Table of Contents
Chapter 1: Introduction | 1 |
Welcome | 1 |
What’s in this Guide? | 2 |
Chapter 2: Planning Your Wireless Network | 5 |
Network Topology | 5 |
5 | |
Network Layout | 6 |
Chapter 3: Getting to Know the Router | 7 |
The Back Panel | 7 |
The Front Panel | 8 |
Chapter 4: Connecting the Router | 11 |
Overview | 11 |
Connection Instructions | 12 |
Chapter 5: Configuring the Router | 13 |
Overview | 13 |
How to Access the | 16 |
The Setup Tab - Basic Setup | 17 |
The Setup Tab - DDNS | 24 |
The Setup Tab - MAC Address Clone | 26 |
The Setup Tab - Advanced Routing | 27 |
The Wireless Tab - Basic Wireless Settings | 29 |
The Wireless Tab - Wireless Security | 30 |
The Wireless Tab - Wireless Network Access | 32 |
The Wireless Tab - Advanced Wireless Settings | 33 |
The Security Tab - Filter | 35 |
The Security Tab - VPN Passthrough | 37 |
The Voice Tab | 38 |
The Applications & Gaming Tab - Port Range Forwarding | 38 |
The Applications & Gaming Tab - Port Triggering | 39 |
The Applications & Gaming Tab - UPnP Forwarding | 40 |
The Applications & Gaming Tab - DMZ | 43 |
The Applications & Gaming Tab - QoS | 44 |
The Administration Tab - Management | 47 |
The Administration Tab - Log | 49 |
The Administration Tab - Factory Defaults | 50 |
The Administration Tab - Firmware Upgrade | 50 |
The Status Tab - Voice | 51 |
The Status Tab - Router | 52 |
The Status Tab - Local Network | 53 |
The Status Tab - Wireless | 54 |
Appendix A: Troubleshooting | 55 |
Common Problems and Solutions | 55 |
Frequently Asked Questions | 69 |
Appendix B: Wireless Security | 81 |
Security Precautions | 81 |
Security Threats Facing Wireless Networks | 82 |
Appendix C: Finding the MAC Address and IP Address |
|
for Your Ethernet Adapter | 85 |