Table of Contents
Chapter 1: Introduction |
|
|
| 1 |
Chapter 2: Planning Your Wireless Network |
|
|
| 2 |
Network Topology | . . . . | . . |
| 2 |
. . . . | . | . | 2 | |
Network Layout |
|
|
| 2 |
Chapter 3: Planning Your Virtual Private Network (VPN) |
|
|
| 3 |
Why do I need a VPN? |
|
|
| 3 |
1) MAC Address Spoofing | . . . . | . | . | 3 |
2) Data Sniffing | . . . . | . |
| . 3 |
3) Man in the middle attacks |
|
|
| 3 |
What is a VPN? | . . . . | . |
| . 3 |
VPN Router to VPN Router | . . . . | . | . | 4 |
Computer (using the Linksys VPN client software) to VPN Router . . | . . . . | . . |
| 4 |
Chapter 4: Product Overview |
|
|
| 5 |
Front Panel |
|
|
| 5 |
Back Panel | . . . . | . |
| . 5 |
Chapter 5: Configuring the |
|
|
| 6 |
Overview |
|
|
| 6 |
How to Access the | . . . . | . . |
| 7 |
Setup | . . . . | . |
| . 7 |
Setup > Basic Settings |
|
|
| 7 |
Setup > VLAN | . . . . | . . |
| 10 |
Setup > DDNS |
|
|
| 10 |
Setup > MAC Address Clone |
|
|
| 11 |
Setup > Advanced Routing | . . . . | . . |
| 12 |
Wireless |
|
|
| 13 |
Wireless > Basic Wireless Settings | . . . . | . |
| 13 |
Wireless > Wireless Security | . . . . | . . |
| 13 |
Wireless > Wireless Network Access | . . . . | . | .16 | |
Wireless > Advanced Wireless Settings | . . . . | . |
| 17 |
Wireless > WDS | . . . . | . |
| 17 |
Firewall | . . . . | . | .18 | |
Firewall > General | . . . . | . . |
| 18 |
Firewall > Port Forwarding |
|
|
| 18 |
Firewall > Port Triggering |
|
|
| 19 |
Firewall > DMZ | . . . . | . |
| 19 |
Firewall > Access Restriction |
|
|
| 20 |
Firewall > URL Filtering | . . . . | . . |
| 20 |
VPN | . . . . | . . |
| 20 |
VPN > VPN Client Access | . . . . | . |
| 20 |