Gateway 2701hgb Manual
Have a look at the manual Gateway 2701hgb Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 54 Gateway manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
Management and Diagnostic Console 76 Local Network - Wireless Settings Page The Local Network - Wireless Settings page allows you to view or change the wireless settings with which your gateway is configured. Figure 32. MDC Local Network Wireless Settings Page The Current Settings panel shows the 2Wire gateway’s wireless access point settings. Access Point. The designated name of the wireless access point. Network Name. The name assigned to your wireless network. The default is 2WIREXXX, where XXX represents the last three digits of your 2Wire gateway serial number (for example, 2WIRE954). Channel. The radio frequency band the access point uses for your wireless network (the default is 6). Wireless adapter cards auto-detect the channels to use. If you are having problems with your wireless network, it could be due to radio interference. You can change the wireless channel to see if interference is reduced on a different channel. Authentication. The security method used to ensure that users are authorized to access the wireless network: WEP-Open, WEP-Shared, or WPA-PSK. Encryption. The security setting that makes it difficult for unauthorized users to access your network.
Management and Diagnostic Console 77 The Settings panel allows you to change the Network Name and Wireless Channel, and enable SSID broadcast. Customizing Security Settings You should always enable encr yption for wireless communication. When encryption is enabled, you must define an encr yption key for the 2Wire gateway’s wireless access point and configure that same key on each wireless client that will use your 2Wire gateway wireless network. You can customize the following wireless settings in the Wireless Security panel. 1.From the Authentication pull-down menu, select an authentication setting: WEP-Open, WEP-Shared, or WPA-PSK. Open authentication allows users to configure their wireless adapter as either Open or Shared; in either case an encr yption key is required. Shared authentication allows users to configure their wireless adapter for Shared authentication, which requires an encryption key. WPA-PSK requires that users configure their wireless adapter using TKIP. 2.To use the encr yption key that came with your gateway, click the Use default encryption key radio button. To create a custom encr yption key, click the Use custom encryption key radio button. If you select Use custom encr yption key, you can define a 64-bit or 128-bit encr yption key. For 64-bit encryption, in the Key field enter a 10-digit hexadecimal number. For 128-bit encr yption, enter a 26-digit hexadecimal number. A hexadecimal number uses the characters 0-9, a-f, or A-F. 3.Click the Submit button. Additional Settings The Additional Settings panel allows you to customize wireless settings. In general, it is recommended that you leave the default settings in place; however, if you are experiencing connection or performance difficulties, altering these settings may improve performance. Wireless Mode. Allows you to force the gateway to use 802.11b/g, 802.11b-only, or 802.11g-only modes of operation. DTIM Period (seconds). Determines at which inter val the access point will send its broadcast traffic. The default value is 1 second. Power Setting. Allows you to select the power level for your wireless connection. The default list is 1 to 4; additional options may appear based on the service provider’s configuration. Maximum Connection Rate. The maximum rate at which your wireless connection works (1, 2, 5.5, 11, or 22 Mbps for 802.11b-based models; 1, 2, 5.5, 11, 6, 9, 12, 24, 36, 48, or 54 Mbps for 802.11b/ g-based models). Note: If encr yption is enabled, each wireless client must be configured with the encr yption key defined on the system before it can operate on your wireless network. Note: Because the fields that display are dependent on the type of wireless adapter you are using, some of these settings may not display.
Management and Diagnostic Console 78 Local Network - Configuration Page The Local Network - Configuration page allows you to change the gateway’s default local network settings. You must click the Submit button for changes to take effect. Figure 33. MDC Local Network Configuration Page Private Network Settings By default, the gateway uses the 192.168.1.254/255.255.255.0 IP address range. The Private Network pane allows you to change the IP address range used by the local network. You can choose from three standard configuration options, or configure the network settings manually. Note: To access this page, your network must have the Remote Management feature enabled. If the feature is not enabled, an error message will display when you click the link to access this page.
Management and Diagnostic Console 79 Public Routed Subinterface Settings The Public Routed Subinterface pane allows you to create a local network that has broadband network- accessible IP addresses by creating a route from the Internet to the public network specified. The public network operates without the use of Network Address Translation (NAT). This feature is typically used in conjunction with broadband ser vice that provides a range of available IP addresses. Once enabled, the public IP addresses can be assigned to local computers. Public Proxied Subnet Settings The Public Proxied Subnet pane allows you to create a local network that has broadband-accessible IP addresses. Public Proxied Subnet is a public network in which the local network is an extension of the broadband network and does not require any special routing. Computers that are assigned Public Proxied Subnet IP addresses operate without the use of Network Address Translation (NAT). This feature is typically used in conjunction with broadband service that provides a range of IP addresses. Once enabled, the Public Proxied Subnet IP addresses can be assigned to local computers. Display Settings If the Show Inactive Devices checkbox is checked, devices that are no longer on the local network will display in the Local Network Local Devices list as an inactive device. If this checkbox is not checked, inactive devices will not be displayed in the device list. Enable Router Behind Router Alert If the Display alert when another router is connected to this router checkbox is checked, the Router Behind Router error page displays in the gateway user interface if the gateway detects the presence of a third-party router. If a third-party router is connected to the 2Wire gateway, the network can become unstable because both devices are tr ying to manage private IPs via NAT. Note: If you change the local network IP address range, you must renew the DHCP lease on all devices on the gateway’s local network and manually reconfigure all devices configured with static IP addresses.
Management and Diagnostic Console 80 Firewall - Settings Page The Firewall - Settings page allows you to configure the firewall to pass through specific application data to a selected computer. Figure 35. MDC Firewall Settings Page Note: To access this page, your network must have the Remote Management feature enabled. If the feature is not enabled, an error message will display when you click the link to access this page.
Management and Diagnostic Console 81 Hosting an Application To host an application on the gateway’s network for Internet users to access (such as a Web ser ver), the firewall must be configured to allow users on the Internet to access it. To host an application: 1.From 1 Select a computer, select a computer from the pull-down menu. 2.From 2 Edit firewall settings for this computer, click the Allow individual application(s) radio button. 3.From the Applications list, select an application profile. 4.Click the ADD > button. The application displays in the Hosted Applications list. 5.Click the Submit button. To stop an application that is routed to a selected computer: 1.From the Hosted Applications list, select the application profile name. 2.Click the < REMOVE button. Creating an Application Profile If the application that the user wishes to host is not included in the updated application list, you may need to create an application profile. An application profile configures the system’s firewall to pass through application-specific data. Note: If an application does not appear in the Applications list, the list may need updating. If an update is available, click the UPDATE APPLICATION LIST button.
Management and Diagnostic Console 82 To create an application profile: 1.Click the Add a new user-defined application link. The Edit Application page opens. Figure 36. MDC Firewall Edit Application Page 2. In the Application Name field, enter a name for the application profile. 3.In the Protocol field, click the TCP or UDP radio button. If both protocols are required, you must create a definition for each. 4.In the Por t (or Range) field, enter the por t or por t range used by the application. 5.In the Protocol Timeout (seconds) field, enter the amount of time (in seconds) that the connection in the specified range should remain open when there is no data transfer. In most cases the default value is appropriate. 6.In the Map to Host Por t field, enter the value that provides the mapping offset to the local computer. For example, if this value is set to 4000 and the range being opened is 100 to 108, the forwarded data to the first value in the range will be sent to 4000. Subsequent por ts will be mapped accordingly; 101 will be sent to 4001, 102 will be sent to 4002, etc. 7.From the Application Type pull-down menu, select the application type: None (Default), File Transfer Protocol (FTP), Microsoft Games, H.323-based Internet telephony, IRC (Internet relay chat) server, or PPTP vir tual private network ser ver. 8.Click the Add Definition button. 9.Repeat the previous step for each por t or range of ports required for the application profile.
Management and Diagnostic Console 83 Allowing all applications DMZplus is used for hosting applications if an application will not operate properly using the “Allow individual application(s)” option. When in DMZplus mode, the designated computer: Shares the gateway’s IP address. Appears as if it is directly connected to the Internet. Has all of the unassigned TCP and UDP por ts opened and pointed to it. Can receive unsolicited network traffic from the Internet. To configure a computer on the user’s network for DMZplus mode: 1.Select the computer to which the user wishes to have all data sent. 2.Click the Allow all applications (DMZplus mode) radio button. 3.Click Submit. 4.Access the selected computer. 5.Confirm that the computer is configured for DHCP. If it is not, configure it for DHCP. 6.Restar t the computer. When the computer restarts, it receives a special IP address from the system and all unassigned TCP and UDP ports are forwarded to it.
Management and Diagnostic Console 84 Firewall - Detailed Information Page The Firewall - Detailed Information page shows detailed information about the gateway’s firewall. Figure 37. MDC Firewall Detailed Information Page Pinholes A pinhole is a configuration setting in the firewall that allows access to specific ser vices running on the network. For example, for users outside the network to access a specific application (such as a game), a pinhole must be opened on the gateway firewall to allow requests to the application. The Pinholes pane shows the number of pinholes that are currently open. There are 192 pinholes available. NAT Sessions The NAT Sessions pane shows the number of NAT sessions currently running. Note: To access this page, your network must have the Remote Management feature enabled. If the feature is not enabled, an error message will display when you click the link to access this page.
Management and Diagnostic Console 85 Firewall - Advanced Settings Page The Firewall - Advanced Settings page allows you to configure the gateway’s firewall. Figure 38. MDC Firewall Advanced Settings Page Note: To access this page, your network must have the Remote Management feature enabled. If the feature is not enabled, an error message will display when you click the link to access this page.