2
www.encore-usa.com
DTIM Interval: Type a DTIM (Delivery Traffic Indication Message)
interval in the text box. ................................................................................ 26
4.2.4 Wi-Fi Protected Setup ........................................................ 27
This screen enables users to configure the Wi-Fi Protected Setup
(WPS) function. ............................................................................................ 27
4.3 LAN ......................................................................................... 28
4.3.1 Basic ...................................................................................... 28
4.3.2 DHCP ...................................................................................... 29
4.4 ROUTING .................................................................................. 30
4.4.1 Static ...................................................................................... 30
4.4.2 Dynamic ................................................................................ 31
4.4.3 Routing Table ....................................................................... 31
4.5 ACCESS CONTROL .................................................................. 32
4.5.1 Filters ..................................................................................... 32
4.5.1.1 MAC Filters ..................................................................................... 33
4.5.1.2 IP Filter ............................................................................................. 34
4.5.1.3 URL/Domain Blocking .................................................................. 35
4.5.1.4 Protocol Filters .............................................................................. 36
4.5.2 Virtual Server ....................................................................... 37
4.5.3 Special AP ............................................................................. 38
4.5.4 DMZ ........................................................................................ 39
4.5.5 Firewall Rule ........................................................................ 40
4.6 SYSTEM ................................................................................... 42
4.6.1 Password .............................................................................. 42
4.6.2 Time ........................................................................................ 43
4.6.3 Device Information ............................................................. 44
4.6.4 Log .......................................................................................... 45
4.6.5 Log Setting ........................................................................... 46