III‐3‐6. Firewall.........................................................................................................................57
III‐3‐6‐1. URLBlocking................................................................................................................57
III‐3‐6‐2. AccessControl..............................................................................................................59
III‐3‐6‐3. DMZ..............................................................................................................................63
III‐3‐6‐4. DoS...............................................................................................................................64
III‐3‐7. QoS...............................................................................................................................66
III‐3‐7‐1. QoS...............................................................................................................................66
III‐3‐8. Advanced.....................................................................................................................70
III‐3‐8‐1. StaticRouting...............................................................................................................70
III‐3‐8‐2. PortForwarding...........................................................................................................71
III‐3‐8‐3. VirtualServer...............................................................................................................73
III‐3‐8‐4. 2.4GHzWireless...........................................................................................................74
III‐3‐8‐5. ALG...............................................................................................................................75
III‐3‐8‐6. IGMP............................................................................................................................76
III‐3‐8‐7. UPnP.............................................................................................................................76
III‐3‐9. Administration.............................................................................................................77
III‐3‐9‐1. TimeZone....................................................................................................................77
III‐3‐9‐2. Password......................................................................................................................78
III‐3‐9‐3. RemoteAccess.............................................................................................................79
III‐3‐9‐4. Backup/Restore...........................................................................................................80
III‐3‐9‐5. Upgrade.......................................................................................................................80
III‐3‐9‐6. Restart..........................................................................................................................81
III‐3‐9‐7. Logs..............................................................................................................................81
III‐3‐9‐8. ActiveDHCPClient.......................................................................................................82
III‐3‐9‐9. Statistics.......................................................................................................................82
IV. Appendix..............................................................................................83
IV‐1. ConfiguringyourIPaddress.........................................................................................83
IV‐1‐1. HowtocheckthatyourcomputerusesadynamicIPaddress...................................84
IV‐1‐1‐1. WindowsXP.................................................................................................................84
IV‐1‐1‐2. WindowsVista.............................................................................................................86
IV‐1‐1‐3. Windows7...................................................................................................................88
IV‐1‐
1‐4. Windows8...................................................................................................................91
IV‐1‐1‐5. MacOS.........................................................................................................................95
IV‐1‐2. HowtomodifytheIPaddressofyourcomputer........................................................97
IV‐1‐2‐1. WindowsXP.................................................................................................................97
IV‐1‐2‐2. WindowsVista.............................................................................................................99
IV‐1‐2‐3. Windows7.................................................................................................................100
IV‐1‐2‐4. Windows8.................................................................................................................103
IV‐1‐2‐5. Mac............................................................................................................................107
IV‐1‐3. HowtoFindYourNetworkSecurityKey...................................................................110
IV‐1‐3‐1. Windows7&Vista.....................................................................................................110