F3x32 Series Router User Manual
Xiamen
Xiamen
Xiamen
Xiamen Four-Faith
Four-Faith
Four-Faith
Four-Faith Communication
Communication
Communication
Communication Technology
Technology
Technology
Technology Co.,Ltd.
Co.,Ltd.
Co.,Ltd.
Co.,Ltd.
Page 63 of 93
Add
:
J1-J3,3
rd
Floor,No.44,GuanRiRoad,SoftWare Park,XiaMen .361008.China
http
:
//www.fourfaith.com
Tel
:
+86 592-6300326
6300325
6300324
Fax
:
+86 592-5912735
IPSec
IPSec
IPSec
IPSec Passthrough
Passthrough
Passthrough
Passthrough
:
Internet Protocol Security (IPSec) is a suite of protocols used to implement
secure exchange of packets at the IP layer. To allow IPSec tunnels to pass through the router,
IPSec Passthrough is enabled by default. To disable IPSec Passthrough, select Disable.
PPTP
PPTP
PPTP
PPTP Passthrough
Passthrough
Passthrough
Passthrough
:
Point-to-Point Tunneling Protocol is the method used to enable VPN sessions
to a Windows NT 4.0 or 2000 server. To allow PPTP tunnels to pass through the router, PPTP
Passthrough is enabled by default. To disable PPTP Passthrough, select Disable.
L2TP
L2TP
L2TP
L2TP Passthrough
Passthrough
Passthrough
Passthrough
:
Layer Two (2) Tunneling Protocol, an extension to the PPP protocol that
enables ISPs to operate Virtual Private Networks (VPNs). L2TP merges the best features of two
other tunneling protocols: PPTP from Microsoft and L2F from Cisco Systems. To allow L2TP
tunnels to pass through the router, L2TP Passthrough is enabled by default. To disable L2TP
Passthrough, select Disable.
Click the
Save
Save
Save
Save Settings
Settings
Settings
Settings
button to save your changes. Click the
Cancel
Cancel
Cancel
Cancel Changes
Changes
Changes
Changes
button to cancel
unsaved changes.
3.3.6
3.3.6
3.3.6
3.3.6 Access
Access
Access
Access Restrictions
Restrictions
Restrictions
Restrictions
3.3.6.1
3.3.6.1
3.3.6.1
3.3.6.1
WAN
WAN
WAN
WAN Access
Access
Access
Access
Use access restrictions, you can block or allow specific types of Internet applications.
You
can set
specific PC-based Internet access policies.
This feature allows you to customize up to ten
different Internet Access Policies for particular PCs, which are identified by their IP or MAC
addresses.
Two options in the default policy rules: "Filter" and "reject". If select "Deny”, you will
deny specific computers to access any Internet service at a particular time period. If you choose to