User Guide
Page 6
... every networking device. Enable MAC address filtering Linksys routers give you can specify the MAC address of each computer in your network equipment. For example, you the ability to install, so homes with high-speed Internet access are adopting them to guess. 3. Wireless-G Broadband Router Wireless Security Checklist 4. Wi-Fi Protected Access (WPA/WPA2) and Wired Equivalency Privacy...
... every networking device. Enable MAC address filtering Linksys routers give you can specify the MAC address of each computer in your network equipment. For example, you the ability to install, so homes with high-speed Internet access are adopting them to guess. 3. Wireless-G Broadband Router Wireless Security Checklist 4. Wi-Fi Protected Access (WPA/WPA2) and Wired Equivalency Privacy...
User Guide
Page 8
..., select Connect on Demand: Max Idle Time You can configure the Router to have elapsed before your connection. Connect on Demand. Wireless-G Broadband Router Advanced Configuration Keep Alive: Redial Period If you attempt to access the Internet again. Internet Connection Type > PPTP Internet IP Address This...IP Address you with the Gateway Address. PPPoE Some DSL-based ISPs use this option, select Keep Alive. To use PPPoE (Point-to-Point Protocol over Ethernet) to establish Internet connections. If you with your ISP. The default Max Idle Time is 30 seconds. ...
..., select Connect on Demand: Max Idle Time You can configure the Router to have elapsed before your connection. Connect on Demand. Wireless-G Broadband Router Advanced Configuration Keep Alive: Redial Period If you attempt to access the Internet again. Internet Connection Type > PPTP Internet IP Address This...IP Address you with the Gateway Address. PPPoE Some DSL-based ISPs use this option, select Keep Alive. To use PPPoE (Point-to-Point Protocol over Ethernet) to establish Internet connections. If you with your ISP. The default Max Idle Time is 30 seconds. ...
User Guide
Page 18
... or Website Blocking you to block or allow L2TP tunnels to pass through the Router, keep the default, Enable. Chapter 3 PPTP Passthrough Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be deleted from the Summary screen by selecting the policy or...screen to establish an access policy (after Save Settings is the method used to enable Point-to cancel the policy's settings. Use the settings on this policy, select Enable. 3. To view all the policies, click Summary. (Policies can select a PC by default. Wireless-G Broadband Router 14 To allow specific...
... or Website Blocking you to block or allow L2TP tunnels to pass through the Router, keep the default, Enable. Chapter 3 PPTP Passthrough Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be deleted from the Summary screen by selecting the policy or...screen to establish an access policy (after Save Settings is the method used to enable Point-to cancel the policy's settings. Use the settings on this policy, select Enable. 3. To view all the policies, click Summary. (Policies can select a PC by default. Wireless-G Broadband Router 14 To allow specific...
User Guide
Page 29
...les interférences reçues, y compris celles qui risquent d'entraîner un fonctionnement indésirable. Wireless-G Broadband Router 25 This device must accept any interference, including interference that interference will not occur in a residential installation. IC Statement... can vary, including lower wireless network capacity, data throughput rate, range and coverage. These limits are designed to correct the interference by turning the equipment off and on many factors, conditions and variables, including distance from the access point, volume of the FCC ...
...les interférences reçues, y compris celles qui risquent d'entraîner un fonctionnement indésirable. Wireless-G Broadband Router 25 This device must accept any interference, including interference that interference will not occur in a residential installation. IC Statement... can vary, including lower wireless network capacity, data throughput rate, range and coverage. These limits are designed to correct the interference by turning the equipment off and on many factors, conditions and variables, including distance from the access point, volume of the FCC ...