Table Of Contents - Yamaha RTX810 Instruction Manual

Gigabit vpn router
Hide thumbs Also See for RTX810:
Table of Contents

Advertisement

Table of contents

Please ensure to read this first. ........................................2
Particular usage in this manual ........................................5
Safety precautions ............................................................5
Important notice ...............................................................8
DOWNLOAD button ...........................................10
Chapter 1
Introduction
What the product enables you to do ..............................12
Name and function of individual parts .........................13
Front panel/Top panel ...........................................13
Rear panel ..............................................................15
Bottom panel .........................................................15
Chapter 2
Making preparations
Flow of preparation steps ..............................................16
preparations ...................................................17
Preparation 1: Making connections .............................18
Preparation 2: Opening the "Basic configuration
page" .....................................................20
Preparation 3: Setting the passwords ...........................22
Preparation 4: Setting date and time ............................27
Preparation 5: Configuring the IP address on the
LAN side ...............................................29
Preparation 6: Changing the IP addresses of PCs
in LAN ..................................................31
Chapter 3
a broadband line (PPPoE/CATV) .........................33
connection service .................................................43
tion terminal ...........................................................49
Chapter 4
Implementing site-to-site
VPN connections
(IPsec LAN-to-LAN connection) .........................57
Gaining remote access using PPTP ...............................70
(PPTP-LAN-to-LAN connection) ........................84
closed network .......................................................88
Chapter 5
Enhancing security
measures ................................................................92
Configuring the filter settings ........................................94
about them .............................................................98
3

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents