2.2.1 Basic ...................................................................................................... 24
2.2.2 Authentication ....................................................................................... 25
2.2.3 Advanced............................................................................................... 27
2.3 Status............................................................................................................ 27
2.3.1 Device Information................................................................................ 28
2.3.2 Log......................................................................................................... 28
2.3.3 Log Setting ............................................................................................ 30
2.3.4 Statistic .................................................................................................. 31
2.3.5 Wireless ................................................................................................. 32
2.4 Routing......................................................................................................... 33
2.4.1 Static ...................................................................................................... 33
2.4.2 Dynamic ................................................................................................ 34
2.4.3 Routing Table ........................................................................................ 35
2.5 Access .......................................................................................................... 36
2.5.1 MAC Filters........................................................................................... 36
2.5.2 Protocol Filter........................................................................................ 37
2.5.3 IP Filter.................................................................................................. 37
2.5.4 Virtual Server ........................................................................................ 39
2.5.5 Special AP ............................................................................................. 40
2.5.6 DMZ ...................................................................................................... 41
2.5.7 Firewall Rule ......................................................................................... 42
2.6 Management................................................................................................. 44
2.6.1 Remote Management............................................................................. 44
2.7 Tools ............................................................................................................ 45
2.7.1 Reset ...................................................................................................... 45
TECHNICAL SPECIFICATIONS ................................................................................. 49
v