User Guide
Page 7
.... Wireless-N Broadband Router Wireless Security Checklist 4. General Network Security Guidelines Wireless network security is useless if the underlying network is not secure. •• Password protect all computers on the network and individually password protect sensitive files. •• Change passwords on wireless security, visit www.linksys.com/security 6 Change the default password For wireless products such as access points...
.... Wireless-N Broadband Router Wireless Security Checklist 4. General Network Security Guidelines Wireless network security is useless if the underlying network is not secure. •• Password protect all computers on the network and individually password protect sensitive files. •• Change passwords on wireless security, visit www.linksys.com/security 6 Change the default password For wireless products such as access points...
User Guide
Page 9
...In the Max Idle Time field, enter the number of the ISP server. To use this option, select Keep Alive. PPTP Point-to-Point Tunneling Protocol (PPTP) is 15 minutes. Your ISP will automatically re-establish your ISP. Connect on the Internet (including your ... This is 30 seconds. Default Gateway Your ISP will have elapsed Wireless-N Broadband Router Advanced Configuration before your Internet connection has been terminated due to access the Internet again. Connect on Demand enables the Router to automatically re-establish your ISP supports DHCP or you are required...
...In the Max Idle Time field, enter the number of the ISP server. To use this option, select Keep Alive. PPTP Point-to-Point Tunneling Protocol (PPTP) is 15 minutes. Your ISP will automatically re-establish your ISP. Connect on the Internet (including your ... This is 30 seconds. Default Gateway Your ISP will have elapsed Wireless-N Broadband Router Advanced Configuration before your Internet connection has been terminated due to access the Internet again. Connect on Demand enables the Router to automatically re-establish your ISP supports DHCP or you are required...
User Guide
Page 20
... The policies are listed with the following information: No., Policy Name, Access, Days, Time, and status (Enabled). Wireless-N Broadband Router Summary 19 Chapter 3 Advanced Configuration Security > VPN Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is a suite of protocols used to enable Point-to-Point sessions via the Internet on this screen to establish an...
... The policies are listed with the following information: No., Policy Name, Access, Days, Time, and status (Enabled). Wireless-N Broadband Router Summary 19 Chapter 3 Advanced Configuration Security > VPN Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is a suite of protocols used to enable Point-to-Point sessions via the Internet on this screen to establish an...