2.6.6 Static Routing
This router provides Static Routing function when NAT is disabled. With Static Routing, the router can forward packets according to your routing rules. The IP sharing function will not work any more in Static Routing mode.
Note: The DMZ function of firewall will not work if static routing is enabled.
| Parameters |
| Description |
| Enable Static Routing |
| Static Routing function is default disabled. You have to enable the Static Routing function |
|
|
| before your routing rules take effect. |
| Destination LAN IP |
| The network address of destination LAN. |
|
|
|
|
| Subnet Mask |
| The subnet mask of destination LAN. |
|
|
|
|
| Default Gateway |
| The next stop gateway of the path toward the destination LAN. This is the IP of the neighbor |
|
| router that this router should communicate with on the path to the destination LAN. | |
|
|
| |
|
|
|
|
| Hop Count |
| The number of hops (routers) to pass through to reach the destination LAN. |
|
|
|
|
| Interface |
| The interface that go to the next hop (router). |
|
|
|
|
|
|
| Fill in the "Destination LAN IP", "Subnet Mask”, “Default Gateway”, "Hop Count" and |
| Add a Rule |
| "Interface" of the rule to be added and then click "Add". Then this rule of Static Routing will be |
|
| added into the "Static Routing Table" below. If you find any typo before adding it and want to | |
|
|
| |
|
|
| retype again, just click "Reset" and the fields will be cleared. |
|
|
|
|
|
|
| If you want to remove some routing rules from the "Static Routing Table", select the rules you |
| Remove a Rule |
| want to remove in the table and then click "Delete Selected". If you want remove all rules |
|
|
| from the table, just click "Delete All" button. Click "Reset" will clear your current selections. |
|
|
|
|
Click <Apply> at the bottom of the screen to save the above configurations. You can now configure other advance sections or start using the router (with the advance settings in place)
2.7 Firewall
The Broadband router provides extensive firewall protection by restricting connection parameters, thus limiting the risk of hacker attack, and defending against a wide array of common Internet attacks. However, for applications that require unrestricted access to the Internet, you can configure a specific client/server as a Demilitarized Zone (DMZ).
Note: To enable the Firewall settings select Enable and click Apply
36