beautypg.com

Linksys WRVS4400N User Manual

Page 6

background image

Wireless-N Gigabit Security Router with VPN

Figure 6-11: Setup - LAN

32

Figure 6-12: Setup - DMZ

34

Figure 6-13: Setup - MAC Address Clone

34

Figure 6-14: Setup - Advanced Routing

35

Figure 6-15: Setup - Advanced Routing (Routing Table)

36

Figure 6-16: Setup - Time

37

Figure 6-17: Wireless - Basic Wireless Settings

38

Figure 6-18: Wireless - Wireless Security (Disabled)

40

Figure 6-19: Wireless - Wireless Security (WPA-Personal)

40

Figure 6-20: Wireless - Wireless Security (WPA2-Personal)

41

Figure 6-21: Wireless - Wireless Security (WPA2-Personal Mixed)

41

Figure 6-22: Wireless - Wireless Security (WPA-Enterprise)

42

Figure 6-23: Wireless - Wireless Security (WPA2-Enterprise)

42

Figure 6-24: Wireless - Wireless Security (WPA2-Enterprise Mixed)

43

Figure 6-25: Wireless - Wireless Security (WEP)

43

Figure 6-26: Wireless - Wireless Connection Control

44

Figure 6-27: Select MAC Address from Wireless Client List

44

Figure 6-28: Wireless - Advanced Wireless Settings

45

Figure 6-29: Firewall - Basic Settings

47

Figure 6-30: Firewall - IP Based ACL

49

Figure 6-31: Firewall - IP Based ACL (pre-defined services)

49

Figure 6-32: Firewall - IP Based ACL (Service definition)

50

Figure 6-33: Firewall - Edit IP ACL Rule

50

Figure 6-34: Firewall - Internet Access Policy

52

Figure 6-35: Firewall - Internet Access Policy Summary

53

Figure 6-36: Firewall - Internet Access Policy (List of PCs to apply policy)

53

Figure 6-37: Firewall - Single Port Forwarding

54

Figure 6-38: Port Range Forwarding

55

Figure 6-39: Port Range Triggering

56

Figure 6-40: Firewall - Services

57