Page 26 / 137
Scroll up to view Page 21 - 25
26
3.2
Creating a Guest Network
The Guest Network provides temporary visitors with Internet
connectivity via access to separate SSIDs or networks without
providing access to your private network.
NOTE:
RT-AC3200 supports up to six SSIDs (three 2.4GHz and three
5GHz SSIDs).
To create a guest network:
1.
From the navigation panel, go to
General
>
Guest Network
.
2.
On the Guest Network screen, select 2.4Ghz, 5Ghz-1, or 5Ghz-
2 frequency band for the guest network that you want to
create.
3.
Click
Enable
.
Page 27 / 137
27
4.
To change a guest’s settings, click the guest settings you want
to modify. Click
Remove
to delete the guest’s settings.
5.
Assign a wireless name for your temporary network on the
Network Name (SSID) field.
6.
Select an Authentication Method.
7.
If you select a WPA authentication method, select a WPA
Encryption.
8.
Specify the Access time or choose
Limitless
.
9.
Select
Disable
or
Enable
on the Access Intranet item.
10. When done, click
Apply
.
Page 28 / 137
28
3.3
AiProtection
AiProtection provides real-time monitoring that detects malware,
spyware, and unwanted access. It also filters unwanted websites
and apps and allows you to schedule a time that a connected
device is able to access the Internet.
Page 29 / 137
29
3.3.1 Network Protection
Network Protection prevents network exploits and secures your
network from unwanted access.
Configuring Network Protection
To configure Network Protection:
1.
From the navigation panel, go to
General
>
AiProtection
.
2.
From the
AiProtection
main page, click on
Network
Protection
.
3.
From the
Network Protection
tab, click
Scan
.
When done scanning, the utility displays the results on the
Router Security Assessment
page.
Page 30 / 137
30
IMPORTANT!
Items marked as
Yes
on the
Router Security Assessment
page is considered to be at a
safe
status. Items marked as
No
,
Weak
, or
Very Weak
is highly recommended to be configured accordingly.
4.
(Optional) From the
Router Security Assessment
page,
manually configure the items marked as
No
,
Weak
, or
Very
Weak
.
To do this:
a.
Click an item.
NOTE:
When you click an item, the utility forwards you to the item’s
setting page.
b.
From the item’s security settings page, configure and
make the necessary changes and click
Apply
when done.
c.
Go back to the
Router Security Assessment
page and
click
Close
to exit the page.
5.
To automatically configure the security settings, click
Secure
Your Router.
6.
When a message prompt appears, click
OK
.