Linksys E2100L manual Security Firewall, Security VPN Passthrough, Web Filters

Page 26

Linksys E2100L

Security > Firewall

The Firewall screen is used to configure a firewall that can filter out various types of unwanted traffic on the Router’s local network..

Security > Firewall

Firewall

SPI Firewall Protection  To use firewall protection, keep the default selection, Enabled.. To turn off firewall protection, select Disabled..

Internet Filters

Filter Anonymous Internet Requests  This option makes it more difficult for outside users to work their way into your network.. This option is enabled by default.. Disable it to allow anonymous Internet requests..

Filter Multicast  The multicasting feature allows for multiple transmissions to specific recipients at the same time.. If multicasting is permitted, then the Router will allow IP multicast packets to be forwarded to the appropriate computers.. Select this option to enable the filter.. This option is disabled by default..

Filter Internet NAT Redirection  This option is used to prevent a local computer from using a URL or Internet address to access the local server.. Select this option to enable the filter.. This option is disabled by default..

Filter IDENT (Port 113)  The Filter IDENT (Identification) option keeps port 113 from being scanned by devices outside of your local network.. This option is enabled by default.. Disable it to allow port 113 to be scanned..

Web Filters

Proxy  Use of WAN proxy servers may compromise the Gateway’s security.. Denying Proxy will disable access to any WAN proxy servers.. Select this option to enable proxy filtering.. Deselect the option to allow proxy access..

Java  Java is a programming language for websites.. If you deny Java, you run the risk of not having access to Internet sites created using this programming language.. Select

Chapter 3: Advanced Configuration

this option to enable Java filtering.. Deselect the option to allow Java usage..

ActiveX  ActiveX is a programming language for websites.. If you deny ActiveX, you run the risk of not having access to Internet sites created using this programming language.. Select this option to enable ActiveX filtering.. Deselect the option to allow ActiveX usage..

Cookies  A cookie is data stored on your computer and used by Internet sites when you interact with them.. Select this option to filter cookies.. Deselect the option to allow cookie usage..

Click Save Settings to apply your changes, or click Cancel Changes to clear your changes..

Security > VPN Passthrough

The VPN Passthrough screen allows you to enable Virtual Private Network (VPN) tunnels using IPSec, PPTP, or L2TP protocols to pass through the Router’s firewall..

Security > VPN Passthrough

VPN Passthrough

IPSec Passthrough  Internet Protocol Security (IPSec) is a suite of protocols used to implement secure exchange of packets at the IP layer.. To allow IPSec tunnels to pass through the Router, keep the default, Enabled..

PPTP Passthrough  Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be tunneled through an IP network.. To allow PPTP tunnels to pass through the Router, keep the default, Enabled..

L2TP Passthrough  Layer 2 Tunneling Protocol is the method used to enable Point-to-Point sessions via the Internet on the Layer 2 level.. To allow L2TP tunnels to pass through the Router, keep the default, Enabled..

Click Save Settings to apply your changes, or click Cancel Changes to clear your changes..

Advanced Wireless-N Router

23

Image 26
Contents User Guide Contents Avis d’Industrie Canada Wireless Disclaimer Appendix C Specifications Appendix D Warranty InformationSafety Notices Appendix F Software End User License AgreementBack Product OverviewTop Bottom Horizontal PlacementWall-Mounting Placement Cisco Connect InstallationTo install the Router Attach the antennas to the Router Insert the CD into your CD-ROM drivePlug the power adapter into an electrical outlet Connection steps are displayedWhen Cisco Connect starts up, the main menu appears Local Access versus Guest AccessInstallation is complete.. Click OK Guest Access versus Local Access DiagramComputers and Other Devices Main Menu Guest AccessMain Menu Router Settings Main Menu Computers and DevicesConnect Manually Create or Update the Easy Setup KeyPlease wait while settings are copied to the Easy Setup Key After your device connects, click NextGuest Access Wireless PrinterChange Router Name or Password Router SettingsEasy Setup Key PersonalizeHow to Exit Cisco Connect How to Access Cisco ConnectSetup Basic Setup Advanced ConfigurationHow to Access the Browser-Based Utility Internet SetupPPPoE Automatic Configuration DhcpStatic IP MinutesOptional Settings Telstra CableRouter IP Network SetupDhcp Server Settings Dhcp ReservationDynDNS..org Time SettingsDdns Service MAC Address Clone Setup MAC Address CloneSetup Advanced Routing Advanced RoutingRouting Table Wireless Basic Wireless SettingsManual Setup Wi-Fi Protected Setup Personal Options Wireless Wireless SecuritySecurity Mode Office OptionWEP Wireless MAC Filter Wireless Wireless MAC FilterWireless Advanced Wireless Settings Advanced WirelessLinksys E2100L Firewall Security FirewallSecurity VPN Passthrough Web FiltersShared Folder Storage DiskDisk Management Format DiskCreate a Shared Folder Claim DiskEdit a Shared Folder SetupStorage Media Server UPnP Media ServerAdd a Media Folder Database SetupStorage FTP Server FTP ServerFTP Summary AccessCreate an FTP Folder Information Storage AdministrationEdit an FTP Folder After you clicked Edit, the FTP Folder screen appearsCreate or Edit a Group Account Group ManagementUser Management Create or Edit a User AccountSummary Access Restrictions Internet AccessInternet Access Policy Applications and Gaming Single Port Forwarding Single Port ForwardingPort Range Forwarding Applications and Gaming Port Range ForwardingApplications & Gaming Port Range Triggering Port Range TriggeringApplications and Gaming QoS QoS Quality of ServiceApplications and Gaming DMZ Online Games CategoryApplications Add a New GameManagement Administration ManagementSummary Administration Log LogTraceroute Test Administration DiagnosticsDiagnostics Ping TestStatus Router Administration Factory DefaultsAdministration Firmware Upgrade Status Wireless Network Status Local NetworkClick OK Appendix a TroubleshootingClick the Connections tab Connect the USB storage device directly to your computerClick the Exceptions tab Access the USB Storage Device Appendix B How to Install and Access USB StorageInstall the USB Storage Device OverviewMap a Drive Windows Vista Access the Mapped DriveDouble-click the mapped drive to access it Click FinishOn your desktop, double-click the Network icon Windows XP On your desktop, double-click the My Computer icon Create a Shared Folder,Map a Drive Double-click the server name Mac OSFrom your desktop, select Go Network Click Connect As Go to the Apple menu and select System Preferences Add to Startup Login ItemsDisplay the Shared Folder on the Desktop Click AccountsDrag the shared folder to the Login Items window Advanced Configuration Advanced Users OnlyAccess the Browser-Based Utility Click the Storage tab Click the Disk tabClick the Storage tab Click the Administration tab Create a User Group AccountCreate a User Account Appendix C Specifications Appendix D Warranty Information A, Canada, Asia Pacific, Australia, New ZealandObtaining Warranty Service Appendix E Regulatory Information Wireless Disclaimer Avis de non-responsabilité concernant les appareils sans filSoftware Licenses Appendix F Software End User License AgreementCisco Products Schedule Cisco Software License AgreementAdvanced Wireless-N Router Advanced Wireless-N Router Advanced Wireless-N Router Preamble Schedule Open Source and Third Party LicensesSchedule 2-A Version 2, JuneAdvanced Wireless-N Router No Warranty Schedule 2-B Version 2..1, FebruaryAdvanced Wireless-N Router Advanced Wireless-N Router Advanced Wireless-N Router END of Terms and Conditions END of Schedule 2-B Original SSLeay License Schedule 2-COpenSSL License END of Schedule 2-C 10012110NC-JL