TP-Link TL-ER604W manual Wan

Page 74

Figure 3-44 Policy Routing

The following items are displayed on this screen:

General

Protocol:Select the protocol for the entry in the drop-down list. If the protocol you want to set is not in the list, you can add it to the list on 3.4.4.4 Protocol page.

Source IP: Enter the source IP range for the entry. 0.0.0.0 - 0.0.0.0 means any IP is acceptable.

Destination IP: Enter the destination IP range for the entry. 0.0.0.0 - 0.0.0.0 means any IP is acceptable.

Source Port: Enter the source Port range for the entry, which is effective only when the protocol is TCP, UDP or TCP/UDP. The default value is 1 – 65535, which means any port is acceptable.

Destination Port: Enter the destination port range for the entry, which is effective only when the protocol is TCP, UDP or TCP/UDP. The default value is 1 – 65535, which means any port is acceptable.

WAN:

Select the WAN port for transmitting packets.

Effective Time: Specify the time for the entry to take effect.

Status:Activate or inactivate the entry.

-69-

Image 74
Contents TL-ER604W Copyright & Trademarks FCC Statement Contents III 149 Hardware Specifications 148Application 130 Glossary 151Package Contents Conventions Symbol DescriptionIntended Readers Overview of this GuideOverview of the Router Features Security WirelessTraffic Control  LEDs AppearanceFront Panel Status IndicationRear Panel Status System ModeNetwork Page  Non-NAT Mode WAN Mode NAT Mode  Classic ModeTips  WAN Mode3.2 WAN1 Static IPWAN Static IP Following items are displayed on this screen  Static IPConnection Type Dynamic IP Dynamic IP Host NameUse the following DNS Get IP Address byUnicast ServerPPPoE WAN PPPoESettings Keep Alive PasswordActive Mode Account NameSecondary Connection Service NameISP Address Subnet AddressGateway Address L2TP L2TP Settings 10 WAN L2TP Following items are displayed on this screenConnection Default GatewaySecondary  L2TP Status Pptp Pptp Settings Server IPInternet connection by the Connect or Disconnect  Pptp Status BigPond BigPond Settings 12 WAN Bigpond Following items are displayed on this screen BigPond Status ISPDhcp 4 LAN4.1 LAN  Dhcp Settings  Dhcp Reservation Dhcp ClientDhcp Reservation Set the MAC Address for LAN port MAC Address List of Reserved Address Set the MAC Address for WAN port MAC Address SwitchStatistics PortPort Mirror  StatisticsMirroring Port Enable Port MirrorMode Mirrored Port Rate Control Rate ControlApplication Example Port Config  Port Config Port Vlan Port StatusPort Vlan Wireless Setting WirelessWireless Setting  Wireless Setting Wireless Parameter AP Isolation DescriptionSsid Broadcast SecurityWPA/WPA2 WEP Hexadecimal and Ascii formats are Multi-SSIDKey Format  Multi-SSID Config  GeneralEnable/Disable Guest NetworkEncryption Group KeyAuth Type 1.3 WDS  List of GroupBSSIDto be bridged Scan Parameter Key TypeKey : Wireless Advanced Wireless Advanced Short GIMAC Filtering  Rule List Host Status Filtering Rules  Host Status User GroupGroup User  Group Config User Config  List of User  View ConfigView View1 NAT NAT SetupAdvanced One-to-One NAT  One-to-One NAT Multi-Nets NAT Multi-Nets NAT List of Rules Configuration procedure Application Example Network RequirementsVirtual Server Protocol  Virtual ServerInterface Port Triggering  Port Triggering1.6 ALG 38 ALG Following items are displayed on this screen323 ALG SetupTraffic Control IPsec ALGLimited ControlControl all the time UpstreamBandwidth Control Limited Bandwidth Session LimitSession Limit Session List  List of Session LimitPolicy Routing ConfigurationLoad Balance WAN Link Backup 45 Link Backup Following items are displayed on this screenTiming WAN ConfigProtocol Failover Protocol RoutingStatic Route  List of Protocol47 Static Route Following items are displayed on this screen  Static Route5.2 RIP 48 RIP Following items are displayed on this screen  List of RIPRoute Table IP-MAC Binding FirewallAnti ARP Spoofing ARP Scanning  IP-MAC BindingARP List Attack Defense Packet Anomaly Enable AttackFlood Defense DefenseURL Filtering Access ControlMAC Filtering  MAC Filtering URL Filtering Rule ObjectAccess Rules Web FilteringPolicy  Access RulesService SourceDestination ServiceGroup on 3.3.1 Group PriorityName  Service List of Service Dest. Port Control Rules App ControlControl Rules ApplicationVPN Database1 IKE IKE Policy62 IKE Policy Following items are displayed on this screen  IKE PolicyIKE Proposal 63 IKE Proposal Following items are displayed on this screen  IKE Proposal List of IKE Proposal IPsecIPsec Policy Local Subnet  IPsec PolicyPolicy Name Remote Gateway Policy ModeRemote Subnet IKE PolicyAH Authentication Key-Out AH Authentication Key-InESP Authentication Key-In ESP Authentication Key-Out IPsec Proposal IPsec Proposal List of IPsec Policy IPsec  List of IPsec Proposal IPsec SA Protocol Media Tunnel Length of Header Authentication3 L2TP/PPTP 3.1 L2TP/PPTP Tunnel  L2TP/PPTP TunnelL2TP/PPTP Server TunnelMax Connections Pre-shard KeyList of L2TP/PPTP Tunnel  List of ConfigurationsIP Address Pool  IP Address PoolGeneral ServicesPPPoE Server 70 General Following items are displayed on this screen IP Address Pool IP Address Assigned Account Account Static IP Address List of Account Is 48. If Enable Advanced Account Features is not selected,Exceptional IP  Exceptional IP BulletinList of Account Title Interval E-Bulletin  List of E-Bulletin Dynamic DNSPublisher DynDNS  Dyndns Ddns No-IP Ddns No-IP List of DynDNS Account  PeanutHull Ddns PeanutHull List of No-IP Account Comexe  List of PeanutHull Account List of Comexe Account UPnP Comexe Ddns Administrator MaintenanceAdmin Setup  List of UPnP MappingLogin Parameter  AdministratorRemote Management  Remote Management List of Subnet Factory DefaultsManagement Export and Import Reboot Configuration Version  ExportFirmware Upgrade License Interface Traffic Statistics StatisticsInterface Traffic Statistics 123IP Traffic Statistics  Advanced WAN Information Traffic Statistics DiagnosticsDiagnostics  IP Traffic Statistics Tracert Online Detection Ping DNS Lookup TimePing Port Displays the detected WAN port DetectionLogs Severity  Config List of Logs Send System LogsApplication Network RequirementsSystem Mode Network Topology ConfigurationsInternet Setting System Mode Internet ConnectionSettings VPN SettingIKE Setting IPsec VPN IKE Policy IKE1IPsec Setting  IPsec Proposal IPsec Policy PFS DH1Pptp VPN Setting  IP Address Pool L2TP/PPTP Tunnel  Group Network ManagementUser Group  UserApp Control  ViewEnable Bandwidth Control 11 App RulesBandwidth Control Rule LAN WAN1Scan and import the entries to ARP List Network SecurityLAN ARP Defense Set Attack Defense WAN ARP DefenseSet IP-MAC Binding Entry Manually Attack Defense 20 Attack Defense 145Traffic Monitoring StatisticsPage Appendix a Hardware Specifications Environmental and PhysicalAppendix B FAQ Page Appendix C Glossary Glossary DescriptionAllows dissimilar communication devices to communicate Port or device that connects to a LAN. Other devices Enterprise
Related manuals
Manual 4 pages 13.1 Kb