Linksys WRV200 manual Firewall Access Restriction, Firewall URL Filtering, VPN VPN Client Access

Page 25

Chapter 5

Configuring the Wireless-G Router

Firewall > Access Restriction

The Access Restriction screen allows you to block or allow specific kinds of Internet usage and traffic during specific days and times.

Firewall > Access Restriction

Internet Access Policy  Access can be managed by a policy. Use the settings on this screen to establish an access policy (after Save Settings is clicked). Selecting a policy from the drop-down menu will display that policy’s settings. To delete a policy, select that policy’s number and click Delete. To view all the policies, click Summary.

Status  Policies are disabled by default. To enable a policy, select the policy number from the drop-down menu, and click the radio button beside Enable.

To create an Internet Access Policy:

1.Select a number from the Internet Access Policy drop- down menu.

2.To enable this policy, click the Enable radio button.

3.Enter a Policy Name in the field provided.

4.Decide which days and what times you want this policy to be enforced. Select the individual days during which the policy will be in effect. Then enter a range of hours and minutes during which the policy will be in effect, or select 24 Hours.

5.You can block access to various services accessed over the Internet, such as FTP or telnet, by specifying the TCP/UDP port or the protocol number.

Click Save Settings to save the policy settings you have entered. Click Cancel Changes to cancel any changes you have entered. For help information, click More.

Firewall > URL Filtering

URL filtering is used to block access to specific sites on the Internet.

Firewall > URL Filtering

To create a URL filtering policy:

1.Select a number from the URL Filtering Policy drop- down menu.

2.Enter a Policy Name in the field provided.

3.To enable this policy, select Enabled from the Status menu.

4.Enter the Start IP Address and End IP Address that will be affected by the policy. After making your changes, click Save Settings to apply your changes.

5.In the URL String field, enter the URL of the Internet site that this policy will block access to.

6.Click Save Settings to save the policy’s settings. To cancel the policy’s settings, click Cancel Changes.

Click Save Settings to save the policy settings you have entered. Click Cancel Changes to cancel any changes you have entered. For help information, click More.

VPN

Virtual Private Networking (VPN) is a security measure that creates a secure connection between two remote locations. The security is created by the very specific settings for the connection. The VPN Tab allows you to configure your VPN settings to make your network more secure.

VPN > VPN Client Access

The Router offers a QuickVPN Client utility for Windows 2000 or XP. If the Router has clients using this utility, then you can designate the QuickVPN clients and their passwords on the VPN > VPN Client Access screen.

Wireless-G VPN Router with RangeBooster

20

Image 25
Contents Wireless-G VPN Router with RangeBooster About This Guide About This GuideTable of Contents Appendix B Wireless Security Checklist Appendix a TroubleshootingAppendix I Regulatory Information Appendix E Gateway-to-Gateway VPN TunnelAppendix J Contact Information Introduction ChapterAd-Hoc versus Infrastructure Mode Chapter Planning Your Wireless NetworkNetwork Topology Network LayoutWhat is a VPN? Why do I need a VPN?Chapter Planning Your Virtual Private Network VPN VPN Router to VPN Router Computer using the Linksys VPN client software to VPN RouterProduct Overview Chapter Product OverviewFront Panel Back PanelOverview Chapter Configuring the Wireless-G VPN RouterSetup How to Access the Web-based UtilitySetup Basic Settings Internet SetupPptp LAN Setup Optional Settings Required by some ISPsSetup Ddns Setup VlanTime Settings Ddns Setup MAC Address CloneDynamic Routing Setup Advanced RoutingStatic Routing Wireless Basic Wireless Settings WirelessWireless Wireless Security Wireless Network ModeWPA Enterprise WPA2 PersonalWPA2 Enterprise WPA2 Enterprise Mixed WPA2 Personal MixedWireless Network Access Wireless Wireless Network Access Wireless WDS Wireless Advanced Wireless Settings Advanced Wireless Settings Firewall General FirewallFirewall Port Forwarding Internet BlockFirewall DMZ Firewall Port TriggeringVPN VPN Client Access Firewall Access RestrictionFirewall URL Filtering VPN Client List Table VPN VPN PassthroughCertificate Management Local Secure Group VPN IPSec VPNRemote Secure Group Key Management Remote Secure GatewayTunnel Options VPN VPN Summary QoS Application-Based QoS QoSQoS Port-Based QoS Priority QueueAdministration Management AdministrationAdmin Password Local Router AccessBackup and Restore Administration LogUPnP Administration Factory Default Administration DiagnosticsAdministration Firmware Upgrade Ping TestStatus Administration RebootStatus Router InformationStatus Local Network Status WirelessStatus System Performance Local NetworkSystem Performance Status VPN ClientsVPN Summary Troubleshooting Appendix a TroubleshootingAppendix a WindowsTroubleshooting Need to set up a server behind my Router Go to the Firewall DMZ tab Click Save SettingsClick the Firewall Port Triggering tab Go to the Setup Basic Setup tabWRV200 does not support NetBIOS Broadcast over Frequently Asked QuestionsIs the Router cross-platform compatible? Wireless Security Checklist Appendix B Wireless Security ChecklistAppendix B General Network Security GuidelinesAppendix C Installing from the CD-ROMAppendix C Overview Before You BeginVersion Number of the QuickVPN Client Using the Linksys QuickVPN SoftwareDistributing Certificates to QuickVPN Users Select VPN, then VPN Client Access\Program Files\Linksys\QuickVPN Client\ Introduction Appendix DEnvironment Create an IPSec PolicyFilter List 2 router win Tunnel 1 win-Router Configure Individual Tunnel RulesTunnel 2 Router-win Rules Tab Create a Tunnel Through the Web-Based Utility Assign New IPSec PolicyYour tunnel should now be established Appendix E Configuration of the WRV200Appendix E Gateway-to-Gateway VPN Tunnel Click IPSec VPNConfiguration of PC 1 and PC Configuration of the RV082Click the Gateway to Gateway tab RV082 WRV200 Dynamic IP B.B.B.B with Configuration when Both Gateways Use Dynamic IP Addresses RV082 VPN Settings Appendix F Glossary Appendix FGlossary Http HyperText Transport ProtocolSmtp Simple Mail Transfer Protocol The standard e GlossaryAppendix F Specifications Appendix G SpecificationsAppendix G Specifications Obtaining Warranty Service Warranty InformationAppendix H Exclusions and LimitationsTechnical Support Warranty InformationRegulatory Information AppendixAvis d’Industrie Canada Wireless DisclaimerDansk Danish Miljøinformation for kunder i EU Appendix Norsk Norwegian Miljøinformasjon for kunder i EU Appendix Contact Information Appendix J
Related manuals
Manual 2 pages 11.27 Kb