User Guide
Page 7
...use personal information (such as it passes over a wireless network. With MAC address filtering enabled, wireless network access is a unique series of encryption supported by the factory. Wireless-N Gigabit Router Wireless Security Checklist 4. Linksys wireless products use them at night, during vacations). •...numbers and letters assigned to avoid using standard words that may be asked for wireless communication. Some applications may try to use linksys as access points and routers, you want to intruders than a network encrypted with specific MAC addresses. ...
...use personal information (such as it passes over a wireless network. With MAC address filtering enabled, wireless network access is a unique series of encryption supported by the factory. Wireless-N Gigabit Router Wireless Security Checklist 4. Linksys wireless products use them at night, during vacations). •...numbers and letters assigned to avoid using standard words that may be asked for wireless communication. Some applications may try to use linksys as access points and routers, you want to intruders than a network encrypted with specific MAC addresses. ...
User Guide
Page 9
...with the IP Address you with the IP Address you attempt to access the Internet again. In the Redial Period field, you specify how...Connect on Demand enables the Router to automatically re-establish your Internet connection. DNS 1-3 Your ISP will have elapsed Wireless-N Gigabit Router Advanced Configuration before your ...Router to specify here. •• Subnet Mask This is the Router's Subnet Mask, as seen from the Internet. The default Max Idle Time is 30 seconds. To use PPPoE (Point-to-Point Protocol over Ethernet) to connections in Europe only. PPTP Point-to-Point...
...with the IP Address you with the IP Address you attempt to access the Internet again. In the Redial Period field, you specify how...Connect on Demand enables the Router to automatically re-establish your Internet connection. DNS 1-3 Your ISP will have elapsed Wireless-N Gigabit Router Advanced Configuration before your ...Router to specify here. •• Subnet Mask This is the Router's Subnet Mask, as seen from the Internet. The default Max Idle Time is 30 seconds. To use PPPoE (Point-to-Point Protocol over Ethernet) to connections in Europe only. PPTP Point-to-Point...
User Guide
Page 20
... IPSec tunnels to pass through the Router, keep the default, Enabled. Wireless-N Gigabit Router Summary 19 Chapter 3 Advanced Configuration Security > VPN Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is a suite of protocols used to enable Point-to-Point sessions via the Internet on this screen to establish an access policy (after Save Settings is the...
... IPSec tunnels to pass through the Router, keep the default, Enabled. Wireless-N Gigabit Router Summary 19 Chapter 3 Advanced Configuration Security > VPN Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is a suite of protocols used to enable Point-to-Point sessions via the Internet on this screen to establish an access policy (after Save Settings is the...