User's Manual
Table Of Contents
- Wireless-N 150 Router WNR612v2 User Manual
- Contents
- About This Manual
- Chapter 1 Configuring Basic Connectivity
- Chapter 2 Safeguarding Your Network
- Choosing Appropriate Wireless Security
- Recording Wireless-N 150 Settings Setup Information
- Changing Wireless Security Settings
- Viewing Advanced Wireless Settings
- Configuring WPS Security (Wi-Fi Protected Setup)
- Restricting Wireless Access by MAC Address
- Changing the Administrator Password
- Backing Up Your Configuration
- Understanding Your Firewall
- Chapter 3 Restricting Access From Your Network
- Chapter 4 Customizing Your Network Settings
- Chapter 5 Fine-Tuning Your Network
- Chapter 6 Using Network Monitoring Tools
- Chapter 7 Troubleshooting
- Appendix A Technical Specifications
- Appendix B Related Documents
- Index
5-1
v1.0, March 2010
Chapter 5
Fine-Tuning Your Network
This chapter describes how to modify the configuration of the Wireless-N 150 Router Model
WNR612v2 to allow specific applications to access the Internet or to be accessed from the
Internet, and how to make adjustments to enhance your network’s performance.
This chapter includes the following sections:
• “Allowing Inbound Connections to Your Network”
• “Configuring Port Forwarding to Local Servers” on page 5-6
• “Configuring Port Triggering” on page 5-9
• “Using Universal Plug and Play” on page 5-12
• “Optimizing Wireless Performance” on page 5-14
• “Changing the MTU Size” on page 5-15
• “Overview of Home and Small Office Networking Technologies” on page 5-16
Allowing Inbound Connections to Your Network
By default, the WNR612v2 router blocks any inbound traffic from the Internet to your computers
except for replies to your outbound traffic. However, you might need to create exceptions to this
rule for the following purposes:
• To allow remote computers on the Internet to access a server on your local network.
• To allow certain applications and games to work correctly when their replies are not
recognized by your router.
Your router provides two features for creating these exceptions: port forwarding and port
triggering. This section explains how a normal outbound connection works, followed by two
examples explaining how port forwarding and port triggering operate and how they differ.










