Home > Linksys > Router > Linksys Router WRT54GS User Manual

Linksys Router WRT54GS User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Linksys Router WRT54GS User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 11 Linksys manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							
    Chapter 3Advanced Configuration
    
    W
    
    reless-G Broadband Router w
    
    th SpeedBooster
    DynDNS.org
    Setup > DDNS > DynDNS
    User Name
     Enter the User Name for your DDNS account.
    Password Enter the Password for your DDNS account.
    Host  Name  The  is  the  DDNS  URL  assigned  by  the  DDNS 
    service.
    Internet  IP  Address  The  Router’s  Internet  IP  address  is 
    displayed here. Because it is dynamic, it will change.
    Status The  status  of  the  DDNS  service  connection  is 
    displayed here.
    Click the  Save Sett  ngs button to apply your changes, or 
    click the Cancel Changes button to cancel your changes.
    TZO.com
    Setup > DDNS > TZO
    E-ma l Address, TZO Key, and Doma  n Name  Enter the 
    settings of the account you set up with TZO.
    Internet  IP  Address The  Router’s  Internet  IP  address  is 
    displayed here. Because it is dynamic, it will change.
    Status The  status  of  the  DDNS  service  connection  is 
    displayed here.
    Click the  Save Sett  ngs button to apply your changes, or 
    click the Cancel Changes button to cancel your changes.
    Setup > MAC Address Clone
    A  MAC  address  is  a  12-digit  code  assigned  to  a  unique 
    piece of hardware for identification. Some ISPs will require 
    you  to  register  a  MAC  address  in  order  to  access  the 
    Internet. If you do not wish to re-register the MAC address 
    with  your  ISP,  you  may  assign  the  MAC  address  you  have 
    currently  registered  with  your  ISP  to  the  Router  with  the 
    MAC Address Clone feature.
    Setup > MAC Address Clone
    MAC Address Clone
    Enable/D sable  To have the MAC Address cloned, select 
    Enable.
    User  Def ned  Entry  Enter  the  MAC  Address  registered 
    with your ISP here.
    Clone  Your  PC’s  MAC  Address  Clicking  this  button  will 
    clone the MAC address of the computer you are using.
    Click the Save Sett  ngs button to apply your changes, or 
    click the Cancel Changes button to cancel your changes.
    Setup > Advanced Routing
    This  screen  is  used  to  set  up  the  Router’s  advanced 
    functions.  Operating  Mode  allows  you  to  select  the 
    type(s)  of  advanced  functions  you  use.  Dynamic  Routing 
    automatically adjusts how packets travel on your network. 
    Static  Routing  sets  up  a  fixed  route  to  another  network 
    destination.
    Setup > Advanced Routing (Gateway)      
    						
    							
    Chapter 3Advanced Configuration
    8
    W
    
    reless-G Broadband Router w
    
    th SpeedBooster
    Setup > Advanced Routing (Router)
    Advanced Routing
    Operat
     ng  Mode  Select  the  mode  in  which  this  Router 
    will  function.  If  this  Router  is  hosting  your  network’s 
    connection  to  the  Internet,  select Gateway.  If  another 
    Router  exists  on  your  network,  select Router.  When 
    Router is chosen, Dynamic Routing will be available as an 
    option.
    Dynam c  Rout  ng  This  feature  enables  the  Router  to 
    automatically adjust to physical changes in the network’s 
    layout and exchange routing tables with the other router(s). 
    The  Router  determines  the  network  packets’  route  based 
    on  the  fewest  number  of  hops  between  the  source  and 
    the destination. This feature is  D  sabled by default. From 
    the drop-down menu, you can also select  LAN & W  reless, 
    which  performs  dynamic  routing  over  your  Ethernet  and 
    wireless  networks.  You  can  also  select WAN  (Internet), 
    which  performs  dynamic  routing  with  data  coming  from 
    the Internet. Selecting Both enables dynamic routing for 
    both networks, as well as data from the Internet.
    Stat c Rout  ng  To set up a static route between the Router 
    and  another  network,  select  a  number  from  the Static 
    Routing drop-down list. (A static route is a pre-determined 
    pathway that network information must travel to reach a 
    specific host or network.) Enter the information described 
    below to set up a new static route. (Click the  Delete Th  s 
    Entry button to delete a static route.)
    Enter  Route  Name Enter  a  name  for  the  Route  here, 
    using a maximum of 25 alphanumeric characters.
    Dest nat  on  LAN  IP  The  Destination  LAN  IP  is  the 
    address  of  the  remote  network  or  host  to  which  you 
    want to assign a static route.
    Subnet  Mask The  Subnet  Mask  determines  which 
    portion of a Destination LAN IP address is the network 
    portion, and which portion is the host portion. 
    •
    •
    •
    Default Gateway  This is the IP address of the gateway 
    device that allows for contact between the Router and 
    the remote network or host.
    Interface This  interface  tells  you  whether  the 
    Destination  IP  Address  is  on  the  LAN  &  W  reless 
    (Ethernet  and  wireless  networks)  or  the WAN 
    (Internet).
    Click  the Show  Rout  ng Table  button  to  view  the  Static 
    Routes you have already set up.
    Click the Save Sett  ngs button to apply your changes, or 
    click the Cancel Changes button to cancel your changes.
    Wireless > Basic Wireless Settings
    The  basic  settings  for  wireless  networking  are  set  on  this 
    screen.
    Wireless > Basic Wireless Settings
    Wireless Network
    W reless  Network  Mode  From  this  drop-down  menu, 
    you  can  select  the  wireless  standards  running  on  your 
    network.  If  you  have  both  802.11g  and  802.11b  devices 
    in  your  network,  keep  the  default  setting,  M  xed.  If  you 
    have  only  802.11g  devices,  select G-Only.  If  you  have 
    only  802.11b  devices,  select B-Only.  If  you  do  not  have 
    any  802.11g  and  802.11b  devices  in  your  network,  select 
    D
     sable
    .  SpeedBooster  works  automatically  with  all 
    settings,  providing  the  added  bonus  of  increased  speed 
    across your entire network and even greater speed when 
    you use SpeedBooster products only.
    NOTE:  SpeedBooster  ONLY  works  in 
    Infrastructure Mode.
    W reless Network Name (SSID)  The SSID is the network 
    name  shared  among  all  points  in  a  wireless  network. 
    The  SSID  must  be  identical  for  all  devices  in  the  wireless 
    network.  It  is  case-sensitive  and  must  not  exceed  
    32 characters (use any of the characters on the keyboard). 
    Make  sure  this  setting  is  the  same  for  all  points  in  your 
    •
    •    
    						
    							
    Chapter 3Advanced Configuration
    9
    W
    
    reless-G Broadband Router w
    
    th SpeedBooster
    wireless  network.  For  added  security,  you  should  change 
    the default SSID (
    l  nksys) to a unique name.
    W reless  Channel  Select  the  appropriate  channel  from 
    the list provided to correspond with your network settings. 
    All  devices  in  your  wireless  network  must  use  the  same 
    channel in order to communicate. 
    W reless  SSID  Broadcast  When  wireless  clients  survey 
    the local area for wireless networks to associate with, they 
    will detect the SSID broadcast by the Router. To broadcast 
    the Router’s SSID, keep the default setting, Enable. If you 
    do  not  want  to  broadcast  the  Router’s  SSID,  then  select 
    D
     sable
    .
    SecureEasySetup  If  you  did  not  utilize  this  network 
    connection feature during the Setup Wizard, you may use 
    it here by clicking the green logo. When you are prompted 
    to start the push button setup, click OK. 
    Reset  Secur ty  Use  this  button  to  reset  the  security 
    settings  on  your  network.  You  will  need  to  run 
    SecureEasySetup  again  on  each  device  on  your  network 
    to re-associate it with your network.
    Click the Save Sett  ngs button to apply your changes, or 
    click the Cancel Changes button to cancel your changes.
    Wireless > Wireless Security
    The  Wireless  Security  settings  configure  the  security  of 
    your  wireless  network.  There  are  six  wireless  security 
    mode  options  supported  by  the  Router:  WPA  Personal, 
    WPA Enterprise, WPA2 Personal, WPA2 Enterprise, RADIUS, 
    and  WEP.  (WPA  stands  for  Wi-Fi  Protected  Access,  which 
    is a security standard stronger than WEP encryption. WEP 
    stands for Wired Equivalent Privacy, while RADIUS stands 
    for  Remote  Authentication  Dial-In  User  Service.)  These 
    six  are  briefly  discussed  here.  For  detailed  instructions 
    on  configuring  wireless  security  for  the  Router,  refer  to  
    “Chapter 2: Wireless Security.”
    Wireless Security
    Security Mode
    Select  the  security  method  for  your  wireless  network.  If 
    you do not want to use wireless security, keep the default, 
    D
     sabled
    .
    WPA Personal
    NOTE:  If  you  are  using WPA,  always  remember 
    that each device in your wireless network MUST 
    use  the  same  WPA  method  and  shared  key,  or 
    else the network will not function properly.
    Security Mode > WPA Personal
    WPA Algor  thm  WPA supports two encryption methods, 
    TKIP  and  AES,  with  dynamic  encryption  keys.  Select  the 
    type of algorithm, TKIP or AES.  The default is TKIP.
    WPA  Shared  Key  Enter  a  WPA  Shared  Key  of  8-63 
    characters. 
    Group Key Renewal  Enter a Group Key Renewal period, 
    which instructs the Router how often it should change the 
    encryption keys. The default Group Key Renewal period is 
    3600 seconds.
    WPA Enterprise
    This  option  features  WPA  used  in  coordination  with  a 
    RADIUS server. (This should only be used when a RADIUS 
    server is connected to the Router.) 
    Security Mode > WPA Enterprise
    WPA Algor thm  WPA supports two encryption methods, 
    TKIP  and  AES,  with  dynamic  encryption  keys.  Select  the 
    type of algorithm, TKIP or AES. The default is TKIP.
    RADIUS  Server  Address  Enter  the  IP  Address  of  the 
    RADIUS server.
    RADIUS  Port   Enter  the  port  number  of  the  RADIUS 
    server.
    Shared  Key Enter  the  key  shared  between  the  Router 
    and the server.
    Key  Renewal  T  meout  Enter  a  Key  Renewal  Timeout 
    period,  which  instructs  the  Router  how  often  it  should 
    change  the  encryption  keys.  The  default  Key  Renewal 
    Timeout period is 3600 seconds.    
    						
    							
    Chapter 3Advanced Configuration
    0
    W
    
    reless-G Broadband Router w
    
    th SpeedBooster
    WPA2 Personal
    Security Mode > WPA2 Personal
    WPA Algor
     thm  WPA2 supports two encryption methods, 
    TKIP  and  AES,  with  dynamic  encryption  keys.  Select  the 
    type of algorithm, AES, or TKIP + AES. The default is AES.
    WPA  Shared  Key  Enter  a  WPA  Shared  Key  of  8-63 
    characters. 
    Group Key Renewal  Enter a Group Key Renewal period, 
    which instructs the Router how often it should change the 
    encryption keys. The default Group Key Renewal period is 
    3600 seconds.
    WPA2 Enterprise
    This  option  features  WPA2  used  in  coordination  with  a 
    RADIUS server. (This should only be used when a RADIUS 
    server is connected to the Router.)
    Security Mode > WPA2 Enterprise
    WPA Algor thm  WPA2 supports two encryption methods, 
    TKIP  and  AES,  with  dynamic  encryption  keys.  Select  the 
    type of algorithm, AES, or TKIP + AES. The default is AES.
    WPA Algor thm  WPA supports two encryption methods, 
    TKIP  and  AES,  with  dynamic  encryption  keys.  Select  the 
    type of algorithm, TKIP or AES. 
    RADIUS  Server  Address  Enter  the  IP  Address  of  the 
    RADIUS server.
    RADIUS  Port   Enter  the  port  number  of  the  RADIUS 
    server.
    Shared  Key Enter  the  key  shared  between  the  Router 
    and the server.
    Key  Renewal  T  meout  Enter  a  Key  Renewal  Timeout 
    period,  which  instructs  the  Router  how  often  it  should 
    change  the  encryption  keys.  The  default  Key  Renewal 
    Timeout period is 3600 seconds.
    RADIUS
    This  option  features  WEP  used  in  coordination  with  a 
    RADIUS server. (This should only be used when a RADIUS 
    server is connected to the Router.) 
    IMPORTANT: If  you  are  using  WEP  encryption, 
    always remember that each device in your wireless 
    network  MUST  use  the  same  WEP  encryption 
    method and encryption key, or else your wireless 
    network will not function properly.
    Security Mode > RADIUS
    RADIUS  Server  Address  Enter  the  IP  Address  of  the 
    RADIUS server.
    RADIUS  Port   Enter  the  port  number  of  the  RADIUS 
    server.
    Shared  Key Enter  the  key  shared  between  the  Router 
    and the server.
    Default  Transm  t  Key  Select  a  Default  Transmit  Key 
    (choose which Key to use). The default is .
    WEP  Encrypt on  Select  a  level  of  WEP  encryption,  
    64  b
    
    ts 
    
    0  hex  d
    
    g
    
    ts
      or   28  b  ts  26  hex  d  g  ts.  The 
    default is 64 b  ts   0 hex d  g  ts.
    Passphrase Enter a Passphrase to automatically generate  
    WEP keys. Then click the Generate button.
    Key  -4  If you did not enter a Passphrase, enter the WEP 
    key(s) manually.      
    						
    							
    Chapter 3Advanced Configuration
    
    W
    
    reless-G Broadband Router w
    
    th SpeedBooster
    WEP
    WEP is a basic encryption method, which is not as secure 
    as WPA. 
    Security Mode > WEP
    Default  Transm
     t  Key  Select  a  Default  Transmit  Key 
    (choose which Key to use). The default is .
    WEP Encrypt on  Select a level of WEP encryption,  64   b  ts 
    
    0  hex  d
    
    g
    
    ts
      or   28  b  ts  26  hex  d  g  ts.  The  default  is 
    64
     
    b
    
    ts 
    
    0 hex d
    
    g
    
    ts
    .
    Passphrase  Enter a Passphrase to automatically generate  
    WEP keys. Then click the Generate button.
    Key  -4  If you did not enter a Passphrase, enter the WEP 
    key(s) manually.
    Click the  Save Sett  ngs button to apply your changes, or 
    click the Cancel Changes button to cancel your changes. 
    Wireless > Wireless MAC Filter
    Wireless  access  can  be  filtered  by  using  the  MAC  addresses  of 
    the wireless devices transmitting within your network’s radius. 
    Wireless > Wireless MAC Filter
    Wireless MAC Filter
    W reless MAC F  lter  To filter wireless users by MAC Address, 
    either  permitting  or  blocking  access,  click Enable.  If  you  do 
    not  wish  to  filter  users  by  MAC  Address,  keep  the  default 
    setting, D  sable.
    Prevent Clicking this button will block wireless access by 
    MAC Address. This button is selected by default.
    Perm t  Only  Clicking  this  button  will  allow  wireless 
    access by MAC Address.
    Ed t  MAC  Address  F  lter  L  st  Clicking  this  button  will 
    open the MAC Address Filter List. On this screen, you can list 
    users, by MAC Address, to whom you wish to provide or block 
    access. For easy reference, click the  W  reless Cl  ent MAC L  st 
    button to display a list of network users by MAC Address.
    MAC Address Filter List
    Click the Save Sett  ngs button to apply your changes, or 
    click the Cancel Changes button to cancel your changes.
    Wireless > Advanced Wireless Settings
    This Wireless  >  Advanced  Wireless  Settings  screen  is  used 
    to set up the Router’s advanced wireless functions. These 
    settings should only be adjusted by an expert administrator 
    as incorrect settings can reduce wireless performance.     
    						
    							
    Chapter 3Advanced Configuration
    2
    W
    
    reless-G Broadband Router w
    
    th SpeedBooster
    Wireless > Advanced Wireless Settings
    Advanced Wireless
    Authent
     cat  on  Type  The  default  is  set  to Auto,  which 
    allows  either  Open  System  or  Shared  Key  authentication 
    to be used. With Open System authentication, the sender 
    and the recipient do NOT use a WEP key for authentication. 
    With Shared Key authentication, the sender and recipient 
    use a WEP key for authentication.
    Bas c Rate  The Basic Rate setting is not actually one rate 
    of  transmission  but  a  series  of  rates  at  which  the  Router 
    can transmit. The Router will advertise its Basic Rate to the 
    other wireless devices in your network, so they know which 
    rates will be used. The Router will also advertise that it will 
    automatically  select  the  best  rate  for  transmission.  The 
    default  setting  is Default,  when  the  Router  can  transmit 
    at all standard wireless rates (1-2Mbps, 5.5Mbps, 11Mbps, 
    18Mbps,  and  24Mbps).  Other  options  are   -2Mbps,  for 
    use  with  older  wireless  technology,  and All,  when  the 
    Router  can  transmit  at  all  wireless  rates.  The  Basic  Rate 
    is  not  the  actual  rate  of  data  transmission.  If  you  want  to 
    specify  the  Router’s  rate  of  data  transmission,  configure 
    the Transmission Rate setting.
    Transm ss  on Rate  The rate of data transmission should 
    be set depending on the speed of your wireless network. 
    You can select from a range of transmission speeds, or you 
    can select Auto to have the Router automatically use the 
    fastest  possible  data  rate  and  enable  the  Auto-Fallback 
    feature.  Auto-Fallback  will  negotiate  the  best  possible 
    connection  speed  between  the  Router  and  a  wireless 
    client. The default value is Auto.
    CTS  Protect on  Mode  CTS  (Clear-To-Send)  Protection 
    Mode should remain disabled unless you are having severe 
    problems  with  your  Wireless-G  products  not  being  able 
    to  transmit  to  the  Router  in  an  environment  with  heavy 
    802.11b  traffic.  This  function  boosts  the  Router’s  ability 
    to  catch  all  Wireless-G  transmissions  but  will  severely 
    decrease performance.
    Frame  Burst Enabling  this  option  should  provide  your 
    network  with  greater  performance,  depending  on  the 
    manufacturer  of  your  wireless  products.  To  turn  off  the 
    Frame Burst option, select  D  sable. The default is Enable.
    Beacon  Interval The  default  value  is   00.  Enter  a  value 
    between  1  and  65,535  milliseconds.  The  Beacon  Interval 
    value  indicates  the  frequency  interval  of  the  beacon.  A 
    beacon is a packet broadcast by the Router to synchronize 
    the wireless network.
    DTIM  Interval This  value,  between  1  and  255,  indicates 
    the  interval  of  the  Delivery  Traffic  Indication  Message 
    (DTIM).  A  DTIM  field  is  a  countdown  field  informing 
    clients  of  the  next  window  for  listening  to  broadcast 
    and  multicast  messages.  When  the  Router  has  buffered 
    broadcast  or  multicast  messages  for  associated  clients,  it 
    sends the next DTIM with a DTIM Interval value. Its clients 
    hear  the  beacons  and  awaken  to  receive  the  broadcast 
    and multicast messages. The default value is .
    Fragmentat on  Threshold  This  value  specifies  the 
    maximum  size  for  a  packet  before  data  is  fragmented 
    into  multiple  packets.  If  you  experience  a  high  packet 
    error  rate,  you  may  slightly  increase  the  Fragmentation 
    Threshold.  Setting  the  Fragmentation  Threshold  too  low 
    may  result  in  poor  network  performance.  Only  minor 
    reduction  of  the  default  value  is  recommended.  In  most 
    cases, it should remain at its default value of 2346.
    RTS Threshold Should  you  encounter  inconsistent  data 
    flow,  only  minor  reduction  of  the  default  value,  234 ,  is 
    recommended.  If  a  network  packet  is  smaller  than  the 
    preset  RTS  threshold  size,  the  RTS/CTS  mechanism  will 
    not  be  enabled. The  Router  sends  Request  to  Send  (RTS) 
    frames  to  a  particular  receiving  station  and  negotiates 
    the  sending  of  a  data  frame.  After  receiving  an  RTS,  the 
    wireless station responds with a Clear to Send (CTS) frame 
    to  acknowledge  the  right  to  begin  transmission. The  RTS 
    Threshold  value  should  remain  at  its  default  value  of 
    234
    
    .
    AP Isolat  on  This isolates all wireless clients and wireless 
    devices on your network from each other. Wireless devices 
    will be able to communicate with the Router but not with 
    each other. To use this function, select On. AP Isolation is 
    turned Off by default. 
    Secure  Easy  Setup  This  feature  allows  you  to  enable  or 
    disable  the  SecureEasySetup  feature.  Select  Disable  to 
    disable  the  feature  and  turn  off  the  button’s  light.  The 
    feature is enabled by default.
    Click the Save Sett  ngs button to apply your changes, or 
    click the Cancel Changes button to cancel your changes.
    Security > Firewall
    The Security > Firewall screen is used to configure a firewall 
    that can filter out various types of unwanted traffic on the 
    Router’s local network.    
    						
    							
    Chapter 3Advanced Configuration
    3
    W
    
    reless-G Broadband Router w
    
    th SpeedBooster
    Security > Firewall
    Firewall
    Block WAN Requests
    Block Anonymous Internet Requests
     This feature makes 
    it  more  difficult  for  outside  users  to  work  their  way  into 
    your network. This feature is Enabled by default. Deselect 
    the feature to allow anonymous Internet requests.
    F lter  Mult  cast  Multicasting  allows  for  multiple 
    transmissions  to  specific  recipients  at  the  same  time.  If 
    multicasting  is  permitted,  then  the  Router  will  allow  IP 
    multicast  packets  to  be  forwarded  to  the  appropriate 
    computers.  Select  F  lter  Mult  cast  to  filter  multicasting, 
    or deselect the feature to disable it.
    F lter  Internet  NAT  Red  rect  on  This  feature  uses 
    port  forwarding  to  block  access  to  local  servers  from 
    local  networked  computers.  Select  F  lter  Internet  NAT 
    Red  rect  on
     to filter Internet NAT redirection, or deselect 
    the feature to disable it.
    F lter IDENT (Port   3)  This feature keeps port 113 from 
    being  scanned  by  devices  outside  of  your  local  network. 
    Select F  lter  INDENT  (Port   3)  to  filter  port  113,  or 
    deselect the feature to disable it.
    Click the Save Sett  ngs button to apply your changes, or 
    click the Cancel Changes button to cancel your changes.
    Security > VPN Passthrough
    Security > VPN Passthrough
    The Security > VPN Passthrough screen allows you to enable 
    VPN  tunnels  using  IPSec,  PPTP,  or  L2TP  protocols  to  pass 
    through the Router’s firewall.
    VPN Passthrough
    IPSec  Passthrough  Internet  Protocol  Security  (IPSec)  is 
    a  suite  of  protocols  used  to  implement  secure  exchange 
    of  packets  at  the  IP  layer.  To  allow  IPSec  tunnels  to  pass 
    through the Router, keep the default, Enable. 
    PPTP  Passthrough  Point-to-Point  Tunneling  Protocol 
    (PPTP)  allows  the  Point-to-Point  Protocol  (PPP)  to  be 
    tunneled through an IP network. To allow PPTP tunnels to 
    pass through the Router, keep the default, Enable. 
    L2TP  Passthrough Layer  2  Tunneling  Protocol  is  the 
    method  used  to  enable  Point-to-Point  sessions  via  the 
    Internet on the Layer 2 level. To allow L2TP tunnels to pass 
    through the Router, keep the default, Enable.
    Click the Save Sett  ngs button to apply your changes, or 
    click the Cancel Changes button to cancel your changes.
    Access Restrictions > Internet Access
    The Access Restrictions > Internet Access screen allows you 
    to  block  or  allow  specific  kinds  of  Internet  usage  and 
    traffic,  such  as  Internet  access,  designated  services,  and 
    websites during specific days and times.
    Access Restrictions > Internet Access
    Internet Access
    Internet  Access  Pol  cy  Access  can  be  managed  by  a 
    policy.  Use  the  settings  on  this  screen  to  establish  an 
    access  policy  (after  the Save  Sett  ngs  button  is  clicked). 
    Selecting a policy from the drop-down menu will display 
    that  policy’s  settings.  To  delete  a  policy,  select  that      
    						
    							
    Chapter 3Advanced Configuration
    4
    W
    
    reless-G Broadband Router w
    
    th SpeedBooster
    policy’s  number  and  click  the Delete  button.  To  view  all 
    the  policies,  click  the Summary  button.  (Policies  can  be 
    deleted from the Summary screen by selecting the policy 
    or policies and clicking the Delete button. To return to the 
    Internet Access tab, click the Close button.)
    Internet Policy Summary
    Status
     Policies are disabled by default. To enable a policy, 
    select the policy number from the drop-down menu, and 
    select Enable.
    To create an Internet Access policy:
    Select  a  number  from  the Internet  Access  Policy  drop-
    down menu.
    To enable this policy, select Enable.
    Enter a Policy Name in the field provided. 
    Click  the  Ed  t  L  st  of  PCs  button  to  select  which  PCs 
    will  be  affected  by  the  policy.  The List  of  PCs  screen 
    appears.  You  can  select  a  PC  by  MAC  Address  or  IP 
    Address.  You  can  also  enter  a  range  of  IP  Addresses 
    if  you  want  this  policy  to  affect  a  group  of  PCs.  After 
    making your changes, click the  Save Sett  ngs button 
    to  apply  your  changes  or Cancel  Changes  to  cancel 
    your changes. Then click the Close button. 
    List of PCs
    Select  the  appropriate  option, Deny  or Allow, 
    depending  on  whether  you  want  to  block  or  allow 
    Internet access for the PCs you listed on the List of PCs 
    screen.
    1.
    2.
    3.
    4.
    5.
    Decide which days and what times you want this policy 
    to be enforced. Select the individual days during which 
    the  policy  will  be  in  effect,  or  select Everyday.  Then 
    enter  a  range  of  hours  and  minutes  during  which  the 
    policy will be in effect, or select 24 Hours.
    Select  any  Blocked  Services  or  Website  Blocking  you 
    wish to use.
    Click  the Save  Sett  ngs  button  to  save  the  policy’s 
    settings, or click the Cancel Changes button to cancel 
    the policy’s settings.
    Blocked Services
    You can filter access to various services accessed over the 
    Internet, such as FTP or telnet, by selecting services from 
    the  drop-down  menus  next  to Blocked  Services.  (You  can 
    block up to 20 services.) Then enter the range of ports you 
    want to filter.
    If the service you want to block is not listed or you want to 
    edit  a  service’s  settings,  then  click  the  Add/Ed  t  Serv  ce 
    button. Then the Port Services screen will appear.
    Port Services
    To  add  a  service,  enter  the  service’s  name  in  the Service 
    Name  field.  Select  its  protocol  from  the Protocol  drop-
    down  menu,  and  enter  its  range  in  the Port  Range  fields. 
    Then click the Add button.
    To  modify  a  service,  select  it  from  the  list  on  the  right. 
    Change  its  name,  protocol  setting,  or  port  range.  Then 
    click the Mod  fy button.
    To delete a service, select it from the list on the right. Then 
    click the Delete button.
    When you are finished making changes on the Port Services 
    screen, click the Apply button to save the changes. If you 
    want  to  cancel  your  changes,  click  the Cancel  button. 
    To  close  the Port  Services  screen  and  return  to  the Access 
    Restrictions screen, click the Close button.
    Website Blocking by URL Address
    If you want to block websites with specific URL addresses, 
    enter each URL in a separate field next to Website Blocking 
    by URL Address.
    6.
    7.
    8.     
    						
    							
    Chapter 3Advanced Configuration
    5
    W
    
    reless-G Broadband Router w
    
    th SpeedBooster
    Website Blocking by Keyword
    If  you  want  to  block  websites  using  specific  keywords, 
    enter  each  keyword  in  a  separate  field  next  to Website 
    Blocking by Keyword.
    Click the 
    Save Sett  ngs button to apply your changes, or 
    click Cancel Changes to cancel your changes. 
    Applications and Gaming > Port Range 
    Forward
    The  Applications  &  Gaming  >  Port  Range  Forward  screen 
    allows you to set up public services on your network, such as 
    web servers, ftp servers, e-mail servers, or other specialized 
    Internet  applications.  (Specialized  Internet  applications  are 
    any applications that use Internet access to perform functions 
    such as videoconferencing or online gaming. Some Internet 
    applications may not require any forwarding.)
    Applications and Gaming > Port Range Forward
    Port Range Forward
    To  forward  a  port,  enter  the  information  on  each  line  for 
    the criteria required.
    Appl cat  on  In this field, enter the name you wish to give 
    the application. Each name can be up to 12 characters.
    Start/End This  is  the  port  range.  Enter  the  number  that 
    starts the port range in the Start column and the number 
    that ends the range in the End column.
    Protocol Select  the  protocol  used  for  this  application, 
    either TCP or UDP, or Both.
    IP  Address  For  each  application,  enter  the  IP  Address  of 
    the PC running the specific application.
    Enable Select Enable  to  enable  port  forwarding  for  the 
    relevant application.
    Click the  Save Sett  ngs button to apply your changes, or 
    click Cancel Changes to cancel your changes. 
    Applications & Gaming > Port Triggering
    The Applications & Gaming > Port Triggering screen allows 
    the  Router  to  watch  outgoing  data  for  specific  port 
    numbers. The  IP  address  of  the  computer  that  sends  the 
    matching data is remembered by the Router, so that when 
    the requested data returns through the Router, the data is 
    pulled back to the proper computer by way of IP address 
    and port mapping rules.
    Applications and Gaming > Port Triggering
    Port Triggering
    Appl cat  on  Enter the application name of the trigger.
    Triggered Range
    For each application, list the triggered port number range. 
    Check  with  the  Internet  application  documentation  for 
    the port number(s) needed.
    Start Port Enter the starting port number of the Triggered 
    Range.
    End Port Enter the ending port number of the Triggered 
    Range.
    Forwarded Range
    For  each  application,  list  the  forwarded  port  number 
    range. Check with the Internet application documentation 
    for the port number(s) needed.
    Start  Port  Enter  the  starting  port  number  of  the 
    Forwarded Range.
    End Port Enter the ending port number of the Forwarded 
    Range.
    Enable Select Enable  to  enable  port  triggering  for  the 
    applicable application.
    Click the  Save Sett  ngs button to apply your changes, or 
    click Cancel Changes to cancel your changes.     
    						
    							
    Chapter 3Advanced Configuration
    6
    W
    
    reless-G Broadband Router w
    
    th SpeedBooster
    Applications and Gaming > DMZ
    The  DMZ  feature  allows  one  network  computer  to  be 
    exposed  to  the  Internet  for  use  of  a  special-purpose 
    service  such  as  Internet  gaming  or  videoconferencing. 
    DMZ  hosting  forwards  all  the  ports  at  the  same  time  to 
    one  PC.  The  Port  Range  Forward  feature  is  more  secure 
    because it only opens the ports you want to have opened, 
    while  DMZ  hosting  opens  all  the  ports  of  one  computer, 
    exposing the computer to the Internet. 
    Applications and Gaming > DMZ
    DMZ
    Any PC whose port is being forwarded must have its DHCP 
    client  function  disabled  and  should  have  a  new  static  IP 
    address assigned to it because its IP address may change 
    when using the DHCP function.
    To  expose  one  PC,  select Enable.  Then,  enter  the 
    computer’s IP address in the DMZ Host IP Address field.
    Click the 
    Save Sett  ngs button to apply your changes, or 
    click Cancel Changes to cancel your changes. 
    Applications and Gaming > QoS
    Quality  of  Service  (QoS)  ensures  better  service  to 
    high-priority  types  of  network  traffic,  which  may 
    involve  demanding,  real-time  applications,  such  as 
    videoconferencing. 
    There  are  three  types  of  QoS  available:  Device  Priority, 
    Ethernet Port Priority, and Application Priority.
    QoS
    Enable/D sable  To enable QoS, select Enable. Otherwise, 
    select D  sable.
    Upstream  Bandw  dth  Select Auto  or Manual  from 
    the  drop-down  menu.  Manual  allows  you  to  specify  the 
    maximum  outgoing  bandwidth  that  applications  can 
    utilize.
    Applications and Gaming > QoS
    Device Priority
    Enter the name of your network device in the Device name 
    field,  enter  its  MAC  Address,  and  then  select  its  priority 
    from the drop-down menu.
    Ethernet Port Priority
    Ethernet  Port  Priority  QoS  allows  you  to  prioritize 
    performance for the Router’s four ports, LAN Ports 1-4.  For 
    each port, select  the priority and flow control setting.
    Pr or  ty  Select H  gh  or Low  in  the  Priority  column.  The 
    Router’s  four  ports  have  been  assigned  low  priority  by 
    default. 
    Flow  Control  If  you  want  the  Router  to  control  the 
    transmission  of  data  between  network  devices,  select 
    Enable.  To  disable  this  feature,  select  D  sable.  Ethernet 
    Port  Priority  QoS  does  not  require  support  from  your  ISP 
    because  the  prioritized  ports  LAN  ports  1-4  are  in  your 
    network.
    Application Priority
    Application  Priority  QoS  manages  information  as  it  is 
    transmitted  and  received.  Depending  on  the  settings  of 
    the QoS screen, this feature will assign information a high 
    or low priority for the applications that you specify.    
    						
    All Linksys manuals Comments (0)

    Related Manuals for Linksys Router WRT54GS User Manual