|
Advanced
|
|
Virtual
Server
The device
can be configured as a virtual server so that users on the Internet can
access services such as Web or FTP via the public (WAN) IP address. The
can be configured to automatically redirect these requests from the
Internet to servers on the LAN network. At the bottom of the screen, there
are already defined well-known virtual services. To use them, click on the
edit icon. You will only need to input the LAN IP address of the computer
running the service, enable it, and click Apply.
Name - The name for your virtual service.
Private
IP
- The server computer on the LAN network that will be providing the virtual
services.
Protocol Type - The protocol used for the virtual service.
Private Port - The port number of the service being hosted by
the server computer on the LAN.
Public Port - The port number that users on the Internet will
use to access the virtual service.
Schedule - The schedule of time when the virtual service will
be enabled.
Example:
If you have a Web (HTTP) server that you want Internet users to access at all
times, you would need to edit the Virtual Server HTTP predefined entry,
enable it, enter the IP address of the server on the LAN, and then click
Apply. In the example below, the Web server is on the LAN computer with an IP
address of 192.168.0.25. HTTP uses TCP port 80.
Name: Virtual Server HTTP
Private IP: 192.168.0.25
Protocol Type: TCP
Private Port: 80
Public Port: 80
Schedule: Always
|
|

|
|

|
Click
on this icon to edit the virtual service.
|
|

|
Click
on this icon to delete the virtual service.
|
|
|
|
Applications
Some
applications, such as Internet gaming, video conferencing, Internet telephony
and others, require computers on the LAN to receive multiple connections from
servers on the Internet, These applications have difficulties working through
NAT (Network Address Translation). If you need to run applications that
require multiple connections, specify the port normally associated with the
application in the "Trigger Port" field, select the protocol type
as TCP (Transmission Control Protocol) or UDP (User Datagram Protocol), then
enter the additional ports associated with the trigger port to open them for
inbound access to the computer on the LAN running the application. At the
bottom of the screen, there are already defined, well-known special
applications. To use them, click on the edit icon, enable the service, and
click Apply.
Name - This is the name referencing the application you are
using.
Trigger Port - This is the port used to trigger the
application. It can be either a single port or a range of ports.
Trigger Type - This is the protocol of the port used to trigger
the application.
Public Port - This is the port or range of ports that will be
used to access the computer on the LAN running the application. You can use a
comma to add multiple ports or port ranges.
Protocol Type - This is the protocol of the port or ports that
will be used to access the application on the LAN computer.
|
|
|
|
Filters
Filters
are used to deny or allow LAN computers from accessing the Internet. Within
the Local Area Network, the can be setup to deny Internet access to
computers based on the IP address they have been assigned or by their MAC
address. The can also block users from accessing restricted web
sites.
|
|
|
|
Filter - IP
Filters
Use IP Filters to deny a particular LAN IP address
or addresses from accessing the Internet. You can deny specific port numbers
or all ports. To use IP Filters, enter the LAN IP address(es) of the
computer(s) that will be denied Internet access, specify the ports you would
like to block access to, enable the entry, and then click Apply.
IP - The IP address of the LAN computer that will be denied
access to the Internet. You can also add a range of IP addresses.
Port - The single port or range of ports that the specified IP
address(es) will be denied access to the Internet.
Protocol Type - This is the protocol type of the port or ports
that will be blocked.
Schedule - This is the schedule of time when the IP Filter will
be enabled.
|
|
|
|
Filters -
MAC Filters
Use MAC Filters to either allow or deny computers
within the Local Area Network from accessing the Internet. You can either
manually add a MAC address or select the MAC address from the list of clients
that are currently connected to the .
Select "Only allow computers with MAC address listed below to
access the network" if you only want the listed computers to have
network access.
Select "Only deny computers with MAC address listed below to
access the network" if you want all computers to have network access
except those computers in the list.
Name - The host name of the computer on the LAN (Local Area
Network) which will be added to the MAC Filter List.
MAC Address - The MAC address of the computer on the LAN which
will be added to the MAC Filter List.
DHCP Client - DHCP clients will have their host names and MAC
addresses listed here. You can select a client computer, click Clone,
and then click Apply to add them to the MAC Filter List.
|
|
|
|
Parental
Controls
Enable Parental Controls - Select this option to enable the
Parental Control features provided by Trend Micro.
Use General Controls - Select this option to setup Parental
Controls as a global setting. When using this option, the restrictions that
you set affect every computer on the network.
Use Per-User Controls - Select this option to setup Parental
Controls in a per-user fashion. When using this option, the restrictions are
setup based on usernames and passwords. This allows for more control of the
content that each user on the network is allowed to access.
Parents Overridden Password - Enter a password which can
override any restrictions that have been setup on this page.
Confirm Password - Retype the password
Parental Controls Access Status - Shows how many times traffic
was blocked or allowed by category.
|
|
|
|
Firewall
The
Firewall section contains advanced settings used to deny or allow traffic
from passing through the . Entries created on this page can pertain to
Inbound or Outbound traffic. Please refer to the manual for more details and
examples.
|
|
|
|
DMZ
If you
have a computer that cannot run Internet applications properly from behind
the , then you may need to allow the computer running these
applications to have unrestricted Internet access. To do this, you would need
to enable the DMZ (Demilitarized Zone) option, enter the IP address of that
computer in the IP Address field, and click Apply. Adding a client to the DMZ
may expose that computer to a variety of security risks, so only use this
option as a last resort.
|
|
|
|
DDNS
Dynamic DNS (Domain Name Service) is a method of keeping a domain name linked
to a changing (dynamic) IP address. With most Cable and DSL connections, you
are assigned a dynamic IP address and that address is used only for the
duration of that specific connection. With the , you can setup your
DDNS service and the will automatically update your DDNS server every
time it receives a new WAN IP address.
Server Address - Choose your DDNS provider from the drop down menu.
Host Name - Enter the Host Name that you registered with your
DDNS service provider.
Username - Enter the username for your DDNS account.
Password - Enter the password for your DDNS account.
|
|
|
|
Printer
Server
The
can be setup as a Printer Server to provide the printer that
connected on USB port to the network.
|
|
|
|
QoS
QoS
(Quality of Service). The support the QoS control by Physical Port,
MAC Address, IP Address and Application (Protocal/Port based).
|
|
|
|
Wireless
Performance
Transmission (TX) Rates
Select the
wireless signal rates based on the speed of wireless adapters on the WLAN
(Wireless Local Area Network).
|
|
|
|
Transmit
Power
The
transmit power ranges from 12.5% to 100%. The higher the antenna transmit
power, the greater the range of wireless communications. Select the power
based on the coverage you desire for your . For security reasons,
certain implementations require that the antenna transmit power be adjusted
to provide wireless coverage within a limited area.
|
|
|
|
Beacon
interval
Beacons
are packets sent by an Access Point to synchronize a wireless network.
Specify a Beacon interval value between 25 and 500. The default value is set
to 100 milliseconds.
|
|
|
|
RTS
Threshold
This value
should remain at its default setting of 2312. If you encounter inconsistent
data flow, only minor modifications to the value range between 256 and 2312
are recommended. The default value for RTS Threshold is set to 2312.
|
|
|
|
Fragmentation
This value
should remain at its default setting of 2346. If you experience a high packet
error rate, you may slightly decrease your "Fragmentation" value
within the range of 256 to 2346. Setting the Fragmentation value too low may
result in poor performance.
|
|
|
|
DTIM
interval (beacon rate)
Enter a
value between 1 and 15 for the Delivery Traffic Indication Message (DTIM). A
DTIM is a countdown informing clients of the next window for listening to
broadcast and multicast messages. When the Access Point has buffered
broadcast or multicast messages for associated clients, it sends the next
DTIM with a DTIM Interval value. AP clients hear the beacons and awaken to
receive the broadcast and multicast messages. The default value for DTIM
interval is set to 3.
|
|
|
|
Preamble
Type
The
Preamble Type defines the length of the CRC (Cyclic Redundancy Check) block
for communication between the Access Point and roaming wireless adapters.
Make sure to select the appropriate preamble type and click the Apply button.
Note: High network traffic
areas should use the short preamble type. CRC is a common technique for
detecting data transmission errors.
|
|
|
|
SSID
Broadcast
Enables or
disables the broadcasting of the SSID from the . When enabled, the
SSID of is sent to wireless enabled devices on the WLAN.
|
|
|
|
Mode Setting
These
settings determine whether 802.11b wireless card can be used to connect to
the . The default setting is Mix Mode. When G Mode is enabled, only
802.11g wireless clients can be used to connect to .
|
|
|