Konig Electronic WLAN router 300 Mbps User Manual

Page 37

Advertising
background image

37

If, for example, client 3 tries to use an IP address different from the address listed in the control table
(192.168.12.101), it will be denied to connect to this device.

5. Clients 2 and 3 and other wired clients with a MAC address unspecified in the control table are all

allowed to connect to this device. But client 1 is denied to connect to this device.

6. Clients 1 and 2 are allowed to associate to the wireless LAN, but a wireless client with a MAC

address not specified in the control table is denied to associate to the wireless LAN. Client 3 is a
wired client and so is not affected by Association control.

Miscellaneous Items

Remote Administrator Host/Port
In general, only Intranet users can browse the built-in web pages to perform administration tasks. This
feature enables you to perform administration tasks from a remote host. If this feature is enabled, only
the specified IP address can perform remote administration. If the specified IP address is 0.0.0.0, any
host can connect to this product to perform administration tasks. You can use subnet mask bits “/nn”
notation to specify a group of trusted IP addresses. For example, “10.1.2.0/24”.

NOTE: When Remote Administration is enabled, the web server port will be shifted to 88. You can
change the web server port to another port, too.


Administrator Time-out
The time of no activity to logout automatically. Set it to zero to disable this feature.

Discard PING from WAN side
When this feature is enabled, any host on the WAN cannot ping this product.

SPI Mode
When this feature is enabled, the router will record the packet information that passes through the
router such as an IP address, port address, ACK, SEQ number and so on. And the router will check
every incoming packet to detect if this packet is valid.

DoS Attack Detection
When this feature is enabled, the router will detect and log the DoS attack from the Internet. Currently,
the router can detect the following DoS attack: SYN Attack, WinNuke, Port Scan, Ping of Death, Land
Attack etc.

VPN PPTP and IPSec Pass-Through
Virtual Private Networking (VPN) is typically used for work-related networking. For VPN tunnels, the
router supports IPSec Pass-through and PPTP Pass-through.

Advertising