4
6.2.4
PPTP........................................................................................................................................................... 27
6.2.5
L2TP........................................................................................................................................................... 28
6.2.6
T
ELSTRA
B
IG
P
OND
..................................................................................................................................... 28
6.3 DNS ............................................................................................................. 29
CHAPTER 7
WIRELESS SETTINGS ................................................................. 30
7.1 WIRELESS BASIC SETTINGS ........................................................................ 30
7.2 ADVANCED WIRELESS SETTINGS ................................................................. 31
7.3 WIRELESS SECURITY OPTIONS.................................................................... 32
7.3.1
WEP
E
NCRYPTION
...................................................................................................................................... 32
7.3.2
802.1
X ONLY
............................................................................................................................................... 34
7.3.3
WPA
P
RE
-
SHARED KEY
............................................................................................................................... 35
7.3.4
WPA
R
ADIUS
............................................................................................................................................... 36
7.4 ACCESS CONTROL ........................................................................................ 37
CHAPTER 8
FIREWALL SETTINGS ................................................................... 38
8.1 DMZ ............................................................................................................. 38
8.2 DOS ATTACK ................................................................................................ 39
8.3 ACCESS CONTROL ........................................................................................ 40
8.4 URL BLOCK................................................................................................... 41
CHAPTER 9
ADVANCED SETTINGS ................................................................ 43
9.1 PORT FORWARDING .................................................................................... 43
9.2 VIRTUAL SERVER ......................................................................................... 44
9.3 SPECIAL APPLICATIONS .............................................................................. 46
9.4 ALG SETTINGS ............................................................................................. 48
9.5 UPNP SETTINGS........................................................................................... 48
9.6 QOS ............................................................................................................. 49
CHAPTER 10
TOOLS ......................................................................................... 52
10.1 TIMEZONE.................................................................................................. 53
10.2 REMOTE MANAGEMENT .............................................................................. 54
10.3 FIRMWARE UPGRADE................................................................................. 55
10.4 BACK-UP SETTINGS ................................................................................... 56