Linksys BEFSX41 Network Router User Manual


 
EtherFast
®
Cable/DSL Firewall Router with 4-Port Switch/VPN Endpoint
35
Instant Broadband
®
Series
HBS
The HeartBeat
Signal (HBS) is
a service that
applies to connec-
tions in Australia
only. (Shown in
Figure 7-9.) For
users in Australia,
check with your ISP
for setup informa-
tion.
User Name and Password Enter the User Name and Password supplied by
your ISP.
Heart Beat Server Enter the IP address of the Heart Beat Server. This is sup-
plied by your ISP.
Connect on Demand and Max Idle Time You can configure the Router to cut
your connection with your ISP after a specified period of time (Max Idle Time).
If you have been disconnected due to inactivity, Connect on Demand enables
the Router to automatically re-establish your connection as soon as you attempt
to access the Internet again. If you wish to activate Connect on Demand, click
the radio button. In the Max Idle Time field, enter the number of minutes you
want to have elapsed before your Internet access disconnects.
Keep Alive Option and Redial Period If you select this option, the Router will
periodically check your Internet connection. If you are disconnected, then the
Router will automatically re-establish your connection. To use this option,
click the radio button next to Keep Alive. The default Redial Period is 30 sec-
onds.
To apply any of the settings you change on a page, click the Apply button, and
then click the Continue button. To cancel any values you’ve entered on any
page, click the Cancel button.
34
The Firewall Tab, shown in Figure 7-10, allows you to set the Cable/DSL
Firewall Router’s level of security. Some environments require greater security
while some Internet applications work better with fewer restrictions. This tab
allows you to customize these settings.
Advanced Firewall Protection Enable this option to employ SPI (Stateful
Packet Inspection) and DoS (Denial of Service). These functions allow for
more detailed review of data packets entering your network environment and
prevention of Denial of Service attacks.
Firewall
Figure 7-10
Figure 7-9