Canyon Router CNP-WF514N1 User Manual
Have a look at the manual Canyon Router CNP-WF514N1 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1 Canyon manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
91 There are many applications listed here. Please check the box of the special support for applications you need, and then click ‘Apply’ button and the following message will be displayed on your web browser: Please click ‘Continue’ to back to previous setup menu; to continue on other setup procedures, or click ‘Apply’ to reboot the router so the settings will take effect (Please wait for about 30 seconds while router is rebooting). If you want to reset all settings in this page back to previously-saved value, please click ‘Cancel’ button.
92 3-3 Firewall Excepting NAT, this router also provides firewall function to block malicious intruders from accessing your computers on local network. These functions include inbound attack prevention, and block outbound traffics, like block URLs which have pre-defined keywords. Please follow the following instructions to enable or disable firewall function: Please click ‘Firewall’ menu on the left of web management interface, and the following message will be displayed on your web browser: Please select ‘Enable’ or ‘Disable’ to enable or disable firewall function of this router, the click ‘Apply’ button, and the following message will be displayed on your web browser: Please click ‘Continue’ to back to previous setup menu; to continue on other setup procedures, or click ‘Apply’ to reboot the router so the settings will take effect (Please wait for about 30 seconds while router is rebooting).
93 3-3-1 Access Control This function allows or denies computers with specific MAC address from connecting to the network; it can also allow or deny computers with specific IP address, protocol, or port. Please click ‘Firewall’ menu on the left of web management interface, then click ‘Access Control’, and the following message will be displayed on your web browser: Here are descriptions of every setup items: Enable MAC Check this box to enable MAC address based filtering, Filtering (1): and please select ‘Deny’ or ‘Allow’ to decide the behavior of MAC filtering table. If you select deny, all MAC addresses listed in filtering table will be denied from connecting to the network; if you select allow, only MAC addresses listed in filtering table will be able to connect to the network, and rejecting all other network devices. Client PC Please input the MAC address of computer or network MAC address (2): device here, dash ( - ) or colon ( : ) are not required. (i.e. If the MAC address label of your wireless device indicates ‘aa-bb-cc-dd-ee-ff’ or ‘aa:bb:cc:dd:ee:ff’, just input ‘aabbccddeeff’ 1 2 3 5 6 7 89 10 12 131415 16 11 4
94 Computer Name (3): Pull down the menu and all the computers connected to the router will be listed here. You can easily to select the computer name without checking the IP address of the computer. Comment (4): You can input any text here as the comment of this MAC address, like ‘ROOM 2A Computer’ or anything. You can input up to 16 alphanumerical characters here. This is optional and you can leave it blank, however, it’s recommended to use this field to write a comment for every MAC addresses as a memory aid. Add (5): Click ‘Add’ button to add the MAC address and associated comment to the MAC address filtering table. Reset (6): Remove all inputted values. Current MAC All existing MAC addresses in filtering table will be Filtering Table (7): listed here. Delete (8): If you want to delete a specific MAC address entry, check the ‘select’ box of the MAC address you want to delete, then click ‘Delete Selected’ button. (You can select more than one MAC addresses). Delete All (9): If you want to delete all MAC addresses listed here, please click ‘Delete All’ button. Reset (10): You can also click ‘Reset’ button to unselect all MAC addresses. Enable IP Check this box to enable IP address based filtering, and Filtering (11): please select ‘Deny’ or ‘Allow’ to decide the behavior of IP filtering table. If you select deny, all IP addresses listed in filtering table will be denied from connecting to the network; if you select allow, only IP addresses listed in filtering table will be able to connect to the network, and rejecting all other network devices.
95 IP Filtering All existing IP addresses in filtering table will be listed here. Table (12): Add PC (13): Click this button to add a new IP address to IP filtering table, up to 20 IP addresses can be added. Please refer to section 3-3-1-1 ‘Add PC’ below. Delete (14): If you want to delete a specific IP address entry, check the ‘select’ box of the IP address you want to delete, then click ‘Delete Selected’ button. (You can select more than one IP addresses). Delete All (15): If you want to delete all IP addresses listed here, please click ‘Delete All’ button. After you finish with all settings, please click ‘Apply’ (16) button and the following message will be displayed on your web browser: Please click ‘Continue’ to back to previous setup menu; to continue on other setup procedures, or click ‘Apply’ to reboot the router so the settings will take effect (Please wait for about 30 seconds while router is rebooting). If you want to reset all settings in this page back to previously-saved value, please click ‘Cancel’ button. 3-3-1-1 Add PC After button is clicked, the following message will be displayed on your web browser:
96 Here are descriptions of every setup items: Client PC Please input any text to describe this IP Description (a): address, up to 16 alphanumerical characters. Client PC IP Please input the starting IP address in the left address (b): field, and input the end IP address in the right field to define a range of IP addresses, or just input the IP address in the left field to define a single IP address. a b c d e f
97 Client PC Please check all services you want to allow or Service (c): deny this IP address to use, you can check multiple services. Protocol (d): If the service you need is not listed above, you can create a new service on your own. Please select TCP or UDP, if you’re not sure, please select ‘Both’. Port Range (e): Please input the port range of new service here. If you want to specify port 80 to 90, please input ’80-90’; if you want to apply this rule on a single port, just input the port number, like ‘80’. Add (f): When you finish with all settings, please click ‘Add’ to save settings, you’ll be brought back to previous menu, and the rule you just set will appear in current IP filtering table. If you want to remove all settings in this page, click ‘Reset’ button. 3-3-2 URL Blocking If you want to prevent computers in local network from accessing certain website (like pornography, violence, or anything you want to block), you can use this function to stop computers in local network from accessing the site you defined here. This function is useful for parents and company managers. Please follow the following instructions to set URL blocking parameters: Please click ‘Firewall’ menu on the left of web management interface, then click ‘URL Blocking’, and the following message will be displayed on your web browser:
98 Here are descriptions of every setup items: Enable URL Check this box to enforce URL Blocking, Blocking (1): uncheck it to disable URL Blocking. URL/Keyword (2): Input the URL (host name or IP address of website, like http://www.blocked-site.com or http://11.22.33.44), or the keyword which is contained in URL (like pornography, cartoon, stock, or anything). Add (3): Click ‘Add’ button to add the URL / keyword to the URL / Keyword filtering table. Reset (4): Click ‘Reset’ to remove the value you inputted in URL/Keyword field. Current URL All existing URL/Keywords in filtering Blocking Table (5): table will be listed here. Delete (6): If you want to delete a specific URL/Keyword entry, check the ‘select’ box of the MAC address you want to delete, then click ‘Delete Selected’ button. (You can select more than one MAC addresses). Delete All (7): If you want to delete all URL/Keyword listed here, please click ‘Delete All’ button. 2 3 4 5 6 7 8 9 1
99 Reset (8): You can also click ‘Reset’ button to unselect all URL/Keywords. After you finish with all settings, please click ‘Apply’ (9) button, and the following message will be displayed on your web browser: Please click ‘Continue’ to back to previous setup menu; to continue on other setup procedures, or click ‘Apply’ to reboot the router so the settings will take effect (Please wait for about 30 seconds while router is rebooting). If you want to reset all settings in this page back to previously-saved value, please click ‘Cancel’ button. 3-3-3 DoS Attack Prevention Denial of Service (DoS) is a common attack measure, by transmitting a great amount of data or request to your Internet IP address and server, the Internet connection will become very slow, and server may stop responding because it is not capable to handle too much traffics. This router has a built-in DoS attack prevention mechanism; when you activate it, the router will stop the DoS attack for you. Please follow the following instructions to set DoS prevention parameters: Please click ‘Firewall’ menu on the left of web management interface, then click ‘DoS’, and the following message will be displayed on your web browser:
100 Here are descriptions of every setup items: Ping of Death (1): Ping of Death is a special packet, and it will cause certain computer to stop responding. Check this box and the router will filter this kind of packet out. Discard Ping Ping is a common and useful tool to know the connection From WAN (2): status of a specified remote network device, but some malicious intruder will try to fill your network bandwidth with a lot of PING request data packet, to make your internet connection become very slow, even unusable. Check this box and the router will ignore all inbound PING request, but when you activate this function, you will not be able to ping your own router from internet, too. Port Scan (3): Some malicious intruder will try to use a ‘port scanner’ to know how many ports of your Internet IP address are open, and they can collect a lot of valuable information by doing so. Check this box and the router will block all traffics which are trying to scan your Internet IP address. Sync Flood (4): This is another kind of attack, which uses a lot of fake connection request to consume the memory of your server, and try to make your server become unusable. Check this box and the router will filter this kind of traffic out. Advanced Click this button and you can set advanced Settings (5): settings of the DoS prevention method listed above, please see section 3-3-3-1 ‘DoS – Advanced Settings’ below. 1 2 3 4 5 6