5.2.6
Telstra Big Pond .............................................................................................................
29
5.2.7
DNS ................................................................................................................................
30
5.2.8
DDNS..............................................................................................................................
31
5.3
LAN.....................................................................................................................................
5.4
WIRELESS ............................................................................................................................
33
5.4.1
Basic Settings..................................................................................................................
34
5.4.2
Advance Settings.............................................................................................................
5.4.3
Security ...........................................................................................................................
36
5.4.4
Access Control ................................................................................................................
41
5.5
QOS .....................................................................................................................................
5.5.1
Add/Edit QoS Rule..........................................................................................................
42
5.6
NAT.....................................................................................................................................
43
5.6.1
Port Forwarding.............................................................................................................
45
5.6.2
Virtual Server..................................................................................................................
46
5.6.3
Special Applications .......................................................................................................
48
5.6.4
UPnP ..............................................................................................................................
50
5.6.5
ALG Settings...................................................................................................................
51
5.7
FIREWALL.............................................................................................................................
5.7.1
53
5.7.2
URL Blocking .................................................................................................................
55
5.7.3
DoS .................................................................................................................................
56
5.7.4
DMZ................................................................................................................................
57
59
6.1
AP MODE.............................................................................................................................
6.2
STATION - AD HOC MODE ....................................................................................................
61
6.3
STATION - INFRASTRUCTURE MODE .....................................................................................
62
6.4
AP BRIDGE - POINT TO POINT MODE ...................................................................................
63
6.5
AP BRIDGE - POINT TO MULTIPOINT MODE .........................................................................
65
6.6
AP BRIDGE - WDS MODE....................................................................................................
66
6.7
SECURITY SETTING OF BRIDGE MODE ...................................................................................
67
CHAPTER 7
70
7.1
INTERNET CONNECTION .......................................................................................................
7.2
DEVICE STATUS....................................................................................................................
71
7.3
SYSTEM LOG ........................................................................................................................
72
7.4
SECURITY LOG .....................................................................................................................
7.5
ACTIVE DHCP CLIENT ........................................................................................................
73
7.6
STATISTICS ...........................................................................................................................
74