Changes between Version 2 and Version 3 of WebInterface
- Timestamp:
- Jan 3, 2010, 12:21:31 PM (15 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
WebInterface
v2 v3 5 5 On this page the GUI's tabs (bold), subtabs (italic) and their functionality are defined. 6 6 7 8 ==System== 7 == System == 9 8 10 9 General settings: … … 48 47 49 48 50 == Interfaces==49 == Interfaces == 51 50 52 51 '''Assign''': … … 54 53 Set Interface Network port with dropdown menu for Internal, WAN and External. 55 54 56 === LAN===55 === LAN === 57 56 58 57 '''Type''': dropdown menu: static or DHCP by default DHCP. Select static if you use another DHCP server in your network. … … 62 61 '''MTU''': Enter a value for MTU, If you enter a value in this field, then MSS clamping for TCP connections to the value entered above minus 40 (TCP/IP header size) will be in effect. If you leave this field blank, an MTU of 1492 bytes for PPPoE and 1500 bytes for all other connection types will be assumed. 63 62 64 === WAN===63 === WAN === 65 64 66 65 '''Type''': dropdown menu: static or DHCP by default DHCP. Select static if you use another DHCP server in your network. … … 76 75 '''DHCP Client''' configuration: Hostname. The value in this field is sent as the DHCP client identifier and hostname when requesting a DHCP lease. Some ISPs may require this (for client identification). 77 76 78 === External===77 === External === 79 78 80 79 '''Type''': Dropdown menu with: static or DHCP … … 100 99 101 100 102 == Firewall==101 == Firewall == 103 102 104 103 The firewall is used to block unauthorized access while permitting authorized communications. It can be configured to permit, deny, encrypt, decrypt, or proxy all (in and out) computer traffic between different security domains based upon a set of rules and other criteria. … … 131 130 132 131 133 == Services==132 == Services == 134 133 135 134 '''DHCP''': … … 164 163 Description: You may enter a description here for your reference (not parsed). 165 164 166 == DNS Forwarding==:165 == DNS Forwarding ==: 167 166 168 167 '''Add DNS''': … … 196 195 Password: Enter your password for the service type. 197 196 198 == HTTPS==197 == HTTPS == 199 198 200 199 Certificate: Paste a signed certificate in X.509 PEM format here. … … 206 205 Internet Protocol Security (IPsec) is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a data stream. 207 206 208 == NTP==207 == NTP == 209 208 210 209 Time zone: Select the location closest to you … … 214 213 NTP time server: Use a space to separate multiple hosts (only one required). Remember to set up at least one DNS server if you enter a host name here! 215 214 216 == Proxy==215 == Proxy == 217 216 218 217 In computer networks, a proxy server is a server (a computer system or an application program) that acts as an intermediary for requests from clients seeking resources from other servers. … … 220 219 To be continued 221 220 222 == SSH==221 == SSH == 223 222 224 223 Secure Shell or SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices. … … 226 225 Enable SSH, check to enable, uncheck to disable SSH access to the generic proxy appliance 227 226 228 == Scheduling==227 == Scheduling == 229 228 230 229 To be continued 231 230 232 == Traffic shaping==231 == Traffic shaping == 233 232 234 233 Traffic shaping (also known as "packet shaping") is the control of computer network traffic in order to optimize or guarantee performance, lower latency, and/or increase usable bandwidth by delaying packets that meet certain criteria.