TP-Link manual To add a new rule, please follow the steps below, TL-WR940N Wireless N Router

Page 72
Figure 4-45 Access Control Rule Management

TL-WR940NWireless N Router

Figure 4-45 Access Control Rule Management

¾Enable Internet Access Control - Select the check box to enable the Internet Access Control function, so the Default Filter Policy can take effect.

¾Rule Name - Here displays the name of the rule and this name is unique.

¾Host - Here displays the host selected in the corresponding rule.

¾Target - Here displays the target selected in the corresponding rule.

¾Schedule - Here displays the schedule selected in the corresponding rule.

¾Action - Here displays the action the Router takes to deal with the packets. It could be Allow or Deny. Allow means that the Router permits the packets to go through the Router. Deny means that the Router rejects the packets to go through the Router.

¾Status - This field displays the status of the rule. Enabled means the rule will take effect, Disabled means the rule will not take effect.

¾Modify - Here you can edit or delete an existing rule.

To add a new rule, please follow the steps below.

1.Click the Add New… button and the next screen will pop-up as shown in Figure 4-46.

2.Give a name (e.g. Rule_1) for the rule in the Rule Name field.

3.Select a host from the Host drop-down list or choose “Click Here To Add New Host List”.

4.Select a target from the Target drop-sown list or choose “Click Here To Add New Target List”.

5.Select a schedule from the Schedule drop-down list or choose “Click Here To Add New Schedule”.

-64-

Image 72
Contents TL-WR940N Wireless N Router Rev 1.1.0COPYRIGHT & TRADEMARKS FCC STATEMENTFCC RF Radiation Exposure Statement CE Mark WarningNational restrictions CountryIndustry Canada Statement Korea Warning StatementsNCC Notice DECLARATION OF CONFORMITY ETSI EN 300 328 V1.7.1ETSI EN 301 489-1 V1.8.12008& ETSI EN 301 489-17 EN 550222006 +A12007 EN 550241998+A12001+A22003 EN 61000-3-22006+A12009+A22009 ENCONTENTS Package ContentsChapter 4.6.5 4.15.1 Package Contents TL-WR940N Wireless N RouterFlexible Access Control Simple InstallationChapter 1.Introduction 1.1 Overview of the Router1.3 Main Features 1.4 Panel Layout1.4.1 The Front Panel Wireless N Router 1.4.2 The Rear PanelTL-WR940N Indication¾ RESET Chapter 2.Connecting the Router 2.2 Installation Environment Requirements2.3 Connecting the Router 2.1 System RequirementsFigure 2-1 Hardware Installation of the TL-WR940N Wireless N Router Chapter 3.Quick Installation Guide 3.1 TCP/IP ConfigurationPlease check the connection following these steps Figure 3-1 Success result of Ping commandFigure 3-2 Failure result of Ping command 1. Is the connection between your PC and the Router correct?3.2 Quick Installation Guide Figure 3-5 Quick Setup Figure 3-6 Choose WAN Connection TypeFigure 3-7 Quick Setup - PPPoE Figure 3-8 Quick Setup - MAC CloneFigure 3-9 Quick Setup - MAC Clone Figure 3-10 Quick Setup - Static IPNote Dialog z PSK Password - You can enter ASCII or Hexadecimal characters Figure 3-13 Quick Setup - Finish Chapter 4.Configuring the Router 4.1 Login4.2 Status 4.3 Quick Setup 4.4 QSSPlease refer to 3.2 Quick Installation Guide Figure 4-1 Router StatusI. By PBC Method OneMethod Two Method Three The QSS Configuration Screen of Wireless AdapterTL-WR940N Wireless N Router II. By PIN Method Two Enter the PIN from my Router 4.5 Network 4.5.1 WANadded to the network Figure 4-5 WAN - Dynamic IP Figure 4-6 WAN - Static IP Figure 4-7 WAN - PPPoE Figure 4-8 PPPoE Advanced Settings NSW / ACT - nsw.bigpond.net.au QLD - qld.bigpond.net.au Figure 4-10 L2TP Settings Figure 4-11 PPTP Settings z Dynamic IP - Connections which use dynamic IP address assignment z Static IP - Connections which use static IP address assignment4.5.2 LAN 4.5.3 MAC CloneFigure 4-12 LAN Figure 4-13 MAC Address Clone4.6 Wireless 4.6.1 Wireless SettingsOnly the PC on your LAN can use the MAC Address Clone function Figure 4-15 Wireless Settings ¾ Mode - Select the desired mode. The default setting is 11bgn mixed 4.6.2 Wireless Security ¾ WPA /WPA2 - Enterprise - It’s based on Radius Server Encryption - You can select either Automatic, or TKIP or AES 4.6.3 Wireless MAC Filtering Figure 4-20 Wireless MAC address Filtering4. Click the Save button to save this entry 4.6.4 Wireless Advanced to access for Filtering Rules4.6.5 Wireless Statistics 4.7.1 DHCP Settings 4.7 DHCPThis page will be refreshed automatically every 5 seconds ¾ Default Domain - Optional. Input the domain name of your network 4.7.2 DHCP Clients List 4.7.3 Address Reservation4.8 Forwarding To Reserve IP addressesTo modify or delete an existing entry To set up a virtual server entry 4.8.1 Virtual Servers4.8.2 Port Triggering Figure 4-31 Add or Modify a Virtual Server EntryTo add a new rule, follow the steps below 4.8.3 DMZ 3. Incoming Port Range cannot overlap each other4.8.4 UPnP To assign a computer or server to be a DMZ server4.9 Security 4.9.1 Basic SecurityFigure 4-37 Basic Security z z z4.9.2 Advanced Security 4.9.3 Local Management 4.9.4 Remote Management Figure 4-39 Local Management4.10Parental Control Figure 4-40 Remote ManagementTo add a new entry, please follow the steps below 7. Click the Save button 4.11Access Control 4.11.1 RuleTo add a new rule, please follow the steps below Figure 4-45 Access Control Rule ManagementFigure 4-46 Add or Modify Internet Access Control Entry 4.11.2 Host Figure 4-47 Host SettingsFigure 4-48 Add or Modify a Host Entry Figure 4-49 Add or Modify a Host Entry4.11.3 Target Figure 4-50 Target SettingsFigure 4-51 Add or Modify an Access Target Entry Figure 4-52 Add or Modify an Access Target Entry4.11.4 Schedule To add a new schedule, follow the steps below4.12 Advanced Routing Figure 4-54 Advanced Schedule SettingsFigure 4-55 Advanced Routing Other configurations for the entries 4.12.1 Static Routing ListTo add static routing entries 4.13Bandwidth Control 4.12.2 System Routing Table4.13.1 Control Settings 4.13.2 Rules List4.14IP & MAC Binding Setting 4.14.1 Binding SettingTo add/modify a Bandwidth Control rule, follow the steps below To add IP & MAC Binding entries, follow the steps below To modify or delete an existing entry, follow the steps belowTo find an existing entry, follow the steps below Figure 4-64 Binding Setting4.14.2 ARP List Figure 4-66 Find IP & MAC Binding EntryFigure 4-67 ARP List 4.15Dynamic DNS 4.15.1 Comexe.cn DDNSTo set up for DDNS, follow these instructions 4.15.2 Dyndns.org DDNS4.15.3 No-ip.com DDNS Figure 4-69 Dyndns.org DDNS Settings4.16System Tools Figure 4-70 No-ip.com DDNS SettingsFigure 4-71 The System Tools menu 4.16.1 Time Settings To set time manually4.16.2 Diagnostic To set time automaticallyTo set Daylight Saving 2. The time will be lost if the router is turned offFigure 4-73 Diagnostic Tools 4.16.3 Firmware Upgrade To upgrade the Routers firmware, follow these instructions below4.16.4 Factory Defaults 4.16.5 Backup & Restore4. The Router will reboot after the upgrading has been finished 4.16.6 Reboot 4.16.7 Password 4.16.8 System LogFigure 4-80 System Log Figure 4-81 Mail Account Settings 4.16.9 Statistics Figure 4-82 StatisticsStatistics Table Appendix A FAQ 1. How do I configure the Router to access Internet by ADSL users?3. I want to use Netmeeting, what do I need to do? Figure A-3 MAC CloneFigure A-4 Virtual Servers Figure A-5 Add or Modify a Virtual server Entry Figure A-6 DMZ4. I want to build a WEB Server on the LAN, what should I do? 5. The wireless stations cannot connect to the Router field of the Web browserAppendix B Configuring the PCs 1. Install TCP/IP component¾ Setting IP address automatically Now you have two ways to configure the TCP/IP protocol belowshown in the Figure below Figure B-2¾ Setting IP address manually Figure B-3Figure B-4 Appendix C Specifications WirelessGeneral Environmental and PhysicalAppendix D Glossary identifying a wireless local area network. For the wireless devices in a network to communicate with each other, all devices must be configured with the same SSID. This is typically the configuration parameter for a wireless PC card. It corresponds to the ESSID in the wireless Access Point and to the wireless network name