iv
2.1.4
Time ............................................................................................ 22
2.2
Wireless ........................................................................................... 23
2.2.1
Basic ........................................................................................... 23
2.2.2
Authentication ............................................................................ 24
2.2.3
Advanced .................................................................................... 25
2.3
Status ............................................................................................... 26
2.3.1
Device Information ..................................................................... 26
2.3.2
Log .............................................................................................. 27
2.3.3
Log Setting ................................................................................. 28
2.3.4
Statistic ....................................................................................... 29
2.3.5
Wireless ...................................................................................... 30
2.4
Routing ............................................................................................ 31
2.4.1
Static ........................................................................................... 31
2.4.2
Dynamic ...................................................................................... 31
2.4.3
Routing Table ............................................................................. 32
2.5
Access .............................................................................................. 33
2.5.1
MAC Filters ................................................................................ 33
2.5.2
Protocol Filter ............................................................................. 33
2.5.3
IP Filter ....................................................................................... 34
2.5.4
Virtual Server ............................................................................. 35
2.5.5
Special AP .................................................................................. 35
2.5.6
DMZ ........................................................................................... 36
2.5.7
Firewall Rule .............................................................................. 37
2.6
Management .................................................................................... 39
2.6.1
Remote Management .................................................................. 39
2.7
Tools ................................................................................................ 39
2.7.1
Reset ........................................................................................... 39