Table of Contents
Chapter 1......................................................................................................................................................3
Introduction .........................................................................................................................................3
Feature/Function Introduction......................................................................................................3
Application Scenario Introduction...............................................................................................3
Chapter 2......................................................................................................................................................4
Multi-WAN connectivity with load balancing and fail over ................................................4
Increased bandwidth and reach ..................................................................................................4
Robust security designs ..................................................................................................................4
Secure business access via VPN..................................................................................................5
Comprehensive management.......................................................................................................5
Chapter 3......................................................................................................................................................6
Scenario 1 –VLAN ............................................................................................................................6
Scenario 2 –Firewall........................................................................................................................7
Scenario 3 –User Access Control ...............................................................................................9
Scenario 4 –3G backup................................................................................................................10
Scenario 5 –NAT .............................................................................................................................11
Scenario 6 –FullFeature NAT .....................................................................................................12
Scenario 7 –Virtual Private Network (VPN) .........................................................................14
Scenario 8 –802.1x.......................................................................................................................17
Scenario 9 –Maintenance Log ...................................................................................................18
Chapter 4....................................................................................................................................................20
Product FAQ: .....................................................................................................................................20
Wireless FAQ......................................................................................................................................28