User's Manual

11g Wireless Security Router User Guide
- v -
4-9
DMZ HOST................................................................................................................................................. 40
4-10 DYNAMIC ROUTING .................................................................................................................................. 42
4-11 STATIC ROUTING ....................................................................................................................................... 43
4-12 WIRELESS ................................................................................................................................................. 44
4-13 DDNS....................................................................................................................................................... 47
CHAPTER 5: MANAGEMENT........................................................................................................................ 49
5-1 DEVICE ADMINISTRATION SETTINGS........................................................................................................... 49
5-2 STATUS MONITOR ....................................................................................................................................... 52
5-3 LOG............................................................................................................................................................. 53
5-4 BACKUP & RESTORE ................................................................................................................................... 54
5-5 UPGRADE FIRMWARE.................................................................................................................................. 55
5-6 DIAGNOSTIC-PING/TRACERT....................................................................................................................... 56
Ping ............................................................................................................................................................. 56
Tracert......................................................................................................................................................... 57
CHAPTER 6: MACINTOSH SETUP............................................................................................................... 58
6-1 HARDWARE CONNECTIONS ......................................................................................................................... 58
6-2 COMPUTER NETWORK CONFIGURATION ..................................................................................................... 58
6-2.1 Dynamic IP Addressing using DHCP Server...................................................................................... 58
6-2.2 Manual Configuration of Fixed IP Addresses.................................................................................... 58
6-3 11G WIRELESS SECURITY ROUTER CONFIGURATION................................................................................... 59
6-4 ADDING 11G WIRELESS SECURITY ROUTER TO EXISTING NETWORK.......................................................... 59
CHAPTER 7: TROUBLE SHOOTING............................................................................................................ 61
CHAPTER 7: TROUBLE SHOOTING............................................................................................................ 61
HARDWARE....................................................................................................................................................... 61
CLIENT SIDE (COMPUTERS)...............................................................................................................................62
APPENDIX A: FREQUENTLY ASKED QUESTIONS .................................................................................. 64
APPENDIX B: TECHNICAL SPECIFICATIONS.......................................................................................... 66
APPENDIX C: CONFIGURING IPSEC BETWEEN A MICROSOFT WINDOWS 2000 OR XP PC AND
BROADBAND VPN ROUTER.......................................................................................................................... 67
C-1 ENVIRONMENT ........................................................................................................................................... 67
C-2 STEPS IN WINDOWS 2000/XP..................................................................................................................... 67
C-2.1 Create IPSec Policy........................................................................................................................... 67