Cisco Linksys AG310 User Manual page 21

Adsl2 plus gateway with voip
Table of Contents

Advertisement

ADSL2+ Gateway with VoIP
Security
• Firewall. To disable or enable the firewall, set up filters, and block WAN requests, click this tab.
• VPN. To enable or disable Virtual Private Network (VPN) passthrough, or to set up an IPSec VPN tunnel, use
this screen.
Access Restrictions
• Internet Access. This screen allows you to control the Internet usage and traffic on your local network.
Applications & Gaming
• Single Port Forwarding. Use this screen to set up common services or applications that require forwarding on
a single port.
• Port Range Forwarding. To set up public services or other specialized Internet applications that require
forwarding on a range of ports, use this screen.
• Port Triggering. To set up triggered ranges and forwarded ranges for Internet applications, click this tab.
• DMZ. To allow one local computer to be exposed to the Internet for use of special-purpose services, use this
screen.
• QoS. Use Quality of Service (QoS) to assign different priority levels to different types of data transmissions.
• ALG. Allows legitimate application data to pass through the security checks of the firewall that would have
otherwise restricted the traffic for not meeting its limited filter criteria.
Administration
• Management. On this screen, alter Gateway access, Simple Network Management Protocol (SNMP), Universal
Plug and Play (UPnP), IGMP-Proxy (IGMP stands for Internet Group Multicast Protocol), and IGMP-Snooping
settings.
• Reporting. If you want to view or save activity logs, click this tab.
• Diagnostics. Use this screen to run a Ping test.
• Backup&Restore. On this screen, you can back up or restore the Gateway's configuration.
• Factory Defaults. If you want to restore the Gateway's factory default settings, use this screen.
• Firmware Upgrade. Click this tab if you want to upgrade the Gateway's firmware.
Chapter 6: Configuring the ADSL2+ Gateway
Overview
vpn (virtual private network): a security
measure to protect data as it leaves one
network and goes to another over the Internet.
15

Advertisement

Table of Contents
loading

Table of Contents