SMC Networks Router SMCWBR14-N User Manual
Here you can view all the pages of manual SMC Networks Router SMCWBR14-N User Manual. The SMC Networks manuals for Router are available online for free. You can easily download all the documents as PDF.
Page 51
38 Advanced_WEB Filter This section is where you add the Web sites to be used for Access Control. The Web sites listed here are used when the Web Filter option is enabled in Access Control. The Web Filter section is one of two means by which you can specify the web sites you want to allow. You also have the alternative of using the Sentinel Parental Controls Service, which allows you to specify broad categories of web sites and saves you the trouble of entering specific web site URLs. For more...
Page 52
39 Enable Entries in the Allowed Web Site List can be activated or deactivated with this checkbox. New entries are activated by default. Save Saves the new or edited Allowed Web Site in the following list. When finished updating the Allowed Web Site List, you must still click the Save Settings button at the top of the page to make the changes effective and permanent. Allowed Web Site List The section lists the currently allowed web sites. An allowed web site can be changed by clicking...
Page 53
40 Advanced_MAC Address Filter The MAC address filter section can be used to filter network access by machines based on the unique MAC addresses of their network adapter(s). It is most useful to prevent unauthorized wireless devices from connecting to your network. A MAC address is a unique ID assigned by the manufacturer of the network adapter. Enable MAC Address Filter When this is enabled, computers are granted or denied network access depending on the mode of the filter....
Page 54
41 Filter Wired Clients When this is selected, the MAC address filters will be applied to wired network clients. Add/Edit MAC Address In this section, you can add entries to the MAC Address List below, or edit existing entries. Enable MAC address entries can be activated or deactivated with this checkbox. MAC Address Enter the MAC address of the desired computer or connect to the router from the desired computer and click the Copy Your PC’s MAC Address button. Save Saves the...
Page 55
42 Advanced_Firewall The router provides a tight firewall by virtue of the way NAT works. Unless you configure the router to the contrary, the NAT does not respond to unsolicited incoming requests on any port, thereby making your LAN invisible to Internet cyber attackers. However, some network applications cannot run with a tight firewall. Those applications need to selectively open ports in the firewall to function correctly. The options on this page control several ways of opening the firewall to...
Page 56
43 Firewall Settings Enable SPI SPI (stateful packet inspection also known as dynamic packet filtering) helps to prevent cyber attacks by tracking more state per session. It validates that the traffic passing through that session conforms to the protocol. When the protocol is TCP, SPI checks that packet sequence numbers are within the valid range for the session, discarding those packets that do not have valid sequence numbers. Whether SPI is enabled or not, the router always tracks TCP...
Page 57
44 Controls endpoint filtering for packets of the TCP protocol. DMZ Host DMZ means Demilitarized Zone. If an application has trouble working from behind the router, you can expose one computer to the Internet and run the application on that computer. When a LAN host is configured as a DMZ host, it becomes the destination for all incoming packets that do not match some other incoming session or rule. If any other ingress rule is in place, that will be used instead of sending packets to the...
Page 58
45 then you may want to make a static reservation on the Basic → Network Settings page so that the IP address of the DMZ computer does not change. Non-UDP/TCP/ICMP LAN Sessions When a LAN application that uses a protocol other than UDP, TCP, or ICMP initiates a session to the Internet, the routers NAT can track such a session, even though it does not recognize the protocol. This feature is useful because it enables certain applications (most importantly a single VPN connection to a remote...
Page 59
46 must also be enabled when the Windows Messenger ALG is enabled. FTP Allows FTP clients and servers to transfer data across NAT. Refer to the Advanced → Virtual Server page if you want to host an FTP server. H.323 (Netmeeting) Allows H.323 (specifically Microsoft Netmeeting) clients to communicate across NAT. Note that if you want your buddies to call you, you should also set up a virtual server for NetMeeting. Refer to the Advanced → Virtual Server page for information on how to set up...
Page 60
47 Advanced_Inbound Filter When you use the Virtual Server, Gaming, or Remote Administration features to open specific ports to traffic from the Internet, you could be increasing the exposure of your LAN to cyber attacks from the Internet. In these cases, you can use Inbound Filters to limit that exposure by specifying the IP addresses of internet hosts that you trust to access your LAN through the ports that you have opened. You might, for example, only allow access to a game server on your home...