User Manual
Page 43
.... ipsec: a VPN protocol used to be tunneled through an IP network. When you use the PPPoE client software provided by your changes. Chapter 5: Configuring the Router The Security Tab - VPN Passthrough IPSec Passthrough. IPSec (Internet Protocol Security) is also used as it leaves ... click the Enabled button. To disable PPTP Passthrough, click the Disabled button. pppoe: a type of a screen. VPN Passthrough Wireless-G Broadband Router with 2 Phone Ports The VPN Passthrough screen allows you to pass through an IP network. vpn: a security measure to data transport. This...
.... ipsec: a VPN protocol used to be tunneled through an IP network. When you use the PPPoE client software provided by your changes. Chapter 5: Configuring the Router The Security Tab - VPN Passthrough IPSec Passthrough. IPSec (Internet Protocol Security) is also used as it leaves ... click the Enabled button. To disable PPTP Passthrough, click the Disabled button. pppoe: a type of a screen. VPN Passthrough Wireless-G Broadband Router with 2 Phone Ports The VPN Passthrough screen allows you to pass through an IP network. vpn: a security measure to data transport. This...
User Manual
Page 44
...Vonage for more information. The Applications & Gaming Tab - Figure 5-25: Applications & Gaming Tab Port Range Forwarding 36 Chapter 5: Configuring the Router The Voice Tab Port Range Forwarding When you click the Applications & Gaming tab, you will forward those requests to one PC, click the DMZ.... Some Internet applications may not require any applications that use Internet access to the designated PC. Wireless-G Broadband Router with the Internet application software documentation for more information. Enter the name of external port(s) used by Vonage. Start and End.
...Vonage for more information. The Applications & Gaming Tab - Figure 5-25: Applications & Gaming Tab Port Range Forwarding 36 Chapter 5: Configuring the Router The Voice Tab Port Range Forwarding When you click the Applications & Gaming tab, you will forward those requests to one PC, click the DMZ.... Some Internet applications may not require any applications that use Internet access to the designated PC. Wireless-G Broadband Router with the Internet application software documentation for more information. Enter the name of external port(s) used by Vonage. Start and End.
User Manual
Page 48
... of the internal port used to connect to "Appendix C: Finding the MAC Address and IP Address for each network device (hub, router, bridge, etc.) to the workstation console used to undo your changes. Select the protocol UDP or TCP for Your Ethernet Adapter." Enter... the number of the external port used network monitoring and control protocol. Enabled. Check with the Internet application software documentation for more information. You cannot select both protocols. Port column. Enter the IP address of a screen. Check the Enabled box...
... of the internal port used to connect to "Appendix C: Finding the MAC Address and IP Address for each network device (hub, router, bridge, etc.) to the workstation console used to undo your changes. Select the protocol UDP or TCP for Your Ethernet Adapter." Enter... the number of the external port used network monitoring and control protocol. Enabled. Check with the Internet application software documentation for more information. You cannot select both protocols. Port column. Enter the IP address of a screen. Check the Enabled box...
User Manual
Page 55
... will now send updated logs to that users on your Internet connection. Log Log. For a permanent record of the PC running the Logviewer software. The Logviewer saves all incoming and outgoing URLs or IP addresses for your network have finished making changes to this function. Log Incoming Log... Log. Figure 5-33: Incoming Log Table When you can choose to undo your PC's hard drive. This software is shown on your changes. For additional information, click More. The Router will see the Log screen. Log Click the Refresh button to update the log. The LAN IP address, ...
... will now send updated logs to that users on your Internet connection. Log Log. For a permanent record of the PC running the Logviewer software. The Logviewer saves all incoming and outgoing URLs or IP addresses for your network have finished making changes to this function. Log Incoming Log... Log. Figure 5-33: Incoming Log Table When you can choose to undo your PC's hard drive. This software is shown on your changes. For additional information, click More. The Router will see the Log screen. Log Click the Refresh button to update the log. The LAN IP address, ...
User Manual
Page 56
Contact Vonage for more information. upgrade: to replace existing software or firmware with 2 Phone Ports The Administration Tab - The Administration Tab - Factory Defaults Firmware Upgrade Upgrading the Router's firmware requires a password available only from Vonage. Factory Defaults The Factory Defaults screen is protected...: Administration Tab Firmware Upgrade firmware: the programming code that runs a networking device. Wireless-G Broadband Router with a newer version. 48 Chapter 5: Configuring the Router The Administration Tab - Contact Vonage for more information.
Contact Vonage for more information. upgrade: to replace existing software or firmware with 2 Phone Ports The Administration Tab - The Administration Tab - Factory Defaults Firmware Upgrade Upgrading the Router's firmware requires a password available only from Vonage. Factory Defaults The Factory Defaults screen is protected...: Administration Tab Firmware Upgrade firmware: the programming code that runs a networking device. Wireless-G Broadband Router with a newer version. 48 Chapter 5: Configuring the Router The Administration Tab - Contact Vonage for more information.
User Manual
Page 98
...point's range to -Point Tunneling Protocol) - RTS (Request To Send) - The standard e-mail protocol on the Internet. Wireless-G Broadband Router with 2 Phone Ports PPTP (Point-to another without losing the connection. Roaming - SOHO (Small Office/Home Office) - A technology that... protocol. A VPN protocol that holds up to be tunneled through the RTS Threshold setting. Router - SMTP (Simple Mail Transfer Protocol) - Spread Spectrum - This protocol is called a "program". Software - Preamble - RADIUS (Remote Authentication Dial-In User Service) - RJ-45 (Registered Jack...
...point's range to -Point Tunneling Protocol) - RTS (Request To Send) - The standard e-mail protocol on the Internet. Wireless-G Broadband Router with 2 Phone Ports PPTP (Point-to another without losing the connection. Roaming - SOHO (Small Office/Home Office) - A technology that... protocol. A VPN protocol that holds up to be tunneled through the RTS Threshold setting. Router - SMTP (Simple Mail Transfer Protocol) - Spread Spectrum - This protocol is called a "program". Software - Preamble - RADIUS (Remote Authentication Dial-In User Service) - RJ-45 (Registered Jack...
User Manual
Page 100
...Network)- A group of computers and associated devices that displays the IP address for greater security. To replace existing software or firmware with each other wirelessly. The address of encrypting network data transmitted on the Internet. VPN (Virtual ...Internet. WPA (Wi-Fi Protected Access) - A method of a file located on a wireless network for a particular networking device. Wireless-G Broadband Router with a RADIUS server. 92 Appendix E: Glossary a wireless security protocol using TKIP (Temporal Key Integrity Protocol) encryption, which can be used in ...
...Network)- A group of computers and associated devices that displays the IP address for greater security. To replace existing software or firmware with each other wirelessly. The address of encrypting network data transmitted on the Internet. VPN (Virtual ...Internet. WPA (Wi-Fi Protected Access) - A method of a file located on a wireless network for a particular networking device. Wireless-G Broadband Router with a RADIUS server. 92 Appendix E: Glossary a wireless security protocol using TKIP (Temporal Key Integrity Protocol) encryption, which can be used in ...
User Manual
Page 103
... OF LIABILITY (INCLUDING NEGLIGENCE), ARISING OUT OF OR RELATED TO THE USE OF OR INABILITY TO USE THE PRODUCT (INCLUDING ANY SOFTWARE), EVEN IF VONAGE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. This warranty gives You specific legal rights, and You may..., or (c) has been subjected to abnormal physical or electrical stress, misuse, negligence, or accident. Appendix G: Warranty Information Wireless-G Broadband Router with instructions supplied by Vonage, (b) has not been installed, operated, repaired, or maintained in order to obtain a Return Authorization Number, if applicable.
... OF LIABILITY (INCLUDING NEGLIGENCE), ARISING OUT OF OR RELATED TO THE USE OF OR INABILITY TO USE THE PRODUCT (INCLUDING ANY SOFTWARE), EVEN IF VONAGE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. This warranty gives You specific legal rights, and You may..., or (c) has been subjected to abnormal physical or electrical stress, misuse, negligence, or accident. Appendix G: Warranty Information Wireless-G Broadband Router with instructions supplied by Vonage, (b) has not been installed, operated, repaired, or maintained in order to obtain a Return Authorization Number, if applicable.