User's Manual
Table Of Contents
- Reference Manual for the Model DG834G Wireless ADSL Firewall Router
- Contents
- Chapter 1 About This Guide
- Chapter 2 Introduction
- Chapter 3 Connecting the Router to the Internet
- What You Need Before You Begin
- Connecting the DG834G to Your LAN
- Auto-Detecting Your Internet Connection Type
- Testing Your Internet Connection
- Manually Configuring Your Internet Connection
- Chapter 4 Wireless Configuration
- Chapter 5 Protecting Your Network
- Chapter 6 Managing Your Network
- Chapter 7 Advanced Configuration
- Chapter 8 Troubleshooting
- Appendix A Technical Specifications
- Appendix B Network and Routing Basics
- Appendix C Preparing Your Network
- Appendix D Wireless Networking Basics
- Glossary
- Index
Contents vii
Chapter 5
Protecting Your Network
Protecting Access to Your DG834G Wireless ADSL Firewall Router .............................5-1
How to Change the Built-In Password .....................................................................5-1
Changing the Administrator Login Timeout ..............................................................5-2
Configuring Basic Firewall Services ...............................................................................5-2
Blocking Keywords, Sites, and Services ..................................................................5-3
How to Block Keywords and Sites ...........................................................................5-3
Firewall Rules .................................................................................................................5-5
Inbound Rules (Port Forwarding) .............................................................................5-6
Inbound Rule Example: A Local Public Web Server ..........................................5-7
Inbound Rule Example: Allowing Videoconferencing ........................................5-8
Considerations for Inbound Rules .....................................................................5-8
Outbound Rules (Service Blocking) .........................................................................5-9
Outbound Rule Example: Blocking Instant Messenger ...................................5-10
Order of Precedence for Rules .............................................................................. 5-11
Services ........................................................................................................................5-12
How to Define Services ..........................................................................................5-12
Setting Times and Scheduling Firewall Services ..........................................................5-13
How to Set Your Time Zone ...................................................................................5-13
How to Schedule Firewall Services ........................................................................5-14
Chapter 6
Managing Your Network
Backing Up, Restoring, or Erasing Your Settings ...........................................................6-1
How to Back Up the Configuration to a File .............................................................6-1
How to Restore the Configuration from a File ..........................................................6-2
How to Erase the Configuration ...............................................................................6-2
Upgrading the Router’s Firmware ...................................................................................6-2
How to Upgrade the Router Firmware .....................................................................6-3
Network Management Information .................................................................................6-4
Viewing Router Status and Usage Statistics ............................................................6-4
Viewing Attached Devices ........................................................................................6-9
Viewing, Selecting, and Saving Logged Information ..............................................6-10
Selecting What Information to Log .................................................................. 6-11
Saving Log Files on a Server ..........................................................................6-12










