Wireless-N Gigabit Security Router with VPN
Figure 6-11: Setup - LAN
32
Figure 6-12: Setup - DMZ
34
Figure 6-13: Setup - MAC Address Clone
34
Figure 6-14: Setup - Advanced Routing
35
Figure 6-15: Setup - Advanced Routing (Routing Table)
36
Figure 6-16: Setup - Time
37
Figure 6-17: Wireless - Basic Wireless Settings
38
Figure 6-18: Wireless - Wireless Security (Disabled)
40
Figure 6-19: Wireless - Wireless Security (WPA-Personal)
40
Figure 6-20: Wireless - Wireless Security (WPA2-Personal)
41
Figure 6-21: Wireless - Wireless Security (WPA2-Personal Mixed)
41
Figure 6-22: Wireless - Wireless Security (WPA-Enterprise)
42
Figure 6-23: Wireless - Wireless Security (WPA2-Enterprise)
42
Figure 6-24: Wireless - Wireless Security (WPA2-Enterprise Mixed)
43
Figure 6-25: Wireless - Wireless Security (WEP)
43
Figure 6-26: Wireless - Wireless Connection Control
44
Figure 6-27: Select MAC Address from Wireless Client List
44
Figure 6-28: Wireless - Advanced Wireless Settings
45
Figure 6-29: Firewall - Basic Settings
47
Figure 6-30: Firewall - IP Based ACL
49
Figure 6-31: Firewall - IP Based ACL (pre-defined services)
49
Figure 6-32: Firewall - IP Based ACL (Service definition)
50
Figure 6-33: Firewall - Edit IP ACL Rule
50
Figure 6-34: Firewall - Internet Access Policy
52
Figure 6-35: Firewall - Internet Access Policy Summary
53
Figure 6-36: Firewall - Internet Access Policy (List of PCs to apply policy)
53
Figure 6-37: Firewall - Single Port Forwarding
54
Figure 6-38: Port Range Forwarding
55
Figure 6-39: Port Range Triggering
56
Figure 6-40: Firewall - Services
57
Downloaded from
www.Manualslib.com
manuals search engine