User Guide
Page 3
VPN Passthrough 27 The Access Restrictions Tab - Management 34 DDNS 18 The Setup Tab - Advanced Wireless Settings 25 The Security Tab - QoS 32 The Administration Tab - Advanced Routing 19 The Wireless Tab - Firewall 27 The Security Tab - Port Range ... - Wireless Security 21 The Wireless Tab - Internet Access 28 The Applications and Gaming Tab - Basic Wireless Settings 20 The Wireless Tab - DMZ 32 The Applications and Gaming Tab - Basic Setup 13 The Setup Tab - Wireless MAC Filter 24 The Wireless Tab - Wireless-G Broadband Router Table...
VPN Passthrough 27 The Access Restrictions Tab - Management 34 DDNS 18 The Setup Tab - Advanced Wireless Settings 25 The Security Tab - QoS 32 The Administration Tab - Advanced Routing 19 The Wireless Tab - Firewall 27 The Security Tab - Port Range ... - Wireless Security 21 The Wireless Tab - Internet Access 28 The Applications and Gaming Tab - Basic Wireless Settings 20 The Wireless Tab - DMZ 32 The Applications and Gaming Tab - Basic Setup 13 The Setup Tab - Wireless MAC Filter 24 The Wireless Tab - Wireless-G Broadband Router Table...
User Guide
Page 6
VPN Passthrough 27 Figure 5-29: Access Restrictions Tab - QOS 32 Figure 5-38: Administration Tab - Router 37 Figure 5-47: Status Tab - Firewall 27 Figure 5-28: Security Tab - Port ...Wireless Security (WEP) 23 Figure 5-24: Wireless Tab - Config Management 36 Figure 5-46: Status Tab - Advanced Wireless Settings 25 Figure 5-27: Security Tab - Wireless 39 Figure C-1: Upgrade Firmware 57 Figure E-1: MAC Address/Physical Address 59 Figure E-2: MAC Address Filter List 59 Figure E-3: MAC Address Clone 60 Wireless-G Broadband Router Figure 5-23: Wireless...
VPN Passthrough 27 Figure 5-29: Access Restrictions Tab - QOS 32 Figure 5-38: Administration Tab - Router 37 Figure 5-47: Status Tab - Firewall 27 Figure 5-28: Security Tab - Port ...Wireless Security (WEP) 23 Figure 5-24: Wireless Tab - Config Management 36 Figure 5-46: Status Tab - Advanced Wireless Settings 25 Figure 5-27: Security Tab - Wireless 39 Figure C-1: Upgrade Firmware 57 Figure E-1: MAC Address/Physical Address 59 Figure E-2: MAC Address Filter List 59 Figure E-3: MAC Address Clone 60 Wireless-G Broadband Router Figure 5-23: Wireless...
User Guide
Page 34
... transmissions to disable this feature. This feature is enabled by default. The Security Tab - L2TP Pass-through the Router, click Enable. Wireless-G Broadband Router The Security Tab - Both functions of the Block WAN Request feature make it more detailed review of packets at... the same time. Select Enabled to filter Internet NAT redirection, or Disabled to disable this feature. VPN Passthrough Use the ...
... transmissions to disable this feature. This feature is enabled by default. The Security Tab - L2TP Pass-through the Router, click Enable. Wireless-G Broadband Router The Security Tab - Both functions of the Block WAN Request feature make it more detailed review of packets at... the same time. Select Enabled to filter Internet NAT redirection, or Disabled to disable this feature. VPN Passthrough Use the ...
User Guide
Page 51
...the field provided. If the port number that you have port forwarding, then the Router will work . Go to host an online game or Internet application. Consider the example below: Application UT Halflife PC Anywhere VPN IPSEC Start and End 7777 to 27900 27015 to 27015 5631 to 5631 500 to...many ports or when you are using DeMilitarized Zone (DMZ) hosting. Check the Enable option for the port services you want to use . Wireless-G Broadband Router If you want to play online games or use Internet applications, most will send the data to whichever PC or network device you set for...
...the field provided. If the port number that you have port forwarding, then the Router will work . Go to host an online game or Internet application. Consider the example below: Application UT Halflife PC Anywhere VPN IPSEC Start and End 7777 to 27900 27015 to 27015 5631 to 5631 500 to...many ports or when you are using DeMilitarized Zone (DMZ) hosting. Check the Enable option for the port services you want to use . Wireless-G Broadband Router If you want to play online games or use Internet applications, most will send the data to whichever PC or network device you set for...
User Guide
Page 71
...Infrastructure - NAT technology translates IP addresses of packets at once. Appendix F: Glossary 64 Wireless-G Broadband Router HTTP (HyperText Transport Protocol) - IPCONFIG - NNTP (Network News Transfer Protocol) - Node - A wireless network that provides access to a wired network via an access point. IP (Internet...World Wide Web. The computers and networking products that a manufacturer assigns to send data over a network. A VPN protocol used to connect to a different IP address for data transmission. The communications protocol used to implement secure ...
...Infrastructure - NAT technology translates IP addresses of packets at once. Appendix F: Glossary 64 Wireless-G Broadband Router HTTP (HyperText Transport Protocol) - IPCONFIG - NNTP (Network News Transfer Protocol) - Node - A wireless network that provides access to a wired network via an access point. IP (Internet...World Wide Web. The computers and networking products that a manufacturer assigns to send data over a network. A VPN protocol used to connect to a different IP address for data transmission. The communications protocol used to implement secure ...
User Guide
Page 72
...are then transmitted in a network is to provide user access to determine whether a particular IP address is also used for Linksys products. Passphrase - PEAP (Protected Extensible Authentication Protocol) - Ping (Packet INternet Groper) - An Internet utility used to files...cable to -Point Tunneling Protocol) - A VPN protocol that connects multiple networks together. A protocol that separates the data stream into a number of the wireless signal that holds up to be tunneled through the RTS Threshold setting. Server - Router - POP3 (Post Office Protocol 3) -...
...are then transmitted in a network is to provide user access to determine whether a particular IP address is also used for Linksys products. Passphrase - PEAP (Protected Extensible Authentication Protocol) - Ping (Packet INternet Groper) - An Internet utility used to files...cable to -Point Tunneling Protocol) - A VPN protocol that connects multiple networks together. A protocol that separates the data stream into a number of the wireless signal that holds up to be tunneled through the RTS Threshold setting. Server - Router - POP3 (Post Office Protocol 3) -...
User Guide
Page 74
...VPN (Virtual Private Network) - A security measure to protect data as it leaves one network and goes to another over a network. WPA (Wi-Fi Protected Access) - URL (Uniform Resource Locator) - A method of encrypting network data transmitted on the Internet. WAN (Wide Area Network)- The Internet. Upgrade - A network protocol for greater security. a wireless...the data that communicate with each other wirelessly. Wireless-G Broadband Router TX Rate - WEP (Wired Equivalent Privacy) - The address of a file located on a wireless network for transmitting data that does not ...
...VPN (Virtual Private Network) - A security measure to protect data as it leaves one network and goes to another over a network. WPA (Wi-Fi Protected Access) - URL (Uniform Resource Locator) - A method of encrypting network data transmitted on the Internet. WAN (Wide Area Network)- The Internet. Upgrade - A network protocol for greater security. a wireless...the data that communicate with each other wirelessly. Wireless-G Broadband Router TX Rate - WEP (Wired Equivalent Privacy) - The address of a file located on a wireless network for transmitting data that does not ...