User Manual
Table Of Contents
- Copyright
- Notice
- Trademarks
- Europe – EU Declaration of Conformity
- Contents
- About this Guide
- Purpose
- Prerequisite Skills and Knowledge
- Conventions Used in this Document
- Help Us to Improve this Document!
- Browan Technical Support
- Chapter 1 – Introduction
- Chapter 2 - Installation
- Chapter 3 – Application Mode
- Chapter 4 – Reference Manual
- Welcome | Wizard
- Welcome | Wizard | Setup Wizard
- Welcome | Notice Board
- Welcome | Password
- Welcome | Wizard
- LAN Settings | Unit Configuration
- LAN Settings | Static DHCP Assignment
- LAN Settings | DHCP lease table
- Wireless Settings | Configuration
- Wireless Settings | Encryption
- Wireless Settings | WDS
- Wireless Settings | WMM
- Wireless Settings | Connection Control
- Wireless Settings | Client List
- Wireless Settings | Advanced
- Wireless Settings | Multiple SSIDs
- Internet Settings | Connection to ISP
- Firewall | Virtual Servers
- Firewall | Special Apps
- Firewall | SPI
- Firewall | QoS
- Firewall | Internet Access Policy
- Firewall | URL Filter
- System Tools | Restart
- System Tools | Time Zone
- System Tools | Configuration
- System Tools | Upgrade
- Advanced | Static Route
- Advanced | RIP
- Advanced | DDNS
- Advanced | Security
- Advanced | Proxy ARP
- Advanced | 1 to 1 NAT
- Advanced | SNMP
- Status and Logs | Status
- Status and Logs | Logs
- Status and Logs | Routing Table
- Status and Logs | Syslog
- Support | Support
- Appendix
BROWAN COMMUNICATIONS Page 137
including LANs, WANs, and the Internet. It was first
defined by the ITU in 1996 and has been updated
regularly.
The scope of H.323 covers real-time voice, video,
and data communication over packet-switched
networks. It was designed from the outset to
operate over IP networks, primarily, though H.323
may also operate over other packet-switched
networks. It was designed with multipoint voice and
video conferencing capabilities, though most users
do not take advantage of the multipoint capabilities
specified in the protocol.
15. L2TP
L2TP, Layer 2 Tunneling Protocol, is used to
provide IP security at the network layer.
L2TP uses UDP to transport the PPP data; this is
often encapsulated in IPSec for encryption instead
of using MPP.
16. PPTP
PPP (Point-to-Point Protocol) is a standard for
transporting datagram over point-to-point links. It is