vi
v1.0, May 2007
Information to Gather Before Changing the Wireless Settings
................................
2-3
Viewing or Change Wireless Settings
......................................................................
2-4
Understanding Wireless Security
...................................................................................
2-6
Wireless Security Options
........................................................................................
2-7
WEP Wireless Security
...................................................................................................
2-8
Setting Up WEP
.......................................................................................................
2-8
WPA-PSK or WPA2-PSK Wireless Security
.................................................................
2-11
Wireless Adapter Compatibility
..............................................................................
2-11
Setting Up WPA-PSK or WPA2-PSK
.....................................................................
2-12
Restricting Wireless Access by MAC Address
.............................................................
2-13
Advanced Wireless Settings
.........................................................................................
2-15
Chapter 3
Content Filtering
Blocking Access to Internet Sites
...................................................................................
3-1
Keyword Application Examples
................................................................................
3-2
Blocking Services (Port Filtering)
...................................................................................
3-2
Blocking Access to Internet Services
.......................................................................
3-3
Adding a Service to be Blocked
...............................................................................
3-3
Creating a User-Defined Service Type
.....................................................................
3-4
Scheduling Blocking
.......................................................................................................
3-5
E-Mail Alerts and Web Access Log Notifications
............................................................
3-6
Viewing Logs of Web Access or Attempted Web Access
...............................................
3-8
Chapter 4
Maintenance
Viewing the Router Status
..............................................................................................
4-1
Viewing a List of Attached Devices
.................................................................................
4-3
Upgrading the Router Firmware
.....................................................................................
4-3
Configuration File Management
.....................................................................................
4-5
Backing Up and Restoring the Configuration
...........................................................
4-5
Erasing the Configuration
.........................................................................................
4-6
Changing the Administrator Password
...........................................................................
4-6
Chapter 5
Advanced Configuration
Configuring Port Forwarding to Local Servers
................................................................
5-1
Adding a Port-Forwarding Custom Service
..............................................................
5-2