DrayTek Vigor2830 Series User Manual

Configuring the Linksys WRT1900ACS From Scratch

Best wireless routers 2018: Boost the range and speed of your internet connection
Item Description best utilization of network resources. Do not make a loop with many filter sets. The following page will be open for you to specify Internet Access Type. Inactive or Active state. Page Item Description Content Filter web page first. If you choose Disable, all the web proxy profile appeared under VPN remote dial-in web page will disappear.

Navigation menu

Virtual private network

While VPNs often do provide security, an unencrypted overlay network does not neatly fit within the secure or trusted categorization. Trusted VPNs do not use cryptographic tunneling, and instead rely on the security of a single provider's network to protect the traffic.

From the security standpoint, VPNs either trust the underlying delivery network, or must enforce security with mechanisms in the VPN itself. Unless the trusted delivery network runs among physically secure sites only, both trusted and secure models need an authentication mechanism for users to gain access to the VPN.

Users utilize mobile virtual private networks in settings where an endpoint of the VPN is not fixed to a single IP address , but instead roams across various networks such as data networks from cellular carriers or between multiple Wi-Fi access points. Increasingly, mobile professionals who need reliable connections are adopting mobile VPNs. A conventional VPN can not withstand such events because the network tunnel is disrupted, causing applications to disconnect, time out, [30] or fail, or even cause the computing device itself to crash.

Instead of logically tying the endpoint of the network tunnel to the physical IP address, each tunnel is bound to a permanently associated IP address at the device. The mobile VPN software handles the necessary network-authentication and maintains the network sessions in a manner transparent to the application and to the user. With HIP a mobile host maintains its logical connections established via the host identity identifier while associating with different IP addresses when roaming between access networks.

With the increasing use of VPNs, many have started deploying VPN connectivity on routers for additional security and encryption of data transmission by using various cryptographic techniques. Supported devices are not restricted to those capable of running a VPN client. Many router manufacturers supply routers with built-in VPN clients. Setting up VPN services on a router requires a deep knowledge of network security and careful installation.

Minor misconfiguration of VPN connections can leave the network vulnerable. Performance will vary depending on the ISP. One major limitation of traditional VPNs is that they are point-to-point, and do not tend to support or connect broadcast domains. Therefore, communication, software, and networking, which are based on layer 2 and broadcast packets , such as NetBIOS used in Windows networking , may not be fully supported or work exactly as they would on a real LAN.

A VPN connection may not be as robust as a direct connection to a network. If either fails, the connection fails. From Wikipedia, the free encyclopedia. For other uses, see VPN disambiguation. This article is in a list format that may be better presented using prose. You can help by converting this article to prose, if appropriate. Editing help is available. This section needs additional citations for verification.

Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. August Learn how and when to remove this template message. Cisco Secure Virtual Private Network. Internet working Technologies Handbook, Third Edition. Cisco Press, , p. Digital Subscriber Line Engineering Consortium, , p.

Archived from the original on 15 June It just happens to interoperate with their equipment. Comparing, designing, and deploying VPNs 1st print. Retrieved 29 August Generic Routing Encapsulation over IPv4 networks. Networking Technology Series 4 ed. Closing the Gap" , SearchMobileComputing.

Retrieved 19 October Layer 2 Forwarding Protocol DirectAccess. Freenet Tresorit TeamDrive Wuala. Internet censorship circumvention technologies. Program Think Blog Great Cannon. Retrieved from " https: The web page also can guide you to upgrade firmware. The DrayTek web site is www. Go to Certificate Management and choose Local Certificate. Enter the information in the certificate request. Copy and save the X Local Certificate Requet as a text file and save it for later use.

Connect to CA server via web browser. Follow the instruction to submit the request. Below we take a Windows CA server for example. Then you have done the request and the server now issues you a certificate. Use web browser connecting to the CA server that you would like to retrieve its CA certificate. Click Retrive the CA certificate or certificate recoring list.

When finished, click refresh and you will find the below illustration. The website of MyVigor a server located on http: To access into MyVigor for getting more information, please create an account for MyVigor first.

Check to confirm that you accept the Agreement and click Accept. Type your personal information in this page and then click Continue. Choose proper selection for your computer and click Continue. New Account Confirmation 8. Check to see the confirmation email with the title of Letter from myvigor. Click the Activate my Account link to enable the account that you created.

The following screen will be shown to verify the register process is finished. Your account has been activated. You can access into MyVigor server to activate the service e. Find the line of Not registered yet?. Then, click the link Click here! New Account Confirmation 6. When you see the following page, please type in the account and password that you just created in the fields of UserName and Password. Then type the code in the box of Auth Code according to the value displayed on the right side of it.

If it is necessary for you to delete, copy files on the device or write, paste files to the devcie, it must be done through SAMBA server or FTP server. Click OK to save the configuration. Make sure the FTP service is running properly. When the following screen appears, it means the FTP service is running properly. The information for FTP server will be shown as below. This section will discuss how to build VPN Trunk with load-balance between Vigor and other router e.

The purpose is to setup a VPN trunk between Vigor Settings for Vigor In the following page, please configure the settings as the following figure. Click OK to save the configuration and return to previous page. In this page, please configure the settings as the following figure.

Click Advanced for specifying Load Balance Algorithm. Transferred packets Tx Pkts will keep increasing through both tunnels when outgoing packets sent to the remote VPN network. Click Apply to save the configuration and return to previous page. Click Apply to save the configuration. Choose Index 1 and click Edit. Now, one-pair VPN trunk between Vigor Setting configuration is the same as Scenario 1.

Profile 1 and Profile 2 are one pair; Profile 3 and Profile 4 are the other pair. Choose the tab of Configure the settings as the following figure.

Set two LAN subnet: Group two VPN policies as the following figure and then click Apply. The way to configure the setting is the same as Scenario 1. Now, two-pair VPN trunk between Vigor This chapter will guide users to execute advanced full configuration through admin mode operation. As for other examples of application, please refer to chapter 5. The window will ask for typing username and password. These are known as private IP addresses, and are listed in the following ranges: Therefore, when other Ethernet WAN ports are not available, the router will use 3.

Enable V means such WAN interface is enabled and ready to be used. Choose No to disable the settings for this WAN interface. Display the physical mode of such WAN interface. After finished the above settings, click OK to save the settings.

It will be changed according to the Active Mode specified. If you choose Always On as Active Mode, such interface will be used for access into Internet all the time.

Each item is explained as follows: The following web page will be shown. If you click Disable, this function will be closed and all the settings that you adjusted in this page will be invalid. Item Description have to type IP address in this field for pinging. TTL value is set by telnet command. It means Max Transmit Unit for packet. The default setting is Click Enable RIP for activating this function.

Bridge Mode If you check this box to invoke the function, the router will work as a bridge. Item Description MAC address for the router. Specify a MAC Address: Some Cable service providers specify a specific MAC address for access authentication. Item Description after passing through the time without any action. In some case, your ISP provides service to always assign you the same IP address whenever you request. After finishing all the settings here, please click OK to activate them.

You Setup can type in four sets of time schedule for your request. This router supports the function of load balancing. It can assign traffic with protocol type, IP address for specific host, a subnet of hosts, and port range to be allocated in WAN interface. The user can assign traffic category and force it to go to dedicate network interface based on the following web page setup.

Click any Index number link to access into the following page for configuring load-balance policy. Item Description Enable Check this box to enable this policy. Protocol Use the drop-down menu to choose a proper protocol for the WAN interface. The most generic function of Vigor router is NAT.

This means that you can set up a public subnet or call second subnet that each host is equipped with a public IP address. As a part of the public subnet, the Vigor router will serve for IP routing to help hosts in the public subnet to communicate with other public hosts or servers outside.

You can group local hosts by physical port and create up to 4 virtual LANs. This page provides you the general settings for LAN.

Item Description General Setup Allow to configure settings for each subnet respectively. Status- Check the box to enable such LAN configuration.

Basically, LAN1 status is enabled in default. After finishing all the settings here, please click OK to save the configuration. Item Description in the LAN. For Routing Usage - Click this item to invoke Routing usage. Subnet Mask - Type in an address code that determines the size of the network. The default is Here is an example of setting Static Route in Main Router so that user A and B locating in different subnet can talk to each other via the router.

Assuming the Internet access has been configured and the router works properly: Please add a static route as shown below, which regulates all packets destined to Return to Static Route Setup page. Click on another Index Number to add another static route as show below, which regulates all packets destined to Virtual LAN function provides you a very convenient way to manage subnets by grouping them.

The following page will appear. Or, check Disable to close this function. Mirror Port Select a port to view traffic sent from mirrored ports. At present, only WAN4 will be treated as mirror port. NAT is a mechanism that one or more private IP addresses can be mapped into a single public one. Private IP addresses are recognized only among internal hosts. Item Description Display the number of the profile. Index Service Name Display the description of the specific network service.

Public Port Display the port number which will be redirected to the specified Private IP and Port of the internal host. If you choose Range as the port redirection mode, you will see two boxes on this field. Type a complete IP address in the first box as the starting point and the fourth digits in the second box as the end point.

Choose PC Click this button and then a window will automatically pop up, as depicted below. WAN IP for your selection. Open Ports allows you to open a range of ports for the traffic of special applications. Common application of Open Ports includes P2P application e. Ensure that you keep the application involved up-to-date to avoid falling victim to any security exploits.

Specify the WAN interface that will be used for this entry. You can use address mapping function to achieve this demand. Item Description Index Indicate the relative number for the particular entry that you want to configure You should click the appropriate index number to edit or clear the corresponding entry. Item Description Enable Check to enable this entry. Protocol Specify the transport layer protocol.

Local host can use this IP to connect to Internet. Item Description Display the text which memorizes the application of this rule. Comment Triggering Protocol Display the protocol of the triggering packets. Triggering Port Display the port of the triggering packets. Incoming Protocol Display the protocol for the incoming data of such triggering profile.

Service Choose the predefined service to apply for such trigger profile. Comment Type the text to memorize the application of this rule. Triggering Port Type the port or port range for such trigger profile. When the triggering packets received, it is expected the Incoming Protocol incoming packets will use the selected protocol.

While the broadband users demand more bandwidth for multimedia, interactive applications, or distance learning, security has been always the most concerned. The firewall of the Vigor router helps to protect your local network against attack from unauthorized outsiders. It also restricts users in the local network from accessing the Internet. Stateful inspection is a firewall architecture that works at the network layer. Unlike legacy static packet filtering, which examines a packet based on the information in its header, stateful inspection builds up a state machine to track each connection traversing all interfaces of the firewall and makes sure they are valid.

General Setup allows you to adjust settings of IP Filter and common options. Here you can enable or disable the Call Filter or Data Filter. Under some circumstance, your filter set can be linked to work in a serial manner. So here you assign the Start Filter Set only. Enable Strict Security For the sake of security, the router will execute strict security Firewall checking for data transmission.

Such feature is enabled in default. All the packets, while transmitting through Vigor router, will be filtered by firewall. If the firewall system e. Item Description section later. When there is no user profile or group profile existed, Create New User or Create New Group item will appear for you to click to create a new one.

Or choose [Create New] from the drop down list in this page to create a new profile. For troubleshooting needs, you can specify to record information for Web Content Filter by checking the Log box. Item Description best utilization of network resources. Click Firewall and click Filter Setup to open the setup page. To edit or add a filter, click on the set number to edit the individual set.

The following page will be shown. Each filter set contains up to 7 rules. Click on the rule number button to edit each rule. Item Description Check to enable the Check this box to enable the filter rule. RT means routing domain for 2nd subnet. Protocol - Specify the protocol s which this filter rule will apply to. No-Strict - no limitation. Quality of Service Choose one of the QoS rules to be applied as firewall rule.

For detailed information of setting QoS, please refer to the related section later. Item Description Content Filter web page first. It will be sent to Syslog server. TCP protocol only; session timeout is configured for the data flow which matched with the firewall rule. DrayTek Banner — Please uncheck this box and the following screen will not be shown for the unreachable web page.

The default setting is Enabled. As stated before, all the traffic will be separated and arbitrated using on of two IP filters: You may preset 12 call filters and data filters in Filter Setup and even link them in a serial manner. Each filter set is composed by 7 filter rules, which can be further defined.

The DoS Defense functionality is disabled for default. Click Firewall and click DoS Defense to open the setup page. Item Description Enable Dos Defense The default setting for threshold and timeout are 50 packets per second and 10 seconds, respectively.

This attack involves the perpetrator sending overlapping packets to the target hosts so that those target hosts will hang once they re-construct the packets. User Management is a security feature which disallows any IP traffic except DHCP-related packets from a particular host until that host has correctly supplied a valid username and password.

Network administrator can give different firewall policies or rules for different hosts with different User Management accounts. This page allows you to set customized profiles up to which will be applied for users controlled under User Management. Item Description Enable this account Check this box to enable such user profile. User Name Type a name for such user profile e. When a user tries to access Internet through this router, an authentication step must be performed first.

Item Description Default — If you choose such item, the filter rules pre-configured in Firewall can be adopted for such user profile. Create New Policy — If you choose such item, the following page will be popped up for you to define another filter rule as a new policy. Next, the user can access Internet through any browser on Windows. Note that Alert Tool can be downloaded from DrayTek web site. Telnet — If it is selected, the user can use Telnet command to perform the authentication job.

Please click any index number link to open the following page. Item Description Name Type a name for this user group. Available User Objects You can gather user profiles objects from User Profile page within one user group. This page displays the user s connected to the router and refreshes the connection status in an interval of several seconds.

Item Description Refresh Seconds Use the drop down list to choose the time interval of refreshing data flow that will be done by the system automatically. Item Description Name Type a name for this profile. Maximum 15 characters are allowed. Interface Choose a proper interface. Subnet Mask Type the subnet mask if the Subnet Address type is selected. Invert Selection If it is checked, all the IP addresses except the ones listed above will be applied later while it is chosen.

Click the number under Index column for settings in detail. You can set up to 96 sets of Service Type Objects with different conditions. Item Description Name Display a name for this profile. Set to Factory Default Clear all profiles. It can be ignored for other protocols. The filter rule will filter out any port number.

This page allows you to bind several service types into one group. Click the number under Index column for setting in detail. Item Description Name Type a name for this profile, e. Contents Type the content for such profile. For example, type gambling as Contents.

Item Description Name Type a name for this group. You can gather keyword objects from Keyword Object page Available Keyword Objects within one keyword group.

All the available Keyword objects that you have created will be shown in this box. Selected Keyword Click button to add the selected Keyword objects in Click the number under Profile column for configuration in details. Item Description Profile Name Type a name for this profile. Type a name for such profile and check all the items of file extension that will be processed in the router. As the popularity of all kinds of instant messenger application arises, communication cannot become much easier.

This page allows you to set 32 profiles for different requirements. Item Description Set to Factory Default Below shows the items which are categorized under IM. Select All Click it to choose all of the items in this page. Clear All Uncheck all the selected boxes. Below shows the items which are categorized under Protocol.

Default Message You can type the message manually for your necessity or click this button to get the default message which will be displayed on the field of Administration Message.

You can set eight profiles as URL content filter. Simply click the index number under Profile to open the following web page. Item Description will process the packages with the conditions set below for web feature first, then URL second. None — There is no log file will be recorded for this profile. Pass — Only the log about Pass will be recorded in Syslog.

Item Description decline the connection request to the website whose URL string matched to any user-defined keyword. It should be noticed that the more simplified the blocking keyword list is, the more efficiently the Vigor router performs.

Item Description After finishing all the settings here, please click OK to save the configuration. WCF adopts the mechanism developed and offered by certain service provider e. No matter activating WCF feature or getting a new license for web content filter, you have to click Activate to satisfy your request.

Setup Test Server It is recommended for you to use the default setting, auto-selected. Find more Click it to open http: Click this link to retrieve the factory settings. Set to Factory Default Block — Only the log about Block will be recorded in Syslog. All — All the actions Pass and Block will be recorded in Syslog.

Below shows the menu items for Bandwidth Management. To activate the function of limit session, simply click Enable and set the default session limit. Item Description Enable Click this button to activate the function of limit session. Disable Click this button to close the function of limit session.

Default session limit Defines the default session number used for each computer in LAN. Item Description Delete Remove the selected settings existing on the limitation list. Administration Message Type the words which will be displayed when reaches the maximum number of Internet sessions permitted. Click this button to apply the default message offered by the Default Message router. Bandwidth Limit Enable - Click this button to activate the function of limit bandwidth.

Disable - Click this button to close the function of limit bandwidth. Deploying QoS Quality of Service management to guarantee that all applications receive the service levels required and sufficient bandwidth to meet performance expectations is indeed one important aspect of modern enterprise network. One reason for QoS is that numerous TCP-based applications tend to continually increase their transmission rate and consume all available bandwidth, which is called TCP slow start.

However, each node may take different attitude toward packets with high priority marking since it may bind with the business deal of SLA among different DS domain owners. Click the Setup link to access into next page for the general setup of WAN interface. As to class rule, simply click the Edit link to access into next for configuration. There are four queues allowed for QoS control.

The first three Class 1 to Class 3 class rules can be adjusted for your necessity. Yet, the last one is reserved for the packets which are not suitable for the user-defined class rules.

Item Description Reserved Bandwidth It is reserved for the group index in the form of ratio of Ratio reserved bandwidth to upstream speed and reserved bandwidth to downstream speed. Item Description Check this box to invoke these settings. By the way, you can set up to 20 rules for one Class. If you want to edit an existed rule, please select the radio button of that one and click Edit to open the rule edit page for modification. To add a new service type, edit or delete an existed service type, please click the Edit link under Service Type field.

After you click the Edit link, you will see the following page. For adding a new service type, click Add to open the following page. Item Description Service Name Type in a new service for your request.

Below shows the menu items for Applications. It means that the public IP address assigned to your router changes each time you access the Internet. Force the router updates its information to DDNS server. If you choose Custom, you can modify the domain that is chosen in the Domain Name field.

Domain Name Type in one domain name that you applied previously. This method can only be applied when the WAN connection has been built up. The detailed settings of the call schedule with index 1 are shown below. Item Description Check to enable the schedule. Duration Time Specify the duration or period for the schedule. Other time the Internet access connection should be disconnected Force Down. Force On Mon - Sun 9: It is the most common method of authenticating and authorizing dial-up and tunneled network users.

It defines the methods to access distributing directory server by clients, work on directory and share the information in the directory by clients. The different is that, the server will firstly check if you have the search authority. Item Description Name Type a name for such profile.

This has to manually set up port mappings or use other similar methods. The screenshots below show examples of this facility. When the applications terminate abnormally, these mappings may not be removed.

It is a communication protocol which is mainly used for managing the membership of Internet Protocol multicast groups. A Virtual Private Network VPN is the extension of a private network that encompasses links across shared or public networks like the Internet.

In short, by VPN technology, you can send data between two computers across a shared or public network in a manner that emulates the properties of a point-to-point private link.

Please choose a There are 32 VPN profiles for users to set. There are six types provided here. You will see different configurations based on the selection s you made. When you choose IPSec, you will see the following graphic: When you choose L2TP, you will see the following graphic: Item Description Type a name for such profile. The length of the file is limited Profile Name to 10 characters.

Digital Signature Click Digital Signature to invoke this function. Use the drop X. Otherwise, the setting you choose here will not be effective. Allowed Dial-in Type This item is available after you choose any one of dial-in user account profiles.

You will see different configurations based on the selection dial-in type you made. When you check PPTP, you will see the following graphic: When you check IPSec, you will see the following graphic: Item Description of the remote host for building VPN connection. Remote Network Please type the network mask according to the real location of Mask the remote host for building VPN connection.

After finishing the configuration, please click Next. The confirmation page will be shown as follows. Enable the necessary VPN service as you need. Item Description fall back to use the PAP protocol for authentication. There are two phases of IPSec. The peer that starts the negotiation proposes all its policies to the remote peer and then remote peer tries to find a highest-priority match with its policies.

Click each index to edit one peer digital certificate. There are three security levels of digital signature authentication: Fill each necessary field to authenticate the remote peer. The following explanation will guide you to fill all the necessary fields.

Item Description Profile Name You can manage remote access by maintaining a table of remote user profile, so that users can be authenticated to dial-in via VPN connection. Click each index to edit one remote user profile. Each Dial-In Type requires you to fill the different corresponding fields on the right. If the fields gray out, it means you may leave it untouched.

Item Description policy can be viewed as one pure L2TP connection. From the web page, you will see the message to indicate that you have the privilege for the SSL Web Proxy.

Item Description View All — Click it to show all of profiles. Profile Name Enable this profile Check here to activate this profile. Item Description any one of VPN peers wants to disconnect the connection, it should follow a serial of packet exchange procedure to inform each other. However, if the remote peer disconnect without notice, Vigor router will by no where to know this situation.

To resolve this dilemma, by continuously sending PING packets to the remote host, the Vigor router can know the true existence of this VPN connection and react accordingly. Medium AH Authentication Header means data will be authenticated, but not be encrypted. Item Description suggest you select the combination that covers the most algorithms.

IKE phase 1 key lifetime-For security reason, the lifetime of key should be defined. The default value is seconds. You may specify a value in between and seconds. IKE phase 2 key lifetime-For security reason, the lifetime of key should be defined. Item Description connection through the Internet. You should set the User Name and Password of remote dial-in user below.

Member2 on Backup Profile field - Display the dial-out profile selected from the Member2 drop down list below. Detailed information for this dialog, see later section - Advanced Load Balance and Backup.

General Setup Status- After choosing one of the profile listed above, please click Enable to activate this profile. Edit Click this button to save the changes to the Status Enable or Disable , profile name, member1 or member2. If the router will be used as the VPN Server i.

After setting profiles for load balance, you can choose any one of them and click Advance for more detailed configuration. The windows for advanced load balance and backup are different.

Refer to the following explanation: Advanced Load Balance Available settings are explained as follows: Policy Edit — Click this radio button for assign a blank table for configuring Binding Tunnel. After insert — Click this radio button to adding a new binding tunnel table. Tunnel Bind Table Index- Binding tunnel tables are provided by this device. Below shows a successful binding tunnel policy for load balance: You can find the summary table of all VPN connections.

You may disconnect any VPN connection by clicking Drop button. Dial - Click this button to execute dial out function. Refresh Seconds Choose the time for refresh the dial information among 5, 10, and Refresh Click this button to refresh the whole connection status.

A digital certificate works as an electronic ID, which is issued by a certification authority CA. It contains information such as your name, a serial number, expiration dates etc.

Item Description Upload Local Certificate It allows users to import the certificate which is generated by vigor router and signed by CA server. View Click this button to view the detailed settings for certificate request. You have to copy the certificate request information from above window. Next, access your CA server and enter the page of certificate request, copy the information into it and submit a request.

Trusted CA certificate lists three sets of trusted CA certificate. Use Browse… to find out the saved text file. The one you imported will be listed on the Trusted CA Certificate window. Local certificate and Trusted CA certificate for this router can be saved within one file. Please click Backup on the following screen to save them. If you want to set encryption password for these certificates, please type characters in both fields of Encrypt password and Retype password.

Vigor router supports four SSID settings for wireless connections. Vigor Router is equipped with a hardware AES encryption engine so it can apply the highest protection to your data without influencing user experience.

To isolate means neither of the parties can access each other. To elaborate an example for business use, you may set up a wireless LAN for visitors only so they can connect to Internet without hassle of the confidential information leakage. By clicking the General Settings, a new web page will appear so that you could configure the SSID and the wireless channel.

Please refer to the following figure for more information. Means the identification of the wireless LAN. SSID can be any text numbers or various special characters. We suggest you to change it. Item Description Long Preamble This option is to define the length of the sync field in an Most modern wireless network uses short preamble with 56 bit sync field instead of long preamble with bit sync field. However, some original 11b wireless network devices only support long preamble.

Item Description environment of the network. Rate Control It controls the data transmission rate through wireless connection. Upload — Check Enable and type the transmitting rate for data upload. Default value is 30, kbps. Download — Type the transmitting rate for data download. This page allows you to set security with different modes for SSID 1, 2, 3 and 4 respectively. After configuring the correct settings, please click OK to save and invoke it. Item Description Mode There are several modes provided for you to choose.

Disable - Turn off the encryption mechanism. Item Description as "0xabcde On the side of a station with network card installed, press Start PBC button of network card. Display related system information for WPS. It is a protocol for connecting two access points AP wirelessly. Usually, it can be used for the following application: Provide bridge traffic between two LANs through the air. Extend the coverage range of a WLAN. To meet the above requirement, two WDS modes are implemented in Vigor router.

The major difference between these two modes is that: Yet in Bridge mode, packets received from a WDS link will only be forwarded to local wired or wireless hosts.

Disable mode will not invoke any WDS setting. Bridge mode is designed to fulfill the first type of application. Repeater mode is for the second one. If you choose Bridge as the connecting mode, please type in Bridge the peer MAC address in these fields. Four peer MAC addresses are allowed to be entered in this page at one time. Yet please disable the unused link to get better performance. Such channel can increase the performance for data transit. Guard Interval It is to assure the safety of propagation delays and reflections for the sensitive digital data.

Aifsn It controls how long the client waits for each data transmission. Please specify the value ranging from 1 to Such parameter will influence the time delay for WMM accessing categories. Vigor router can scan all regulatory channels and find working APs in the neighborhood.

Based on the scanning result, users will know which channel is clean for usage. Notice that during the scanning process about 5 seconds , no client is allowed to connect to Vigor. Station List provides the knowledge of connecting wireless clients now along with its status code.

There is a code summary below for explanation. This page allows you to specify an URL for accessing into or display a message when a wireless user connects to Internet through this router. Item Description Display the name of the profile that you create.

Name Display the URL. Disable — the profile will be inactive. If you choose Disable, all the web proxy profile appeared under VPN remote dial-in web page will disappear. There are two restrictions for proxy web server for such selection: Item Description Name Display the application name of the profile that you create.

Different application type will lead different web pages.

Advanced Home Networking In 2017