5.0

Out of 2 Ratings

Owner's of the Linksys Network Router Wireless-G Broadband Router gave it a score of 5.0 out of 5. Here's how the scores stacked up:
  • Reliability

    5.0 out of 5
  • Durability

    5.0 out of 5
  • Maintenance

    5.0 out of 5
  • Performance

    5.0 out of 5
  • Ease of Use

    5.0 out of 5
of 102
 
47
Chapter 6: Configuring the Wireless-G Broadband Router
The Security Tab - Firewall
Wireless-G Broadband Router
The Security Tab - Firewall
Firewall Protection. This feature employs Stateful Packet Inspection (SPI) for a more detailed review of data
packets entering your network environment.
Block WAN Requests. Enable the Block WAN Request feature by checking the box beside Block Anonymous
Internet Requests and you can prevent your network from being “pinged,” or detected, by other Internet users.
The Block WAN Request feature also reinforces your network security by hiding your network ports. Both
functions of the Block WAN Request feature make it more difficult for outside users to work their way into your
network. This feature is enabled by default. Select Disabled to allow anonymous Internet requests.
Filter Multicast. Multicasting allows for multiple transmissions to specific recipients at the same time. If
multicasting is permitted, then the Router will allow IP multicast packets to be forwarded to the appropriate
computers. Select Enabled to filter multicasting, or Disabled to disable this feature.
Filter Internet NAT Redirection. This feature uses port forwarding to block access to local servers from local
networked computers. Select Enabled to filter Internet NAT redirection, or Disabled to disable this feature.
Filter IDENT (Port 113). This feature keeps port 113 from being scanned by devices outside of your local
network. Select Enabled to filter port 113, or Disabled to disable this feature.
Change these settings as described here and click the Save Settings button to apply your changes or Cancel
Changes to cancel your changes.
The Security Tab - VPN Passthrough
Use the settings on this tab to allow VPN tunnels using IPSec, PPTP, or L2TP protocols to pass through the
Router’s firewall.
IPSec Pass-through. Internet Protocol Security (IPSec) is a suite of protocols used to implement secure
exchange of packets at the IP layer. To allow IPSec tunnels to pass through the Router, click Enable. IPSec Pass-
Through is enabled by default.
PPTP Pass-through. Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be
tunneled through an IP network. To allow PPTP tunnels to pass through the Router, click Enable. PPTP Pass-
Through is enabled by default.
L2TP Pass-through. Layer 2 Tunneling Protocol is the method used to enable Point-to-Point sessions via the
Internet on the Layer 2 level. To allow L2TP tunnels to pass through the Router, click Enable. L2TP Pass-Through
is enabled by default.
Figure 6-26: Security Tab - Firewall
Figure 6-27: Security Tab - VPN Passthrough