Wireless-N ADSL2+ Modem Router DGN2000 Reference Manual
viii
v1.0, July 2008
Hiding your wireless network name (SSID)
.....................................................
2-11
Restricting access by MAC address
................................................................
2-11
Configuring Mixed WPA-PSK+WPA2-PSK Security
..............................................
2-13
Choosing Alternative Authentication and Encryption Methods
..............................
2-14
Configuring WEP
.............................................................................................
2-15
Configuring WPA-802.1x
.................................................................................
2-16
Using Push 'N' Connect (WPS) to Configure Your Wireless Network and Security
.....
2-17
Connecting Additional Wireless Client Devices After WPS Setup
.........................
2-20
Chapter 3
Protecting Your Network
Protecting Access to Your Wireless Modem Router
.......................................................
3-1
How to Change the Built-In Password
.....................................................................
3-2
Changing the Administrator Login Time-out
.............................................................
3-3
Configuring Basic Firewall Services
...............................................................................
3-3
Blocking Keywords, Sites, and Services
..................................................................
3-3
How to Block Keywords and Sites
...........................................................................
3-3
Firewall Rules
.................................................................................................................
3-5
Inbound Rules (Port Forwarding)
.............................................................................
3-6
Inbound Rule Example: A Local Public Web Server
..........................................
3-7
Inbound Rule Example: Allowing Video conferencing
.......................................
3-8
Considerations for Inbound Rules
.....................................................................
3-9
Outbound Rules (Service Blocking)
.........................................................................
3-9
Outbound Rule Example: Blocking Instant Messenger
.....................................
3-9
Order of Precedence for Rules
..............................................................................
3-11
Services
........................................................................................................................
3-12
How to Define Services
..........................................................................................
3-12
Setting Times and Scheduling Firewall Services
..........................................................
3-13
How to Set Your Time Zone
...................................................................................
3-14
How to Schedule Firewall Services
........................................................................
3-15
Chapter 4
Managing Your Network
Backing Up, Restoring, and Erasing Your Settings
........................................................
4-1
How to Back Up the Configuration to a File
.............................................................
4-1
How to Restore the Configuration from a File
..........................................................
4-2
How to Erase the Configuration
...............................................................................
4-2