TP-Link TL-R470T Plus Configuration Manual page 4

Table of Contents

Advertisement

Configuring the Policy Routing .......................................................................................................................................................74
Viewing the Routing Table .................................................................................................................................................................75
Configuration Examples ................................................................................................................................................. 76
Example for Configuring NAT ..........................................................................................................................................................76
Network Requirements ..........................................................................................................................................................76
Network Topology ....................................................................................................................................................................76
Configuration Scheme ...........................................................................................................................................................76
Configuration Procedure ......................................................................................................................................................77
Example for Configuring Load Balancing ..................................................................................................................................79
Network Requirements ..........................................................................................................................................................79
Network Topology ....................................................................................................................................................................79
Configuration Scheme ...........................................................................................................................................................79
Configuration Procedure ......................................................................................................................................................80
Example for Configuring Virtual Server ......................................................................................................................................80
Network Requirements ..........................................................................................................................................................80
Network Topology ....................................................................................................................................................................81
Configuration Scheme ...........................................................................................................................................................81
Configuration Procedure ......................................................................................................................................................81
Example for Configuring Policy Routing ....................................................................................................................................82
Network Requirements ..........................................................................................................................................................82
Network Topology ....................................................................................................................................................................82
Configuration Scheme ...........................................................................................................................................................82
Configuration Procedure ......................................................................................................................................................82
Configuring Firewall ..........................................................................................................85
Firewall .................................................................................................................................................................................. 86
Overview ......................................................................................................................................................................................................86
Supported Features ..............................................................................................................................................................................86
Firewall Configuration ..................................................................................................................................................... 88
Anti ARP Spoofing ..................................................................................................................................................................................88
Adding IP-MAC Binding Entries ........................................................................................................................................88
Enable Anti ARP Spoofing ....................................................................................................................................................91
Configuring Attack Defense .............................................................................................................................................................93
Configuring MAC Filtering ..................................................................................................................................................................95
Configuring Access Control .............................................................................................................................................................96
Configuration Examples ................................................................................................................................................. 98
Example for Anti ARP Spoofing ......................................................................................................................................................98

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Tl-r480t plus

Table of Contents