Linksys WRT400N manual Security Firewall, Security VPN Passthrough, Web Filters

Page 20

Chapter 3

Advanced Configuration

Threshold. Setting the Fragmentation Threshold too low may result in poor network performance. Only minor reduction of the default value is recommended. In most cases, it should remain at its default value of 2346.

RTS Threshold  Should you encounter inconsistent data flow, only minor reduction of the default value, 2347, is recommended. If a network packet is smaller than the preset RTS threshold size, the RTS/CTS mechanism will not be enabled. The Router sends Request to Send (RTS) frames to a particular receiving station and negotiates the sending of a data frame. After receiving an RTS, the wireless station responds with a Clear to Send (CTS) frame to acknowledge the right to begin transmission. The RTS Threshold value should remain at its default value of 2347.

Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes.

Security > Firewall

The Security > Firewall screen is used to configure a firewall that can filter out various types of unwanted traffic on the Router’s local network.

Security > Firewall

Firewall

SPI Firewall Protection  To use firewall protection, keep the default selection, Enabled. To turn off firewall protection, select Disabled.

Internet Filters

Filter Anonymous Internet Requests  This feature makes it more difficult for outside users to work their way into your network. This feature is selected by default. Deselect the feature to allow anonymous Internet requests.

Filter Multicast  Multicasting allows for multiple transmissions to specific recipients at the same time. If multicasting is permitted, then the Router will allow IP multicast packets to be forwarded to the appropriate

computers. It is selected by default. Deselect this feature to disable it.

Filter Internet NAT Redirection  This feature is used to prevent a local computer from using a URL or Internet address to access the local server. Select Filter Internet NAT Redirection to filter Internet NAT redirection. It is not selected by default.

Filter IDENT (Port 113)  This feature keeps port 113 from being scanned by devices outside of your local network. It is selected by default. Deselect this feature to disable it.

Web Filters

Filters  Select to filter Proxy, Java, ActiveX, and Cookies.

Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes.

Security > VPN Passthrough

The Security > VPN Passthrough screen allows you to enable VPN tunnels using IPSec, PPTP, or L2TP protocols to pass through the Router’s firewall.

Security > VPN Passthrough

VPN Passthrough

IPSec Passthrough  Internet Protocol Security (IPSec) is a suite of protocols used to implement secure exchange of packets at the IP layer. To allow IPSec tunnels to pass through the Router, keep the default, Enabled.

PPTP Passthrough  Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be tunneled through an IP network. To allow PPTP tunnels to pass through the Router, keep the default, Enabled.

L2TP Passthrough  Layer 2 Tunneling Protocol is the method used to enable Point-to-Point sessions via the Internet on the Layer 2 level. To allow L2TP tunnels to pass through the Router, keep the default, Enabled.

Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes.

Simultaneous Dual-Band Wireless-N Router

16

Image 20
Contents Simultaneous Dual-Band Wireless-N Router Copyright and Trademarks Icon DescriptionsOnline Resources Table of Contents Appendix D Regulatory Information Appendix E Software End User License AgreementFront Panel Back PanelHorizontal Placement Wall-Mounting PlacementGeneral Network Security Guidelines Additional Security TipsHow to Access the Web-Based Utility Setup Basic SetupInternet Setup LanguageAutomatic Configuration Dhcp Static IPPPPoE PptpTelstra Cable Optional SettingsL2TP Router Address Network SetupNetwork Address Server Settings Dhcp Setup Ddns Time SettingDdns Service DynDNS.orgSetup MAC Address Clone Setup Advanced RoutingMAC Address Clone Advanced RoutingWireless Basic Wireless Settings Configuration ViewGHz or 2.4 GHz Wireless Settings Simultaneous NetworksMethod #2 Wi-Fi Protected SetupMethod #1 Wireless Wireless Security Wireless SecuritySecurity Mode Method #3Radius WPA2 PersonalWPA2 Enterprise Wireless Wireless MAC Filter Wireless MAC FilterAccess Restriction MAC Address Filter ListWireless Advanced Wireless Settings GHz or 2.4 GHz Advanced WirelessSecurity Firewall Security VPN PassthroughFirewall Web FiltersBlocked Applications Internet AccessTo create an Internet Access Policy Applications and Gaming Single Port Forwarding Applications and Gaming Port Range ForwardingSingle Port Forwarding Port Range ForwardingApplications and Gaming DMZ Applications & Gaming Port TriggeringPort Triggering Triggered RangeQoS Quality of Service Internet Access PriorityApplications and Gaming QoS CategoryOnline Games MAC Address GamesEthernet Port Add a New GameSummary Administration ManagementRouter Password Administration Log Administration DiagnosticsLog Ping TestStatus Router Administration Factory DefaultsAdministration Firmware Upgrade Status Wireless Network 5GHz/2.4GHz Wireless NetworkStatus Local Network Internet ConnectionAppendix a Troubleshooting Appendix B Specifications Exclusions and Limitations Limited WarrantyObtaining Warranty Service Technical Support Safety Notices FCC StatementFCC Radiation Exposure Statement Industry Canada StatementRestrictions dans la bande 5 GHz Wireless DisclaimerAvis d’Industrie Canada Dansk Danish Miljøinformation for kunder i EU Regulatory Information Norsk Norwegian Miljøinformasjon for kunder i EU Regulatory Information Schedule Cisco Software License Agreement Cisco ProductsSoftware Licenses Software End User License Agreement Software End User License Agreement Schedule Network Magic Features Schedule Open Source and Third Party LicensesSchedule 3-A GNU General Public LicenseSoftware End User License Agreement Software End User License Agreement END of Schedule 3-A No WarrantySchedule 3-B GNU Lesser General Public License Software End User License Agreement Software End User License Agreement Software End User License Agreement Schedule 3-C END of Schedule 3-BOpenSSL License Original SSLeay LicenseEND of Schedule 3-C