Linksys WRT320N manual Security VPN Passthrough, Internet Access Policy, Summary

Page 20

Chapter 3

Advanced Configuration

sites created using this programming language. Select this feature to enable Java filtering. Deselect the feature to allow Java usage.

ActiveX  ActiveX is a programming language for websites. If you deny ActiveX, you run the risk of not having access to Internet sites created using this programming language. Select this feature to enable ActiveX filtering. Deselect the feature to allow ActiveX usage.

Cookies  A cookie is data stored on your computer and used by Internet sites when you interact with them. Select this feature to filter cookies. Deselect the feature to allow cookie usage.

Click Save Settings to apply your changes or click Cancel Changes to cancel your changes.

Security > VPN Passthrough

The VPN Passthrough screen allows you to enable VPN tunnels using IPSec, PPTP or L2TP protocols to pass through the Router's firewall.

Security > VPN Passthrough

VPN Passthrough

IPSec Passthrough  Internet Protocol Security (IPSec) is a suite of protocols used to implement secure exchange of packets at the IP layer. To allow IPSec tunnels to pass through the Router, keep the default, Enabled.

PPTP Passthrough  Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be tunnelled through an IP network. To allow PPTP tunnels to pass through the Router, keep the default, Enabled.

L2TP Passthrough  Layer 2 Tunneling Protocol is the method used to enable Point-to-Point sessions via the Internet on the Layer 2 level. To allow L2TP tunnels to pass through the Router, keep the default, Enabled.

Click Save Settings to apply your changes or click Cancel Changes to cancel your changes.

Access Restrictions > Internet Access

The Internet Access screen allows you to block or allow specific kinds of Internet usage and traffic, such as Internet access, designated services and websites during specific days and times.

Access Restrictions > Internet Access

Internet Access Policy

Access Policy  Access can be managed by a policy. Use the settings on this screen to establish an access policy (after Save Settings is clicked). Selecting a policy from the drop- down menu will display that policy's settings. To delete a policy, select that policy's number and click Delete This Policy. To view all the policies, click Summary.

Summary

The policies are listed with the following information: No., Policy Name, Access, Days, Time and status (Enabled). To enable a policy, select Enabled. To delete a policy, click Delete. Click Save Settings to save your changes or click Cancel Changes to cancel your changes. To return to the Internet Access Policy screen, click Close.

Summary

Dual-Band Wireless-N Gigabit Router

19

Image 20 Contents
Dual-Band Wireless-N Gigabit Router Copyright and Trademarks Icon DescriptionsOnline Resources Table of Contents Appendix D Regulatory Information Appendix E Software Licence AgreementPlacement Positions Horizontal PlacementFront Panel Back PanelWall-Mounting Placement Suggested Mounting HardwareGeneral Network Security Guidelines Additional Security TipsHow to access the Web-Based Utility Setup Basic SetupInternet Setup Automatic Configuration DhcpStatic IP PPPoEOptional Settings Telstra CableNetwork Setup Dhcp Server SettingRouter IP Dhcp ReservationSetup Ddns Time SettingDdns Service DynDNS.orgSetup MAC Address Clone Setup Advanced RoutingMAC Address Clone Advanced RoutingRouting Table Wireless Basic Wireless SettingsBasic Wireless Settings Wireless Security Wireless Wireless SecurityWi-Fi Protected Setup WPA2 Enterprise WPA2 Personal WPA Enterprise Wireless Wireless MAC Filter RadiusWireless MAC Filter Advanced WirelessAccess Restriction Wireless Client ListSecurity Firewall FirewallInternet Filter Web FilterInternet Access Policy Security VPN PassthroughVPN Passthrough SummaryApplications and Gaming Single Port Forwarding Single Port ForwardingApplications and Gaming Port Range Forwarding Applications & Gaming Port Range TriggeringPort Range Forwarding Port Range TriggeringQoS Quality of Service WirelessApplications and Gaming DMZ Applications and Gaming QoSInternet Access Priority CategoryAdministration Management Router AccessWeb Access Remote AccessAdministration Log Backup and RestoreLog UPnPAdministration Diagnostics Administration Factory DefaultsReboot DiagnosticsStatus Local Network Administration Firmware UpgradeStatus Router Status Wireless Network Wireless NetworkLocal Network Dhcp ServerAppendix a Troubleshooting Appendix B Specifications Exclusions and Limitations Limited WarrantyObtaining Warranty Service Technical Support GeneralSafety Notices FCC StatementIndustry Canada Statement Avis d’Industrie CanadaWireless Disclaimer Изисквания Приложими Wireless Equipment Wireless-N/G/A/B Products CE MarkingNational Restrictions DenmarkProduct Usage Restrictions Technical Documents onDansk Danish Miljøinformation for kunder i EU Regulatory Information Norsk Norwegian Miljøinformasjon for kunder i EU Regulatory Information Schedule 1 Linksys Software Licence Agreement Software in Linksys ProductsSoftware Licences Schedule GNU General Public LicencePreamble Software Licence Agreement No Warranty GNU Lesser General Public Licence Software Licence Agreement Software Licence Agreement Software Licence Agreement No Warranty OpenSSL Licence Original SSLeay Licence8122210NC-AI