Internet services, blocking access 3-3interval, poll 6-6
IP addresses
blocking access by 3-5current 6-3dynamic or static 1-7LAN 4-3
registering domain name 4-6reserved 4-5
IP subnet mask 4-3,6-3ISP settings, basic 1-5italic text xi
K
keys, encryption 2-10keywords, blocking by 3-1knowledge base 1-4
L
LAN IP setup 4-1
LAN path, troubleshooting 7-9LAN port settings 6-3
lease, DHCP 6-5Legacy mode 2-8
local network, default settings A-1local servers, port forwarding to 5-6logging in 1-2
login required 1-8login settings A-1logout, automatic 1-5
logs sending 3-7
time-stamping entries 3-9viewing 3-6
M
MAC addresses attached devices 6-7current 6-3
entering 1-7
restricting access by 2-19spoofing 7-7
mail server, outgoing 3-8managing router remotely 6-13metric value 4-12
mixed mode encryption 2-3,2-11mode, communication 2-8,6-4MTU size 4-9,5-15
N
NAT (Network Address Translation) 4-8,4-10,5-2Neighbor Friendly mode 2-8
NetBIOS host name 6-7
Network Time Protocol (NTP) 3-9,7-10
O
obstructions, connecting through 5-17Open System authentication 2-9optimizing performance 5-14outgoing mail server 3-8
P
passphrases 2-9,2-10,2-11
password changing 2-21restoring 7-12
path, testing 7-10PDF, printing xiii Performance mode 2-8performance, optimizing 5-14physical push button (WPS) 2-14physical specifications A-3PIN 2-15,2-17
ping 4-9,7-8placement, router 5-15poll interval 6-6port filtering 3-3