Linksys WRT120N manual Security VPN Passthrough, Internet Access Policy, Summary

Page 21

Chapter 3

Advanced Configuration

this option to enable Java filtering. This option is disabled by default.

ActiveX  ActiveX is a programming language for websites. If you deny ActiveX, you run the risk of not having access to Internet sites created using this programming language. Select this option to enable ActiveX filtering. This option is disabled by default.

Cookies  A cookie is data stored on your computer and used by Internet sites when you interact with them. Select this option to filter cookies. This option is disabled by default.

Click Save Settings to apply your changes, or click Cancel Changes to clear your changes.

Security > VPN Passthrough

The VPN Passthrough screen allows you to enable VPN tunnels using IPSec, PPTP, or L2TP protocols to pass through the Router’s firewall.

Security > VPN Passthrough

VPN Passthrough

IPSec Passthrough  Internet Protocol Security (IPSec) is a suite of protocols used to implement secure exchange of packets at the IP layer. To allow IPSec tunnels to pass through the Router, keep the default, Enabled.

PPTP Passthrough  Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be tunneled through an IP network. To allow PPTP tunnels to pass through the Router, keep the default, Enabled.

L2TP Passthrough  Layer 2 Tunneling Protocol is the method used to enable Point-to-Point sessions via the Internet on the Layer 2 level. To allow L2TP tunnels to pass through the Router, keep the default, Enabled.

Click Save Settings to apply your changes, or click Cancel Changes to clear your changes.

Access Restrictions > Internet Access

The Internet Access screen allows you to block or allow specific kinds of Internet usage and traffic, such as Internet access, designated services, and websites during specific days and times.

Access Restrictions > Internet Access

Internet Access Policy

Access Policy  Access can be managed by a policy. Use the settings on this screen to establish an access policy (after Save Settings is clicked). Selecting a policy from the dropdown menu will display that policy’s settings. To delete a policy, select that policy’s number and click Delete This Entry. To view all the policies, click Summary.

Summary

The policies are listed with the following information: No., Policy Name, Days, and Time of Day. To delete a policy, select the policy’s Delete option, and then click Delete. To return to the Internet Access Policy screen, click Close.

Wireless-N Home Router

17

Image 21
Contents Wireless-N Home Router Icon Descriptions Online ResourcesCopyright and Trademarks Table of Contents Warranty Information Appendix D Regulatory InformationAppendix E Software End User License Agreement Horizontal Placement Front PanelBack Panel Suggested Mounting Hardware Wall-Mounting PlacementAdditional Security Tips General Network Security GuidelinesSetup Basic Setup Access the Browser-Based UtilityInternet Setup LanguageStatic IP Automatic Configuration DhcpPPPoE PptpOptional Settings L2TPTelstra Cable Dhcp Server Setting Network SetupRouter IP Dhcp ReservationTime Settings Setup DdnsDdns Service DynDNS.orgSetup Advanced Routing Setup MAC Address CloneMAC Address Clone Advanced RoutingWireless Basic Wireless Settings Basic Wireless Settings ManualRouting Table Wi-Fi Protected Setup Method #1Method #2 Wireless Security Wireless Wireless SecuritySecurity Mode Method #3WPA Enterprise WPA2 EnterpriseRadius Wireless MAC Filter Wireless Wireless MAC FilterAccess Restriction MAC Address Filter ListWireless Client List Advanced WirelessFirewall Security FirewallInternet Filter Web FilterSecurity VPN Passthrough Internet Access PolicyVPN Passthrough SummarySummary Applications and Gaming Port Range Forwarding Applications and Gaming Single Port ForwardingSingle Port Forwarding Port Range ForwardingApplications & Gaming Port Range Triggering Applications and Gaming DMZPort Range Triggering Applications and Gaming QoS QoS Quality of ServiceMAC Address Online GamesEthernet Port Voice DeviceRouter Access Administration ManagementLocal Management Access Remote Management AccessAdministration Diagnostics Administration LogSystem Reboot LogAdministration Firmware Upgrade Administration Factory DefaultsDiagnostics Factory DefaultsStatus Local Network Status RouterWireless Network Status Wireless NetworkAppendix a Troubleshooting Troubleshooting Appendix B Specifications Limited Warranty Obtaining Warranty ServiceExclusions and Limitations General Technical SupportSafety Notices FCC StatementFCC Radiation Exposure Statement Wireless Disclaimer Industry Canada StatementAvis d’Industrie Canada Изисквания Приложими Wireless Equipment Wireless-N/G/A/B Products CE MarkingNational Restrictions Italy Latvia Product Usage RestrictionsGHz Restrictions Third-Party Software or FirmwareDansk Danish Miljøinformation for kunder i EU Regulatory Information Norsk Norwegian Miljøinformasjon for kunder i EU Regulatory Information Cisco Products Software LicensesSchedule Cisco Software License Agreement Software End User License Agreement Software End User License Agreement Schedule Open Source and Third Party Licenses Schedule Network Magic FeaturesSchedule 3-A GNU General Public LicensePreamble Software End User License Agreement No Warranty Schedule 3-BEND of Schedule 3-A GNU Lesser General Public License Software End User License Agreement Software End User License Agreement Software End User License Agreement END of Schedule 3-B Schedule 3-COriginal SSLeay License OpenSSL LicenseEND of Schedule 3-C