VI
FIGURE 5-26 WAN SETTINGS – PPPOE ................................................................................................................ 63
FIGURE 5-27 WAN SETTINGS – PPTP .................................................................................................................. 64
FIGURE 5-28 VPN PASS THROUGH ....................................................................................................................... 65
FIGURE 5-29 PORT FORWARDING .......................................................................................................................... 66
FIGURE 5-30 PORT FORWARDING .......................................................................................................................... 67
FIGURE 5-31 DMZ ............................................................................................................................................... 68
FIGURE 5-32 WIRELESS NETWORK – AP/WDS AP MODE .................................................................................... 69
FIGURE 5-33 WIRELESS NETWORK – SSID PROFILE............................................................................................. 69
FIGURE 5-34 WIRELESS NETWORK – CB/WDS STA/CR/REPEATER MODE ......................................................... 71
FIGURE 5-35 WDS LINK SETTINGS – WDS BRIDGE MODE .................................................................................. 72
FIGURE 5-36 SECURITY SETTINGS – AP/WDS AP MODE ..................................................................................... 73
FIGURE 5-37 SECURITY SETTINGS – CB/WDS STA/CR/REPEATER MODE ........................................................... 73
FIGURE 5-38 SECURITY SETTINGS – WDS BRIDGE MODE .................................................................................... 74
FIGURE 5-39 SECURITY SETTINGS – WEP ............................................................................................................ 75
FIGURE 5-40 SECURITY SETTINGS – WPA-PSK .................................................................................................... 76
FIGURE 5-41 SECURITY SETTINGS – WPA2-PSK .................................................................................................. 77
FIGURE 5-42 SECURITY SETTINGS – WPA-PSK MIXED ........................................................................................ 77
FIGURE 5-43 SECURITY SETTINGS – WPA (WPA ENTERPRISE) ............................................................................. 78
FIGURE 5-44 SECURITY SETTINGS – WPA2 (WPA2 ENTERPRISE) ........................................................................ 79
FIGURE 5-45 SECURITY SETTINGS – WPA MIXED (WPA MIXED ENTERPRISE) ..................................................... 81
FIGURE 5-46 WIRELESS MAC FILTER .................................................................................................................. 83
FIGURE 5-47 WIRELESS ADVANCED SETTINGS ..................................................................................................... 84
FIGURE 5-48 ADMINISTRATION (PASSWORD SETTINGS) ........................................................................................ 86
FIGURE 5-49 MANAGEMENT VLAN ..................................................................................................................... 86
FIGURE 5-50 SNMP SETTINGS ............................................................................................................................. 87
FIGURE 5-51 BACKUP/RESTORE SETTINGS ........................................................................................................... 88
FIGURE 5-52 AUTO REBOOT SETTINGS ................................................................................................................. 89
FIGURE 5-53 FIRMWARE UPGRADE ....................................................................................................................... 89
FIGURE 5-54 TIME SETTINGS ................................................................................................................................ 91
FIGURE 5-55 WI-FI SCHEDULE ............................................................................................................................. 92
FIGURE 5-56 CLI SETTINGS .................................................................................................................................. 93
FIGURE 5-57 LOG ................................................................................................................................................. 93
FIGURE 5-58 DIAGNOSTICS................................................................................................................................... 94
FIGURE 5-59 LOGOUT ........................................................................................................................................... 95