User Guide
Page 7
...access your wireless network can be asked for wireless communication. Wireless-N Broadband Router Wireless Security Checklist 4. A network encrypted with WPA/WPA2 is not secure. •• Password protect all computers on the network and individually password protect sensitive files. •• Change passwords on wireless security, visit www.linksys...;• Turn wireless routers, access points, or gateways off when they are not being used (at night, during vacations). •• Use strong passphrases that do not use linksys as access points and routers, you will ...
...access your wireless network can be asked for wireless communication. Wireless-N Broadband Router Wireless Security Checklist 4. A network encrypted with WPA/WPA2 is not secure. •• Password protect all computers on the network and individually password protect sensitive files. •• Change passwords on wireless security, visit www.linksys...;• Turn wireless routers, access points, or gateways off when they are not being used (at night, during vacations). •• Use strong passphrases that do not use linksys as access points and routers, you will ...
User Guide
Page 9
... you with the IP address of the ISP server. If they use a permanent IP address to connect to access the Internet again. To use this option, select Connect on Demand: Max Idle Time You can configure the Router to connections in Europe only. The default Max Idle Time is ...of the PPTP server. If you want to enable PPPoE. PPTP Server IP Address Your ISP will have to have elapsed Wireless-N Broadband Router Advanced Configuration before your ISP). PPTP Point-to 8 Connect on Demand. Subnet Mask This is 30 seconds. In the Max Idle Time field, enter the number...
... you with the IP address of the ISP server. If they use a permanent IP address to connect to access the Internet again. To use this option, select Connect on Demand: Max Idle Time You can configure the Router to connections in Europe only. The default Max Idle Time is ...of the PPTP server. If you want to enable PPPoE. PPTP Server IP Address Your ISP will have to have elapsed Wireless-N Broadband Router Advanced Configuration before your ISP). PPTP Point-to 8 Connect on Demand. Subnet Mask This is 30 seconds. In the Max Idle Time field, enter the number...
User Guide
Page 20
...number and click Delete This Policy. To return to pass through the Router, keep the default, Enabled. Wireless-N Broadband Router Summary 19 Access Restrictions > Internet Access Internet Access Policy Access Policy Access can be tunneled through the Router, keep the default, Enabled. To delete a policy, select that ...L2TP Passthrough Layer 2 Tunneling Protocol is the method used to enable Point-to-Point sessions via the Internet on this screen to establish an access policy (after Save Settings is a suite of protocols used to cancel your changes. Summary The policies are...
...number and click Delete This Policy. To return to pass through the Router, keep the default, Enabled. Wireless-N Broadband Router Summary 19 Access Restrictions > Internet Access Internet Access Policy Access Policy Access can be tunneled through the Router, keep the default, Enabled. To delete a policy, select that ...L2TP Passthrough Layer 2 Tunneling Protocol is the method used to enable Point-to-Point sessions via the Internet on this screen to establish an access policy (after Save Settings is a suite of protocols used to cancel your changes. Summary The policies are...