Advanced

Virtual Server
The device can be configured as a virtual server so that users on the Internet can access services such as Web or FTP via the public (WAN) IP address. The can be configured to automatically redirect these requests from the Internet to servers on the LAN network. At the bottom of the screen, there are already defined well-known virtual services. To use them, click on the edit icon. You will only need to input the LAN IP address of the computer running the service, enable it, and click Apply.

Name - The name for your virtual service.

Private IP - The server computer on the LAN network that will be providing the virtual services.
Protocol Type - The protocol used for the virtual service.
Private Port - The port number of the service being hosted by the server computer on the LAN.
Public Port - The port number that users on the Internet will use to access the virtual service.
Schedule - The schedule of time when the virtual service will be enabled.

Example:
If you have a Web (HTTP) server that you want Internet users to access at all times, you would need to edit the Virtual Server HTTP predefined entry, enable it, enter the IP address of the server on the LAN, and then click Apply. In the example below, the Web server is on the LAN computer with an IP address of 192.168.0.25. HTTP uses TCP port 80.

Name: Virtual Server HTTP
Private IP: 192.168.0.25
Protocol Type: TCP
Private Port: 80
Public Port: 80
Schedule: Always

Click on this icon to edit the virtual service.

Click on this icon to delete the virtual service.

 

Applications
Some applications, such as Internet gaming, video conferencing, Internet telephony and others, require computers on the LAN to receive multiple connections from servers on the Internet, These applications have difficulties working through NAT (Network Address Translation). If you need to run applications that require multiple connections, specify the port normally associated with the application in the "Trigger Port" field, select the protocol type as TCP (Transmission Control Protocol) or UDP (User Datagram Protocol), then enter the additional ports associated with the trigger port to open them for inbound access to the computer on the LAN running the application. At the bottom of the screen, there are already defined, well-known special applications. To use them, click on the edit icon, enable the service, and click Apply.

Name - This is the name referencing the application you are using.
Trigger Port - This is the port used to trigger the application. It can be either a single port or a range of ports.
Trigger Type - This is the protocol of the port used to trigger the application.
Public Port - This is the port or range of ports that will be used to access the computer on the LAN running the application. You can use a comma to add multiple ports or port ranges.
Protocol Type - This is the protocol of the port or ports that will be used to access the application on the LAN computer.

 

Filters
Filters are used to deny or allow LAN computers from accessing the Internet. Within the Local Area Network, the can be setup to deny Internet access to computers based on the IP address they have been assigned or by their MAC address. The can also block users from accessing restricted web sites.

 

Filter - IP Filters
Use IP Filters to deny a particular LAN IP address or addresses from accessing the Internet. You can deny specific port numbers or all ports. To use IP Filters, enter the LAN IP address(es) of the computer(s) that will be denied Internet access, specify the ports you would like to block access to, enable the entry, and then click Apply.

IP - The IP address of the LAN computer that will be denied access to the Internet. You can also add a range of IP addresses.
Port - The single port or range of ports that the specified IP address(es) will be denied access to the Internet.
Protocol Type - This is the protocol type of the port or ports that will be blocked.
Schedule - This is the schedule of time when the IP Filter will be enabled.

 

Filters - MAC Filters
Use MAC Filters to either allow or deny computers within the Local Area Network from accessing the Internet. You can either manually add a MAC address or select the MAC address from the list of clients that are currently connected to the .
Select "Only allow computers with MAC address listed below to access the network" if you only want the listed computers to have network access.
Select "Only deny computers with MAC address listed below to access the network" if you want all computers to have network access except those computers in the list.

Name - The host name of the computer on the LAN (Local Area Network) which will be added to the MAC Filter List.
MAC Address - The MAC address of the computer on the LAN which will be added to the MAC Filter List.
DHCP Client - DHCP clients will have their host names and MAC addresses listed here. You can select a client computer, click Clone, and then click Apply to add them to the MAC Filter List.

 

Parental Controls

Enable Parental Controls - Select this option to enable the Parental Control features provided by Trend Micro.
Use General Controls - Select this option to setup Parental Controls as a global setting. When using this option, the restrictions that you set affect every computer on the network.
Use Per-User Controls - Select this option to setup Parental Controls in a per-user fashion. When using this option, the restrictions are setup based on usernames and passwords. This allows for more control of the content that each user on the network is allowed to access.
Parents Overridden Password - Enter a password which can override any restrictions that have been setup on this page.
Confirm Password - Retype the password
Parental Controls Access Status - Shows how many times traffic was blocked or allowed by category.

 

Firewall
The Firewall section contains advanced settings used to deny or allow traffic from passing through the . Entries created on this page can pertain to Inbound or Outbound traffic. Please refer to the manual for more details and examples.

 

DMZ
If you have a computer that cannot run Internet applications properly from behind the , then you may need to allow the computer running these applications to have unrestricted Internet access. To do this, you would need to enable the DMZ (Demilitarized Zone) option, enter the IP address of that computer in the IP Address field, and click Apply. Adding a client to the DMZ may expose that computer to a variety of security risks, so only use this option as a last resort.

 

DDNS
Dynamic DNS (Domain Name Service) is a method of keeping a domain name linked to a changing (dynamic) IP address. With most Cable and DSL connections, you are assigned a dynamic IP address and that address is used only for the duration of that specific connection. With the , you can setup your DDNS service and the will automatically update your DDNS server every time it receives a new WAN IP address.

Server Address - Choose your DDNS provider from the drop down menu.
Host Name - Enter the Host Name that you registered with your DDNS service provider.
Username - Enter the username for your DDNS account.
Password - Enter the password for your DDNS account.

 

Printer Server
The can be setup as a Printer Server to provide the printer that connected on USB port to the network.

 

QoS
QoS (Quality of Service). The support the QoS control by Physical Port, MAC Address, IP Address and Application (Protocal/Port based).

 

Wireless Performance

Transmission (TX) Rates
Select the wireless signal rates based on the speed of wireless adapters on the WLAN (Wireless Local Area Network).

 

Transmit Power
The transmit power ranges from 12.5% to 100%. The higher the antenna transmit power, the greater the range of wireless communications. Select the power based on the coverage you desire for your . For security reasons, certain implementations require that the antenna transmit power be adjusted to provide wireless coverage within a limited area.

 

Beacon interval
Beacons are packets sent by an Access Point to synchronize a wireless network. Specify a Beacon interval value between 25 and 500. The default value is set to 100 milliseconds.

 

RTS Threshold
This value should remain at its default setting of 2312. If you encounter inconsistent data flow, only minor modifications to the value range between 256 and 2312 are recommended. The default value for RTS Threshold is set to 2312.

 

Fragmentation
This value should remain at its default setting of 2346. If you experience a high packet error rate, you may slightly decrease your "Fragmentation" value within the range of 256 to 2346. Setting the Fragmentation value too low may result in poor performance.

 

DTIM interval (beacon rate)
Enter a value between 1 and 15 for the Delivery Traffic Indication Message (DTIM). A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages. When the Access Point has buffered broadcast or multicast messages for associated clients, it sends the next DTIM with a DTIM Interval value. AP clients hear the beacons and awaken to receive the broadcast and multicast messages. The default value for DTIM interval is set to 3.

 

Preamble Type
The Preamble Type defines the length of the CRC (Cyclic Redundancy Check) block for communication between the Access Point and roaming wireless adapters. Make sure to select the appropriate preamble type and click the Apply button.
Note: High network traffic areas should use the short preamble type. CRC is a common technique for detecting data transmission errors.

 

SSID Broadcast
Enables or disables the broadcasting of the SSID from the . When enabled, the SSID of is sent to wireless enabled devices on the WLAN.

 

Mode Setting
These settings determine whether 802.11b wireless card can be used to connect to the . The default setting is Mix Mode. When G Mode is enabled, only 802.11g wireless clients can be used to connect to .