ADSL2+ 4-Port Ethernet Wireless-G Router - User Guide
Page 5 of 55
Figure 1-26 : DNS Proxy ..................................................................................................... 34
Figure 1-27 : Easy Connect Configuration .......................................................................... 35
Figure 1-28 : Port Forwarding.............................................................................................. 36
Figure 1-29 : MAC Filtering (Bridge Filters) ...................................................................... 37
Figure 1-30 : Access Control ............................................................................................... 38
Figure 1-31 : Static Routing................................................................................................. 39
Figure 1-32 : Dynamic Routing ........................................................................................... 40
Figure 1-33 : Routing Table ................................................................................................. 41
Figure 1-34 : System Password............................................................................................ 41
Figure 1-35 : Firmware Upgrade .......................................................................................... 42
Figure 1-36 : Restore to Default prompt .............................................................................. 42
Figure 1-37 : Wireless Setup Page ....................................................................................... 43
Figure 1-38 : Wireless Configuration Page .......................................................................... 44
Figure 1-39 : Wireless Security............................................................................................ 44
Figure 1-40 : Wireless Security settings .............................................................................. 45
Figure 1-41 : Wireless Security............................................................................................ 45
Figure 1-42 : Wireless Security............................................................................................ 46
Figure 1-43 : Wireless Management .................................................................................... 47
Figure 1-44 : Security........................................................................................................... 48
Figure 1-45 : IP Filters ......................................................................................................... 48
Figure 1-46 : LAN Isolation................................................................................................. 49
Figure 1-47 : URL Filters..................................................................................................... 49
Figure 1-48 : Status .............................................................................................................. 50
Figure 1-49 : Connection Status ........................................................................................... 51
Figure 1-50 : System Log..................................................................................................... 51
Figure 1-51 : Remote Log Settings ...................................................................................... 52
Figure 1-52 : Network Statistics ........................................................................................... 53