User`s guide
  1-3
Access and Application Support
Access and Application Support
Many advanced applications are provided by the RoamAbout R1, such as:
• Flexible LAN Access
The RoamAbout R1 provides connectivity to 10/100 Mbps wired devices, as well as 11 
Mbps wireless mobile users. The wireless interface makes it easy to create a network in 
difficult-to-wire environments, and to provide quick access to databases for wireless users.
• Internet Access
The RoamAbout R1 supports Internet access through an xDSL, Cable, ISDN or PSTN 
connection. Many DSL providers use PPPoE to establish communications with end users. 
The RoamAbout R1 includes a built-in client for PPPoE which eliminates the need to install 
this service on your computer.
• Shared IP Address
The RoamAbout R1 provides Internet access for up to 32 users with a shared IP address. 
Multiple users on your network can browse the Web at the same time using only one ISP 
account.
• Virtual Server
If you have a fixed IP address, you can set up the RoamAbout R1 to act as a virtual host for 
network address translation. Remote users can access various services at your site using a 
constant IP address. Then, depending on the requested service (or port number), the 
RoamAbout R1 can route the request to the appropriate server (at another internal IP 
address). This secures your network from direct attack by hackers, and provides more 
flexible management by allowing you to change internal IP addresses without affecting 
outside access to your network.
• User-Definable Application Sensing Tunnel
You can define special applications that require multiple connections such as Internet 
gaming, videoconferencing, and Internet telephony. The RoamAbout R1 senses the 
application type and opens a multi-port tunnel for it.
• DMZ Host Support
DMZ (Demilitarized Zone) allows you to open up a client PC for two-way unrestricted 
Internet access. For example, you would use this feature if you have a client PC that cannot 
run an Internet application properly from behind the NAT firewall or after configuring the 
special applications feature. Using this feature creates a security risk and should only be 
used as a last resort.










