Linksys WRTU54G-TM Access Restrictions Tab Internet Access, To create an Internet Access policy

Page 37

Wireless-G Broadband Router with 2 Phone Ports

Change these settings as described here and click the Save Settings button to apply your changes or Cancel Changes to cancel your changes.

The Access Restrictions Tab - Internet Access

The Internet Access screen allows you to block or allow specific kinds of Internet usage and traffic, such as Internet access, designated services, websites, and inbound traffic during specific days and times.

Internet Access Policy. Access can be managed by a policy. Use the settings on this screen to establish an access policy (after the Save Settings button is clicked). To delete a policy, select that policy’s number and click the Delete button. To view all the policies, click the Summary button. (Policies can be deleted from the Summary screen by selecting the policy or policies and clicking the Delete button. To return to the Internet Access tab, click the Close button.)

Status. Policies are disabled by default. To enable a policy, select the policy number from the drop-down menu, and click the radio button beside Enable.

You can create two kinds of policies, one kind to manage Internet access and another kind to manage inbound traffic.

To create an Internet Access policy:

1.Select a number from the Internet Access Policy drop-down menu.

2.To enable this policy, click the radio button beside Enable.

3.Enter a Policy Name in the field provided.

4.Click the Edit List of PCs button to select which PCs will be affected by the policy. The List of PCs screen will appear. You can select a PC by MAC Address or IP Address. You can also enter a range of IP Addresses if you want this policy to affect a group of PCs. After making your changes, click the Save Settings button to apply your changes or Cancel Changes to cancel your changes. Then click the Close button.

5.Click the appropriate option, Deny or Allow, depending on whether you want to block or allow Internet access for the PCs you listed on the List of PCs screen.

6.Decide which days and what times you want this policy to be enforced. Select the individual days during which the policy will be in effect, or select Everyday. Then enter a range of hours and minutes during which the policy will be in effect, or select 24 Hours.

Figure 5-29: Access Restrictions Tab - Internet Access

Figure 5-30: Internet Policy Summary

 

Figure 5-31: List of PCs

Chapter 5: Configuring the Wireless-G Broadband Router with 2 Phone Ports

30

The Access Restrictions Tab - Internet Access

Image 37
Contents 802 GHz .11g Wireless- G Copyright and Trademarks How to Use This User GuideWord definition Table of Contents Appendix B Wireless Security Appendix a TroubleshootingAppendix C Upgrading Firmware Appendix D Windows Help Ethernet AdapterRouter’s Back Panel List of Figures17 Wireless Tab Basic Wireless Settings 51 Status Tab Voice Error List Welcome IntroductionWhat’s in this User Guide? Wireless-G Broadband Router with 2 Phone Ports Ad-Hoc versus Infrastructure Mode Planning Your Wireless NetworkSsid service set identifier your wireless network’s name Network TopologyPlanning Your Wireless Network Network Layout Back Panel Getting to Know the Wireless-G Broadband RouterEthernet Front PanelOverview Hardware Installation for Connection to Your Broadband ModemConnecting Your Network Devices Multiple PCs Hardware Installation for Connection to An Existing RouterConnecting the Power Placement Options Direction Holder SIM Card InstallationPassword Screen Internet Setup Setup Tab Basic SetupPPPoE Connection Type Optional Settings Router IP Ddns Service Setup Tab Ddns14 Setup Tab MAC Address Clone Setup Tab MAC Address Clone15 Setup Tab Advanced Routing Router Setup Tab Advanced RoutingWireless Tab Basic Wireless Settings 18 Wireless Tab Wireless Security WPA Personal Wireless Tab Wireless Security21 Wireless Tab Wireless Security WPA2 Enterprise 22 Wireless Tab Wireless Security Radius 24 Wireless Tab Wireless MAC Filter Wireless Tab Wireless MAC FilterSetting Wireless Tab Advanced Wireless SettingsWireless-G Broadband Router with 2 Phone Ports Security Tab VPN Passthrough Security Tab FirewallTo create an Internet Access policy Access Restrictions Tab Internet AccessClick the Modify button 33 Applications and Gaming Tab Port Range Forward Applications and Gaming Tab Port Range ForwardPort Triggering Applications & Gaming Tab Port TriggeringApplications and Gaming Tab DMZ Wired QoSApplications and Gaming Tab QoS Ethernet Port Priority Wireless QoSAdministration Tab Log Administration Tab Management39 Administration Tab Diagnostics Administration Tab DiagnosticsAdministration Tab Firmware Upgrade Administration Tab Factory DefaultsAdministration Tab Config Management 45 Status Tab Router Status Tab Router46 Status Tab Local Network Status Tab Local Network48 Status Tab Wireless Status Tab Wireless49 Status Tab Voice Status Tab VoiceCommon Problems and Solutions Appendix a TroubleshootingNeed to set a static IP address on a PC Wireless-G Broadband Router with 2 Phone Ports Open a command prompt. For Windows 2000 and XP TCP Application Start and End Protocol IP Address EnabledCan’t get the Internet game, server, or application to work Wireless-G Broadband Router with 2 Phone Ports Need to upgrade the firmware To start over, I need to set the Router to factory defaultWhere is the Router installed on the network? Frequently Asked QuestionsIs IPSec Pass-Through supported by the Router? Does the Router support IPX or AppleTalk?Does the Router support ICQ send file? If all else fails in the installation, what can I do?How can I block corrupted FTP downloads? Is the Router cross-platform compatible? What is DMZ Hosting?How many ports can be simultaneously forwarded? What is the Ieee 802.11g standard? What are the advanced features of the Router?What is the Ieee 802.11b standard? What Ieee 802.11g features are supported?What is infrastructure mode? What is ad-hoc mode?What is roaming? What is ISM band?What is DSSS? What is FHSS? And what are their differences? What is Spread Spectrum?What is WEP? What is a MAC Address?How many channels/frequencies are available with the Router? Have excellent signal strength, but I cannot see my networkSecurity Precautions Appendix B Wireless SecuritySecurity Threats Facing Wireless Networks Appendix B Wireless Security Wireless-G Broadband Router with 2 Phone Ports Appendix C Upgrading Firmware Figure C-1 Upgrade FirmwareShared Resources Appendix D Windows HelpNetwork Neighborhood/My Network Places Windows Vista Instructions Windows 2000 or XP InstructionsFigure E-3 MAC Address Clone For the Router’s Web-based UtilityAppendix F Glossary Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Wireless Security Appendix G SpecificationsWi-Fi Protected Access2 WPA2 ModelCertifications Limited Warranty Appendix H Warranty InformationAppendix I Regulatory Information Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Avis de non-responsabilité concernant les appareils sans fil Wireless DisclaimerSoftware in Linksys Products Appendix J Software License AgreementSchedule 1 Linksys Software License Agreement Software LicensesWireless-G Router for 3G/UMTS Broadband Wireless-G Router for 3G/UMTS Broadband Preamble ScheduleWireless-G Router for 3G/UMTS Broadband Wireless-G Router for 3G/UMTS Broadband Wireless-G Router for 3G/UMTS Broadband No Warranty GNU Lesser General Public License Wireless-G Router for 3G/UMTS Broadband Wireless-G Router for 3G/UMTS Broadband Wireless-G Router for 3G/UMTS Broadband Wireless-G Router for 3G/UMTS Broadband Wireless-G Router for 3G/UMTS Broadband Wireless-G Router for 3G/UMTS Broadband Wireless-G Router for 3G/UMTS Broadband OpenSSL License Original SSLeay License END of Schedule Appendix K Contact Information