Operation Manual
28
application software, computer virus or hacker attacks from the Internet. For example, some
software sends network packets to the Internet in the background, even when you are not
using the Internet. So please turn off your computer when you are not using it. This function
also may not work with some ISP. So please make sure this function can work properly when
you use this function in the first time, especially your ISP charge you by time used.
6.2.5 L2TP
Select L2TP if your ISP requires the L2TP protocol to connect you to the Internet. Your ISP
should provide all the information required in this section.
6.2.6 Telstra Big Pond
Select Telstra Big Pond if your ISP requires the Telstra Big Pond protocol to connect you to the
Internet. Your ISP should provide all the information required in this section. Telstra Big Pond
protocol is used by the ISP in Australia.