Table of Contents
Chapter 1: |
|
|
Product Overview |
| 1 |
Front Panel |
| 1 |
Back Panel | . | . 1 |
Chapter 2: |
|
|
Wireless Security Checklist |
| 3 |
General Network Security Guidelines |
| 3 |
Additional Security Tips | . | . 3 |
Chapter 3: |
|
|
Advanced Configuration |
| 4 |
Setup > Basic Setup | . | . 4 |
Setup > DDNS |
| 8 |
Setup > MAC Address Clone |
| 9 |
Setup > Advanced Routing | . . | 9 |
Wireless > Basic Wireless Settings | . | 10 |
Wireless > Wireless Security | . . | 12 |
Wireless > Wireless MAC Filter |
| 14 |
Wireless > Advanced Wireless Settings | . | 15 |
Security > Firewall | . . | 16 |
Security > VPN Passthrough |
| 17 |
Access Restrictions > Internet Access | . . | 17 |
Applications and Gaming > Single Port Forwarding |
| 19 |
Applications and Gaming > Port Range Forwarding | . | 19 |
Applications & Gaming > Port Range Triggering . . . . . . . . . . . . . . . . . . . . . . . . . .20 | ||
Applications and Gaming > DMZ | . | 20 |
Applications and Gaming > QoS | . . | 21 |
Administration > Management |
| 23 |
Administration > Log | . | .24 |
Administration > Diagnostics | . | 24 |
Administration > Factory Defaults |
| 25 |
Administration > Firmware Upgrade | . . | 25 |
Status > Router | . | 26 |
Status > Local Network | . . | 26 |
Status > Wireless Network | . | .27 |
Appendix A: |
|
|
Troubleshooting |
| 28 |
Appendix B: |
|
|
Specifications |
| 30 |
Appendix E:
ii |