EasyManua.ls Logo

TP-Link TL-R470T Plus - Page 4

TP-Link TL-R470T Plus
182 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Configuring the Policy Routing .......................................................................................................................................................74
Viewing the Routing Table .................................................................................................................................................................75
Configuration Examples ................................................................................................................................................. 76
Example for Configuring NAT ..........................................................................................................................................................76
Network Requirements ..........................................................................................................................................................76
Network Topology ....................................................................................................................................................................76
Configuration Scheme ...........................................................................................................................................................76
Configuration Procedure ......................................................................................................................................................77
Example for Configuring Load Balancing ..................................................................................................................................79
Network Requirements ..........................................................................................................................................................79
Network Topology ....................................................................................................................................................................79
Configuration Scheme ...........................................................................................................................................................79
Configuration Procedure ......................................................................................................................................................80
Example for Configuring Virtual Server ......................................................................................................................................80
Network Requirements ..........................................................................................................................................................80
Network Topology ....................................................................................................................................................................81
Configuration Scheme ...........................................................................................................................................................81
Configuration Procedure ......................................................................................................................................................81
Example for Configuring Policy Routing ....................................................................................................................................82
Network Requirements ..........................................................................................................................................................82
Network Topology ....................................................................................................................................................................82
Configuration Scheme ...........................................................................................................................................................82
Configuration Procedure ......................................................................................................................................................82
Configuring Firewall ..........................................................................................................85
Firewall .................................................................................................................................................................................. 86
Overview ......................................................................................................................................................................................................86
Supported Features ..............................................................................................................................................................................86
Firewall Configuration ..................................................................................................................................................... 88
Anti ARP Spoofing ..................................................................................................................................................................................88
Adding IP-MAC Binding Entries ........................................................................................................................................88
Enable Anti ARP Spoofing ....................................................................................................................................................91
Configuring Attack Defense .............................................................................................................................................................93
Configuring MAC Filtering ..................................................................................................................................................................95
Configuring Access Control .............................................................................................................................................................96
Configuration Examples ................................................................................................................................................. 98
Example for Anti ARP Spoofing ......................................................................................................................................................98

Table of Contents

Related product manuals