7
2
‐
7
‐
3
Wireless
Security.................................................................................................... 97
2.7.3.1
WEP
‐
Wired
Equivalent
Privacy .......................................................................... 98
2.7.3.2
Wi
‐
Fi
Protected
Access
(WPA):.......................................................................... 101
2.7.3.3
WPA
RADIUS:..................................................................................................... 103
2
‐
7
‐
4
Wireless
Access
Control ....................................................................................... 105
2
‐
7
‐
5
Wi
‐
Fi
Protected
Setup
(WPS) ............................................................................... 108
2
‐
7
‐
6
Security
Tips
for
a
Wireless
Network ................................................................... 112
Chapter
III
Advanced
Functions.......................................................................................... 113
3
‐
1
Quality
of
Service
(QoS) .............................................................................................. 113
3
‐
1
‐
1
Basic
QoS
Settings ................................................................................................ 114
3
‐
1
‐
2
Add
a
new
QoS
rule.............................................................................................. 117
3
‐
2
Network
Address
Translation
(NAT)............................................................................ 120
3
‐
2
‐
1
Basic
NAT
Settings
(Enable
or
disable
NAT
function)........................................... 121
3
‐
2
‐
2
Port
Forwarding ................................................................................................... 122
3
‐
2
‐
3
Virtual
Server ....................................................................................................... 125
3
‐
2
‐
4
Port
Mapping
for
Special
Applications................................................................. 128
3
‐
2
‐
5
UPnP
Setting ........................................................................................................ 131
3
‐
2
‐
6
ALG
Settings ......................................................................................................... 132
3
‐
3
Firewall ........................................................................................................................ 133
3
‐
3
‐
1
Access
Control...................................................................................................... 134
3.3.1.1
Add
PC ............................................................................................................... 138
3
‐
3
‐
2
URL
Blocking......................................................................................................... 140
3
‐
3
‐
3
DoS
Attack
Prevention ......................................................................................... 143