vi
Contents
Dynamic IP Wizard-Detected Option
.....................................................................
3-10
Fixed IP Account Wizard-Detected Option
.............................................................
3-11
Manually Configuring Your Internet Connection
...........................................................
3-12
Chapter 4
Wireless Configuration
Observe Performance, Placement, and Range Guidelines
............................................
4-1
Implement Appropriate Wireless Security
......................................................................
4-2
Understanding Wireless Settings
...................................................................................
4-4
Common Wireless Settings
......................................................................................
4-5
Understanding WEP Authentication and Encryption
................................................
4-6
Authentication Type
...........................................................................................
4-6
WEP
..................................................................................................................
4-7
Default Factory Settings
...........................................................................................
4-7
Before You Change the SSID and WEP Settings
....................................................
4-8
How to Set Up and Test Basic Wireless Connectivity
..............................................
4-9
How to Restrict Wireless Access by MAC Address
...............................................
4-10
How to Configure WEP
..........................................................................................
4-12
Chapter 5
Firewall Protection and
Content Filtering
Firewall Protection and Content Filtering Overview
........................................................
5-1
Block Sites
......................................................................................................................
5-2
Using Rules to Block or Allow Specific Kinds of Traffic
..................................................
5-3
Inbound Rules (Port Forwarding)
.............................................................................
5-5
Inbound Rule Example: A Local Public Web Server
..........................................
5-5
Inbound Rule Example: Allowing Videoconference from Restricted Addresses 5-6
Considerations for Inbound Rules
.....................................................................
5-6
Outbound Rules (Service Blocking)
.........................................................................
5-7
Following is an application example of outbound rules:
....................................
5-7
Outbound Rule Example: Blocking Instant Messenger
.....................................
5-7
Order of Precedence for Rules
................................................................................
5-8
Default DMZ Server
.................................................................................................
5-8
Respond to Ping on Internet WAN Port
...................................................................
5-9
Services
........................................................................................................................
5-10
Using a Schedule to Block or Allow Specific Traffic
......................................................
5-12
Time Zone
........................................................................................................
5-13