Actiontec Wireless Broadband Router User Manual
Note that it is the origin of the request, not subsequent responses to this request, which determines whether a session can be established or not.
The Router features three
| Requests from the Internet | Requests from the local | |
Security Level | (incoming traffic) | network (outgoing traffic) | |
| Blocked - No access to local | Limited - Only commonly | |
Maximum | network from Internet, | used services, such as web | |
except as configured in the | browsing and | ||
Security | |||
Port Forwarding, DMZ host, | permitted. | ||
| |||
| and Remote Access screens. |
| |
| Blocked - No access to local | Unrestricted - All services | |
| network from Internet, | are permitted, except as | |
Typical Security | except as configured in the | configured in the Access | |
| Port Forwarding, DMZ host, | Control screen. | |
| and Remote Access screens. |
| |
| Unrestricted - Permits full | Unrestricted - All services | |
Minimum | access from Internet to local | are permitted, except as | |
Security | network; all connection | configured in the Access | |
| attempts permitted. | Control screen. |
These services include Telnet, FTP, HTTP, HTTPS, DNS, IMAP, POP3 and SMTP.
☞Note: Some applications (such as some Internet messengers and
To configure the Router’s security settings:
1.From the General screen, select a security level by clicking the appropriate radio button. Using the Minimum Security setting may expose the local network to significant security risks, and thus should only be used for short periods of time.
78