Figure 6-13: Setup - MAC Address Clone 34 
Figure 6-14: Setup - Advanced Routing 35 
Figure 6-15: Setup - Advanced Routing (Routing Table) 36 
Figure 6-16: Setup - Time 37 
Figure 6-17: Wireless - Basic Wireless Settings 38 
Figure 6-18: Wireless - Wireless Security (Disabled) 40 
Figure 6-19: Wireless - Wireless Security (WPA-Personal) 40 
Figure 6-20: Wireless - Wireless Security (WPA2-Personal) 41 
Figure 6-21: Wireless - Wireless Security (WPA2-Personal Mixed) 41 
Figure 6-22: Wireless - Wireless Security (WPA-Enterprise) 42 
Figure 6-23: Wireless - Wireless Security (WPA2-Enterprise) 42 
Figure 6-24: Wireless - Wireless Security (WPA2-Enterprise Mixed) 43 
Figure 6-25: Wireless - Wireless Security (WEP) 43 
Figure 6-26: Wireless - Wireless Connection Control 44 
Figure 6-27: Select MAC Address from Wireless Client List 44 
Figure 6-28: Wireless - Advanced Wireless Settings 45 
Figure 6-29: Firewall - Basic Settings 47 
Figure 6-30: Firewall - IP Based ACL 49 
Figure 6-31: Firewall - IP Based ACL (pre-defined services) 49 
Figure 6-32: Firewall - IP Based ACL (Service definition) 50 
Figure 6-33: Firewall - Edit IP ACL Rule 50 
Figure 6-34: Firewall - Internet Access Policy 52 
Figure 6-35: Firewall - Internet Access Policy Summary 53 
Figure 6-36: Firewall - Internet Access Policy (List of PCs to apply policy) 
53 
Figure 6-37: Firewall - Single Port Forwarding 54 
Figure 6-38: Port Range Forwarding 55 
Figure 6-39: Port Range Triggering 56 
Figure 6-40: Firewall - Services 57 
 
 
Figure 6-41: VPN - IPsec VPN 58 
Figure 6-42: VPN Tunnel Summary 58 
Figure 6-43: View VPN Tunnel Log 60 
Figure 6-44: IPsec VPN Advanced Settings 61 
Figure 6-45: VPN - VPN Client Accounts 63