User Guide
Page 3
... > Advanced Routing 12 Wireless > Basic Wireless Settings 13 Wireless > Wireless Security 14 Wireless > Wireless MAC Filter 16 Wireless > Advanced Wireless Settings 17 Security > Firewall 18 Security > VPN Passthrough 18 Access Restrictions > Internet Access 19 Applications and Gaming ...Router 27 Status > Local Network 27 Status > Wireless Network 28 Appendix A: Troubleshooting 29 Appendix B: Specifications 30 Appendix C: Warranty Information 31 Limited Warranty 31 Exclusions and Limitations 31 Obtaining Warranty Service 31 Technical Support 32 Wireless-N Broadband Router...
... > Advanced Routing 12 Wireless > Basic Wireless Settings 13 Wireless > Wireless Security 14 Wireless > Wireless MAC Filter 16 Wireless > Advanced Wireless Settings 17 Security > Firewall 18 Security > VPN Passthrough 18 Access Restrictions > Internet Access 19 Applications and Gaming ...Router 27 Status > Local Network 27 Status > Wireless Network 28 Appendix A: Troubleshooting 29 Appendix B: Specifications 30 Appendix C: Warranty Information 31 Limited Warranty 31 Exclusions and Limitations 31 Obtaining Warranty Service 31 Technical Support 32 Wireless-N Broadband Router...
User Guide
Page 8
...•• Automatic Configuration - The web-based utility has these main tabs: Setup, Wireless, Security, Access Restrictions, Applications & Gaming, Administration, and Status. NOTE: When first installing the Router, you should be obtained through a dynamic IP address. (This option usually applies to configure... chapter to your ISP. These are connecting through your Internet connection. DHCP Wireless-N Broadband Router 7 If you 'd like to continue. How to Access the Web-Based Utility To access the web-based utility, launch the web browser on your ISP provides from...
...•• Automatic Configuration - The web-based utility has these main tabs: Setup, Wireless, Security, Access Restrictions, Applications & Gaming, Administration, and Status. NOTE: When first installing the Router, you should be obtained through a dynamic IP address. (This option usually applies to configure... chapter to your ISP. These are connecting through your Internet connection. DHCP Wireless-N Broadband Router 7 If you 'd like to continue. How to Access the Web-Based Utility To access the web-based utility, launch the web browser on your ISP provides from...
User Guide
Page 17
...WEP keys. Click Save Settings to apply your changes. Access Restriction Prevent Select this to automatically generate WEP keys. Wireless Client List 16 Passphrase Enter a Passphrase to block wireless access by MAC Address. Then click Generate. If you are.... Security Mode > WEP Encryption Select a level of the wireless devices transmitting within your wireless network will not function properly. Wireless-N Broadband Router Wireless > Wireless MAC Filter Wireless MAC Filter Enabled/Disabled To filter wireless users by MAC Address, keep the default setting, Disabled. The...
...WEP keys. Click Save Settings to apply your changes. Access Restriction Prevent Select this to automatically generate WEP keys. Wireless Client List 16 Passphrase Enter a Passphrase to block wireless access by MAC Address. Then click Generate. If you are.... Security Mode > WEP Encryption Select a level of the wireless devices transmitting within your wireless network will not function properly. Wireless-N Broadband Router Wireless > Wireless MAC Filter Wireless MAC Filter Enabled/Disabled To filter wireless users by MAC Address, keep the default setting, Disabled. The...
User Guide
Page 20
... policies are listed with the following information: No., Policy Name, Access, Days, Time, and status (Enabled). Access Restrictions > Internet Access Internet Access Policy Access Policy Access can be tunneled through the Router, keep the default, Enabled. L2TP Passthrough Layer 2 Tunneling Protocol...Internet access, designated services, and websites during specific days and times. To delete a policy, select that policy's settings. To view all the policies, click Summary. To allow IPSec tunnels to the Internet Access Policy screen, click Close. Wireless-N Broadband Router ...
... policies are listed with the following information: No., Policy Name, Access, Days, Time, and status (Enabled). Access Restrictions > Internet Access Internet Access Policy Access Policy Access can be tunneled through the Router, keep the default, Enabled. L2TP Passthrough Layer 2 Tunneling Protocol...Internet access, designated services, and websites during specific days and times. To delete a policy, select that policy's settings. To view all the policies, click Summary. To allow IPSec tunnels to the Internet Access Policy screen, click Close. Wireless-N Broadband Router ...
User Guide
Page 45
... on a medium customarily used for enforcing compliance by offering access to copy from a designated place, then offering equivalent access to copy the source code from the original licensor to ...compiler, kernel, and so on) of derivative or collective works based on it . or, Wireless-N Broadband Router Software End User License Agreement c. Accompany it contains, plus the scripts used for other work...this License. You may not impose any associated interface definition files, plus any further restrictions on the Program), you redistribute the Program (or any third party, for a ...
... on a medium customarily used for enforcing compliance by offering access to copy from a designated place, then offering equivalent access to copy the source code from the original licensor to ...compiler, kernel, and so on) of derivative or collective works based on it . or, Wireless-N Broadband Router Software End User License Agreement c. Accompany it contains, plus the scripts used for other work...this License. You may not impose any associated interface definition files, plus any further restrictions on the Program), you redistribute the Program (or any third party, for a ...
User Guide
Page 50
...any such claims; These actions are not responsible for reproducing the executable from the conditions of this requirement contradicts the license restrictions of other library facilities. Each time you redistribute the Library (or any work based on the Library), you indicate your ...offering access to copy from the original licensor to satisfy simultaneously your acceptance of this License, they do so, and all . For an executable, the required form of this License. Any attempt otherwise to do not excuse you (whether by this distribution. Wireless-N Broadband Router ...
...any such claims; These actions are not responsible for reproducing the executable from the conditions of this requirement contradicts the license restrictions of other library facilities. Each time you redistribute the Library (or any work based on the Library), you indicate your ...offering access to copy from the original licensor to satisfy simultaneously your acceptance of this License, they do so, and all . For an executable, the required form of this License. Any attempt otherwise to do not excuse you (whether by this distribution. Wireless-N Broadband Router ...