Table of Contents
Chapter 1: |
|
|
|
|
Product Overview |
|
|
| 4 |
Front Panel |
|
|
| 4 |
Back Panel | . . . . . . . . | . . . . | . | . 4 |
Placement Positions |
|
|
| 4 |
Chapter 2: |
|
|
|
|
Wireless Security Checklist |
|
|
| 6 |
General Network Security Guidelines |
|
|
| 6 |
Additional Security Tips | . . . . . . . . | . . . . | . | . 6 |
Chapter 3: |
|
|
|
|
Advanced Configuration |
|
|
| 7 |
Setup > Basic Setup | . . . . . . . . | . . . . | . | . 7 |
Setup > DDNS |
|
|
| 11 |
Setup > MAC Address Clone |
|
|
| 12 |
Setup > Advanced Routing | . . . . . . . . | . . . . | . . | 12 |
Wireless > Basic Wireless Settings | . . . . . . . . | . . . . | . | 13 |
Wireless > Wireless Security | . . . . . . . . | . . . . | . . | 14 |
Wireless > Wireless MAC Filter |
|
|
| 16 |
Wireless > Advanced Wireless Settings | . . . . . . . . | . . . . | . | 17 |
Security > Firewall | . . . . . . . . | . . . . | . . | 18 |
Security > VPN Passthrough |
|
|
| 18 |
Access Restrictions > Internet Access | . . . . . . . . | . . . . | . . | 19 |
Applications and Gaming > Single Port Forwarding |
|
|
| 20 |
Applications and Gaming > Port Range Forwarding . . | . . . . . . . . | . . . . | . | 21 |
Applications & Gaming > Port Range Triggering . . . . . . . . . . . . . . . . . . . . . . . . . .21 | ||||
Applications and Gaming > DMZ | . . . . . . . . | . . . . | . | 22 |
Applications and Gaming > QoS | . . . . . . . . | . . . . | . . | 22 |
Administration > Management |
|
|
| 24 |
Administration > Log | . . . . . . . . | . . . . | . | .25 |
Administration > Diagnostics | . . . . . . . . | . . . . | . | 26 |
Administration > Factory Defaults |
|
|
| 26 |
Administration > Firmware Upgrade | . . . . . . . . | . . . . | . . | 27 |
Status > Router | . . . . . . . . | . . . . | . | 27 |
Status > Local Network | . . . . . . . . | . . . . | . . | 27 |
Status > Wireless Network | . . . . . . . . | . . . . | . | .28 |
Appendix A: |
|
|
|
|
Troubleshooting |
|
|
| 29 |
Appendix B: |
|
|
|
|
Specifications |
|
|
| 30 |
ii |