Table of Contents
Chapter 1: Introduction  | 1  | 
Welcome  | 1  | 
What’s in this Guide?  | 2  | 
Chapter 2: Planning Your Wireless Network  | 5  | 
Network Topology  | 5  | 
5  | |
Network Layout  | 6  | 
Chapter 3: Getting to Know the Router  | 7  | 
The Back Panel  | 7  | 
The Front Panel  | 8  | 
Chapter 4: Connecting the Router  | 9  | 
Overview  | 9  | 
Connection Instructions  | 10  | 
Chapter 5: Configuring the Router  | 11  | 
Overview  | 11  | 
How to Access the   | 14  | 
The Setup Tab - Basic Setup  | 15  | 
The Setup Tab - DDNS  | 22  | 
The Setup Tab - MAC Address Clone  | 24  | 
The Setup Tab - Advanced Routing  | 25  | 
The Wireless Tab - Basic Wireless Settings  | 27  | 
The Wireless Tab - Wireless Security  | 28  | 
The Wireless Tab - Wireless Network Access  | 30  | 
The Wireless Tab - Advanced Wireless Settings  | 31  | 
Wireless-G  Broadband Router with 2 Phone Ports
The Security Tab - Filter  | 33  | 
The Security Tab - VPN Passthrough  | 35  | 
The Voice Tab  | 36  | 
The Applications & Gaming Tab - Port Range Forwarding 36  | |
The Applications & Gaming Tab - Port Triggering  | 37  | 
The Applications & Gaming Tab - UPnP Forwarding  | 38  | 
The Applications & Gaming Tab - DMZ  | 41  | 
The Applications & Gaming Tab - QoS  | 42  | 
The Administration Tab - Management  | 45  | 
The Administration Tab - Log  | 47  | 
The Administration Tab - Factory Defaults  | 48  | 
The Administration Tab - Firmware Upgrade  | 48  | 
The Status Tab - Voice  | 49  | 
The Status Tab - Router  | 50  | 
The Status Tab - Local Network  | 51  | 
The Status Tab - Wireless  | 52  | 
Appendix A: Troubleshooting  | 53  | 
Common Problems and Solutions  | 53  | 
Frequently Asked Questions  | 67  | 
Appendix B: Wireless Security  | 77  | 
Security Precautions  | 77  | 
Security Threats Facing Wireless Networks  | 78  |