A SERVICE OF

logo

Wireless-N Gigabit Security Router with VPN
Figure 6-11: Setup - LAN 32
Figure 6-12: Setup - DMZ 34
Figure 6-13: Setup - MAC Address Clone 34
Figure 6-14: Setup - Advanced Routing 35
Figure 6-15: Setup - Advanced Routing (Routing Table) 36
Figure 6-16: Setup - Time 37
Figure 6-17: Wireless - Basic Wireless Settings 38
Figure 6-18: Wireless - Wireless Security (Disabled) 40
Figure 6-19: Wireless - Wireless Security (WPA-Personal) 40
Figure 6-20: Wireless - Wireless Security (WPA2-Personal) 41
Figure 6-21: Wireless - Wireless Security (WPA2-Personal Mixed) 41
Figure 6-22: Wireless - Wireless Security (WPA-Enterprise) 42
Figure 6-23: Wireless - Wireless Security (WPA2-Enterprise) 42
Figure 6-24: Wireless - Wireless Security (WPA2-Enterprise Mixed) 43
Figure 6-25: Wireless - Wireless Security (WEP) 43
Figure 6-26: Wireless - Wireless Connection Control 44
Figure 6-27: Select MAC Address from Wireless Client List 44
Figure 6-28: Wireless - Advanced Wireless Settings 45
Figure 6-29: Firewall - Basic Settings 47
Figure 6-30: Firewall - IP Based ACL 49
Figure 6-31: Firewall - IP Based ACL (pre-defined services) 49
Figure 6-32: Firewall - IP Based ACL (Service definition) 50
Figure 6-33: Firewall - Edit IP ACL Rule 50
Figure 6-34: Firewall - Internet Access Policy 52
Figure 6-35: Firewall - Internet Access Policy Summary 53
Figure 6-36: Firewall - Internet Access Policy (List of PCs to apply policy) 53
Figure 6-37: Firewall - Single Port Forwarding 54
Figure 6-38: Port Range Forwarding 55
Figure 6-39: Port Range Triggering 56
Figure 6-40: Firewall - Services 57