Home > Linksys > Router > Linksys Router WRT54GL User Manual

Linksys Router WRT54GL User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Linksys Router WRT54GL User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 11 Linksys manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							
    Chapter3Advanced Configuration
    8
    W
    reless-G Broadband Router
    DynDNS.org
    Setup > DDNS > DynDNS
    System Select  the  DynDNS  service  you  use:  Dynamc, 
    Statc
    , or Custom  . The default selection is  Dynamc .
    User Name Enter the User Name for your DDNS account .
    Password Enter the Password for your DDNS account .
    Host  Name The  is  the  DDNS  URL  assigned  by  the  DDNS 
    service  .
    Mal Exchange (Optonal) Enter the address of your mail 
    exchange server, so e-mails to your DynDNS address go to 
    your mail server  .
    Backup MX This feature allows the mail exchange server 
    to  be  a  backup  . To  disable  this  feature,  keep  the  default, 
    No .  To  enable  the  feature,  select Yes  .  If  you  are  not  sure 
    which setting to select, keep the default, No .
    WldCard This  setting  enables  or  disables  wildcards 
    for  your  host .  For  example,  if  your  DDNS  address  is
     
    myplace.dyndns.org  and  you  enable  wildcards,  then 
    x.myplace.dyndns.org   will  work  as  well  (x  is  the  wildcard) . 
    To  disable  wildcards,  keep  the  default, Off .  To  enable 
    wildcards,  select On .  If  you  are  not  sure  which  setting  to 
    select, keep the default, Off .
    Internet  IP  Address The  Router’s  Internet  IP  address  is 
    displayed here  . Because it is dynamic, it will change  .
    Status The  status  of  the  DDNS  service  connection  is 
    displayed here  .
    Click Save Settngs to apply your changes, or click Cancel 
    Changes  to cancel your changes  .
    TZO.com
    Setup > DDNS > TZO
    E-mal  Address,  Password,  and  Doman  Name Enter 
    the settings of the account you set up with TZO  .
    Internet  IP  Address The  Router’s  Internet  IP  address  is 
    displayed here  . Because it is dynamic, it will change  .
    Status The  status  of  the  DDNS  service  connection  is 
    displayed here  .
    Click Save Settngs to apply your changes, or click Cancel 
    Changes  to cancel your changes  .
    Setup > MAC Address Clone
    A  MAC  address  is  a  12-digit  code  assigned  to  a  unique 
    piece of hardware for identification . Some ISPs will require 
    you  to  register  a  MAC  address  in  order  to  access  the 
    Internet . If you do not wish to re-register the MAC address 
    with  your  ISP,  you  may  assign  the  MAC  address  you  have 
    currently  registered  with  your  ISP  to  the  Router  with  the 
    MAC Address Clone feature  .
    Setup > MAC Address Clone
    MAC Address Clone
    Enable/Dsable To have the MAC Address cloned, select 
    Enable .
    User  Defned  Entry Enter  the  MAC  Address  registered 
    with your ISP here  .
    Clone Your  PC’s  MAC Clicking  this  button  will  clone  the 
    MAC address of the computer you are using  .     
    						
    							
    Chapter3Advanced Configuration
    9
    W
    reless-G Broadband Router
    Click  Save Settngs to apply your changes, or click Cancel 
    Changes  to cancel your changes  .
    Setup > Advanced Routing
    This  screen  is  used  to  set  up  the  Router’s  advanced 
    functions .  Operating  Mode  allows  you  to  select  the 
    type(s)  of  advanced  functions  you  use  .  Dynamic  Routing 
    automatically adjusts how packets travel on your network  . 
    Static  Routing  sets  up  a  fixed  route  to  another  network 
    destination .
    Setup > Advanced Routing (Gateway)
    Setup > Advanced Routing (Router)
    Advanced Routing
    Operatng  Mode Select  the  mode  in  which  this  Router 
    will  function .  If  this  Router  is  hosting  your  network’s 
    connection  to  the  Internet,  select Gateway  .  If  another 
    Router  exists  on  your  network,  select Router .  When 
    Router  is  chosen,  Dynamc  Routng  will  be  available  as 
    an option .
    Dynamic Routing
    RIP This  feature  enables  the  Router  to  automatically 
    adjust  to  physical  changes  in  the  network’s  layout  and  exchange  routing  tables  with  the  other  router(s) .  The 
    Router  determines  the  network  packets’  route  based  on 
    the  fewest  number  of  hops  between  the  source  and  the 
    destination . This feature is 
    Dsabled  by default . From the 
    drop-down  menu,  you  can  also  select  LAN  &  Wreless, 
    which  performs  dynamic  routing  over  your  Ethernet  and 
    wireless  networks  .  You  can  also  select 
    WAN  (Internet), 
    which  performs  dynamic  routing  with  data  coming  from 
    the Internet . Selecting 
    Both enables dynamic routing for 
    both networks, as well as data from the Internet .
    Static Routing
    Select  set  number To  set  up  a  static  route  between 
    the  Router  and  another  network,  select  a  number  from 
    the  drop-down  list .  (A  static  route  is  a  pre-determined 
    pathway that network information must travel to reach a 
    specific host or network  .) Enter the information described 
    below to set up a new static route  . (Click Delete Ths Entry
     
    to delete a static route  .)
    Enter  Route  Name Enter  a  name  for  the  Route  here, 
    using a maximum of 25 alphanumeric characters  .
    Destnaton LAN IP The Destination LAN IP is the address 
    of the remote network or host to which you want to assign 
    a static route .
    Subnet  Mask The  Subnet  Mask  determines  which 
    portion  of  a  Destination  LAN  IP  address  is  the  network 
    portion, and which portion is the host portion . 
    Default  Gateway This  is  the  IP  address  of  the  gateway 
    device that allows for contact between the Router and the 
    remote network or host .
    Interface This interface tells you whether the Destination 
    IP Address is on the  LAN & Wreless (Ethernet and wireless 
    networks) or the WAN (Internet) .
    Click Show  Routng Table  to  view  the  Static  Routes  you 
    have already set up  .
    Click Save Settngs to apply your changes, or click Cancel 
    Changes  to cancel your changes  .
    Wireless > Basic Wireless Settings
    The  basic  settings  for  wireless  networking  are  set  on  this 
    screen .    
    						
    							
    Chapter3Advanced Configuration
    0
    W
    reless-G Broadband Router
    Wireless > Basic Wireless Settings
    Wireless Network
    Wreless  Network  Mode From  this  drop-down  menu, 
    you  can  select  the  wireless  standards  running  on  your 
    network  .  If  you  have  both  802 .11g  and  802 .11b  devices 
    in  your  network,  keep  the  default  setting,  Mxed  .  If  you 
    have  only  802 .11g  devices,  select 
    G-Only  .  If  you  have 
    only  802 .11b  devices,  select 
    B-Only  .  If  you  do  not  have 
    any  802 .11g  and  802 .11b  devices  in  your  network,  select 
    D sable  . 
    Wreless Network Name (SSID) The SSID is the network 
    name  shared  among  all  points  in  a  wireless  network  . 
    The  SSID  must  be  identical  for  all  devices  in  the  wireless 
    network .  It  is  case-sensitive  and  must  not  exceed 
     
    32 characters (use any of the characters on the keyboard) . 
    Make  sure  this  setting  is  the  same  for  all  points  in  your 
    wireless  network  .  For  added  security,  you  should  change 
    the default SSID ( lnksys) to a unique name  .
    Wreless  Channel Select  the  appropriate  channel  from 
    the list provided to correspond with your network settings  . 
    All  devices  in  your  wireless  network  must  use  the  same 
    channel in order to communicate . 
    Wreless  SSID  Broadcast When  wireless  clients  survey 
    the local area for wireless networks to associate with, they 
    will detect the SSID broadcast by the Router  . To broadcast 
    the Router’s SSID, keep the default setting, Enable . If you 
    do  not  want  to  broadcast  the  Router’s  SSID,  then  select 
    Dsable
     .
    SecureEasySetup If  you  did  not  utilize  this  network 
    connection feature during the Setup Wizard, you may use 
    it here by clicking the green logo  . When you are prompted 
    to start the push button setup, click OK . 
    Reset  Securty Use  this  button  to  reset  the  security 
    settings  on  your  network  .  You  will  need  to  run 
    SecureEasySetup  again  on  each  device  on  your  network 
    to re-associate it with your network  .
    Click Save Settngs to apply your changes, or click Cancel 
    Changes  to cancel your changes  .
    Wireless > Wireless Security
    The  Wireless  Security  settings  configure  the  security  of 
    your  wireless  network .  There  are  six  wireless  security 
    mode  options  supported  by  the  Router:  WPA  Personal, 
    WPA Enterprise, WPA2 Personal, WPA2 Enterprise, RADIUS, 
    and  WEP .  (WPA  stands  for  Wi-Fi  Protected  Access,  which 
    is a security standard stronger than WEP encryption . WEP 
    stands for Wired Equivalent Privacy, while RADIUS stands 
    for  Remote  Authentication  Dial-In  User  Service  .)  These 
    six  are  briefly  discussed  here  .  For  detailed  instructions 
    on  configuring  wireless  security  for  the  Router,  refer  to  
    “Chapter 2: Wireless Security  .”
    Wireless Security
    Security Mode
    Select  the  security  method  for  your  wireless  network  .  If 
    you do not want to use wireless security, keep the default, 
    Dsabled
     .
    WPA Personal
    NOTE:  If  you  are  using WPA,  always  remember 
    that each device in your wireless network MUST 
    use  the  same  WPA  method  and  shared  key,  or 
    else the network will not function properly  .
    Security Mode > WPA Personal
    WPA Algorthm WPA supports two encryption methods, 
    TKIP  and  AES,  with  dynamic  encryption  keys  .  Select  the 
    type of algorithm, TKIP or AES .  The default is TKIP .
    WPA  Shared  Key Enter  a  WPA  Shared  Key  of  8-63 
    characters  . 
    Group Key Renewal Enter a Group Key Renewal period, 
    which instructs the Router how often it should change the 
    encryption keys  . The default Group Key Renewal period is 
    3600 seconds  .
    WPA Enterprise
    This  option  features  WPA  used  in  coordination  with  a 
    RADIUS server  . (This should only be used when a RADIUS 
    server is connected to the Router  .)     
    						
    							
    Chapter3Advanced Configuration
    
    W
    reless-G Broadband Router
    Security Mode > WPA Enterprise
    WPA Algorthm WPA supports two encryption methods, 
    TKIP  and  AES,  with  dynamic  encryption  keys  .  Select  the 
    type of algorithm, TKIP or AES . The default is TKIP .
    RADIUS  Server  Address Enter  the  IP  Address  of  the 
    RADIUS server  .
    RADIUS  Port   Enter  the  port  number  of  the  RADIUS 
    server  . The default value is  8
     .
    Shared  Key Enter  the  key  shared  between  the  Router 
    and the server  .
    Key  Renewal  T meout Enter  a  Key  Renewal  Timeout 
    period,  which  instructs  the  Router  how  often  it  should 
    change  the  encryption  keys  .  The  default  Key  Renewal 
    Timeout period is 3600 seconds  .
    WPA2 Personal
    Security Mode > WPA2 Personal
    WPA  Algorthm WPA2  supports  two  encryption 
    methods,  TKIP  and  AES,  with  dynamic  encryption  keys  . 
    Select  the  type  of  algorithm, AES,  or TKIP + AES  .  The 
    default selection is  TKIP + AES .
    WPA  Shared  Key Enter  a  WPA  Shared  Key  of  8-63 
    characters  . 
    Group Key Renewal Enter a Group Key Renewal period, 
    which instructs the Router how often it should change the 
    encryption keys  . The default Group Key Renewal period is 
    3600 seconds  .
    WPA2 Enterprise
    This  option  features  WPA2  used  in  coordination  with  a 
    RADIUS server  . (This should only be used when a RADIUS 
    server is connected to the Router  .)
    Security Mode > WPA2 Enterprise
    WPA  Algorthm WPA2  supports  two  encryption 
    methods,  TKIP  and  AES,  with  dynamic  encryption  keys  . 
    Select  the  type  of  algorithm, AES,  or TKIP + AES  .  The 
    default selection is  TKIP + AES
    RADIUS  Server  Address Enter  the  IP  Address  of  the 
    RADIUS server  .
    RADIUS  Port   Enter  the  port  number  of  the  RADIUS 
    server  . The default value is  8
     .
    Shared  Key Enter  the  key  shared  between  the  Router 
    and the server  .
    Key  Renewal  T meout Enter  a  Key  Renewal  Timeout 
    period,  which  instructs  the  Router  how  often  it  should 
    change  the  encryption  keys  .  The  default  Key  Renewal 
    Timeout period is 3600 seconds  .
    RADIUS
    This  option  features  WEP  used  in  coordination  with  a 
    RADIUS server  . (This should only be used when a RADIUS 
    server is connected to the Router  .) 
    Security Mode > RADIUS      
    						
    							
    Chapter3Advanced Configuration
    
    W
    reless-G Broadband Router
    IMPORTANT:  If  you  are  using  WEP  encryption, 
    always  remember  that  each  device  in  your 
    wireless  network  MUST  use  the  same  WEP 
    encryption  method  and  encryption  key,  or  else 
    your wireless network will not function properly  .
    RADIUS  Server  Address Enter  the  IP  Address  of  the 
    RADIUS server  .
    RADIUS  Port   Enter  the  port  number  of  the  RADIUS 
    server  . The default value is  8
     .
    Shared  Key Enter  the  key  shared  between  the  Router 
    and the server  .
    Default  Transmt  Key Select  a  Default  Transmit  Key 
    (choose which Key to use) . The default is 
     .
    WEP  Encrypton Select  a  level  of  WEP  encryption,  
    64  bts  0  hex  dgts
      or 8  bts  6  hex  dgts  .  The 
    default is 64 bts 0 hex dgts .
    Passphrase Enter a Passphrase to automatically generate  
    WEP keys  . Then click 
    Generate .
    Key -4 If you did not enter a Passphrase, enter the WEP 
    key(s) manually  .
    WEP
    WEP is a basic encryption method, which is not as secure 
    as WPA . 
    Security Mode > WEP
    Default  Transmt  Key Select  a  Default  Transmit  Key 
    (choose which Key to use) . The default is 
     .
    WEP Encrypton Select a level of WEP encryption,  64 bts 
    0  hex  dgts
      or  8  bts  6  hex  dgts  .  The  default  is 
    64 bts 0 hex dgts
     .
    Passphrase Enter a Passphrase to automatically generate  
    WEP keys  . Then click 
    Generate .
    Key -4 If you did not enter a Passphrase, enter the WEP 
    key(s) manually  .
    Click Save Settngs to apply your changes, or click Cancel 
    Changes  to cancel your changes  .
    Wireless > Wireless MAC Filter
    Wireless  access  can  be  filtered  by  using  the  MAC  addresses  of 
    the wireless devices transmitting within your network’s radius  .
     
    Wireless > Wireless MAC Filter
    Wireless MAC Filter
    Wreless MAC F lter To filter wireless users by MAC Address, 
    either  permitting  or  blocking  access,  click Enable .  If  you  do 
    not  wish  to  filter  users  by  MAC  Address,  keep  the  default 
    setting,  Dsable .
    Prevent Select  this to  block  wireless  access  by  MAC 
    Address  . This button is selected by default .
    Permt  Only Select  this  to  allow  wireless  access  by  MAC 
    Address  . This button is not selected by default .
    Edt  MAC  F lter  Lst Click  this  to  open  the MAC  Address 
    Filter  List  screen .  On  this  screen,  you  can  list  users,  by  MAC 
    Address,  to  whom  you  wish  to  provide  or  block  access  .  For 
    easy reference, click Wreless Clent MAC Lst to display a list 
    of network users by MAC Address .
    MAC Address Filter List
    Click  Save Settngs to apply your changes, or click Cancel 
    Changes  to cancel your changes  .      
    						
    							
    Chapter3Advanced Configuration
    3
    W
    reless-G Broadband Router
    Wireless > Advanced Wireless Settings
    This Wireless  >  Advanced  Wireless  Settings  screen  is  used 
    to set up the Router’s advanced wireless functions  . These 
    settings should only be adjusted by an expert administrator 
    as incorrect settings can reduce wireless performance  .
    Wireless > Advanced Wireless Settings
    Advanced Wireless
    Authentcaton  Type The  default  is  set  to Auto,  which 
    allows  either  Open  System  or  Shared  Key  authentication 
    to be used . With 
    Open System authentication, the sender 
    and the recipient do NOT use a WEP key for authentication . 
    With Shared Key authentication, the sender and recipient 
    use a WEP key for authentication .
    Basc Rate The Basic Rate setting is not actually one rate 
    of  transmission  but  a  series  of  rates  at  which  the  Router 
    can transmit . The Router will advertise its Basic Rate to the 
    other wireless devices in your network, so they know which 
    rates will be used  . The Router will also advertise that it will 
    automatically  select  the  best  rate  for  transmission .  The 
    default  setting  is Default,  when  the  Router  can  transmit 
    at all standard wireless rates (1-2Mbps, 5 .5Mbps, 11Mbps, 
    18Mbps,  and  24Mbps) .  Other  options  are  -Mbps
    ,  for 
    use  with  older  wireless  technology,  and All,  when  the 
    Router  can  transmit  at  all  wireless  rates  .  The  Basic  Rate 
    is  not  the  actual  rate  of  data  transmission .  If  you  want  to 
    specify  the  Router’s  rate  of  data  transmission,  configure 
    the Transmission Rate setting  .
    Transmsson Rate The rate of data transmission should 
    be set depending on the speed of your wireless network  . 
    You can select from a range of transmission speeds, or you 
    can select Auto to have the Router automatically use the 
    fastest  possible  data  rate  and  enable  the  Auto-Fallback 
    feature .  Auto-Fallback  will  negotiate  the  best  possible 
    connection  speed  between  the  Router  and  a  wireless 
    client . The default value is 
    Auto .
    CTS  Protecton  Mode CTS  (Clear-To-Send)  Protection 
    Mode should remain disabled unless you are having severe 
    problems  with  your  Wireless-G  products  not  being  able 
    to  transmit  to  the  Router  in  an  environment  with  heavy 
    802 .11b  traffic  .  This  function  boosts  the  Router’s  ability 
    to  catch  all  Wireless-G  transmissions  but  will  severely 
    decrease performance  .
    Frame  Burst Enabling  this  option  should  provide  your 
    network  with  greater  performance,  depending  on  the 
    manufacturer  of  your  wireless  products  .  To  turn  on  the 
    Frame Burst option, select Enable . The default is  Dsable .
    Beacon  Interval The  default  value  is  00 .  Enter  a  value 
    between  1  and  65,535  milliseconds  .  The  Beacon  Interval 
    value  indicates  the  frequency  interval  of  the  beacon .  A 
    beacon is a packet broadcast by the Router to synchronize 
    the wireless network  .
    DTIM  Interval This  value,  between  1  and  255,  indicates 
    the  interval  of  the  Delivery  Traffic  Indication  Message 
    (DTIM) .  A  DTIM  field  is  a  countdown  field  informing 
    clients  of  the  next  window  for  listening  to  broadcast 
    and  multicast  messages  .  When  the  Router  has  buffered 
    broadcast  or  multicast  messages  for  associated  clients,  it 
    sends the next DTIM with a DTIM Interval value  . Its clients 
    hear  the  beacons  and  awaken  to  receive  the  broadcast 
    and multicast messages . The default value is 
     .
    Fragmentaton  Threshold This  value  specifies  the 
    maximum  size  for  a  packet  before  data  is  fragmented 
    into  multiple  packets .  If  you  experience  a  high  packet 
    error  rate,  you  may  slightly  increase  the  Fragmentation 
    Threshold .  Setting  the  Fragmentation  Threshold  too  low 
    may  result  in  poor  network  performance  .  Only  minor 
    reduction  of  the  default  value  is  recommended  .  In  most 
    cases, it should remain at its default value of 346 .
    RTS Threshold Should  you  encounter  inconsistent  data 
    flow,  only  minor  reduction  of  the  default  value,  34,  is 
    recommended  .  If  a  network  packet  is  smaller  than  the 
    preset  RTS  threshold  size,  the  RTS/CTS  mechanism  will 
    not  be  enabled  . The  Router  sends  Request  to  Send  (RTS) 
    frames  to  a  particular  receiving  station  and  negotiates 
    the  sending  of  a  data  frame  .  After  receiving  an  RTS,  the 
    wireless station responds with a Clear to Send (CTS) frame 
    to  acknowledge  the  right  to  begin  transmission . The  RTS 
    Threshold  value  should  remain  at  its  default  value  of 
    34
     .
    AP Isolaton This isolates all wireless clients and wireless 
    devices on your network from each other  . Wireless devices 
    will be able to communicate with the Router but not with 
    each other . To use this function, select 
    On . AP Isolation is 
    turned Off  by default . 
    SecureEasySetup This  feature  allows  you  to  enable  or 
    disable  the  SecureEasySetup  feature  .  Select Dsabled
      to 
    disable  the  feature  and  turn  off  the  button’s  light .  The 
    feature is Enabled  by default .
    Click Save Settngs to apply your changes, or click Cancel 
    Changes  to cancel your changes  .   
    						
    							
    Chapter3Advanced Configuration
    4
    W
    reless-G Broadband Router
    Security > Firewall
    The Security > Firewall screen is used to configure a firewall 
    that can filter out various types of unwanted traffic on the 
    Router’s local network  . 
    Security > Firewall
    Firewall
    Frewall  Protecton To  use  firewall  protection,  keep  the 
    default  selection, Enable  .  To  turn  off  firewall  protection, 
    select Dsable .
    Block WAN Requests
    Block  Anonymous  Internet  Requests This  feature 
    makes  it  more  difficult  for  outside  users  to  work  their 
    way into your network  . This feature is selected
     by default .  
    Deselect  the  feature  to  allow  anonymous  Internet 
    requests .
    F lter  Multcast Multicasting  allows  for  multiple 
    transmissions  to  specific  recipients  at  the  same  time  .  If 
    multicasting  is  permitted,  then  the  Router  will  allow  IP 
    multicast  packets  to  be  forwarded  to  the  appropriate 
    computers .  This  feature  is  selected  by  default .  Deselect 
    this feature to disable it .
    F lter  Internet  NAT  Redrecton This  feature  uses 
    port  forwarding  to  block  access  to  local  servers  from 
    local  networked  computers  .  Select Flter  Internet  NAT 
    Redrecton  to filter Internet NAT redirection . This feature 
    is not selected by default .
    F lter IDENT (Port  3) This feature keeps port 113 from 
    being  scanned  by  devices  outside  of  your  local  network  . 
    This feature is selected by default . Deselect this feature to 
    disable it .
    Click  Save Settngs to apply your changes, or click Cancel 
    Changes  to cancel your changes  .
    Security > VPN Passthrough
    The Security > VPN Passthrough screen allows you to enable 
    VPN  tunnels  using  IPSec,  PPTP,  or  L2TP  protocols  to  pass 
    through the Router’s firewall  .
    Security > VPN Passthrough
    VPN Passthrough
    IPSec  Passthrough Internet  Protocol  Security  (IPSec)  is 
    a  suite  of  protocols  used  to  implement  secure  exchange 
    of  packets  at  the  IP  layer .  To  allow  IPSec  tunnels  to  pass 
    through the Router, keep the default, Enable . 
    PPTP  Passthrough Point-to-Point  Tunneling  Protocol 
    (PPTP)  allows  the  Point-to-Point  Protocol  (PPP)  to  be 
    tunneled through an IP network  . To allow PPTP tunnels to 
    pass through the Router, keep the default, Enable . 
    LTP  Passthrough Layer  2  Tunneling  Protocol  is  the 
    method  used  to  enable  Point-to-Point  sessions  via  the 
    Internet on the Layer 2 level  . To allow L2TP tunnels to pass 
    through the Router, keep the default, Enable .
    Click Save Settngs to apply your changes, or click Cancel 
    Changes  to cancel your changes  .    
    						
    							
    Chapter3Advanced Configuration
    
    W
    reless-G Broadband Router
    Access Restrictions > Internet Access
    The Access Restrictions > Internet Access screen allows you 
    to  block  or  allow  specific  kinds  of  Internet  usage  and 
    traffic,  such  as  Internet  access,  designated  services,  and 
    websites during specific days and times  .
    Access Restrictions > Internet Access
    Internet Access
    Internet  Access  Polcy Access  can  be  managed  by  a 
    policy  .  Use  the  settings  on  this  screen  to  establish  an 
    access  policy  (after  Save  Settngs  is  clicked) .  Selecting  a 
    policy from the drop-down menu will display that policy’s 
    settings .  To  delete  a  policy,  select  that  policy’s  number 
    and  click Delete . To  view  all  the  policies,  click Summary  . 
    (Policies  can  be  deleted  from  the Summary  screen  by 
    selecting  the  policy  or  policies  and  clicking Delete .  To 
    return to the Internet Access tab, click Close .)
    Internet Policy Summary
    Status Policies are disabled by default . To enable a policy, 
    select the policy number from the drop-down menu, and 
    select Enable .
    To create an Internet Access policy:
    Select  a  number  from  the Internet  Access  Policy  drop-
    down menu  .1 .
    To enable this policy, select Enable .
    Enter a Policy Name in the field provided  . 
    Click Edt Lst of PCs to select which PCs will be affected 
    by  the  policy  .  The 
    List  of  PCs  screen  appears  .  You  can 
    select a PC by MAC Address or IP Address  . You can also 
    enter  a  range  of  IP  Addresses  if  you  want  this  policy 
    to  affect  a  group  of  PCs .  After  making  your  changes, 
    click Save  Settngs  to  apply  your  changes  or Cancel 
    Changes  to cancel your changes  . Then click Close . 
    List of PCs
    Select  the  appropriate  option, Deny  or Allow, 
    depending  on  whether  you  want  to  block  or  allow 
    Internet access for the PCs you listed on the List of PCs 
    screen .
    Decide which days and what times you want this policy 
    to be enforced  . Select the individual days during which 
    the  policy  will  be  in  effect,  or  select Everyday .  Then 
    enter  a  range  of  hours  and  minutes  during  which  the 
    policy will be in effect, or select  4 Hours .
    Select  any  Blocked  Services  or  Website  Blocking  you 
    wish to use .
    Click Save  Settngs  to  save  the  policy’s  settings,  or 
    click Cancel Changes  to cancel the policy’s settings  .
    Blocked Services
    You can filter access to various services accessed over the 
    Internet, such as FTP or telnet, by selecting services from 
    the  drop-down  menus  next  to Blocked  Services .  (You  can 
    block up to 20 services  .) Then enter the range of ports you 
    want to filter  .
    If the service you want to block is not listed or you want to 
    edit a service’s settings, then click  Add/Edt Servce . Then 
    the Port Services screen will appear  .
    Port Services
    2 .
    3 .
    4 .
    5 .
    6 .
    7 .
    8 .      
    						
    							
    Chapter3Advanced Configuration
    6
    W
    reless-G Broadband Router
    To  add  a  service,  enter  the  service’s  name  in  the Service 
    Name   field .  Select  its  protocol  from  the Protocol  drop-
    down  menu,  and  enter  its  range  in  the Port  Range   fields . 
    Then click Add .
    To  modify  a  service,  select  it  from  the  list  on  the  right . 
    Change  its  name,  protocol  setting,  or  port  range  .  Then 
    click Modfy .
    To delete a service, select it from the list on the right . Then 
    click Delete .
    When  you  are  finished  making  changes  on  the Port 
    Services  screen,  click Apply   to  save  the  changes  .  If  you 
    want  to  cancel  your  changes,  click Cancel .  To  close  the 
    Port  Services  screen  and  return  to  the Access  Restrictions 
    screen, click Close .
    Website Blocking by URL Address
    If you want to block websites with specific URL addresses, 
    enter each URL in a separate field next to Website Blocking 
    by URL Address .
    Website Blocking by Keyword
    If  you  want  to  block  websites  using  specific  keywords, 
    enter  each  keyword  in  a  separate  field  next  to Website 
    Blocking by Keyword .
    Click Save Settngs to apply your changes, or click Cancel 
    Changes  to cancel your changes  .
    Applications and Gaming > Port Range 
    Forward
    The  Applications  &  Gaming  >  Port  Range  Forward  screen 
    allows you to set up public services on your network, such as 
    web servers, ftp servers, e-mail servers, or other specialized 
    Internet  applications .  (Specialized  Internet  applications  are 
    any applications that use Internet access to perform functions 
    such as videoconferencing or online gaming  . Some Internet 
    applications may not require any forwarding  .)
    Applications and Gaming > Port Range Forward
    Port Range Forward
    To  forward  a  port,  enter  the  information  on  each  line  for 
    the criteria required .
    Applcaton In this field, enter the name you wish to give 
    the application . Each name can be up to 12 characters  .
    Start/End This  is  the  port  range .  Enter  the  number  that 
    starts the port range in the Start column and the number 
    that ends the range in the End column .
    Protocol Select  the  protocol  used  for  this  application, 
    either TCP or UDP, or Both .
    IP  Address For  each  application,  enter  the  IP  Address  of 
    the PC running the specific application .
    Enable Select Enable  to  enable  port  forwarding  for  the 
    relevant application .
    Click  Save Settngs to apply your changes, or click Cancel 
    Changes  to cancel your changes  .
    Applications & Gaming > Port Triggering
    The Applications & Gaming > Port Triggering screen allows 
    the  Router  to  watch  outgoing  data  for  specific  port 
    numbers . The  IP  address  of  the  computer  that  sends  the 
    matching data is remembered by the Router, so that when 
    the requested data returns through the Router, the data is 
    pulled back to the proper computer by way of IP address 
    and port mapping rules  .
    Applications and Gaming > Port Triggering
    Port Triggering
    Applcaton Enter the application name of the trigger  .
    Triggered Range
    For each application, list the triggered port number range  . 
    Check  with  the  Internet  application  documentation  for 
    the port number(s) needed .    
    						
    							
    Chapter3Advanced Configuration
    
    W
    reless-G Broadband Router
    Start Port Enter the starting port number of the Triggered 
    Range  .
    End Port Enter the ending port number of the Triggered 
    Range  .
    Forwarded Range
    For  each  application,  list  the  forwarded  port  number 
    range . Check with the Internet application documentation 
    for the port number(s) needed  .
    Start  Port Enter  the  starting  port  number  of  the 
    Forwarded Range  .
    End Port Enter the ending port number of the Forwarded 
    Range  .
    Enable Select Enable  to  enable  port  triggering  for  the 
    applicable application .
    Click  Save Settngs to apply your changes, or click Cancel 
    Changes  to cancel your changes  .
    Applications and Gaming > DMZ
    The  DMZ  feature  allows  one  network  computer  to  be 
    exposed  to  the  Internet  for  use  of  a  special-purpose 
    service  such  as  Internet  gaming  or  videoconferencing  . 
    DMZ  hosting  forwards  all  the  ports  at  the  same  time  to 
    one  PC .  The  Port  Range  Forward  feature  is  more  secure 
    because it only opens the ports you want to have opened, 
    while  DMZ  hosting  opens  all  the  ports  of  one  computer, 
    exposing the computer to the Internet . 
    Applications and Gaming > DMZ
    DMZ
    Any PC whose port is being forwarded must have its DHCP 
    client  function  disabled  and  should  have  a  new  static  IP 
    address assigned to it because its IP address may change 
    when using the DHCP function .
    To  expose  one  PC,  select Enable .  Then,  enter  the 
    computer’s IP address in the DMZ Host IP Address  field . This 
    feature is disabled by default .
    Click  Save Settngs to apply your changes, or click Cancel 
    Changes  to cancel your changes  .
    Applications and Gaming > QoS
    Quality  of  Service  (QoS)  ensures  better  service  to 
    high-priority  types  of  network  traffic,  which  may 
    involve  demanding,  real-time  applications,  such  as 
    videoconferencing . 
    There  are  three  types  of  QoS  available:  Device  Priority, 
    Ethernet Port Priority, and Application Priority  .
    Wired QoS
    Enable/Dsable To enable QoS, select Enable . Otherwise, 
    select Dsable  . QoS is disabled by default .
    Upstream  Bandwdth Select Auto  or Manual  from 
    the  drop-down  menu  .  Manual  allows  you  to  specify  the 
    maximum  outgoing  bandwidth  that  applications  can 
    utilize .
    Applications and Gaming > QoS
    Device Priority
    Enter the name of your network device in the Device name 
    field,  enter  its  MAC  Address,  and  then  select  its  priority 
    from the drop-down menu  .
    Ethernet Port Priority
    Ethernet  Port  Priority  QoS  allows  you  to  prioritize 
    performance for the Router’s four ports, LAN Ports 1-4 .  For 
    each port, select  the priority and flow control setting  .    
    						
    All Linksys manuals Comments (0)

    Related Manuals for Linksys Router WRT54GL User Manual