Advanced Help

Advanced Wireless

The Wireless section under Advanced contains three sections for further configurations.

  • Advanced Settings
  • MAC Filtering
  • Security
Advanced Settings
Additional Settings for configuring you're wireless network.
Transmission Rate
The wireless link rate at which information will be received and transmitted on your wireless network.
Multicast Rate
The rate at which a message is sent to a specified group of recipients.
Transmit Power
This is the percentage of power that should be transmitted from your wireless router. Select from 20%, 40%, 60%, 80%, and 100%.
Beacon Period
A packet of information that is sent from a connected device to all other devices where it announces its availability and readiness. A beacon interval is a period of time (sent with the beacon) before sending the beacon again. The beacon interval may be adjusted in milliseconds (ms).
RTS Threshold (Request to Send Threshold)
Determines the packet size of a transmission through the use of the router to help control traffic flow.
Fragmentation Threshold
Used to fragment packets which help improve performance in the presence of radio frequency (RF) interference.
DTIM Interval
Sets the Wake-up interval for clients in power-saving mode.
Preamble Type
This is the length of the CRC (Cyclic Redundancy Check) block for communication between the router and wireless clients. High network traffic areas should select Short preamble type.

MAC Filter
Filters incoming connection on your wireless router based on their MAC address.
Security
Settings to secure other "Guest" wireless network.

Port Forwarding

Multiple connections are required by some applications, such as internet games, video conferencing, Internet telephony, and others. These applications have difficulties working through NAT (Network Address Translation). This section is used to open multiple ports or a range of ports in your router and redirect data through those ports to a single PC on your network.

DMZ

DMZ Host

DMZ means "Demilitarized Zone." If an application has trouble working from behind the router, you can expose one computer to the Internet and run the application on that computer.

When a LAN host is configured as a DMZ host, it becomes the destination for all incoming packets that do not match some other incoming session or rule. If any other ingress rule is in place, that will be used instead of sending packets to the DMZ host; so, an active session, virtual server, active port trigger, or port forwarding rule will take priority over sending a packet to the DMZ host. (The DMZ policy resembles a default port forwarding rule that forwards every port that is not specifically sent anywhere else.)

Note: Putting a computer in the DMZ may expose that computer to a variety of security risks. Use of this option is only recommended as a last resort.

DMZ IP Address
Specify the LAN IP address of the LAN computer that you want to have unrestricted Internet communication. If this computer obtains its address Automatically using DHCP, then you may want to make a static reservation on the Basic �� Network Settings page so that the IP address of the DMZ computer does not change.

Parental Control

Block Website
Allows you to deny certain websites from being accessed. An example is that you might deny "ww.blockthiswebsite.com" so that access to this site will be blocked during the "schedule" you specified.
Block MAC Address

In a home setting, parents can also restrict the time and day of the week certain computers can access the Internet.

Example:

You would only like to allow your child to access the Internet from Monday to Friday, and from 7:00pm to 9:00pm only.

  1. You can then set the Username to "BeforeAccess", then enter the MAC address of your child\'s computer.
  2. Check the checkbox Monday to Friday and set the Start time to 00:00 and the End Time to 19:00.
  3. Now we have just denied Internet access of your child\'s computer from 12:00am to 7:00pm, Monday to Friday.
  4. Now repeat the steps above, but now enter "AfterAccess" in the Username field. Then enter 21:00 for the Start time and 23:59 for the End time.
  5. Now you have just completed a rule that only allows your child\'s computer to access the Internet from 7:00pm to 9:00pm from Monday to Friday.

Filtering Options

Filters can be configured to manage your incoming and outgoing traffic. Click on the Inbound, Outbound and Bridge buttons to advance to the next section for further configuration.

Inbound/Outbound Filtering

When you use the Port Triggering or Port Forwarding features to open specific ports to traffic from the Internet, you could be increasing the exposure of your LAN to cyberattacks from the Internet. In these cases, you can use Inbound Filters to limit that exposure by specifying the IP addresses of Internet hosts that you trust to access your LAN through the ports that you have opened. You might, for example, only allow access to a game server on your home LAN from the computers of friends whom you have invited to play the games on that server.

Inbound Filters can be used for limiting access to a server on your network to a system or group of systems. Filter rules can be used with Port Triggering features. Each filter can be used for several functions; for example a "Game Clan" filter might allow all of the members of a particular gaming group to play several different games for which gaming entries have been created. At the same time an "Admin" filter might only allow systems from your office network to access the WAN admin pages and an FTP server you use at home. If you add an IP address to a filter, the change is affected in all of the places where the filter is used.

Outbound Filters can be used to limit LAN computer from accessing the Internet. Filters can be used with Port Forwarding features. Outbound filter can be used in conjunction with the Inbound Filter to allow incoming and restrict outgoing access when playing a game over the Internet or simply downloading a file.

Bridge Filtering
Also known as MAC address filtering. You can forward or deny incoming traffic based on the source MAC address or the destination MAC address. Note that bridge filter will work with interfaces which are configured as bridge.

Firewall Settings

This allows you to prevent your router from Denial of Service(DOS) attacks.

DNS

Domain Name Server(DNS) is a server that translates URL/Domain Names to the corresponding IP address. Since URL/Domain Names are alphabetical, they are easier to remember. But the Internet is based on IP address.

DDNS

D-DNS provider
Select a dynamic DNS service provider from the pull-down list.
Hostname
Enter your host name, fully qualified; for example: myhost.mydomain.net.
Username
Enter the username provided by your service provider.
Password
Enter the password provided by your service provider.

Network Tools

Port Mapping
Port Mapping supports single or multiple (LAN) ports to be formed as a group and mapped to a PVC(which is associated w/ a VLAN). As a result, each group of LAN ports will perform as an independent (logical) network (like a broadcast domain) among whom traffic broadcast would be prevented. This feature is useful while you would like to form multiple independent (logical) networks for multimedia applications at home. For instance, you can map PVC1 to port 1~3 to create a network (broadcast domain) for PCs for Internet, and map PVC2 to port 4 to create another network (broadcast domain) for IPTV service (devices). By using this feature (w/ multiple PVCs), data traffic and IPTV traffic would not affect each other.
IGMP
IGMP allows support for efficient multicasting -- transmission of identical content, such as multimedia, from a source to a number of recipients.
Queue Config
This page allows you to create "Assigned Classification Queue" settings used in QoS. This served as the priority setting for QoS.
QoS
Quality of Service is a feature that allows you to allocate or guarantee the throughput or speed of Internet for certain computers.
UPnP
UPnP is short for Universal Plug and Play, which is a networking architecture that provides compatibility among networking equipment, software, and peripherals. This router has optional UPnP capability, and can work with other UPnP devices and software.
ADSL
The ADSL settings page contains a modulation and capability section to be specified by your ISP. Consult with your ISP to select the correct settings for each. Then click on Apply if you are finished or click on Advanced Settings if you want to configure more advanced settings.
SNMP
Simple Network Management Protocol (SNMP) provides a means to monitor status and performance as well as set configuration parameters. It enables a management station to configure, monitor and receive trap messages from network devices.
TR-069
TR-069 is a WAN management protocol. A bidirectional SOAP/HTTP based protocol it provides the '+ communication between the ADSL router and an Auto Configuration Server (ACS).

Routing

Routing

Schedules

Schedules can be created for use with enforcing rules. For example, if you want to restrict web access to Mon-Fri from 3pm to 8pm, you would create a schedule selecting Mon, Tue, Wed, Thu, and Fri and enter a Start Time of 3pm and End Time of 8pm.

Add/Edit Schedule Rule
In this section you can add entries to the Schedule Rules List below or edit existing entries.
Name
Give the schedule a name that is meaningful to you, such as "Weekday rule".
Day(s)
Place a checkmark in the boxes for the desired days or select the All Week radio button to select all seven days of the week.
All Day - 24 hrs
Select this option if you want this schedule in effect all day for the selected day(s).
Start Time
If you don't use the All Day option, then you enter the time here. The start time is entered in two fields. The first box is for the hour and the second box is for the minute. Email events are normally triggered only by the start time.
End Time
The end time is entered in the same format as the start time. The hour in the first box and the minutes in the second box. The end time is used for most other rules, but is not normally used for email events.
Apply
Saves the new or edited Schedule Rule in the following list. When finished updating the Schedule Rules, you must still click the Apply button to make the changes effective and permanent.
Schedule Rules List
This section shows the currently defined Schedule Rules. A Schedule Rule can be changed by clicking the Edit button, or deleted by clicking the Delete button. When you click the Edit button, the "Edit Schedule Rule" section is activated for editing.