Technical information
Watson SHDSL Router
Web-based Management Manual
Watson-SHDSL-Router-GUI-Manual.doc
Version 2.3-03
1-4
Revision: 2012-02-29
Figure 5-13: Internet Connection - No Internet Connection ............................................................... 5-8
Figure 6-1: Internet Connection – Overview ....................................................................................... 6-1
Figure 6-2: Internet Connection – Settings ......................................................................................... 6-2
Figure 6-3: WAN Ethernet Properties ................................................................................................ 6-3
Figure 6-4: Internet Connection – Diagnostics ................................................................................... 6-4
Figure 6-5: Diagnostics Process ........................................................................................................ 6-4
Figure 6-6: Internet Connection – SHDSL Status .............................................................................. 6-5
Figure 7-1: Local Network Overview .................................................................................................. 7-1
Figure 7-2: Host Information ............................................................................................................... 7-2
Figure 7-3: Local Network Device View.............................................................................................. 7-3
Figure 8-1: Services Overview ........................................................................................................... 8-1
Figure 8-2: General ............................................................................................................................ 8-2
Figure 8-3: Access Control ................................................................................................................. 8-4
Figure 8-4: Add Access Control Rule ................................................................................................. 8-4
Figure 8-5: Access Control Rule ........................................................................................................ 8-5
Figure 8-6: Edit Access Control Rule ................................................................................................. 8-5
Figure 8-7: Port Forwarding................................................................................................................ 8-7
Figure 8-8: Add Port Forwarding Rule ................................................................................................ 8-8
Figure 8-9: Specify Public IP Address ................................................................................................ 8-8
Figure 8-10: Forward to a Specific Port .............................................................................................. 8-8
Figure 8-11: Port Forwarding Rule ..................................................................................................... 8-9
Figure 8-12: Allow Incoming WAN Access to Web-Management .................................................... 8-10
Figure 8-13: DMZ Host ..................................................................................................................... 8-11
Figure 8-14: Port Triggering ............................................................................................................. 8-12
Figure 8-15: New Port Triggering Rule ............................................................................................. 8-12
Figure 8-16: Website Restrictions .................................................................................................... 8-13
Figure 8-17: Network Address Translation ....................................................................................... 8-15
Figure 8-18: Edit Item ....................................................................................................................... 8-15
Figure 8-19: Add NAT/NAPT Rule ................................................................................................... 8-16
Figure 8-20: NAT IP Addresses ....................................................................................................... 8-18
Figure 8-21: NAT/NAPT Rule Sets ................................................................................................... 8-19
Figure 8-22: NAT/NAPT Rule Sets ................................................................................................... 8-19
Figure 8-23: Attention ....................................................................................................................... 8-20
Figure 8-24: NAT/NAPT Rule Sets ................................................................................................... 8-20
Figure 8-25: Add NAPT Rule ............................................................................................................ 8-21
Figure 8-26: NAT/NAPT Rule Sets ................................................................................................... 8-21
Figure 8-27: NAT/NAPT Rule Sets ................................................................................................... 8-22
Figure 8-28: Connection List ............................................................................................................ 8-23
Figure 8-29: Advanced Filtering ....................................................................................................... 8-24
Figure 8-30: Move Up and Move Down Action Icons ....................................................................... 8-25
Figure 8-31: Add Advanced Filter ..................................................................................................... 8-25
Figure 8-32: Add ALG Rule .............................................................................................................. 8-27
Figure 8-33: Firewall Log .................................................................................................................. 8-28
Figure 8-34: Log Settings ................................................................................................................ 8-30
Figure 8-35: Enabling Secure Remote Administration ..................................................................... 8-34
Figure 8-36: Apply Firewall Protection .............................................................................................. 8-34
Figure 8-37: General ........................................................................................................................ 8-36
Figure 8-38: Internet Connection Utilization by Application .............................................................. 8-38
Figure 8-39: A Specific Application................................................................................................... 8-38
Figure 8-40: Internet Connection Utilization by Computer ................................................................ 8-39
Figure 8-41: Traffic Priority ............................................................................................................... 8-41