User's Manual
USER’S MANUAL OF Wireless 802.11g Broadband Router
ii
I WDS Security Setup .................................................................................................... 23
II WDS AP Table............................................................................................................. 24
3.3.9 Site Survey............................................................................................................... 25
3.3.10 LAN Interface Setup................................................................................................ 25
3.3.11 WAN Interface Setup............................................................................................... 27
I Static IP........................................................................................................................ 27
II DHCP Client ................................................................................................................ 29
III PPPoE ...................................................................................................................... 30
IV PPTP ........................................................................................................................ 32
3.3.12 Firewall - Port Filtering ........................................................................................... 33
3.3.13 Firewall - IP Filtering............................................................................................... 34
3.3.14 Firewall - MAC Filtering......................................................................................... 35
3.3.15 Firewall - Port Forwarding....................................................................................... 36
3.3.16 Firewall – URL Filtering.......................................................................................... 38
3.3.17 Firewall - DMZ........................................................................................................ 39
3.3.18 VPN Setting ............................................................................................................. 39
I VPN Setup - Edit Tunnel ............................................................................................. 41
II Advanced IKE Setup.................................................................................................... 43
3.3.19 Management - Statistics........................................................................................... 44
3.3.20 Management - DDNS .............................................................................................. 45
3.3.21 Management - Time Zone Setting............................................................................ 46
3.3.22 Management – Denial-of-Service............................................................................ 46
3.3.23 Management - Log................................................................................................... 47
3.3.24 Management - Upgrade Firmware........................................................................... 48
3.3.25 Management Save/ Reload Settings......................................................................... 49
3.3.26 Management - Password Setup................................................................................ 50
3.3.27 Logout...................................................................................................................... 50
4 FREQUENTLY ASKED QUESTIONS (FAQ).................................................................... 52
4.1 WHAT AND HOW TO FIND MY PC’S IP AND MAC ADDRESS? .............................................. 52
4.2 WHAT IS WIRELESS LAN? ................................................................................................. 52
4.3 WHAT ARE ISM BANDS? .................................................................................................... 52
4.4 HOW DOES WIRELESS NETWORKING WORK?....................................................................... 52
4.5 W
HAT IS BSSID?............................................................................................................... 53
4.6 WHAT IS ESSID? ............................................................................................................... 53
4.7 WHAT ARE POTENTIAL FACTORS THAT MAY CAUSES INTERFERENCE? ................................. 54
4.8 W
HAT ARE THE OPEN SYSTEM AND SHARED KEY AUTHENTICATIONS? .............................. 54










