Blocked URLs/keywords entries will be listed in the table as shown below.
Select an entry using the “Select” checkbox.
77
III-3-6-2. Access Control
Access Control (MAC filtering) can also be configured from
III-3-5-4. Access Control.
Access Control is a security feature that can help to prevent unauthorized
users from connecting to your wireless router.
This function allows you to define a list of network devices permitted or
denied to connect to the BR-6428nS V3/BR-6228nS V3. Devices are each
identified by their unique MAC address or IP address. Specific services can
also be allowed/denied for IP addresses.
Check/uncheck the “Enable MAC Filtering” and/or “Enable IP Filtering” box to
enable/disable MAC filtering and/or IP filtering.
78
MAC Filtering:
Enable MAC
Check the box to enable MAC filtering and
specified MAC address.
Client PC MAC
Enter
a
MAC address of c
omputer or network
‘
aabbccddeeff
’.
Computer Name
Select a computer name from the drop
-
down
it manually.
Comment
Enter a comment for reference/identification
characters.
Add
Click “Add”
to add the MAC address to the
MAC add
ress filtering table.
Delete Selected
/
Delete All
Delete selected or all entries from the table.
Filtering
Address
select whether to “Deny” or “Allow” access for
device manually without dashes or colons e.g.
for MAC address ‘aa-bb-cc-dd-ee-ff’ enter
list and click “<<” to add its MAC address into
the “Client PC Mac Address” field.
Click “Refresh’ in the drop-down menu to
refresh the list of available MAC addresses. If
the address you wish to add is not listed, enter
consisting of up to 16 alphanumerical
MAC address entries will be listed in the table as shown below. Select an entry
using the “Select” checkbox.
79
IP Filtering:
Enable IP Filtering
Chec
k the box to enable IP filtering and select
specified IP address.
Add PC
Opens a new window to add a new IP to the
to above.
whether to “Deny” or “Allow” access for
list, to deny or allow access/services according
80
Client PC
Description
Enter a desc
ription for reference/identification
of up to 16 alphanumeric characters.
Client PC IP address
Enter a
startin
g IP address in the left field
and
the end IP address in the right field to define a
the left fi
eld
only
to define a single IP address.
Service Name
Various services are listed here with a short
service you wish to select.
Protocol
Select protocol “TCP” or “UDP” or “Both” for a
list.
Port Range
Enter the port range for the service not
110,115
,120.
Add
Click “Add”
to add
selected services or a user
defined service to the IP filtering table.
Delete Selected/
Delete All
Delete selected or all entries from the table.
range of IP addresses; or enter an IP address in
description. Check/uncheck the box for each
service not included in the “Client PC Service”
included in the “Client PC Service” list.
Enter a single port number e.g. 110, a range of
port numbers e.g. 110-120, or multiple port
numbers separated by a comma e.g.
IP filtering entries will be listed in the IP filtering table shown below.
81
III-3-6-3. DMZ
Enable DMZ
Check/uncheck the box to
enable/disable the
device’s DMZ function.
Public
Select “Dynamic IP” or “Static IP” here.
want to map to a specific private IP addr
ess.
Client PC
Enter the private IP address that the internet IP
address will be mapped to.
Computer Name
Select a computer name from the list and click
field (above).
Add
Click
“
Add
” to add the client t
o the
“
Current
DMZ Table
”.
A Demilitarized Zone (DMZ) is an isolated area in your local network where
private IP addresses are mapped to specified Internet IP addresses, allowing
unrestricted access to the private IP addresses but not to the wider local
network.
You can define a virtual DMZ host here. This is useful for example, if a
network client PC cannot run an application properly from behind an NAT
firewall, since it opens the client up to unrestricted two-way access.
For “Dynamic IP” select an Internet connection
session from dropdown menu.
For “Static IP” enter the IP address that you
“<<” to enter its IP address into the “Client PC”
82
DMZ entries will be displayed in the table shown below:
Delete Selected/
Delete All
Delete selected or all entries from the table.
III-3-6-4. DoS
Denial-of-Service (DoS) is a common form of malicious attack against a
network. The router’s firewall can protect against such attacks.
If you are not familiar with these functions, it is recommended you keep the
default settings.
83
Ping of Death
Specify the frequency of ping of death packets
which will trigger the router’s DoS protection
function.
Discard Ping from
WAN
Check this box and the router will not answer
ping requests from the Internet.
Port Scan
Intruders use “port scanners” to detect open
port scan to prevent.
S
ync Flood
Specify the frequency of sync flood packets
which will trigger the DoS protection function.
Internet IP address ports. Check each type of
84
III-3-7. QoS
Total Download
E
nter your total download bandwidth limit
kbits.
Total Upload
Bandwidth
Enter your total upload bandwidth limit from
your Internet service provider (ISP) in kbits.
Add
Opens a new window to add a new QoS rule
t
o the current QoS table.
Quality of Service (QoS) is a feature to manage
Internet bandwidth efficiently. Some applications
require more bandwidth than others to function
properly, and QoS allows you to ensure that sufficient
bandwidth is available. Minimum or maximum bandwidth can be guaranteed
for a specified application.
QoS can improve the
performance. QoS is recommended to optimize performance for
online gaming.
BR-6428nS V3/BR-6228nS V3
’s
III-3-7-1. QoS
Check/uncheck the box “Enable QoS” to enable/disable the QoS function.
Click “Add” to open a new window and setup a QoS rule. The “Current QoS
Table” displays all QoS rules.
Bandwidth
from your Internet service provider (ISP) in
85
Rule Name
Enter a name for the QoS rule for
reference/identification.
Bandwidth
Set the
bandwidth limits for the
QoS rule:
(maximum).
Local IP Address
Enter
the IP address range
to which the
QoS
IP address.
(1) (2) (3)
1. Select “Download” or “Upload” for the
QoS rule.
2. Enter the bandwidth limit.
3. Select whether the bandwidth is a
“Guarantee” (minimum) or “Max”
rule will be applied.
Enter a starting IP address in the left field
and the end IP address in the right field to
define a range of IP addresses; or enter an IP
address in the left field only to define a single
86
Local Port Range
Enter
the port range
to activate the QoS rule.
Enter a single port number e.g. 110 or a
range of port numbers e.g. 11
0-120
Remote IP Address
Enter
the
remote
IP address range
which will
IP address.
Remote Port Range
Enter
the
remote
port range
to activate the
range of port numbers e.g. 110
-
120
Traffic Type
Select
traffic type as an alternative to
specifying a
po
rt range above.
Protocol
Select a “
TCP
” or “UDP
” protocol type
.
Save
Click ‘add’ button to add a new QoS rule
(detailed instructions will be given below).
Edit
Edit a selected rule.
Delete Selected/
Delete All
Delete selected or all entries from the
table.
Move Up/Down
Move selected rule up
or down the list.
activate the QoS rule.
Enter a starting IP address in the left field
and the end IP address in the right field to
define a range of IP addresses; or enter an IP
address in the left field only to define a single
QoS rule.
Enter a single port number e.g. 110 or a
QoS rule entries will be listed in the “Current QoS Table” as shown below.
Select a rule using the “Select” checkbox.
When using the “Edit” button only one rule can be selected each
time.
QoS rules will be processed in the order that they are listed i.e.
the rule at the top of the list will be applied first, and then the
second rule etc. The order can be adjusted using the “Move
Up/Down” buttons.
87
III-3-7-2. iQoS
Total Download
Enter your total download bandwidth limit
kbits.
Total Upload
Bandwidth
Enter you
r total
upload
bandwidth limit from
your Internet service provider (ISP) in kbits.
iQoS is a more intuitive and automated tool to manage internet bandwidth
than manually configuring the settings using QoS. For online gamers or users
with bandwidth requirements for audio/video, iQoS is a useful function.
iQoS cannot be used in conjunction with QoS and vice-versa.
When one is enabled, the other is automatically disabled.
Check/uncheck the box “Enable iQoS” to enable/disable the iQoS function,
and then enter your bandwidth limits and arrange the network application
icons in priority order in the “Current iQoS Table”. Icons with higher priority
will be assigned bandwidth more efficiently for better performance.
Bandwidth
from your Internet service provider (ISP) in
88
The icons represent the following categories:
Internet Browsing
P2P/BT Downloads
FTP
Multimedia
Online Gaming
The iQoS table is ordered left to right, high to low priority. Click a small icon
below the table to insert it into the table, and click a large icon in the table to
remove it. All spaces in the priority table must be filled.
89
III-3-8. Advanced
Enable Static Routing
Check/uncheck the box to enable/d
isable
static routing.
Destination LAN IP
Enter the destination network’s IP address.
Subnet Mask
Enter the subnet mask of the destination
network.
Advanced features of the BR-6428nS V3/BR-6228nS V3
can be configured from the “Advanced” menu.
III-3-8-1. Static Routing
Static routing is a method of configuring path selection of routers,
characterized by the absence of communication between routers regarding
the current topology of the network. The opposite of static routing is dynamic
routing, sometimes also referred to as adaptive routing.
You can configure static routing and manually add routes to the routing table
shown below.
90
Default Gateway
Enter the default gateway of the destination
network.
Hop Count
Enter the hop count (the
distance between
destination network and this broadband
router) here.
Interface
Enter the interface which leads to
destination network.
Add
Add the route to the current static routing
table.
Delete Selected/
Delete All
Delete selected or all entries from the table.
Static Routing Table entries will be displayed in the table shown below:
III-3-8-2. Port Forwarding
This function allows you to redirect a single port or consecutive ports of an
Internet IP address to the same port of a local IP address. The port number(s)
of the Internet IP address and local IP address must be the same.
If the port number of the Internet IP address and local IP address is different,
please use the “Virtual Server” function instead.
91
Private IP
Enter the IP address
of the computer on the
local network.
Computer Name
Windows computers on the local network
IP address to the “Private IP” field.
Type
Select the type o
f connect
ion, “
TCP
”, “
UDP
”
or “Both”.
Port Range
Input the starting port number in the left
number in the left field.
Comment
Enter a
comment for reference or
identification.
Delete Selected/
Delete All
Delete selected or all entries from the table.
will be listed here – select a computer from
the list and click << to automatically add the
field, and input the ending port number in
the right field. If you only want to redirect a
single port number, only enter a port
Port Forwarding Table entries will be displayed in the table shown below:
92
III-3-8-3. Virtual Server
P
rivate IP
Specify the IP address of the computer on
your local network.
Computer Name
Select the name of a Windows computer
field.
Private Port
Specify the private port
you wish to use on
the computer in your local network.
Type
Select the type of Internet Protocol.
Public Port
Specify a public port to access the computer
on your local network.
Comment
Enter a comment for reference or
identification.
This function allows you to set up an internet service on a local computer,
without exposing the local computer to the internet. You can also build
various sets of port redirection, to provide various internet services on
different local computers via a single internet IP address.
from the drop-down menu and click to
auto-input its IP address in the “Private IP”
Current Virtual Table entries will be displayed in the table shown below:
93
Fragment Threshold
Set the Fragment threshold of
the
wireless
radio. T
he
default value is 2346.
RTS Threshold
Set the RTS threshold of
the
wireless radio.
T
he
default value is 2347.
Beaco
n Interval
Set the beacon interval of
the
wireless radio.
T
he
default value is 100.
DTIM Period
Set the DTIM period of wireless radio. T
he
default value is 3.
Data Rate
Set the wireless data transfer rate. T
he
defau
lt is set to A
uto.
N Data Rate
Set the
data rate of 802.11
n
. T
he
default is
set to Auto
.
Delete Selected/
Delete All
Delete selected or all entries from the table.
III-3-8-4. 2.4GHz Wireless
These settings are for experienced users only. Please do not change any of the
values on this page unless you are already familiar with these functions.
94
Channel Width
Select wireless channel width (bandwidth
used by wireless signals from the device) –
the recommended value is Auto 20/40MHz.
Preamble Type
Set the wireless radio
preamble type.
The
default
value is “Short Preamble”.
CTS Protect
Enabling
this setting will reduce the chance
recommended to set this option to “Auto”.
Tx Power
Set the power output of
the
wireles
s radio.
access your signal.
WMM
WMM (Wi
-
Fi Multimedia) technology
can
responses
for better performance.
of radio signal collisions between 802.11b
and 802.11g wireless access points. It’s
You may not require 100% output power.
Setting a lower power output can enhance
security since potentially malicious/unknown
users in distant areas will not be able to
improve the performance of certain network
applications, such as audio/video streaming,
network telephony (VoIP) and others. When
WMM is enabled, the device will prioritize
different kinds of data and give higher
priority to applications which require instant
95
III-3-8-5. IGMP
IGMP Snoop
ing
IGMP snooping monitors traffic between
disable.
IGMP Proxy
IGMP proxy enables intelligent multicast
information. Select enable or disa
ble.
IGMP is a communications protocol used to establish multicast group
memberships. It allows for a more efficient use of resources and better
performance for applications such as IPTV video streaming.
hosts and multicast routers to facilitate
bandwidth conservation. Select enable or
forwarding based on IGMP snooping
It is recommended to set “IGMP Snooping” and “IGMP Proxy” to
“Enable”.
96
III-3-8-6. UPnP
Universal plug-and-play (UPnP) is a set of networking protocols which enables
network devices to communicate and automatically establish working
configurations with each other. Select “Enable” or “Disable”.
97
III-3-9. Administration
Set Time Zone
Select the time zone of your country or
reg
ion
.
Time Server Address
The travel router supports NTP (Network
manually.
Daylight Saving
If your country/region uses daylight saving
box, and select the start and end date.
III-3-9-1. Time Zone
Various administrative functions can be accessed from
the “Administration” menu.
Time Protocol) for automatic time and date
setup. Input the host name of the IP server
time, please check the “Enable Function”
98
III-3-9-2. Password
Current Password
Enter your cur
rent password.
New Password
Enter your new password.
Confirmed Password
Confirm your new password.
You can change the password used to login to the browser-based
configuration interface here. It is advised to do so for security purposes.
Please make a note of the new password. In the event that you
forget the password and are unable to login to the browser
based configuration interface, see II-7. Reset to factory default
settings for how to reset the device.
99
III-3-9-3. Remote Access
Check “Enabled” to enable the remote access feature and then enter the
appropriate values.
Host IP Address
Port
Specify the IP address which is allowed remote
access.
Specify a port number (0–65535) used for
remote access.
100
Loading...
+ 56 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.