2
v1.0, January 2009
Wireless Security Options ...................................................................... ..................2-3
Manually Configuring Your Wireless Settings .................................................................2-4
Specifying Wireless Security .................... ......................................................................2-7
Wireless Station Access Control ...................................................... ........................2-7
Restricting Access by MAC Address ........................................................................2-8
Configuring WEP .................................................................................................... 2-10
Configuring WPA, WPA2, or WPA/WPA2 ............................................................... 2-11
Advanced Wireless Settings ...................................................................................... ...2-12
Using Push 'N' Connect (WPS) to Configure Your Wireless Network .......................... 2-13
Using a WPS Button to Add a WPS Client .............................................................2-14
Using PIN Entry to Add a WPS Client .................................................................... 2-15
Connecting Additional Wireless Client Devices After WPS Setup ................................2-17
Adding More WPS Clients ...................................................................................... 2-17
Adding Both WPS and Non-WPS Clients ................. .............................................2-17
Chapter 3
Protecting Your Network
Protecting Access to Your Wireless Router .................................................................... 3-1
Changing the Built-In Password ............................................................................... 3-1
Changing the Administrator Login Time-out .............................................................3-2
Configuring Basic Firewall Services ................... ............................................................3-2
Blocking Keywords, Sites, and Services .................................................................. 3-3
Firewall Rules ........................................................... ......................................................3-5
Inbound Rules (Port Forwarding) .............................................................................3-6
Outbound Rules (Service Blocking) ................................ .........................................3-8
Order of Precedence for Rules ..............................................................................3-10
Services ........................................................................................................................ 3-10
Defining Services ......................................... ..........................................................3-11
Setting Times and Scheduling Firewall Services ..........................................................3-11
Setting Your Time Zone ..........................................................................................3-12
Scheduling Firewall Services ....................................... ..........................................3-13
Chapter 4
Managing Your Network
Backing Up, Restoring, or Erasing Your Settings ........................................................... 4-1
Backing Up the Configuration to a File .....................................................................4-1
Restoring the Configuration from a File .... ...............................................................4-2