Linksys E1000-RM manual Security Firewall, Security VPN Passthrough, Web Filters

Page 28

Linksys E1000

RTS Threshold  Should you encounter inconsistent data flow, only minor reduction of the default value, 2347, is recommended.. If a network packet is smaller than the preset Request to Send (RTS) threshold size, the RTS/CTS (Clear to Send) mechanism will not be enabled.. The Router sends RTS frames to a particular receiving station and negotiates the sending of a data frame.. After receiving an RTS, the wireless station responds with a CTS frame to acknowledge the right to begin transmission.. The RTS Threshold value should remain at its default value of 2347

Click Save Settings to apply your changes, or click Cancel Changes to clear your changes..

Security > Firewall

The Firewall screen is used to configure a firewall that can filter out various types of unwanted traffic on the Router’s local network..

Security > Firewall

Firewall

SPI Firewall Protection  To use firewall protection, keep the default selection, Enabled.. To turn off firewall protection, select Disabled..

Internet Filters

Filter Anonymous Internet Requests  This option makes it more difficult for outside users to work their way into your network.. This option is enabled by default.. Disable it to allow anonymous Internet requests..

Filter Multicast  The multicasting feature allows for multiple transmissions to specific recipients at the same time.. If multicasting is permitted, then the Router will allow IP multicast packets to be forwarded to the appropriate computers.. Select this option to enable the filter.. This option is disabled by default..

Filter Internet NAT Redirection  This option is used to prevent a local computer from using a URL or Internet address to access the local server.. Select this option to enable the filter.. This option is disabled by default..

Filter IDENT (Port 113)  The Filter IDENT (Identification) option keeps port 113 from being scanned by devices

Chapter 3: Advanced Configuration

outside of your local network.. This option is enabled by default.. Disable it to allow port 113 to be scanned..

Web Filters

Proxy  Use of WAN proxy servers may compromise the Gateway’s security.. Denying Proxy will disable access to any WAN proxy servers.. Select this option to enable proxy filtering.. Deselect the option to allow proxy access..

Java  Java is a programming language for websites.. If you deny Java, you run the risk of not having access to Internet sites created using this programming language.. Select this option to enable Java filtering.. Deselect the option to allow Java usage..

ActiveX  ActiveX is a programming language for websites.. If you deny ActiveX, you run the risk of not having access to Internet sites created using this programming language.. Select this option to enable ActiveX filtering.. Deselect the option to allow ActiveX usage..

Cookies  A cookie is data stored on your computer and used by Internet sites when you interact with them.. Select this option to filter cookies.. Deselect the option to allow cookie usage..

Click Save Settings to apply your changes, or click Cancel Changes to clear your changes..

Security > VPN Passthrough

The VPN Passthrough screen allows you to enable Virtual Private Network (VPN) tunnels using IPSec, PPTP, or L2TP protocols to pass through the Router’s firewall..

Security > VPN Passthrough

VPN Passthrough

IPSec Passthrough  Internet Protocol Security (IPSec) is a suite of protocols used to implement secure exchange of packets at the IP layer.. To allow IPSec tunnels to pass through the Router, keep the default, Enabled..

PPTP Passthrough  Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be tunneled through an IP network.. To allow PPTP tunnels to pass through the Router, keep the default, Enabled..

L2TP Passthrough  Layer 2 Tunneling Protocol (L2TP) is the method used to enable Point-to-Point sessions via the

Wireless-N Router

25

Image 28
Contents User Guide Contents Safety Notices Avis d’Industrie Canada Wireless DisclaimerAppendix E Software End User License Agreement Cisco Products Software LicensesHorizontal Placement Power The Power port connects to the included power adapterProduct Overview TopWall-Mounting Placement Suggested Mounting HardwareInstallation To install the Router Insert the CD into your CD-ROM driveCisco Connect Double-click your CD-ROM drivePlug the power adapter into an electrical outlet Installation is complete.. Click OKWhen Cisco Connect starts up, the main menu appears Main MenuLocal Access versus Guest Access Main Menu Guest AccessMain Menu Router Settings Main Menu Computers and DevicesComputers and Other Devices Connect with the Easy Setup KeyComputer Wireless Printer Create or Update the Easy Setup KeyPlease wait while settings are copied to the Easy Setup Key Connect ManuallyFirst-Time Access of Parental Controls Parental ControlsParental controls screen appears Parental controls main screen appearsSet Up Parental Controls Restrict Internet Access ListEnter the new name.. Then click Rename Guest Access Router SettingsChange Parental Controls Password Router settings screen appearsEasy Setup Key Change Router Name or PasswordClick Close to return to the Router settings screen Other OptionsHow to Exit Cisco Connect How to Access Cisco ConnectAdvanced Settings WindowsAdvanced Configuration How to Access the Browser-Based UtilitySetup Basic Setup Internet SetupAutomatic Configuration Dhcp Static IPPPPoE MinutesL2TP Telstra CableNetwork Setup Optional SettingsDhcp Server Settings Router IPSetup Ddns Time SettingsDdns Service Clients Already ReservedMAC Address Clone Setup MAC Address CloneTZO..com Setup Advanced Routing Wireless Basic Wireless SettingsAdvanced Routing Dynamic Routing RIPManual Setup Wi-Fi Protected SetupWireless Wireless Security Security ModePersonal Options Office OptionWPA Personal WEPWireless Wireless MAC Filter Wireless MAC FilterAccess Restriction Wireless Client ListWireless Advanced Wireless Settings Advanced WirelessSecurity Firewall Security VPN PassthroughFirewall Web FiltersInternet Access Policy Access Restrictions Internet AccessSummary Applications and Gaming Single Port Forwarding Single Port ForwardingApplications and Gaming Port Range Forwarding Applications & Gaming Port Range TriggeringPort Range Forwarding Port Range TriggeringQoS Quality of Service WirelessApplications and Gaming DMZ Applications and Gaming QoSInternet Access Priority CategoryApplications Online GamesSummary Add a New GameMAC Address Voice DeviceAdministration Management ManagementAdministration Log Administration DiagnosticsDiagnostics LogAdministration Factory Defaults Administration Firmware UpgradeFactory Defaults Traceroute TestStatus Router Status Local NetworkStatus Wireless Network Wireless NetworkClick the Connections tab Appendix a TroubleshootingClick OK 17..5 dBm Appendix B SpecificationsSecurity Key Bits Up to 128-Bit Encryption Appendix C Warranty Information A, Canada, Asia Pacific, Australia, New ZealandObtaining Warranty Service Appendix D Regulatory Information Wireless Disclaimer Avis de non-responsabilité concernant les appareils sans filAppendix E Software End User License Agreement Cisco ProductsSoftware Licenses Schedule Cisco Software License AgreementLinksys E1000 Appendix E Software End User License Agreement Linksys E1000 Appendix E Software End User License Agreement Linksys E1000 Appendix E Software End User License Agreement Schedule Open Source and Third Party Licenses Schedule 2-APreamble Version 2, JuneLinksys E1000 Appendix E Software End User License Agreement No Warranty Schedule 2-B Version 2..1, FebruaryLinksys E1000 Appendix E Software End User License Agreement Linksys E1000 Appendix E Software End User License Agreement Linksys E1000 Appendix E Software End User License Agreement END of Terms and Conditions END of Schedule 2-B OpenSSL License Schedule 2-COriginal SSLeay License END of Schedule 2-C 10012110NC-JL