Specifications
Table Of Contents
- Package Contents
- Chapter 1. Introduction
- Chapter 2. Connecting the Router
- Chapter 3. Quick Installation Guide
- Chapter 4. Configuring the Router
- Appendix A: FAQ
- Appendix B: Configuring the PCs
- Appendix C: Specifications
- Appendix D: Glossary
- Appendix E: Compatible 3G/4G USB Modem

TL-MR3420 3G/4G Wireless N Router User Guide
  VPN - VPN Passthrough must be enabled if you want to allow VPN tunnels using IPSec, 
PPTP, or L2TP protocols to pass through the Router’s firewall. 
  PPTP Passthrough - Point-to-Point Tunneling Protocol (PPTP) allows the 
Point-to-Point Protocol (PPP) to be tunneled through an IP network. To allow PPTP 
tunnels to pass through the Router, keep the default, Enable. 
  L2TP Passthrough - Layer 2 Tunneling Protocol (L2TP) is the method used to enable 
Point-to-Point sessions via the Internet on the Layer 2 level. To allow L2TP tunnels to 
pass through the Router, keep the default, Enable. 
  IPSec Passthrough  - Internet Protocol Security (IPSec) is a suite of protocols for 
ensuring private, secure communications over Internet Protocol (IP) networks, through 
the use of cryptographic security services. To allow IPSec tunnels to pass through the 
Router, keep the default, Enable. 
  ALG - It is recommended to enable Application Layer Gateway (ALG) because ALG allows 
customized Network Address Translation (NAT) traversal filters to be plugged into the 
gateway to support address and port translation for certain application layer "control/data" 
protocols such as FTP, TFTP, H323, RTSP etc.   
  FTP ALG - Select Enable, to allow FTP servers to operate properly. 
  TFTP ALG - Select Enable, to allow TFTP servers to operate properly. 
  H323 ALG - Select Enable, to allow H323 services to operate properly. 
  RTSP ALG - Select Enable, to allow RTSP services to operate properly. 
Click the Save button to save your settings. 
4.9.2  Advanced Security 
Choose menu “Security  → Advanced Security”, you can protect the Router from being 
attacked by TCP-SYN Flood, UDP Flood and ICMP-Flood in the screen as shown in Figure 
4-43. 
-55- 










