viii
v1.0, May 2006
How to Block Keywords and Sites
...........................................................................
4-3
Firewall Rules
.................................................................................................................
4-5
Inbound Rules (Port Forwarding)
.............................................................................
4-6
Outbound Rules (Service Blocking)
.........................................................................
4-9
Order of Precedence for Rules
..............................................................................
4-11
Services
........................................................................................................................
4-11
How to Define Services
..........................................................................................
4-12
Setting Times and Scheduling Firewall Services
..........................................................
4-13
How to Set Your Time Zone
...................................................................................
4-13
How to Schedule Firewall Services
........................................................................
4-14
Chapter 5
Managing Your Network
Backing Up, Restoring, or Erasing Your Settings
...........................................................
5-1
How to Back Up the Configuration to a File
.............................................................
5-1
How to Restore the Configuration from a File
..........................................................
5-2
How to Erase the Configuration
...............................................................................
5-2
Upgrading the Wireless Modem Router’s Firmware
.......................................................
5-3
How to Upgrade the Wireless Modem Router Firmware
..........................................
5-3
Network Management Information
.................................................................................
5-5
Viewing Wireless Modem Router Status and Usage Statistics
................................
5-5
Viewing Attached Devices
......................................................................................
5-10
Viewing, Selecting, and Saving Logged Information
..............................................
5-10
Examples of Log Messages
...................................................................................
5-13
Enabling Security Event E-mail Notification
.................................................................
5-14
Running Diagnostic Utilities and Rebooting the Wireless Modem Router
....................
5-15
Enabling Remote Management
....................................................................................
5-16
Configuring Remote Management
.........................................................................
5-16
Chapter 6
Advanced Configuration
Configuring Advanced Security
......................................................................................
6-1
Setting Up A Default DMZ Server
............................................................................
6-1
Connect Automatically, as Required
........................................................................
6-3
Disable Port Scan and DOS Protection
...................................................................
6-3
Respond to Ping on Internet WAN Port
...................................................................
6-3
MTU Size
.................................................................................................................
6-3