WNDR3400 User Manual
Page 72
N600 Wireless Dual Band Router WNDR3400 User Manual 3. You can select one of traffic are allowed. • By specifying how many hours of the following to occur when the limit is .... 5. Click the Traffic Status button if you would like to incoming traffic only. • Both Directions - The restriction is reached. Set up Traffic Control to issue a warning message before the month limit of Mbytes or Hours is applied to record and restrict the volume of the following options for controlling the...
N600 Wireless Dual Band Router WNDR3400 User Manual 3. You can select one of traffic are allowed. • By specifying how many hours of the following to occur when the limit is .... 5. Click the Traffic Status button if you would like to incoming traffic only. • Both Directions - The restriction is reached. Set up Traffic Control to issue a warning message before the month limit of Mbytes or Hours is applied to record and restrict the volume of the following options for controlling the...
WNDR3400 User Manual
Page 79
...network and computers against attacks and intrusions. Do not select this check box. For some online games and videoconferencing. N600 Wireless Dual Band Router WNDR3400 User Manual Configuring the WAN Setup Options The WAN Setup screen lets you are described in the following section, Configuring Static Routes. Be careful ...) The normal MTU (Maximum Transmit Unit) value for most Ethernet networks is necessary for known exploits such as when you are troubleshooting application issues. This should be used only as a diagnostic tool, since it makes the firewall security less effective.
...network and computers against attacks and intrusions. Do not select this check box. For some online games and videoconferencing. N600 Wireless Dual Band Router WNDR3400 User Manual Configuring the WAN Setup Options The WAN Setup screen lets you are described in the following section, Configuring Static Routes. Be careful ...) The normal MTU (Maximum Transmit Unit) value for most Ethernet networks is necessary for known exploits such as when you are troubleshooting application issues. This should be used only as a diagnostic tool, since it makes the firewall security less effective.