into any language in any form or by any means without the written permission of NETGEAR, Inc.
Technical Support
Thank you for choosing NETGEAR. T o register your product, get the latest product updates, get support online, or
for more information about the topics covered in this manual, visit the Support website at
http://support.netgear.com.
Phone (US & Canada only): 1-888-NETGEAR
Phone (Other Countries): Check the li
To improve internal design, operational function, and/or reliability, NETGEAR reserves the right to make changes
to the products described in this document without notice. NETGEAR does not assume any liability that may occur
due to the use, or application of, the product(s) or circuit layout(s) described herein.
Revision History
Publication
Part Number
202-10836-04 1.0July, 2012Added the following features:
202-10836-03 1.0April, 2012Added the PPPoE IPv6 feature (see Configure a PPPoE IPv6
202-10836-02 1.0March, 2012Added the following menus and features:
VersionPublish DateComments
• Stat eless IP/ICMP T ranslation (see Configure S tateless IP/ICMP
Translation)
• Option to turn bandwidth profiles on and off (see Create
Bandwidth Profiles)
• Support for SNMPv3 (see Use a Simple Network Management
Protocol Manager)
The following screens provide new information:
• LAN WAN Rules screen (see Configure LAN WAN Rules)
• Router Status screen (see Router Status Screen)
• Detailed Status screen (see Detailed Status Screen)
Internet Connection)
• New and improved general menu stru
radio buttons
• New LAN IPv6 configuration me
screen (see Manage the IPv6 LAN) and a new screen, the LAN
Multi-homing (IPv6) screen (see Configure IPv6 Multihome LAN
IP Addresses on the Default VLAN)
• IPv6 DMZ (Enable and Configure the DMZ Port for IPv4 and
Appendix C Notification of Compliance (Wired)
Appendix D Notification of Compliance (Wireless)
Index
9
1. Introduction
This chapter provides an overview of the features and capabilities of the ProSafe Wireless-N
8-Port Gigabit VPN Firewall FVS318N and explains how to log in to the device and use its web
management interface. The chapter contains the following sections:
•What Is the ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N?
•Key Features and Capabilities
•Package Contents
•Hardware Features
•Choose a Location for the Wireless VPN Firewall
•Log In to the Wireless VPN Firewall
•Web Management Interface Menu Layout
•Requirements for Entering IP Addresses
1
Note: For more information about the topics covered in this manual, visit
the FVS318N support website at http://support.netgear.com.
What Is the ProSafe Wireless-N 8-Port Gigabit VPN
Firewall FVS318N?
The ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N, hereafter referred to as the
wireless VPN firewall, connects your local area network (LAN) and wireless LAN (WLAN) to
the Internet through an external broadband access device such as a cable or DSL modem,
satellite or wireless Internet dish, or another router. A 2.4-GHz radio supports wireless
connections in 802.11n mode with support for legacy clients in 802.11b and 802.11g mode.
The wireless VPN firewall routes both IPv4 and IPv6 traffic. A powerful, flexible firewall
protects your IPv4 and IPv6 networks from denial of service (DoS) attacks, unwanted traffic,
and traffic with objectionable content. IPv6 traffic is supported through 6to4 and Intra-Site
Automatic Tunnel Addressing Protocol (ISATAP) tunnels.
The wireless VPN firewall provides advanced IPSec and SSL VPN technologies with support
for up to 12 IPSec VPN tunnels and 5 SSL VPN tunnels, as well as L2TP support for easy
and secure remote connections. The use of Gigabit Ethernet WAN and LAN ports ensures
high data transfer speeds.
Key Features and Capabilities
•Wireless Features
•Advanced VPN Support for Both IPSec and SSL
•A Powerful, True Firewall
•Security Features
•Autosensing Ethernet Connections with Auto Uplink
•Extensive Protocol Support
•Easy Installation and Management
•Maintenance and Support
The wireless VPN firewall provides the following key features and capabilities:
•A sing
•Built-in eig
transfer between local network resources
•A wireless rad
•Bot
•Advanced IPSec VPN and SSL VPN support
•L
•Advanced st
•SNMP
the NETGEAR ProSafe Network Management Software (NMS200) over a LANJ
connection.
•F
•F
•I
le 10/100/1000 Mbps Gigabit Ethernet WAN port
ht-port 10/100/1000 Mbps Gigabit Ethernet LAN switch for extremely fast data
io with up to four wireless profiles
h IPv4 and IPv6 support
2TP tunnel support
ateful packet inspection (SPI) firewall with multi-NAT support
support with SNMPv1, SNMPv2c, and SNMPv3, and management optimized for
ront panel LEDs for easy monitoring of status and activity
lash memory for firmware upgrade
nternal universal switching power supply
Wireless Features
The wireless VPN firewall supports the following features:
.4 GHz radio. 2.4-GHz band support with 802.11b/g/n wireless modes.
•2
ireless profiles. Support for up to four wireless profiles, each with its own SSID.
•W
•Acc
ess control. The Media Access Control (MAC) address filtering feature can ensure
that only trusted wireless stations can use the wireless VPN firewall to gain access to
your LAN.
•Hidden mode. The SSID is not broadcast, assuring that only clients configured with the
correct SSID can connect.
•Secure an
economical operation.
d economical operation. Adjustable power output allows more secure or
Advanced VPN Support for Both IPSec and SSL
The wireless VPN firewall supports IPSec and SSL virtual private network (VPN)
connections:
•IPSec VPN delivers fu
between a central office and telecommuters. Remote access by telecommuters requires
the installation of VPN client software on the remote computer.
-IPSec VPN with b
gateways and clients.
-Up to 12
-Bundled with
•SSL VPN p
without requiring a preinstalled VPN client on their computers.
-Uses the fa
e-commerce transactions, to provide client-free access with customizable user portals
and support for a wide variety of user repositories.
-Up to five simult
-Allo
popular browsers, such as Microsoft Internet Explorer, Mozilla Firefox, and Apple
Safari.
-Provides granular access to
membership.
simultaneous IPSec VPN connections.
rovides remote access for mobile users to selected corporate resources
miliar Secure Sockets Layer (SSL) protocol, commonly used for
ws browser-based, platform-independent remote access through a number of
ll network access between a central office and branch offices, or
road protocol support for secure connection to other IPSec
a 30-day trial license for the ProSafe VPN Client software (VPN01L).
aneous SSL VPN connections.
corporate resources based on user type or group
A Powerful, True Firewall
Unlike simple NAT routers, the wireless VPN firewall is a true firewall, using stateful packet
inspection (SPI) to defend against hacker attacks. Its firewall features have the following
capabilities:
•DoS protection. Automa
as Ping of Death and SYN flood.
•Secure firewall. Blocks un
•Schedul
•Logs security incident
configure the firewall to email the log to you at specified intervals.
e policies. Permits scheduling of firewall policies by day and time.
tically detects and thwarts denial of service (DoS) attacks such
wanted traffic from the Internet to your LAN.
s. Logs security event s such as logins and secure logins. You can
The wireless VPN firewall is equipped with several features designed to maintain security:
•Com
•Port forwarding with NA
•DMZ port. Incoming tra
puters hidden by NAT. NAT opens a temporary path to the Internet for requests
originating from the local network. Requests originating from outside the LAN are
discarded, preventing users outside the LAN from finding and directly accessing the
computers on the LAN.
T. Although NAT prevents Internet locations from directly
accessing the computers on the LAN, the wireless VPN firewall allows you to direct
incoming traffic to specific computers based on the service port number of the incoming
request.
ffic from the Internet is usually discarded by the wireless VPN
firewall unless the traffic is a response to one of your local computers or a service for
which you have configured an inbound rule. Instead of discarding this traffic, you can use
the dedicated demilitarized zone (DMZ) port to forward the traf fic to one computer on your
network.
Autosensing Ethernet Connections with Auto Uplink
With its internal eight-port 10/100/1000 Mbps switch an d 10/100/1000 W AN port, the wireless
VPN firewall can connect to either a 10 Mbps standard Ethernet network, a 100 Mbps Fast
Ethernet network, or a 1000 Mbps Gigabit Ethernet network. The LAN and WAN interfaces
are autosensing and capable of full-duplex or half-duplex operation.
The wireless VPN firewall incorporates Auto Uplink
automatically senses whether the Ethernet cable plugged into the port should have a normal
connection such as to a computer or an uplink connection such as to a switch or hub. That
port then configures itself correctly. This feature eliminates the need for you to think about
crossover cables, as Auto Uplink accommodates either type of cable to make the right
connection.
TM
technology. Each Ethernet port
Extensive Protocol Support
The wireless VPN firewall supports the Transmission Control Protocol/Internet Protocol
(TCP/IP) and Routing Information Protocol (RIP). The wireless VPN firewall provides the
following protocol support:
P address sharing by NAT. The wireless VPN firewall allows many networked
•I
computers to share an Internet account using only a single IP address, which might be
statically or dynamically assigned by your Internet service provider (ISP). This technique,
known as Network Address Translation (NAT), allows the use of an inexpensive
single-user ISP account.
•Automatic configuration of att
dynamically assigns network configuration information, including IP, gateway, and
Domain
Name Server (DNS) addresses, to attached computers on the LAN using the
ached computers by DHCP. The wireless VPN firewall
Dynamic Host Configuration Protocol (DHCP). This feature greatly simplifies
configuration of computers on your local network.
•DNS prox
provides its own address as a DNS server to the attached computers. The firewall obtains
actual DNS addresses from the ISP during connection setup and forwards DNS requests
from the LAN.
•PPP
Internet over a DSL connection by simulating a dial-up connection.
•Qua
y. When DHCP is enabled and no DNS addresses are specified, the firewall
over Ethernet (PPPoE). PPPoE is a protocol for connecting remote hosts to the
lity of Service (QoS). The wireless VPN firewall supports QoS.
•Laye
r 2 Tunneling Protocol (L2TP). A tunneling protocol that is used to support virtual
private networks (VPNs).
Easy Installation and Management
You can install, configure, and operate the wireless VPN firewall within minutes after
connecting it to the network. The following features simplify installation and management
tasks:
•Bro
•Auto-detec
•IPSec VPN W
•SNMP. The
•Diagnosti
•Remote m
wser-based management. Browser-based configuration allows you to easily
configure the wireless VPN firewall from almost any type of operating system, such as
Windows, Macintosh, or Linux. Online help documentation is built into the browser-based
web management interface.
tion of ISP. The wireless VPN firewall automatically senses the type of
Internet connection, asking you only for the information required for your type of ISP
account.
izard. The wireless VPN firewall includes the NETGEAR IPSec VPN
Wizard so you can easily configure IPSec VPN tunnels according to the
recommendations of the Virtual Private Network Consortium (VPNC). This ensures that
the IPSec VPN tunnels are interoperable with other VPNC-compliant VPN routers and
clients.
wireless VPN firewall supports the Simple Network Management Protocol
(SNMP) to let you monitor and manage log resources from an SNMP-compliant system
manager. The SNMP system configuration lets you change the system variables for
MIB2.
c functions. The wireless VPN firewall incorporates built-in diagnostic
functions such as ping, traceroute, DNS lookup, and remote reboot.
anagement. The wireless VPN firewall allows you to log in to the web
management interface from a remote location on the Internet. For security, you can limit
remote management access to a specified remote IP address or range of addresses.
•V
isual monitoring. The wireless VPN firewall’s front p anel LEDs provide an easy way to
The front panel also contains three groups of status indicator light-emitting diodes (LEDs),
including Power and Test LEDs, LAN LEDs, and WAN LEDs, all of which are explained in
detail in the following table. Some LED explanation is provided on the front panel.
Figure 1.
The following table describes the function of each LED.
Table 1. LED descriptions
LEDActivityDescription
Power LEDOn (green)Power is supplied to the wireless VPN firewall.
OffPower is not supplied to the wireless VPN firewall.
Test LEDOn (amber) during
startup.
On (amber) during
any other time
Blinking (amber)The wireless VPN firewall is writing to flash memory (during upgrading or
OffThe wireless VPN firewall has booted successfully.
Test mode. The wireless VPN firewall is initializing. After approximately 2
minutes, when the wireless VPN firewall has completed its initialization, the
Test LED goes off.
The initialization has failed, or a hardware failure has occurred.
The rear panel of the wireless VPN firewall includes the antennas, a cable lock receptacle, a
console port, a Reset button, a DC power connection, and a power switch.
Figure 2.
Viewed from left to right, the rear panel contains the following components:
1. Dipole anten
2. Cable security lock recept
3. Console port
connector. The default baud rate is 9600 K. The pinouts are (2) Tx, (3) Rx, (5) and (7) Gnd.
4. Fa
ctory default Reset button. Using a sharp object, press and hold t his button for about
8 seconds until the front panel Test LED flashes to reset the wireless VPN firewall to factory
ault settings. All configuration settings are lost, and the default password is restored.
def
5. DC power plug re
country of sale.
6. Power On/Of
7. Dipole anten
na.
acle.
. Port for connecting to an optional console terminal. The port has a DB9 male
ceptacle. Power input is 12VDC, 1A. The power plug is localized to the
The product label on the bottom of the wireless VPN firewall’s enclosure displays factory
defaults settings, regulatory compliance, and other information.
Figure 3.
Choose a Location for the Wireless VPN Firewall
The wireless VPN firewall is suitable for use in an office environment where it can be
freestanding (on its runner feet) or mounted into a standard 19-inch equipment rack.
Alternatively, you can rack-mount the wireless VPN firewall in a wiring closet or equipment
room.
Consider the following when deciding where to position the wireless VPN firewall:
he unit is accessible, and cables can be connected easily.
•T
•Cab
•W
•Airflow aro
•T
•T
ling is away from sources of electrical noise. These include lift shafts, microwave
ovens, and air-conditioning units.
ater or moisture cannot enter the case of the unit.
und the unit and through the vents in the side of the case is not restricted.
Provide a minimum of 25 mm or 1 inch clearance.
he air is as free of dust as possible.
emperature operating limits are not likely to be exceeded. Install the unit in a clean,
air-conditioned environment. For information about the recommended operating
temperatures for the wireless VPN firewall, see Appendix A, Default Settings and
Note: To connect the wireless VPN firewall physically to your network,
connect the cables and restart your network according to the
instructions in the ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N Installation Guide. A PDF of this guide is on the
NETGEAR support website at
To configure the wireless VPN firewall, you nee
Internet Explorer 7.0 or later, Mozilla Firefox 4.0 or later, or Apple Safari 3.0 or later with
JavaScript, cookies, and SSL enabled. (Google Chrome is not supported at this time.)
Although these web browsers are qualified for use with the wireless VPN firewall’s web
management interface, SSL VPN users should choose a browser that supports JavaScript,
Java, cookies, SSL, and ActiveX to take advantage of the full suite of applications. Note that
Java is required only for the SSL VPN portal, not for the web management interface.
To log in to the wireless VPN firewall:
1. S
tart any of the qualified web browsers.
2. In
the address field, enter https://192.168.1.1. The NETGEAR Configuration Manager Login
screen displays in the browser.
Note: The wireless VPN firewall factory default IP address is 192.168.1.1.
If you change the IP address, you need to use the IP address that
you assigned to the wireless VPN firewall to log in to the wireless
VPN firewall.
The following figure shows the menu at the top the web management interface:
Figure 6.
The web management interface menu consists of the following components:
•1st le
vel: Main navigation menu links. The main navigation menu in the orange bar
across the top of the web management interface provides access to all the configuration
functions of the wireless VPN firewall, and remains constant. When you select a main
navigation menu link, the letters are displayed in white against an orange background.
•2nd level: Configuration menu links. The configuration menu links in the gray bar
(immediately below the main navigation menu bar) change according to the main
navigation menu link that you select. When you select a configuration menu link, the
letters are displayed in white against a gray background.
rd level: Submenu tabs. Each configuration menu item has one or more submenu tabs
•3
that are listed below the gray menu bar. When you select a submenu tab, the text is
displayed in white against a blue background.
•Option arrows. If there
are additional screens for the submenu item, links to the screens
display on the right side in blue letters against a white background, preceded by a white
arrow in a blue circle.
•I
P radio buttons. The IPv4 and IPv6 radio buttons let you select the IP version for the
feature to be configured onscreen. There are four options:
-Both
buttons are operational. You can configure the feature onscreen
for IPv4 functionality or for IPv6 functionality
. After you have correctly configured the
feature for both IP versions, the feature can function with both IP versions
simultaneously.
-T
he IPv4 button is operational but the IPv6 button is disabled. You
can configure the feature onscreen for IPv4 functionality only.
-T
he IPv6 button is operational but the IPv4 button is disabled. You
can configure the feature onscreen for IPv6 functionality only.
-Both
buttons are disabled. IP functionality does not apply.
The bottom of each screen provides action buttons. The nature of the screen determines
which
Figure 7.
action buttons are shown. The following figure shows an example:
Any of the following action buttons might display onscreen (this list might not be complete):
•Appl
•Reset. Rese
•T
•Auto Detect. Enab
y. Save and apply the configuration.
t the configuration to the previously saved configuration.
est. Test the configuration.
le the wireless VPN firewall to detect the configuration automatically
and suggest values for the configuration.
•Can
cel. Cancel the operation.
When a screen includes a table, table buttons display to let you configure the table entries.
he nature of the screen determines which table buttons are shown. The following figure
Any of the following table buttons might display onscreen:
•Select All. Select all entries in the table.
•Delete. Delete th
•Enable.
•Disable.
•Add. Add a
•Edit. Edit the selected e
•Up. Mo
•Down.
•Apply. Apply the
Almost all screens and sections of screens have an a
help screen, click the (question mark) icon.
Enable the selected entry or entries in the table.
Disable the selected entry or entries in the table.
ve the selected entry up in the table.
Move the selected entry down in the table.
e selected entry or entries from the table.
n entry to the table.
ntry.
selected entry.
ccompanying help screen. To open the
Requirements for Entering IP Addresses
To connect to the wireless VPN firewall, your computer needs to be configured to obtain an IP
address automatically from the wireless VPN firewall, either an IPv4 address through DHCP
or an IPv6 address through DHCPv6, or both.
IPv4
The fourth octet of an IP address needs to be between 0 and 255 (both inclusive). This
requirement applies to any IP address that you enter on a screen of the web management
interface.
IPv6
IPv6 addresses are denoted by eight groups of hexadecimal quartets that are separated by
colons. Any four-digit group of zeroes within an IPv6 address can be reduced to a single zero
or altogether omitted.
The following errors invalidate an IPv6 address:
•Mor
•Mor
•Mor
e than eight groups of hexadecimal quartets
e than four hexadecimal characters in a quartet
e than two colons in a row
Introduction
24
2. IPv4 and IPv6 Internet and Broadband
Settings
This chapter explains how to configure the Internet and WAN settings. The chapter contains the
following sections:
•Internet and WAN Configuration Tasks
•Configure the IPv4 Internet Connection and WAN Settings
•Configure the IPv6 Internet Connection and WAN Settings
•Configure Advanced WAN Options and Other Tasks
•What to Do Next
2
Internet and WAN Configuration Tasks
The tasks that are required to complete the Internet connection of your wireless VPN firewall
depend on whether you use an IPv4 connection or an IPv6 connection to your Internet
service provider (ISP).
Note: The wireless VPN firewall supports simultaneous IPv4 and IPv6
connections.
Tasks to Set Up an IPv4 Internet Connection to Your ISP
Complete these four tasks:
1. Con
2. Configure the IPv4 In
figure the IPv4 WAN mode. Select either NAT or classical routing: see Configure
the IPv4 WAN Mode on
following sections:
•Let the Wireless VPN Firewall Automatically Detect and Configure an IPv4 Internet
Connection o
•Manually Configure an IPv4 Internet Connection on p
You can also program the WAN traffic meter if you wish: see Enable the WAN Traffic
Meter on p
age 346.
n page 28
page 27.
ternet connection to your ISP. Connect to your ISP: See one of the
3. (Optional) Configure Dynamic DNS on the WAN port. If required, configure your fully
qualified domain names: See Configure Dynamic DNS o
4. (
Optional) Configure the WAN options. If required, change the factory default MTU size,
port speed, and MAC address of the wireless VPN firewall: See Configure Advanced WAN
Options and Other Tasks on p
need to change the settings.
age 50. These are advanced features, and you usually do not
n page 35.
Tasks to Set Up an IPv6 Internet Connection to Your ISP
Complete these four tasks:
1. Configure
IPv6 traffic: See Configure the IPv6 Routing Mode on p
2. Confi
following sections:
•Use a DHCPv6 Server to Configure an IPv6 Internet Connection o
•Configure a Static IPv6 Internet Connection on p
•Configure a PPPoE IPv6 Internet Connection on p
3. Configure the IPv6
Configure 6to4 Automatic Tunneling on
Tunneling on p
4. (Op
5. (
tional) Configure Stateless IP/ICMP Translation (SIIT). Enable IPv6 d ev ice s th at do
not have permanently assigned IPv4 addresses to communicate with IPv4-only devices:
See Configure Stateless IP/ICMP Translation on p
Optional) Configure the WAN options. If required, change the factory default MTU size,
port speed, and MAC address of the wireless VPN firewall: See Configure Advanced WAN
Options and Other Tasks on p
need to change the settings.
the IPv6 WAN mode. Select the IPv4 / IPv6 mode to support both IPv4 and
age 38.
gure the IPv6 Internet connection to your ISP. Connect to your ISP: See one of the
n page 39
age 41
age 43
tunnels. Enable 6to4 tunnels and configure ISATAP tunnels: See
page 46 and Configure ISATAP Automatic
age 47.
age 49.
age 50. These are advanced features, and you usually do not
Configure the IPv4 Internet Connection and WAN Settings
•Configure the IPv4 WAN Mode
•Let the Wireless VPN Firewall Automatically Detect and Configure an IPv4 Internet
Connection
•Manually Configure an IPv4 Internet Connection
•Configure Dynamic DNS
To set up your wireless VPN firewall for secure IPv4 Internet connections, you need to
deter
mine the IPv4 WAN mode (see the next section) and then configure the IPv4 Internet
connection to your ISP on the WAN port. The web management interface offers two
connection configuration options, discussed in the following sections:
•Let the Wireless VPN Firewall Automatically Detect and Configure an IPv4 Internet
Connection on p
•Manually Configure an IPv4 Internet Connection on p
By default, IPv4 is supported and functions in NAT mode but can also function in classical
routing mode. IPv4 functions the same way in IPv4-only mode that it does in IPv4 / IPv6
mode. The latter mode adds IPv6 functionality (see Configure the IPv6 Routing Mode on
page 38).
Network Address Translation
Network Address Translation (NAT) allows all computers on your LAN to share a single public
Internet IP address. From the Internet, there is only a single device (the wireless VPN
firewall) and a single IP address. Computers on your LAN can use any private IP address
range, and these IP addresses are not visible from the Internet.
Note the following about NAT:
he wireless VPN firewall uses NAT to select the correct computer (on your LAN) to
•T
receive any incoming data.
•I
f you have only a single public Internet IP address, you need to use NAT (the default
setting).
•I
f your ISP has provided you with multiple public IP addresses, you can use one address
as the primary shared address for Internet access by your computers, and you can map
incoming traffic on the other public IP addresses to specific computers on your LAN. This
one-to-one inbound mapping is configured using an inbound firewall rule.
Classical Routing
In classical routing mode, the wireless VPN firewall performs routing, but without NAT. To
gain Internet access, each computer on your LAN needs to have a valid static Internet IP
address.
If your ISP has allocated a number of static IP addresses to yo u, and you have assigned one
of these addresses to each computer, you can choose classical routing. Or you can use
classical routing for routing private IP addresses within a campus environment.
To view the status of the WAN ports, you can view the Router Status screen (see View the
2. Click the Auto Detect button at the bottom of the screen. The autodetect process probes
the WAN port for a range of connection methods and suggests one that your ISP is most
likely to support.
The autodetect process returns one of the following results:
f the autodetect process is successful, a status bar at the top of the screen displays
•I
the results (for example, DHCP service detected).
•I
f the autodetect process senses a connection method that requires input from you, it
prompts you for the information. The following table explains the settings that you
might have to enter:
DHCP (Dynamic IP)No manual data input is required.
PPPoEThe following fields are required:
• Login
• Password
• Account Name
• Domain Name
PPTPThe following fields are required:
• Login
• Password
• Account Name
• Domain Name
• My IP Address
• Server IP Address
Fixed (Static) IP The following fields are required:
• IP Address
• IP Subnet Mask
• Gateway IP Address
• Primary DNS Server
• Secondary DNS Server
•If the autodetect process does not find a connection, you are prompted either to
check the physical connection between your wireless VPN firewall and the cable, DSL
line, or satellite or wireless Internet dish, or to check your wireless VPN firewa ll’s MAC
address. For more information, see Configure Advanced WAN Options and Other
Tasks o
3. T
o verify the connection, click the Broadband Status option arrow in the upper right of the
n page 50 and Troubleshoot the ISP Connection on page 382.
screen to display the Connection Status pop-up screen. (The following figure shows a static
IP address configuration.)
Figure 11.
IPv4 and IPv6 Internet and Broadband Settings
30
Loading...
+ 395 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.