III‐3‐6.Firewall.........................................................................................................................57
III‐3‐6‐1.URLBlocking................................................................................................................57
III‐3‐6‐2.AccessControl..............................................................................................................59
III‐3‐6‐3.DMZ..............................................................................................................................63
III‐3‐6‐4.DoS...............................................................................................................................64
III‐3‐7.QoS...............................................................................................................................66
III‐3‐7‐1.QoS...............................................................................................................................66
III‐3‐8.Advanced.....................................................................................................................70
III‐3‐8‐1.StaticRouting...............................................................................................................70
III‐3‐8‐2.PortForwarding...........................................................................................................71
III‐3‐8‐3.VirtualServer...............................................................................................................73
III‐3‐8‐4.2.4GHzWireless...........................................................................................................74
III‐3‐8‐5.ALG...............................................................................................................................75
III‐3‐8‐6.IGMP............................................................................................................................76
III‐3‐8‐7.UPnP.............................................................................................................................76
III‐3‐9.Administration.............................................................................................................77
III‐3‐9‐1.TimeZone....................................................................................................................77
III‐3‐9‐2.Password......................................................................................................................78
III‐3‐9‐3.RemoteAccess.............................................................................................................79
III‐3‐9‐4.Backup/Restore...........................................................................................................80
III‐3‐9‐5.Upgrade.......................................................................................................................80
III‐3‐9‐6.Restart..........................................................................................................................81
III‐3‐9‐7.Logs..............................................................................................................................81
III‐3‐9‐8.ActiveDHCPClient.......................................................................................................82
III‐3‐9‐9.Statistics.......................................................................................................................82
IV.Appendix..............................................................................................83
IV‐1.ConfiguringyourIPaddress.........................................................................................83
IV‐1‐1.HowtocheckthatyourcomputerusesadynamicIPaddress...................................84
IV‐1‐1‐1.WindowsXP.................................................................................................................84
IV‐1‐1‐2.WindowsVista.............................................................................................................86
IV‐1‐1‐3.Windows7...................................................................................................................88
IV‐1‐1‐4.Windows8...................................................................................................................91
IV‐1‐1‐5.MacOS.........................................................................................................................95
IV‐1‐2.HowtomodifytheIPaddressofyourcomputer........................................................97
IV‐1‐2‐1.WindowsXP.................................................................................................................97
IV‐1‐2‐2.WindowsVista.............................................................................................................99
IV‐1‐2‐3.Windows7.................................................................................................................100
IV‐1‐2‐4.Windows8.................................................................................................................103
IV‐1‐2‐5.Mac............................................................................................................................107
IV‐1‐3.HowtoFindYourNetworkSecurityKey...................................................................110
IV‐1‐3‐1.Windows7&Vista.....................................................................................................110