User's Manual
Page II
3.3.6 How to Delete the Connection .............................................................. 28
3.4 Network Security ................................................................................... 29
3.4.1 Virus Defense ....................................................................................... 29
3.4.2 Rate Limit .............................................................................................. 30
3.5 ARP Spoofing Defense ......................................................................... 31
3.5.1 ARP Spoofing Defense Setup .............................................................. 31
3.5.2 Dynamic ARP Table .............................................................................. 31
3.5.3 How to Defense Against ARP Spoofing Attack ..................................... 32
3.6 Port Forwarding .................................................................................... 33
3.6.1 Port Forwarding Setup .......................................................................... 33
3.6.2 Port Forwarding Rule List ..................................................................... 34
3.7 Change Administrator’s Password ....................................................... 35
3.8 Remote Management ........................................................................... 36
Appendix Contact Information ........................................................................................... 37