v
2.2.1 Basic ...................................................................................................... 25
2.2.2 Authentication ....................................................................................... 26
2.2.3 Advanced ............................................................................................... 28
2.3 Status............................................................................................................ 29
2.3.1 Device
Information................................................................................ 29
2.3.2 Log......................................................................................................... 30
2.3.3 Log
Setting ............................................................................................ 32
2.3.4 Statistic .................................................................................................. 33
2.3.5 Wireless ................................................................................................. 34
2.4 Routing......................................................................................................... 35
2.4.1 Static ...................................................................................................... 35
2.4.2 Dynamic ................................................................................................ 36
2.4.3 Routing
Table ........................................................................................ 37
2.5 Access .......................................................................................................... 38
2.5.1 MAC
Filters........................................................................................... 38
2.5.2 Protocol
Filter ........................................................................................ 39
2.5.3 IP
Filter.................................................................................................. 39
2.5.4 Virtual
Server ........................................................................................ 41
2.5.5 Special
AP ............................................................................................. 42
2.5.6 DMZ ...................................................................................................... 44
2.5.7 Firewall
Rule ......................................................................................... 45
2.6 Management................................................................................................. 47
2.6.1 Remote
Management ............................................................................. 47
2.7 Tools ............................................................................................................ 48
2.7.1 Reset ...................................................................................................... 48
T
ECHNICAL
S
PECIFICATIONS
................................................................................. 52