use WINS servers only This setting is useful to fo...

Страница 40: ...every time DHCP Reservations are helpful for server computers on the local network that are hosting applications such as Web and FTP Servers on your network should either use a static IP address or u...

Страница 41: ...n see what LAN devices are currently leasing IP addresses Revoke The Revoke option is available for the situation in which the lease table becomes full or nearly full you need to recover space in the...

Страница 42: ...wn list For example if you are certain that the wireless network will be using only IEEE 802 11g clients and then it is recommended to select 802 11g only instead of 2 4 GHz B G which will reduce the...

Страница 43: ...etwork Name The SSID is a unique named shared amongst all the points of the wireless network It must be identical on all points of the wireless network and cannot exceed 32 characters Check the Enable...

Страница 44: ...as WPA encryption To gain access to a WEP network you must know the key The key is a string of characters that you create When using WEP you must determine the level of encryption The type of encrypti...

Страница 45: ...have been set All authentication packets are transmitted without encryption Shared Key sends an unencrypted challenge text string to any device attempting to communicate with the AP The device reques...

Страница 46: ...es of WEP Wired Equivalent Privacy The technology is designed to work with existing Wi Fi products that have been enabled with WEP WPA provides improved data encryption through the Temporal Integrity...

Страница 47: ...S The bridge negotiates the cipher type with the access point and uses AES when available Group Key Update Interval Specify the number of seconds before the group key used for broadcast and multicast...

Страница 48: ...the Temporal Integrity Protocol TKIP which scrambles the keys using a hashing algorithm and by adding an integrity checking feature which makes sure that keys haven t been tampered with This option w...

Страница 49: ...erver MAC Address Authentication Place a check in this box if you would like the user to always authenticate using the same computer Optional Backup RADIUS server This option enables configuration of...

Страница 50: ...anced link on the navigation tree menu The configuration steps for each option are described below 3 2 1 Advanced Wireless If you are not familiar with Advanced Wireless Settings please read the help...

Страница 51: ...ess packet collisions are occurring wireless performance can be improved by using the RTS CTS Request to Send Clear to Send handshake protocol The wireless transmitter will begin to send RTS frames an...

Страница 52: ...t out as broadcast packets If you experience interoperability problems when the AP is sending streaming media to some legacy wireless clients try turning this option off WMM Enable Enabling WMM can he...

Страница 53: ...internal LAN IP Address and LAN port Name Assign a meaningful name to the virtual server Several well known types of virtual server are available from the Application Name drop down list Selecting on...

Страница 54: ...e Add button to insert the entry into the Virtual Server list 3 2 3 Special Applications An application rule is used to open single or multiple ports on your router when the router senses data sent to...

Страница 55: ...into the Special Applications list 3 2 4 Port Forwarding Multiple connections are required by some applications such as internet games video conferencing Internet telephony and others These applicatio...

Страница 56: ...e to Always or Never from the drop down list If a schedule does not exist you may create it in the Tools Schedule section Inbound Filter Select an inbound filter from the drop down list If an inbound...

Страница 57: ...tic Uplink Speed is disabled this option allows you to set the uplink speed manually Uplink speed is the speed at which data can be transferred from the router to your ISP Connection Type By default t...

Страница 58: ...this box to enable this option This option is enabled by default so that your router will automatically determine which programs should have network priority Dynamic Fragmentation Place a check in th...

Страница 59: ...the rule with the highest priority will be used Enable Place a check in this box to enable the StreamEngine rule Name Specify a name for the rule Priority Specify a priority for the rule Being with 1...

Страница 60: ...number of routing hops The route metric is a value from 1 to 16 that indicates the cost of using this route A value of 1 is the lowest cost and 15 is the highest cost A value of 16 indicates that the...

Страница 61: ...uch as peer to peer utilities or games When Access Control is disabled every device on the LAN has unrestricted access to the Internet However if you enable Access Control Internet access is restricte...

Страница 62: ...n click on the Next button Select a schedule from the drop down list Always or Never or you may define a new schedule Click on the Next button Select a machine to which the policy applies Address Type...

Страница 63: ...the router initially connected to the ISP or click on Clone Your PCs MAC Address Click on the OK button to insert the entry into the table Click on the Next button to continue Select a filtering meth...

Страница 64: ...o restrict certain websites form being accessed through your network These filters can be used for securing and restricting your network Website URL Domain Specify the web address that you would like...

Страница 65: ...lected MAC addresses are not used to control network access Turn MAC Filtering ON and ALLOW computers listed to access the network When ALLOW is selected only computers with MAC addresses listed in th...

Страница 66: ...function correctly The options on this page control several ways of opening the firewall to address the needs of specific types of applications Enable SPI Place a check in this box to enable SPI SPI...

Страница 67: ...fferent from the one used when the outgoing session was created Port And Address Restricted The NAT does not forward any incoming connection requests with the same port address as an already establish...

Страница 68: ...of checking Enabling this option can provide protection from certain kinds of spoofing attacks However enable this option with care With some modems the WAN connection may be lost when this option is...

Страница 69: ...es these kinds of sessions Application Layer Gateway ALG Configuration Place a check in appropriate feature boxes to enable them Some protocols and applications require special handling of the IP payl...

Страница 70: ...nd Real Player are some of the common applications using this protocol Windows MSN Messenger Supports use on LAN computers of Microsoft Windows Messenger the Internet messaging client that ships with...

Страница 71: ...70 www encore usa com MMS Allows Windows Media Player using MMS protocol to receive streaming media from the internet To save configuration changes click the Apply button...

Страница 72: ...s that you trust to access your LAN through the ports that you have opened Inbound Filters can be used for limiting access to a server on your network to a system or group of systems Filter rules can...

Страница 73: ...e them above other traffic Such streams are frequently used by digital media players Windows Media Center Place a check in this box to add HTTP as a classifier This enables the router to recognize cer...

Страница 74: ...specific message flow and assigns a priority to that flow For most applications the priority classifiers ensure the right priorities and specific WISH Rules are not required WISH supports overlaps be...

Страница 75: ...t 1 Port Range Specify the port range for the rule Host 2 IP Range Specify the IP range for the rule Host 2 Port Range Specify the port range for the rule Click on the Save button to insert the entry...

Страница 76: ...he wireless network using Wi Fi Protected Setup Enable Place a check in this box to enable this feature Lock Wireless Security Settings Place a check in this box to lock the wireless security settings...

Страница 77: ...ate NEW PIN Press this button to generate a new random PIN Add Wireless Device Wizard Please refer to Chapter 3 1 3 in order to configure Wi Fi Protected Setup using the Wizard Click on the Apply butt...

Страница 78: ...and PPPoE pass through settings Enable UPnP Place a check in this box to enable UPnP UPnP stands for Universal Plug and Play which is a networking architecture that provides compatibility among networ...

Страница 79: ...elect a WAN port speed from the drop down list It is recommended that you select Auto Enable PPPoE Pass Through Place a check in this box to enable PPPoE pass through This option controls whether LAN...

Страница 80: ...ink in the navigation menu This feature allows you to configure update and maintain the correct time on the device s internal system clock as well as configure the time zone The date and time of the d...

Страница 81: ...Displays the current time on the device Time Zone Select your time zone from the drop down list Enable Daylight Saving Place a check in this box to enable daylight savings time Daylight Saving Offset...

Страница 82: ...e s clock to a Network Time Server over the Internet If you are using schedules or logs this is the best way to ensure that the schedules and logs are kept accurate NTP Server Used Specify the NTP ser...

Страница 83: ...Hard Drive This option allows you to save the current configuration of the device into a file Click on the Save Configuration button to begin Save the file on your local disk by using the Save or Sav...

Страница 84: ...n to browse for a gws file and then click on Restore Configuration from File button The system then prompts you to reboot the device Click on the OK button Click on the Reboot New button to continue Y...

Страница 85: ...back to the settings that were in effect at the time when the device was shipped from the factory Click on the OK button to continue You will then see the Rebooting page Note The current settings wil...

Страница 86: ...he EN2HWI N3 Router using its current settings Click on the OK button to continue You will then see the Rebooting page Note The current settings will be lost Please wait while the system is rebooting...

Страница 87: ...ance This page also displays the current firmware version and its release date Ensure that you have downloaded the appropriate firmware from the Encore s website Connect the EN2HWI N3 Router to your c...

Страница 88: ...ed on the Ethernet and Wireless interface This log can be referred when an unknown error occurs on the system or when a report needs to be sent to the technical support department for debugging purpos...

Страница 89: ...er no matter what your IP address is Enable Dynamic DNS Place a check in this box to enable the DDNS feature Service Address Select a DDNS service provider from the drop down list Host Name Specify th...

Страница 90: ...3 3 6 System Check Click on the System Check link in the navigation menu This page allows you to ping a host name or IP address Host Name or IP address Enter the host name or IP address and then clic...

Страница 91: ...enter a Start Time of 3pm and End Time of 8pm Name Specify a name for the schedule Day s Select the days at which you would like the schedule to be effective All Day 24 hrs Place a check in this box i...

Страница 92: ...ternet Sessions and Firewall The configuration steps for each option are described below 3 4 1 Wireless Status Click on the Wireless link in the navigation menu The wireless section allows you to view...

Страница 93: ...ission rate of the client in megabits per second Signal This is a relative measure of signal quality The value is expressed as a percentage of theoretical best quality Signal quality can be reduced by...

Страница 94: ...s you to view the router logs You can define what types of events you want to view and the level of events to view This router also has external Syslog Server support so you can send the log files to...

Страница 95: ...navigation drop down menu The WISH Sessions page displays full details of active local wireless sessions through your router when WISH has been enabled A WISH session is a conversation between a progr...

Страница 96: ...short time while a connection that was in Close Wait is fully closed CL Closed The connection is no longer active but the session is being tracked in case there are any retransmitted packets still pe...

Страница 97: ...a program or application on a WAN side computer Local The IP address and where appropriate port number of the local application NAT The port number of the LAN side application as viewed by the WAN si...

Страница 98: ...s being tracked in case there are any retransmitted packets still pending Priority The priority given to packets sent wirelessly over this conversation by the WISH logic The priorities are BK Backgrou...

Страница 99: ...98 www encore usa com 3 4 7 Firewall This page displays the full details about firewall holes in your router ports that accept unsolicited messages from the WAN...

Страница 100: ...on the network Access Point AP Device that allows wireless clients to connect to it and access the network ActiveX A Microsoft specification for the interaction of software components Address Resoluti...

Страница 101: ...ly with other applications on a network ASCII American Standard Code for Information Interchange This system of characters is most commonly used for text files Attenuation The loss in strength of digi...

Страница 102: ...ansmission speed Beacon A data frame by which one of the stations in a Wi Fi network periodically broadcasts network control data to other wireless stations Bit rate The amount of bits that pass in gi...

Страница 103: ...10 100 Mbps or 1Gbps Ethernet connections Client A program or user that requests data from a server Collision When do two devices on the same Ethernet network try and transmit data at the exact same...

Страница 104: ...for RS 232 connections dBd Decibels related to dipole antenna dBi Decibels relative to isotropic radiator dBm Decibels relative to one milliwatt Decrypt To unscramble an encrypted message back into pl...

Страница 105: ...e DMZ computer trades some of the protection of the router s security mechanisms for the convenience of being directly addressable from the Internet DNS Domain Name System Translates Domain Names to I...

Страница 106: ...otocol Email Electronic Mail is a computer stored message that is transmitted over the Internet Encryption Converting data into cipher text so that it cannot be easily read Ethernet The most widely us...

Страница 107: ...File Transfer Protocol Easiest way to transfer files between computers on the Internet Full duplex Sending and Receiving data at the same time G Gain The amount an amplifier boosts the wireless signa...

Страница 108: ...to another Host Computer on a network HTTP Hypertext Transfer Protocol is used to transfer files from HTTP servers web servers to HTTP clients web browsers HTTPS HTTP over SSL is used to encrypt and...

Страница 109: ...ources to be accessed from computers around the world Internet Explorer A World Wide Web browser created and provided by Microsoft Internet Protocol The method of transferring data from one computer t...

Страница 110: ...tranet IPsec Internet Protocol Security IPX Internetwork Packet Exchange is a networking protocol developed by Novel to enable their Netware clients and servers to communicate ISP Internet Service Pro...

Страница 111: ...ine Printer Requestor Line Printer Daemon A TCP IP protocol for transmitting streams of printer data M MAC Address A unique hardware ID assigned to every Ethernet adapter by the manufacturer Mbps Mega...

Страница 112: ...twork like the Internet Multicast Sending data from one device to many devices on a network N NAT Network Address Translation allows many private IP addresses to connect to the Internet or another net...

Страница 113: ...data should travel between two devices on a network OSPF Open Shortest Path First is a routing protocol that is used more than RIP in larger scale networks because only changes to the routing table a...

Страница 114: ...A logical channel endpoint in a network A computer might have only one physical channel its Ethernet channel but can have multiple ports logical channels each identified by a number PPP Point to Point...

Страница 115: ...network to discover each other and be connected without the need to configure any settings Repeater Retransmits the signal of an Access Point in order to extend it s coverage RIP Routing Information...

Страница 116: ...s on both ends Simple Mail Transfer Protocol Used for sending and receiving email Simple Network Management Protocol Governs the management and monitoring of network devices SIP Session Initiation Pro...

Страница 117: ...interface for collecting in one place the logs from different sources Originally written for UNIX it is now available for other operating systems including Windows T TCP Transmission Control Protocol...

Страница 118: ...t version of a software or firmware product Upload To send a request from one computer to another and have a file transmitted from the requesting computer to the other UPnP Universal Plug and Play URL...

Страница 119: ...wireless clients including PCs and other devices WDS Wireless Distribution System A system that enables the interconnection of access points wirelessly Web browser A utility that allows you to view co...

Страница 120: ...ting to a Local Area Network over one of the 802 11 wireless standards WISP Wireless Internet Service Provider WLAN Wireless Local Area Network WPA Wi Fi Protected Access A Wi Fi security enhancement...

Страница 121: ...and actual product appearance may differ from that depicted herein All trademarks and brand names are the properties of their respective holders Local tech support numbers are provided in selectively...

Отзывы: