vi Contents
Chapter 3
Wireless Configuration
Considerations For A Wireless Network ...................................... ...................................3-1
Implement Appropriate Security .................................................. .............................3-1
Observe Placement and Range Guidelines ....... ......................................................3-1
Wireless Settings ............................................................ ................................................3-2
Using the Wireless Access by MAC Address Feature .............................................3-4
Configuring Wired Equivalent Privacy (WEP) ..........................................................3- 6
Configuring WEP (Wired Equivalent Privacy) ........................................... ......................3-7
Chapter 4
Protecting Your Network
Protecting Access to Your DG824M Wireless ADSL Modem Gateway .......................... 4-1
Configuring Basic Firewall Services ...............................................................................4-3
Blocking Keywords, Sites, and Services ..... .............................................................4-3
Rules ........................................................................................................................... ...4-5
Inbound Rules (Port Forwarding) ............................. ................................................4-7
Inbound Rule Example: A Local Public Web Server .......................................... 4-7
Inbound Rule Example: Allowing Videoconference from Restricted Addresses 4-9
Considerations for Inbound Rules .....................................................................4-9
Outbound Rules (Service Blocking) .......................................................................4-10
Outbound Rule Example: Blocking Instant Messenger ...................................4-10
Order of Precedence for Rules .............................................................................. 4-12
Services ........................................................................................................................ 4-13
Setting Times and Scheduling Firewall Services ...................................... ....................4-14
Chapter 5
Managing Your Network
Backing Up, Restoring, or Erasing Your Settings ..... ......................................................5-1
Upgrading the Gateway’s Firmware ............................................................................... 5-3
Network Management Information .............................................................................. ...5-5
Viewing Gateway Status and Usage Statistics ......................................................... 5-5
Viewing Attached Devices ..................................................................................... ...5-9
Viewing, Selecting, and Saving Logged Information ................... ...........................5-10
Selecting What Information to Log ........................................................... .......5-11
Saving Log Files on a Server ..........................................................................5 -1 2
Examples of log messages ....................................................................................5-12