Edimax Technology 3G-6200Wg User Manual

Page 39

Advertising
background image

38

MAC address with the MAC address of that PC (you have
to be using that PC for the Clone MAC Address button to
work). To find out the PC's MAC address see Appendix A.
(see Glossary for an explanation on MAC address)

Use the following

IP Address

The ISP gave you a static IP to be used to connect to the
L2TP server.

IP Address

This is the IP address that your ISP has given you to
establish a L2TP connection.

Subnet Mask

Enter the Subnet Mask provided by your ISP (e.g.
255.255.255.0)

Gateway

Enter the IP address of the ISP Gateway

User ID

Enter the User Name provided by your ISP for the PPTP
connection. Sometimes called a Connection ID

Password

Enter the Password provided by your ISP for the PPTP
connection

L2TP Gateway

If your LAN has a L2TP gateway, then enter that L2TP

gateway IP address here. If you do not have a L2TP
gateway then enter the ISP’s Gateway IP address above

MTU

This is optional. You can specify the maximum size of

your transmission packet to the Internet. Keep default
value if you do not wish to set a maximum packet size.

Connection Type

If you select “Continuous”, the router will maintain the

connection to the ISP. If the WAN line breaks down and
links again at a latter time, the router will auto-reconnect
to the ISP. If you select “Connect On Demand”, the router
will connect to the ISP automatically when someone
wants to use the Internet and keep connected until the
WAN idle timeout. The router will close the WAN
connection if the time period that no one is using the
Internet exceeds the “Idle Time”. If you select “Manual”,
the router will connect to ISP only when you click
“Connect” manually from the Web user interface. The
WAN connection will not be disconnected due to the idle
timeout. If the WAN line breaks down and latter links
again, the router will not connect to the ISP by itself.

Idle Time Out

The WAN “idle timeout" auto-disconnect function may not

work due to abnormal activities of some network
application software, computer virus or hacker attacks
from the Internet. For example, some software sends
network packets to the Internet in the background, even

Advertising