Linksys WRT120N manual Security Firewall, Internet Filter, Web Filter

Page 20

Chapter 3

Advanced Configuration

Wireless-G devices are experiencing severe problems and are not able to transmit to the Router in an environment with heavy 802.11b traffic. This option boosts the Router’s ability to catch all Wireless-N and Wireless-G transmissions but severely decreases performance. To use this option, keep the default, Auto. To disable this option, select Disabled.

Beacon Interval  Enter a value between 1 and 65,535 milliseconds. The Beacon Interval value indicates the frequency interval of the beacon. A beacon is a packet broadcast by the Router to synchronize the wireless network. The default is 100 milliseconds.

DTIM Interval  This value, between 1 and 255, indicates the interval of the Delivery Traffic Indication Message (DTIM). A DTIM field is a countdown field informing clients of the next window for listening to broadcast and multicast messages. When the Router has buffered broadcast or multicast messages for associated clients, it sends the next DTIM with a DTIM Interval value. Its clients hear the beacons and awaken to receive the broadcast and multicast messages. The default value is 1.

Fragmentation Threshold  This value specifies the maximum size for a packet before data is fragmented into multiple packets. If you experience a high packet error rate, you may slightly increase the Fragmentation Threshold. Setting the Fragmentation Threshold too low may result in poor network performance. Only minor reduction of the default value is recommended. In most cases, it should remain at its default value of 2346.

RTS Threshold  Should you encounter inconsistent data flow, only minor reduction of the default value, 2347, is recommended. If a network packet is smaller than the preset RTS threshold size, the RTS/CTS mechanism will not be enabled. The Router sends Request to Send (RTS) frames to a particular receiving station and negotiates the sending of a data frame. After receiving an RTS, the wireless station responds with a Clear to Send (CTS) frame to acknowledge the right to begin transmission. The RTS Threshold value should remain at its default value of 2347.

Click Save Settings to apply your changes, or click Cancel Changes to clear your changes.

Security > Firewall

The Firewall screen is used to configure a firewall that can filter out various types of unwanted traffic on the Router’s local network.

Security > Firewall

Firewall

SPI Firewall Protection  To use firewall protection, keep the default selection, Enabled. To turn off firewall protection, select Disabled.

Internet Filter

For the following options, select the option to enable it, or deselect the option to disable it.

Filter Anonymous Internet Requests  This feature makes it more difficult for outside users to work their way into your network. This feature is enabled by default. Deselect this option to allow anonymous Internet requests.

Filter Multicast  Multicasting allows for multiple transmissions to specific recipients at the same time. If multicasting is permitted, then the Router will allow IP multicast packets to be forwarded to the appropriate computers. Select this option to filter multicasting. This option is disabled by default.

Filter Internet NAT Redirection  This feature uses port forwarding to block access to local servers from local networked computers. Select this option to filter Internet NAT redirection. This option is disabled by default.

Filter IDENT (Port 113)  This feature keeps port 113 from being scanned by devices outside of your local network. This feature is enabled by default. Deselect this option to disable it.

Web Filter

For the following options, select the option to enable it, or deselect the option to disable it.

Proxy  Use of WAN proxy servers may compromise the Gateway’s security. Denying Proxy will disable access to any WAN proxy servers. Select this option to enable proxy filtering. This option is disabled by default.

Java  Java is a programming language for websites. If you deny Java, you run the risk of not having access to Internet sites created using this programming language. Select

Wireless-N Home Router

16

Image 20
Contents Wireless-N Home Router Copyright and Trademarks Icon DescriptionsOnline Resources Table of Contents Appendix E Software End User License Agreement Warranty InformationAppendix D Regulatory Information Back Panel Horizontal PlacementFront Panel Wall-Mounting Placement Suggested Mounting HardwareGeneral Network Security Guidelines Additional Security TipsAccess the Browser-Based Utility Setup Basic SetupInternet Setup LanguageAutomatic Configuration Dhcp Static IPPPPoE PptpTelstra Cable Optional SettingsL2TP Network Setup Dhcp Server SettingRouter IP Dhcp ReservationSetup Ddns Time SettingsDdns Service DynDNS.orgSetup MAC Address Clone Setup Advanced RoutingMAC Address Clone Advanced RoutingRouting Table Wireless Basic Wireless SettingsBasic Wireless Settings Manual Method #2 Wi-Fi Protected SetupMethod #1 Wireless Wireless Security Wireless SecuritySecurity Mode Method #3Radius WPA EnterpriseWPA2 Enterprise Wireless Wireless MAC Filter Wireless MAC FilterAccess Restriction MAC Address Filter ListAdvanced Wireless Wireless Client ListSecurity Firewall FirewallInternet Filter Web FilterInternet Access Policy Security VPN PassthroughVPN Passthrough SummarySummary Applications and Gaming Single Port Forwarding Applications and Gaming Port Range ForwardingSingle Port Forwarding Port Range ForwardingPort Range Triggering Applications & Gaming Port Range TriggeringApplications and Gaming DMZ QoS Quality of Service Applications and Gaming QoSOnline Games MAC AddressEthernet Port Voice DeviceAdministration Management Router AccessLocal Management Access Remote Management AccessAdministration Log Administration DiagnosticsSystem Reboot LogAdministration Factory Defaults Administration Firmware UpgradeDiagnostics Factory DefaultsStatus Router Status Local NetworkStatus Wireless Network Wireless NetworkAppendix a Troubleshooting Troubleshooting Appendix B Specifications Exclusions and Limitations Limited WarrantyObtaining Warranty Service Technical Support GeneralFCC Radiation Exposure Statement Safety NoticesFCC Statement Avis d’Industrie Canada Wireless DisclaimerIndustry Canada Statement Изисквания Приложими National Restrictions Wireless Equipment Wireless-N/G/A/B ProductsCE Marking Product Usage Restrictions Italy LatviaGHz Restrictions Third-Party Software or FirmwareDansk Danish Miljøinformation for kunder i EU Regulatory Information Norsk Norwegian Miljøinformasjon for kunder i EU Regulatory Information Schedule Cisco Software License Agreement Cisco ProductsSoftware Licenses Software End User License Agreement Software End User License Agreement Schedule Network Magic Features Schedule Open Source and Third Party LicensesSchedule 3-A GNU General Public LicensePreamble Software End User License Agreement END of Schedule 3-A No WarrantySchedule 3-B GNU Lesser General Public License Software End User License Agreement Software End User License Agreement Software End User License Agreement Schedule 3-C END of Schedule 3-BOpenSSL License Original SSLeay LicenseEND of Schedule 3-C