User Guide
Page 3
... Contents Wireless-G Broadband Router Chapter 1: Product Overview 3 Front Panel 3 Back Panel 3 Chapter 2: Wireless Security Checklist 4 General Network Security Guidelines 4 Additional Security Tips 4 Chapter 3: Advanced Configuration 5 Setup > Basic Setup 5 Setup > DDNS 8 Setup > MAC Address Clone 9 Setup > Advanced Routing 10 Wireless > Basic Wireless Settings 10 Wireless > Wireless Security 11 Wireless > Wireless MAC Filter 13 Wireless > Advanced Wireless Settings 14 Security > Firewall 15 Security > VPN Passthrough...
... Contents Wireless-G Broadband Router Chapter 1: Product Overview 3 Front Panel 3 Back Panel 3 Chapter 2: Wireless Security Checklist 4 General Network Security Guidelines 4 Additional Security Tips 4 Chapter 3: Advanced Configuration 5 Setup > Basic Setup 5 Setup > DDNS 8 Setup > MAC Address Clone 9 Setup > Advanced Routing 10 Wireless > Basic Wireless Settings 10 Wireless > Wireless Security 11 Wireless > Wireless MAC Filter 13 Wireless > Advanced Wireless Settings 14 Security > Firewall 15 Security > VPN Passthrough...
User Guide
Page 17
... IPSec tunnels to pass through the Router, keep the default, Enable. Wireless-G Broadband Router 15 Chapter 3 Security > Firewall The Security > Firewall screen is used to enable Point-to-Point sessions via the Internet on the Router's local network. Advanced Configuration Security > VPN Passthrough The Security > VPN Passthrough screen allows you to enable VPN tunnels using IPSec, PPTP, or...
... IPSec tunnels to pass through the Router, keep the default, Enable. Wireless-G Broadband Router 15 Chapter 3 Security > Firewall The Security > Firewall screen is used to enable Point-to-Point sessions via the Internet on the Router's local network. Advanced Configuration Security > VPN Passthrough The Security > VPN Passthrough screen allows you to enable VPN tunnels using IPSec, PPTP, or...