Table of contents
COPYRIGHT .............................................................................................................................1
CHAPTER 1 INTRODUCTION..................................................................................................5
1.1 PACKAGE LIST ............................................................................................5
1.2 HARDWARE INSTALLATION ......................................................................6
CHAPTER 2 GETTING STARTED WITH EASY SETUP UTILITY...........................................9
2.1 EASY SETUP BY WINDOWS UTILITY.........................................................9
2.2 EASY SETUP BY CONFIGURING WEB PAGES.......................................13
CHAPTER 3 MAKING CONFIGURATION .............................................................................17
3.1 BASIC SETTING ...........................................................................................17
3.1.1 NETWORK SETUP.............................................................................19
3.1.2 DHCP SERVER ..................................................................................35
3.1.3 WIRELESS SETTINGS.......................................................................37
3.1.4 CHANGE PASSWORD.......................................................................41
3.2 FORWARDING RULES.................................................................................42
3.2.1 VIRTUAL SERVER .............................................................................42
3.2.2 SPECIAL AP.......................................................................................43
3.2.3 MISCELLANEOUS .............................................................................44
3.3 SECURITY SETTING ....................................................................................45
3.3.1 PACKET FILTERS………….….…………………………………..……….46
3.3.2 DOMAIN FILTERS ………………………………………………………….48
3.3.3 URL BLOCKING.................................................................................49
3.3.4 MAC CONTROL .................................................................................50
3.3.5 VPN-L2TP CLIENT .............................................................................51
3.3.6 VPN-PPTP CLIENT ............................................................................54
3.3.7 MISCELLANEOUS .............................................................................56
3.4 ADVANCED SETTING ....................................................................................58
3.4.1 System Log…………………………….…………………………………59
3.4.2 DYNAMIC DNS………….….………….…………………………..……….60
3.4.3 OS …………………………………….…………………………………….61
3.4.4 SNMP ..................................................................................................67
3.4.5 ROUTING............................................................................................68
3.4.6 SYSTEM TIME ....................................................................................69
3.4.7 SCHEDULING.....................................................................................70
3.4.8 IPV6.....................................................................................................71
3.4.9 VLAN...................................................................................................75
3.6 TOOL BOX ......................................................................................................82
3.6.1 SYSTEM INFO ....................................................................................83
3.6.3 FIRMWARE UPGRADE ...............................................................................84
3.6.4 BACKUP SETTING ............................................................................84
3.6.5 RESET TO DEFAULT.........................................................................85
3.6.6 REBOOT .............................................................................................85
3.6.7 MISCELLANCEOUS...........................................................................85
CHAPTER 4 TROUBLESHOOTING.......................................................................................86