Table of Contents
Chapter 1: Introduction | 1 |
Welcome | 1 |
What’s in this Guide? | 2 |
Chapter 2: Planning Your Wireless Network | 5 |
Network Topology | 5 |
5 | |
Network Layout | 6 |
Chapter 3: Getting to Know the Router | 7 |
The Back Panel | 7 |
The Front Panel | 8 |
Chapter 4: Connecting the Router | 9 |
Overview | 9 |
Connection Instructions | 10 |
Chapter 5: Configuring the Router | 11 |
Overview | 11 |
How to Access the | 14 |
The Setup Tab - Basic Setup | 15 |
The Setup Tab - DDNS | 22 |
The Setup Tab - MAC Address Clone | 24 |
The Setup Tab - Advanced Routing | 25 |
The Wireless Tab - Basic Wireless Settings | 27 |
The Wireless Tab - Wireless Security | 28 |
The Wireless Tab - Wireless Network Access | 30 |
The Wireless Tab - Advanced Wireless Settings | 31 |
Wireless-G Broadband Router with 2 Phone Ports
The Security Tab - Filter | 33 |
The Security Tab - VPN Passthrough | 35 |
The Voice Tab | 36 |
The Applications & Gaming Tab - Port Range Forwarding 36 | |
The Applications & Gaming Tab - Port Triggering | 37 |
The Applications & Gaming Tab - UPnP Forwarding | 38 |
The Applications & Gaming Tab - DMZ | 41 |
The Applications & Gaming Tab - QoS | 42 |
The Administration Tab - Management | 45 |
The Administration Tab - Log | 47 |
The Administration Tab - Factory Defaults | 48 |
The Administration Tab - Firmware Upgrade | 48 |
The Status Tab - Voice | 49 |
The Status Tab - Router | 50 |
The Status Tab - Local Network | 51 |
The Status Tab - Wireless | 52 |
Appendix A: Troubleshooting | 53 |
Common Problems and Solutions | 53 |
Frequently Asked Questions | 67 |
Appendix B: Wireless Security | 77 |
Security Precautions | 77 |
Security Threats Facing Wireless Networks | 78 |