USING THE WEB-BASED ADVANCED USER INTERFACE
41
Using the Accept “ANY” SSID Feature
Note: This advanced feature should be employed by advanced users only. A feature
of wireless networking is the ability to scan for networks and connect to them
easily. For instance, you can set up a wireless-equipped computer to connect to
and an SSID called “ANY”. This forces the wireless network adapter in the computer
to look for any network in the area and connect to it. For ease-of-use this is very
convenient, but in some cases you may want users to have to specify the name of
the network. You can program the Router to reject a wireless-equipped computer
looking for an SSID of “ANY”. Remove the check mark in the box next to “Accept
‘ANY’ SSID”, then click “Apply Changes”. The change is immediate. Each computer
now needs to be set to connect to your specific SSID; an SSID of “ANY” will no
longer be accepted. Refer to the documentation of your wireless network adapter
for information on making this change.
Using the Broadcast SSID Feature
Note: This advanced feature should be employed by advanced users only. For
security, you can choose not to broadcast your network’s SSID. Doing so will keep
your network name hidden from computers that are scanning for the presence of
wireless networks. To turn off the broadcast of the SSID, remove the check mark
from the box next to “Broadcast SSID”, then click “Apply Changes”. The change is
immediate. Each computer now needs to be set to connect to your specific SSID;
an SSID of “ANY” will no longer be accepted. Refer to the documentation of your
wireless network adapter for information on making this change.
Changing the Wireless Encryption Settings
Clicking on the “Encryption” link in the “Wireless” tab will take you to the
Encryption settings screen. To make setting up your network for the first time easy,
the Router ships with encryption turned off. If you wish to turn on encryption, you
can do so from this page. Turning on encryption will require you to set each of
your wireless-equipped computers with the same encryption settings that you
make in the Router. Refer to the documentation of your wireless network adapter
for information on making this change.
There are two types of encryption to choose from: 64-bit and 128-bit encryption.
Using encryption will make your network more secure, but will slow down the
network performance. Although network performance will be reduced, it is likely
the change will not be detectable to users of the network.
USING THE WEB-BASED ADVANCED USER INTERFACE
42
Setting Encryption Automatically Using a Passphrase
Note to Mac users: The Passphrase option will not operate with Apple® AirPort®. To
configure encryption for your Mac computer, set the encryption using the manual
method described in the next section.
1. Select “64-bit
automatically” or
“128-bit
automatically” from
the drop-down menu.
2. Type in a passphrase. A passphrase is like a password. It can be a mixture
of numbers and letters. After you type in your passphrase, click
“Generate”. When you click “Generate”, the key fields below will become
populated. Note:
64-bit encryption
will generate four
keys and 128-bit
encryption will
generate only one
key. Select the
key you want to
use by clicking
the radio button
next to it. Click
“Apply Changes”.
3. Encryption in the Router is now set. Each of your computers on your
wireless network will now need to be configured with the same
passphrase. Refer to the documentation of your wireless network adapter
for information on making this change.
USING THE WEB-BASED ADVANCED USER INTERFACE
43
Setting Encryption Manually Using a Hexadecimal Key
A hexadecimal key is a mixture of numbers and letters from A–F and 0–9. 64-bit
keys are five 2-digit numbers. 128-bit keys are 13 2-digit numbers.
For instance:
AF 0F 4B C3 D4 = 64-bit key
C3 03 0F AF 0F 4B B2 C3 D4 4B C3 D4 E7 = 128-bit key
In the boxes below, make up your key by writing in two characters between A–F
and 0–9. You will use this key to program the encryption settings on your Router
and your wireless computers.
Note to Mac users: Original Apple AirPort products support 64-bit encryption only.
Apple AirPort 2 products can support 64-bit or 128-bit encryption. Please check
your product to see which version you are using. If you cannot configure your
network with 128-bit encryption, try 64-bit encryption.
1. Select “64-bit
manually” or “128-bit
manually” from the
drop-down menu.
2. If using 64-bit
encryption, there will
be four key fields. If
using 128-bit
encryption, there will
be one key field. In
the key field(s), type in the hexadecimal key(s) that you wish to use.
When finished typing in your keys, select which key you want to use by
clicking the radio button next to it. Click “Apply Changes”.
3. Encryption in the Router is now set. Each of your computers on your
wireless network will now need to be configured with the same
hexadecimal key. Refer to the documentation of your wireless network
adapter for information on making this change.
USING THE WEB-BASED ADVANCED USER INTERFACE
44
Using the Access Point Mode
Note: This advanced feature should be employed by advanced users only. The
Router can be configured to work as a wireless network access point. Using this
mode will defeat the NAT IP sharing feature and DHCP server. In AP mode, the
Router will need to be configured with an IP address that is in the same subnet
as the rest of the network that you will bridge to. The default IP address is
192.168.2.254 and subnet mask is 255.255.255.0. These can be customized for
your need.
1. Enable the AP mode my selecting “Enable” in the “Use as Access Point only”
page. When you select this option, you will be able to change the IP
settings.
2. Set your IP settings to match your network. Click “Apply Changes”.
3. Connect a cable from the WAN port on the Router to your existing network.
The Router is now acting as an Access Point. To access the Router advanced
user interface again, type the IP address you specified into your browser’s
navigation bar. You can set the encryption settings, MAC address filtering,
SSID and channel normally.
USING THE WEB-BASED ADVANCED USER INTERFACE
45
Configuring the Firewall
Your Router is equipped with a firewall that will protect your network from a
wide array of common hacker attacks including:
• IP Spoofing
• Land Attack
• Ping of Death (PoD)
• Denial of Service (DoS)
• IP with zero length
• Smurf Attack
• TCP Null Scan
• SYN flood
• UDP flooding
• Tear Drop Attack
• ICMP defect
• RIP defect
• Fragment flooding
The firewall also masks common ports that are frequently used to attack networks.
These ports appear to be “Stealth” meaning that for all intents and purposes, they
do not exist to a would-be hacker. You can turn the firewall function off if needed,
however, it is recommended that you leave the firewall enabled. Disabling the
firewall protection will not leave your network completely vulnerable to hacker
attacks, but it is recommended that you leave the firewall enabled.
USING THE WEB-BASED ADVANCED USER INTERFACE
46
Configuring the Port Forwarding Settings
Application gateways let you select ports to be open for certain applications to
work properly with the Network Address Translation (NAT) feature of the Router.
A list of popular applications has been included to choose from. You can select
an application from the drop-down list and the proper settings will be
programmed into the Router. If the application you want to set up for is not
here, check the “Virtual Servers” page by clicking “Virtual Servers” on the left
side of the screen. If you cannot find your application in either the “Application
Gateways” screen or the “Virtual Servers” screen, you will need to check with the
application vendor to determine which ports need to be configured. You can
manually input this port information into the Router.
USING THE WEB-BASED ADVANCED USER INTERFACE
47
Choosing an Application
Select your application from the drop-down list. Click “Add”. The settings will be
transferred to the next available space in the screen. Click “Apply Changes” to
save the setting for that application. To remove an application, select the
number of the row that you want to remove then click “Clear”.
USING THE WEB-BASED ADVANCED USER INTERFACE
48
Configuring Internal Forwarding Settings
The Virtual Servers function will allow you to route external (Internet) calls for
services such as a web server (port 80), FTP server (Port 21), or other
applications through your Router to your internal network. Since your internal
computers are protected by a firewall, computers outside your network (over the
Internet) cannot get to them because they cannot be “seen”. A list of common
applications has been provided in case you need to configure the Virtual Server
function for a specific application. If your application is not listed, you will need
to contact the application vendor to find out which port settings you need.
USING THE WEB-BASED ADVANCED USER INTERFACE
49
Choosing an Application
Select your application from the drop-down list. Click “Add”. The settings will be
transferred to the next available space in the screen. Click “Apply Changes” to
save the setting for that application. To remove an application, select the
number of the row that you want to remove then click “Clear”.
Manually Entering Settings into the Virtual Server
To manually enter settings, enter the IP address in the space provided for the
internal (server) machine, the port(s) required to pass (use a comma between
multiple ports), select the port type (TCP or UDP), and click “Apply Changes”.
You can only pass one port per internal IP address. Opening ports in your
firewall can pose a security risk. You can enable and disable settings very
quickly. It is recommended that you disable the settings when you are not
using a specific application.
USING THE WEB-BASED ADVANCED USER INTERFACE
50
Setting Client IP Filters
The Router can be configured to restrict access to the Internet, e-mail, or other
network services at specific days and times. Restriction can be set for a single
computer, a range of computers, or multiple computers.
To restrict Internet access to a single computer for example, enter the IP address
of the computer you wish to restrict access to in the IP fields
(1). Next, enter
“88” in both the port fields
(2). Select “Both” (3). Select “Block” (4). You can
also select “Always” to block access all of the time. Select the day to start on
top (5), the time to start on top (6), the day to end on the bottom (7), and
the time to stop
(8) on the bottom. Select “Enable” (9). Click “Apply Changes”.
The computer at the IP address you specified will now be blocked from Internet
access at the times you specified. Note: Be sure you have selected the correct
time zone under “Utilities> System Settings> Time Zone”.
(1) (2)
(9)
(3) (4) (7) (8)
(5) (6)
USING THE WEB-BASED ADVANCED USER INTERFACE
51
Setting MAC Address Filtering
The MAC address filter is a powerful security feature that allows you to specify
which computers are allowed on the network. Any computer attempting to
access the network that is not specified in the filter list will be denied access.
When you enable this feature, you must enter the MAC address of each client
(computer) on your network to allow network access to each. The “Block”
feature lets you turn on and off access to the network easily for any computer
without having to add and remove the computer’s MAC address from the list.
To enable this feature, select “Enable MAC Address Filtering”
(1). Next, enter the
MAC address of each computer on your network by clicking in the space provided
(2) and entering the MAC address of the computer you want to add to the list.
Click “Add”
(3), then “Apply Changes” to save the settings. To delete a MAC
address from the list, simply click “Delete” next to the MAC address you wish to
delete. Click “Apply Changes” to save the settings.
Note: You will not be able to delete the MAC address of the computer you are using
to access the Router's administrative functions (the computer you are using now).
(3)
(1)
(2)
USING THE WEB-BASED ADVANCED USER INTERFACE
52
Enabling the Demilitarized Zone (DMZ)
The DMZ feature allows you to specify one computer on your network to be
placed outside of the firewall. This may be necessary if the firewall is causing
problems with an application such as a game or video conferencing application.
Use this feature on a temporary basis. The computer in the DMZ is NOT protected
from hacker attacks.
To put a computer in the DMZ, enter the last digits of its IP address in the IP
field and select “Enable”. Click “Apply Changes” for the change to take effect. If
you are using multiple static WAN IP addresses, it is possible to select which
WAN IP address the DMZ host will be directed to. Type in the WAN IP address you
wish the DMZ host to direct to, enter the last two digits of the IP address of the
DMZ host computer, select “Enable” and click “Apply Changes”.
USING THE WEB-BASED ADVANCED USER INTERFACE
53
Blocking an ICMP Ping
Computer hackers use what is known as “pinging” to find potential victims on
the Internet. By pinging a specific IP address and receiving a response from the
IP address, a hacker can determine that something of interest might be there.
The Router can be set up so it will not respond to an ICMP ping from the
outside. This heightens the level of security of your Router.
To turn off the ping response, select “Block ICMP Ping” (1) and click “Apply
Changes”. The Router will not respond to an ICMP ping.
(1)