User guide
Table Of Contents
- 1: Get Started
- 2: Use Your Mobile Hotspot
- Set Auto Connect and Network Options
- View Data Usage
- Select a Language
- Enable / Disable Wi-Fi
- View / Block Connected Users
- Add a Wireless Device to your Wi-Fi Network
- View Messages / Alerts
- Use the GPS Feature
- Battery Settings
- Set Audio Alerts
- Change Device Security Settings
- View Details About Your Mobile Hotspot
- Use the microSD Card to Share Files over Wi-Fi
- Recharge the Battery
- Update the Firmware
- 3: Advanced Settings
- Show Help for Advanced Settings
- Do not Automatically Install Driver for USB Tethering
- Export / Import Router Options
- Set Display Options
- Lock or Unlock Device Keys
- View WAN Information
- Set Connection Preferences
- Enable SIM Security
- View Wi-Fi Status and List of Connected Devices
- Set Wi-Fi Network Options
- Set Wi-Fi Security Options
- Set MAC Filter Mode
- Enable Port Forwarding
- Enable Port Filtering
- Enable VPN Passthrough
- Enable DMZ
- Enable Universal Plug and Play
- Set Router LAN Options
- 4: Frequently Asked Questions
- 5: Troubleshooting
- 6: Specifications
- 7: Regulatory and Safety Information
- Index

Advanced Settings
53
White List
To create a list of devices that are allowed to connect to your Wi-Fi network (white
list):
1. In the drop-down menu, select Allow only those in list.
2. Enter the MAC address for each device and click Add.
3. Click Save.
Enable Port Forwarding
If your computer is hosting a server, you can enable port forwarding so that other
users can access the server.
To enable port forwarding:
1. On the homepage, click the Advanced Settings icon ( ).
2. Go to Router > Port Forward.
3. Select Enable beside Port Forwarding.
Incoming traffic is forwarded to specific ports and devices on your network
(using their local IP addresses).
Note: Port forwarding creates a security risk. When not required, port forward-
ing should be disabled.
4. Enter the Port Forwarding information and click Save.
Enable Port Filtering
Port filtering enables you to select which applications (for example, http, ftp, email
servers) can access the Internet. Used in conjunction with other security
measures such as firewall, port filtering can enhance network security.