![NETGEAR D6300 User Manual Download Page 49](http://html1.mh-extra.com/html/netgear/d6300/d6300_user-manual_1672343049.webp)
NETGEAR genie ADVANCED Home
49
D6300 WiFi DSL Modem Router
•
WAN Setup
. Internet (WAN) setup. See
49.
•
LAN Setup
. Local area network (LAN) setup. See
•
QoS Setup
. Quality of Service (QoS) setup. See
•
Guest Network
. This selection is a shortcut to the same Wireless Settings (for guest
networks) screen that you can access from the dashboard on the BASIC Home screen.
See
ADSL Setup
The ADSL Settings page lets you configure the multiplexing method and virtual circuit of your
ADSL connection. The default parameters should be correct to match the system used by
your ISP. You can view or change the following on the ADSL Settings page:
•
Multiplexing Method
. Your ISP indicates whether your multiplexing method is
VC-BASED or LLC-BASED.
•
VPI
,
VCI
. Your ISP indicates which VPI and VCI combination is used for your service.
•
DSL Mode
. Your ISP indicates the best setting is used for your DSL connection.
To view or change the settings on the ADSL Settings page:
1.
Launch a web browser from a computer or WiFi device that is connected to the network.
2.
Enter
http://www.routerlogin.net
.
A login window opens.
3.
Enter the modem router user name and password.
The user name is
admin
. The default password is
password
. The user name and
password are case-sensitive.
The BASIC Home page displays.
4.
Select
ADVANCED > Setup > ADSL Settings
.
The ADSL Settings page displays.
WAN Setup
The WAN Setup page lets you configure a DMZ (demilitarized zone) server, change the
maximum transmit unit (MTU) size, and enable the modem router to respond to a ping on the
WAN (Internet) port. You can view or change the following on the WAN Setup page:
•
WAN Preference
. Select your WAN preference: Auto-Detect, Must use DSL WAN, or
Must use Ethernet WAN.
•
Disable Port Scan and DoS Protection
. DoS protection protects your LAN against
denial of service attacks such as Syn flood, Smurf Attack, Ping of Death, Teardrop
Attack, UDP Flood, ARP Attack, Spoofing ICMP, Null Scan, and many others. This
feature should be disabled only in special circumstances.