beautypg.com
iii
Setting rate limiting ············································································································································· 131
Wireless QoS configuration example ························································································································ 132
CAC service configuration example ················································································································· 132
Static rate limiting configuration example ········································································································ 133
Dynamic rate limiting configuration example ·································································································· 134
Configuring advanced settings ······························································································································ 136
Setting a district code ·················································································································································· 136
Channel busy test ························································································································································· 136
Managing a 3G modem ········································································································································ 138
Displaying 3G modem information ···························································································································· 138
Configuring the cellular interface ······························································································································· 141
Managing the PIN ······················································································································································· 142
Rebooting the 3G modem ··········································································································································· 142
Configuring NAT ····················································································································································· 144
Overview ······································································································································································· 144
Recommended configuration procedure···················································································································· 144
Configuring dynamic NAT ·········································································································································· 144
Configuring a DMZ host ············································································································································· 146
Creating a DMZ host ·········································································································································· 146
Enabling DMZ host on an interface ·················································································································· 146
Configuring an internal server ···································································································································· 147
Enabling application layer protocol check ················································································································ 149
Configuring connection limit ······································································································································· 149
NAT configuration examples ······································································································································ 150
Internal hosts accessing public network configuration example ···································································· 150
Internal server configuration example ··············································································································· 152
Configuring access control ····································································································································· 156
Configuration procedure ············································································································································· 156
Access control configuration example ······················································································································· 157
Configuring URL filtering········································································································································· 159
Configuration procedure ············································································································································· 159
URL filtering configuration example ··························································································································· 161
Configuring MAC address filtering ······················································································································· 163
Configuring the MAC address filtering type ············································································································· 163
Configuring the MAC addresses to be filtered ········································································································· 163
MAC address filtering configuration example ·········································································································· 165
Configuring attack protection ································································································································· 167
Overview ······································································································································································· 167
Blacklist function ·················································································································································· 167
Intrusion detection function ································································································································· 167
Configuring the blacklist function ······························································································································· 169
Recommended configuration procedure ··········································································································· 169
Enabling the blacklist function ··························································································································· 170
Adding a blacklist entry manually ····················································································································· 170
Viewing blacklist entries ····································································································································· 171
Configuring intrusion detection ·································································································································· 171
Attack protection configuration examples ················································································································· 173
Attack protection configuration example for MSR 900/20-1X ······································································ 173
For MSR 20/30/50/930 routers ····················································································································· 176