VoIP ROUTER ADSL
3.6.1.7 Security Logs
Display the information of security logs. If hacker attacks your sever, he will be isolated by the firewall function and the router will record related information. Hence, you know where the hacker comes from.
3.6.2 Quick Start
If you use this device to access the Internet through the ISP, this web page is enough for you to configure this router to access the Internet and enable VoIP service without a problem.
3.6.2.1 ADSL Quick Start
Please check Chapter 3.5 (Information from the ISP), then enter the proper values into this web page, click the Apply button and then click the Save Config button to save all of the configuration parameters to FLASH. After the router reboot, you may check the Status web page to check whether the router is connected to the ISP or not. In most cases, you can access the Internet immediately. If not, please refer to the sections below for more information.
23