TP-Link TL-R600VPN Configuration Manual page 5

Gigabit broadband
Hide thumbs Also See for TL-R600VPN:
Table of Contents

Advertisement

Example for Anti ARP Spoofing ......................................................................................................................................................99
Network Requirements ..........................................................................................................................................................99
Configuration Scheme ...........................................................................................................................................................99
Configuration Procedure ...................................................................................................................................................100
Example for MAC Filtering ..............................................................................................................................................................102
Network Requirements .......................................................................................................................................................102
Configuration Scheme ........................................................................................................................................................103
Configuration Procedure ...................................................................................................................................................103
Example for Access Control .........................................................................................................................................................104
Network Requirements .......................................................................................................................................................104
Configuration Scheme ........................................................................................................................................................104
Configuration Procedure ...................................................................................................................................................105
Configuring Behavior Control ..................................................................................... 109
Behavior Control .............................................................................................................................................................110
Overview ...................................................................................................................................................................................................110
Supported Features ...........................................................................................................................................................................110
Behavior Control Configuration ................................................................................................................................111
Configuring Web Filtering ...............................................................................................................................................................111
Configure Web Group Filtering .......................................................................................................................................111
Configuring URL Filtering ...................................................................................................................................................114
Configuring Web Security ...............................................................................................................................................................116
Configuration Examples ...............................................................................................................................................118
Example for Access Control .........................................................................................................................................................118
Network Requirements .......................................................................................................................................................118
Configuration Scheme ........................................................................................................................................................118
Configuration Procedure ...................................................................................................................................................119
Example for Web Security ..............................................................................................................................................................122
Network Requirements .......................................................................................................................................................122
Configuration Scheme ........................................................................................................................................................123
Configuration Procedure ...................................................................................................................................................123
Configuring VPN .............................................................................................................. 124
VPN ......................................................................................................................................................................................125
Overview ...................................................................................................................................................................................................125
Supported Features ...........................................................................................................................................................................125
IPSec VPN Configuration .............................................................................................................................................127

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents