Access Restrictions Tab; Applications & Gaming Tab; Administration Tab - Cisco Linksys X2000 V2 User Manual

Wireless adsl2+ modem router, wireless-n router with adsl2+ modem
Table of Contents

Advertisement

Chapter 3
Security > VPN Passthrough
The VPN Passthrough screen allows you to configure the
device's VPN passthrough feature. This feature lets VPN
tunnels using the IPSec, L2TP, or PPTP protocols to pass
through the device's firewall.

Access Restrictions Tab

The Access Restrictions tab allows you to configure
the Internet access restrictions for each device in your
network.
For detailed information on the Access Restrictions tab,
refer to the Utility's online help pages.
Access Restrictions > Internet Access Policy
The Internet  Access  Policy  screen allows you to define
policies that are used to block or allow specific kinds
of Internet usage and traffic, such as Internet access,
designated applications, websites, and inbound traffic
during specific days and times, and for a specified list of
devices in your network.
Applications & Gaming Tab
The Applications & Gaming tab allows you to configure
functions such as port forwarding and quality of service
that may be necessary for special applications such as
hosting web servers, ftp servers, and e-mail servers on on
your network, or other specialized internet applications
such as videoconferencing or online gaming.
For detailed information on the Applications & Gaming
tab, refer to the Utility's online help pages.
Applications & Gaming > Single Port Forwarding
The Single  Port  Forwarding screen allows you to set up
port forwarding for a single port. You should assign static
IP addresses to the destination computers before you use
this feature.
Applications & Gaming > Port Range Forwarding
The Port  Range  Forwarding  screen allows you to set up
port forwarding for a range of ports. You should assign
static IP addresses to the destination computers before
you use this feature.
Applications & Gaming > Port Range Triggering
The Port Range Triggering screen allows you to set up port
triggering. When port triggering is configured, the device
watches for specified port numbers in outgoing data.
When a match is found, the device records the sending
computer's IP address so that when the requested data
returns, it can be sent to the proper computer.
Wireless ADSL2+ Modem Router
Advanced Configuration
Applications & Gaming > DMZ
The DMZ screen allows you to expose one network user
to the Internet for use of a special-purpose service such
as Internet gaming or video conferencing. DMZ hosting
forwards all the ports at the same time to one computer.
You should assign static IP addresses to the destination
computers before you use this feature.
Applications & Gaming > QoS
The QoS screen allows you to specify priorities for different
types of traffic. Lower priority traffic will be slowed down
to allow greater throughput or less delay for high priority
traffic.

Administration Tab

The Administration tab allows you to configure the device's
administrative functions.
For detailed information on the Administration tab, refer
to the Utility's online help pages.
Administration > Management
The Management  screen allows you to manage specific
functions for access and security.
NOTE ON CISCO WEB ASSISTANT OPTION
(not on all models):
404" message (indicating that you entered an
invalid web address), the Cisco Web Assistant
will appear and automatically run a search
based on the keywords in the web address. This
feature can be enabled or disabled from this
screen.
NOTE ON TREND MICRO OPTION (not on all
models):
Trend Micro ProtectLink Gateway
is a hosted security service that stops spam
and filters URLS to prevent unwanted content
from passing through your router. The Email
Protection is the hosted messaging security
solution provided by Trend Micro InterScan
Messaging Hosted Security (IMHS). This feature
can be enabled or disabled from this screen.
Administration > Reporting
The Reporting screen allows you to configure system event
logging and to configure sending of e-mail alerts when a
Denial of Service attack is detected.
If you see an "error code
6

Advertisement

Table of Contents
loading

Table of Contents