User Guide
Page 3
... 8 Hardware Installation for Connection to Another Router 10 Chapter 5: Configuring the Wireless-G Home Router 12 Overview 12 The Setup Tab - DDNS 18 The Setup Tab - VPN Passthrough 29 The Access Restrictions Tab - Port Range Forward 34 The Applications & Gaming Tab - Basic Setup 13 The Setup Tab - Basic Wireless Settings 21 The...
... 8 Hardware Installation for Connection to Another Router 10 Chapter 5: Configuring the Wireless-G Home Router 12 Overview 12 The Setup Tab - DDNS 18 The Setup Tab - VPN Passthrough 29 The Access Restrictions Tab - Port Range Forward 34 The Applications & Gaming Tab - Basic Setup 13 The Setup Tab - Basic Wireless Settings 21 The...
User Guide
Page 6
... - Local Network 43 Figure 5-53: DHCP Clients Table 43 Figure 5-54: Traffic Statistics 44 Figure 5-55: Status Tab - Wireless-G Home Router Figure 5-23: Wireless Tab - VPN Passthrough 29 Figure 5-30: Security Tab - Port Range Forward 34 Figure 5-37: Applications and Gaming Tab - Management 38 Figure 5-41: Administration Tab - Port Triggering 35...
... - Local Network 43 Figure 5-53: DHCP Clients Table 43 Figure 5-54: Traffic Statistics 44 Figure 5-55: Status Tab - Wireless-G Home Router Figure 5-23: Wireless Tab - VPN Passthrough 29 Figure 5-30: Security Tab - Port Range Forward 34 Figure 5-37: Applications and Gaming Tab - Management 38 Figure 5-41: Administration Tab - Port Triggering 35...
User Guide
Page 8
... serve as a DHCP Server, has a powerful SPI firewall to protect your networks all of a local area network to get the most known Internet attacks, supports VPN pass-through, and can be fun. PCs on another computer's hard drive. PCs equipped with a RADIUS server. These instructions should be used for Wireless-B or...
... serve as a DHCP Server, has a powerful SPI firewall to protect your networks all of a local area network to get the most known Internet attacks, supports VPN pass-through, and can be fun. PCs on another computer's hard drive. PCs equipped with a RADIUS server. These instructions should be used for Wireless-B or...
User Guide
Page 36
...Enable/Disable the Prevent ARP attack. Edit IP-MAC mapping list. If the IP address is 1 to 9 times per second, choose "Fixed schedule". VPN Passthrough Figure 5-30: Security Tab - Help information is the method used to broadcast the MAC address. The Security Tab - ARP 29 The Security ...Tab - To allow VPN tunnels using IPSec, PPTP, or L2TP protocols to pass through the Router, click Enable. Layer 2 Tunneling Protocol is shown on the Layer 2 ...
...Enable/Disable the Prevent ARP attack. Edit IP-MAC mapping list. If the IP address is 1 to 9 times per second, choose "Fixed schedule". VPN Passthrough Figure 5-30: Security Tab - Help information is the method used to broadcast the MAC address. The Security Tab - ARP 29 The Security ...Tab - To allow VPN tunnels using IPSec, PPTP, or L2TP protocols to pass through the Router, click Enable. Layer 2 Tunneling Protocol is shown on the Layer 2 ...
User Guide
Page 57
....168.1.100 192.168.1.105 192.168.1.102 192.168.1.100 Enabled X X X X When you are using . Consider the example below: Application UT Halflife PC Anywhere VPN IPSEC Start and End 7777 to 27900 27015 to 27015 5631 to 5631 500 to use other words, data that you are not sure which...
....168.1.100 192.168.1.105 192.168.1.102 192.168.1.100 Enabled X X X X When you are using . Consider the example below: Application UT Halflife PC Anywhere VPN IPSEC Start and End 7777 to 27900 27015 to 27015 5631 to 5631 500 to use other words, data that you are not sure which...
User Guide
Page 77
...device. Port - The connection point on a computer or networking device used as a type of data sent over Ethernet (PoE) - A VPN protocol that a manufacturer assigns to -Point Tunneling Protocol) - PPPoE (Point to be tunneled through an IP network. RADIUS (Remote Authentication Dial-...device on the Internet. IPCONFIG - A Windows 2000 and XP utility that provides authentication (username and password) in Europe. A VPN protocol used to implement secure exchange of data sharing, storage, and/or transmission between users. The computers and networking products that ...
...device. Port - The connection point on a computer or networking device used as a type of data sent over Ethernet (PoE) - A VPN protocol that a manufacturer assigns to -Point Tunneling Protocol) - PPPoE (Point to be tunneled through an IP network. RADIUS (Remote Authentication Dial-...device on the Internet. IPCONFIG - A Windows 2000 and XP utility that provides authentication (username and password) in Europe. A VPN protocol used to implement secure exchange of data sharing, storage, and/or transmission between users. The computers and networking products that ...