2.4.3.1 WEP only................................................................................................ 30
2.4.3.2 802.1x only ............................................................................................. 30
2.4.3.3 802.1x WEP Static key ........................................................................... 31
2.4.3.4 WPA/WPA2 Pre-shared key................................................................... 32
2.4.3.5 WPA/WPA2 Radius ................................................................................ 33
2.4.4 Access Control .......................................................................................... 34
2.5 QoS .............................................................................................................. 35
2.5.1 Port-based QoS......................................................................................... 36
2.5.2 Rate Policing QoS ..................................................................................... 37
2.5.3 Guaranteed / Spare Class QoS................................................................. 38
2.6 NAT .............................................................................................................. 39
2.6.1 Virtual Server............................................................................................. 40
2.6.2 Special Applications .................................................................................. 41
2.6.3 ALG Settings ............................................................................................. 43
2.6.4 UPnP Settings ........................................................................................... 43
2.6.5 Static Routing ............................................................................................ 44
2.7 Firewall ......................................................................................................... 45
2.7.1 Access Control List.................................................................................... 46
2.7.2 URL Filter .................................................................................................. 48
2.7.3 Anti-DoS (Denial of Service)...................................................................... 49
2.7.4 DMZ .......................................................................................................... 50
Chapter 3 ........................................................................................................... 51
Status ................................................................................................................. 51
3.1 Status and Information ................................................................................. 52
3.2 Logs ............................................................................................................. 52
3.2.1 System Log ............................................................................................... 52
3.2.2 ACL Log .................................................................................................... 53
3.2.3 URL Filter Log ........................................................................................... 53
3.2.4 DoS Log .................................................................................................... 53
3.2.5 New Connection Log ................................................................................. 53
Chapter 4 ........................................................................................................... 54
Tool .................................................................................................................... 54
Appendix A ......................................................................................................... 55
Glossary ............................................................................................................. 56
2