Edimax Router BR-6574n User Manual
Have a look at the manual Edimax Router BR-6574n User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 11 Edimax manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
If the service you wish to deny or allow is not listed, you can use ‘User Define Service’ table to add a new service of your own: Here are descriptions of every setup items: Item Name Description Protocol Please select the protocol type of this service: TCP or UDP, or ‘Both’. Port Range Please input the port range if this service. For a single port number, just input the number of service port (like ‘110’). If this service consists multiple continuous ports, you can input ‘110-120’ for port number 110 to 120, or ’110,115,120’ for port number 110, 115, and 120. Click ‘Add’ to add this IP address restriction rule to the list (and back to previous page), or click ‘Reset’ to clear all texts in every field. When you finished with the settings in this page, you can click ‘Apply’ button to save changes you made in this page, or you can click ‘Cancel’ to discard changes. After you click ‘Apply’ button, you’ll see the following messages:
Please click ‘Apply’ to save changes you made and restart the broadband router, this requires about 30 seconds and the broadband router will stop responding (this is normal and is not malfunction). You can reconnect to this broadband router and continue on other settings later.
3-5-2-3-2 URL Blocking If you want to prevent computers in local network from accessing certain website (like pornography, violence, or anything you want to block), you can use this function to stop computers in local network from accessing the site you defined here. This function is useful for parents and company managers. Please follow the following instructions to set URL blocking parameters: Please click ‘Firewall’ menu on the left of web management interface, then click ‘URL Blocking’, and the following message will be displayed on your web browser: Here are descriptions of every setup items: Item Name Description Enable URL Blocking Check this box to enforce URL Blocking, uncheck it to disable URL Blocking. URL/Keyword Input the URL (host name or IP address of
website, like http://www.blocked-site.com or http://11.22.33.44 ), or the keyword which is contained in URL (like pornography, cartoon, stock, or anything). Add Click ‘Add’ button to add the URL / keyword to the URL / Keyword filtering table. Reset Click ‘Reset’ to remove the value you inputted in URL/Keyword field. All existing URLs will be displayed in ‘Current URL Blocking Table’: If you want to delete a specific URL/Keyword entry, check the ‘select’ box of the MAC address you want to delete, then click ‘Delete Selected’ button. (You can select more than one MAC addresses). If you want to delete all URL/Keyword listed here, please click ‘Delete All’ button, or you can also click ‘Reset’ button to unselect all URL/Keywords. When you finished with the settings in this page, you can click ‘Apply’ button to save changes you made in this page, or you can click ‘Cancel’ to discard changes. After you click ‘Apply’ button, you’ll see the following messages: Please click ‘Apply’ to save changes you made and restart the broadband router, this requires about 30 seconds and the broadband router will stop
responding (this is normal and is not malfunction). You can reconnect to this broadband router and continue on other settings later.
3-5-2-3-3 DoS Denial of Service (DoS) is a common attack measure, by transmitting a great amount of data or request to your Internet IP address and server, the Internet connection will become very slow, and server may stop responding because it is not capable to handle too much traffics. This router has a built-in DoS attack prevention mechanism; when you activate it, the router will stop the DoS attack for you: Here lists four kinds of DoS attacks, please select the type of DoS attack you wish this broadband router to protect, and you can select multiple types of attacks. The descriptions of every DoS attack is listed below: Item Name Description Ping of Death Ping of Death is a special packet, and it will cause certain computer to stop responding. Check this box and the router will filter this kind of packet out. Discard Ping From WA N Ping is a common and useful tool to know the connection status of a specified remote network device, but some malicious intruder will try to fill your network bandwidth with a lot of PING request data packet, to make your internet connection become very slow, even unusable. Check this box and the router will ignore all inbound PING request, but when you activate this function, you will not be able to
ping your own router from internet, too. Port Scan Some malicious intruder will try to use a ‘port scanner’ to know how many ports of your Internet IP address are open, and they can collect a lot of valuable information by doing so. Check this box and the router will block all traffics which are trying to scan your Internet IP address. Sync Flood This is another kind of attack, which uses a lot of fake connection request to consume the memory of your server, and try to make your server become unusable. Check this box and the router will filter this kind of traffic out. If you need to specify the details of every DoS attack, please click ‘Advanced Settings’ button, and the following settings will appear: The descriptions of every DoS attack is listed below: Item Name Description Ping of Death Set the threshold of when this DoS prevention mechanism will be activated. Please check the
box of Ping of Death, and input the frequency of threshold (how many packets per second, minute, or hour), you can also input the ‘Burst’ value, which means when this number of ‘Ping of Death’ packet is received in very short time, this DoS prevention mechanism will be activated. Discard Ping From WA N Check the box to activate this DoS prevention mechanism. Port Scan Many kind of port scan methods are listed here, please check one or more DoS attack methods you want to prevent. Sync Flood Like Ping of Death, you can set the threshold of when this DoS prevention mechanism will be activated. When you finished with the settings in this page, you can click ‘Apply’ button to save changes you made in this page, or you can click ‘Cancel’ to discard changes. After you click ‘Apply’ button, you’ll see the following messages: Please click ‘Apply’ to save changes you made and restart the broadband router, this requires about 30 seconds and the broadband router will stop responding (this is normal and is not malfunction). You can reconnect to this broadband router and continue on other settings later.
3-5-2-4 DDNS DDNS (Dynamic DNS) is a IP-to-Hostname mapping service for those Internet users who don’t have a static (fixed) IP address. It will be a problem when such user wants to provide services to other users on Internet, because their IP address will vary every time when connected to Internet, and other user will not be able to know the IP address they’re using at a certain time. This router supports DDNS service of following service providers: 3322 (http://www.3322.org/ ) DHS (http://www.dhs.org ) DynDNS (http://www.dyndns.org /) ODS (http://ods.org ) TZO (http://www.tzo.com /) GnuDIP (http://gnudip2.sourceforge.net/ ) DyNS (http://www.dyns.cx/ ) ZoneEdit (http://www.zoneedit.com) DHIS (http://www.dhis.org/) CyberGate (http://cybergate.planex.co.jp/ddns/) Please go to one of DDNS service provider’s webpage listed above, and get a free DDNS account by the instructions given on their webpage. After that, you can use the DDNS page to setup DDNS parameters to use DDNS service:
Here are descriptions of every setup items: Item Name Description Dynamic DNS If you want to enable DDNS function, please select ‘Enabled’; otherwise please select ‘Disabled’ Provider Select your DDNS service provider here. Domain Name Input the domain name you’ve obtained from DDNS service provider. Account / E-Mail Input account or email of DDNS registration. Password / Key Input DDNS service password or key. If your DDNS provider is ‘DHIS’, the settings will be different: Here are descriptions of every setup items: Item Name Description HostID Please input the HostID you applied during DHIS registration. ISAddr Please input the ISAddr you applied during DHIS registration. Authentication Type Please select the DHIS user authentication type from dropdown menu: password or QRC. HostPass Please input the HostID you applied during DHIS registration. (This field will appear only when