advertisement
Conventions
The following conventions are used to give the user additional information about specific procedures or content. It is important to pay attention to these conventions as they provide information to prevent damage to equipment or personal injury.
General Conventions
The following general conventions are used in this document.
!
CAUTION!
CAUTIONS APPEAR BEFORE THE TEXT IT REFERENCES
.
CAU
-
TIONS APPEAR IN CAPITAL LETTERS TO EMPHASIZE THAT THE
MESSAGE CONTAINS VITAL HEALTH AND SAFETY INFORMATION
.
!
WARNING!
Warning information appears before the text it references to emphasize that the content may prevent damage to the device or equipment.
Important:
Indicates information that is important to know for the proper completion of a procedure, choice of an option, or completing a task.
Note:
Indicates additional information that is relevant to the current process or procedure.
C
ONVENTIONS
Example:
Indicates information used to demonstrate or explain an associated concept.
N/A:
Indicates that a component or a procedure is not applicable to this model.
Prerequisite:
Indicates a requirement that must be addressed before proceeding with the current function or procedure.
VI
Typographical Conventions
The following typographical conventions are used in this document:
Italics
Indicates book titles, directory names, file names, path names, and program/process names.
Constant width
Indicates computer output shown on a computer screen, including menus, prompts, responses to input, and error messages.
Constant width bold
Indicates commands lines as entered on the computer. Variables contained within user input are shown in angle brackets (< >).
Bold
Indicates keyboard keys that are pressed by the user.
VII
C
ONVENTIONS
advertisement
Key Features
- 5 GHz
- Maximum data transfer rate: 300 Mbit/s
- IEEE 802.11b, IEEE 802.11g, IEEE 802.11n
- 128-bit WEP, 64-bit WEP, WPA-AES, WPA-PSK, WPA-TKIP, 802.1x RADIUS
- Power over Ethernet (PoE)
- Integrated antenna
Related manuals
advertisement
Table of contents
- 2 Conventions
- 4 Table of Contents
- 10 Copyright
- 12 1.1 Package Contents
- 13 1.2 Product Overview
- 13 Key Features
- 14 Benefits
- 15 Technical Specification
- 15 Wireless Specification
- 15 Hardware Specification
- 15 Software Specification
- 19 2.1 System Requirements
- 20 2.2 Installing the Device
- 20 Pre-Installation Guidelines
- 20 Installing the Device
- 23 3.1 Logging In
- 24 Best Practices
- 25 Basic Network Settings
- 26 4.1 System Status
- 26 4.1.1 Using Save/Reload
- 27 4.1.2 Viewing System Information
- 29 4.1.3 Viewing Wireless Client List
- 30 4.1.4 Viewing System Log
- 31 4.1.5 Viewing Connection Status
- 32 4.1.6 Viewing DHCP Client Table
- 33 4.1.7 Viewing WDS Link List
- 34 4.2 System Setup
- 34 4.2.1 Configuring Operation Mode
- 35 4.2.2 Configuring IP Settings
- 36 4.2.3 Configuring Spanning Tree Settings
- 37 4.3 Router Setup
- 37 4.3.1 Configuring WAN Settings
- 37 Static IP
- 38 Dynamic IP
- 39 Point-to-Point Protocol over Ethernet (PPPoE)
- 40 Point-to-Point Tunnelling Protocol (PPTP)
- 42 4.3.2 Configuring LAN Settings
- 43 4.3.3 Configuring VPN Pass-Through
- 44 4.3.4 Configuring Port Forwarding
- 46 4.3.5 Configuring Demilitarized Zone
- 47 4.4 Configuring Wireless LAN
- 47 4.4.1 Configuring Wireless Settings
- 47 Access Point Mode
- 49 Client Bridge Mode
- 50 WDS Bridge Mode
- 52 Client Router Mode
- 53 4.4.2 Configuring Wireless Security
- 53 Wired Equivalent Privacy (WEP)
- 54 Wi-Fi Protected Access Pre-Shared Key (WPA-PSK)
- 55 Wi-Fi Protected Access 2 Pre-Shared Key (WPA2-PSK)
- 56 Wi-Fi Protected Access Pre-Shared Key (WPA-PSK) Mixed
- 57 Wi-Fi Protected Access (WPA)
- 58 Wi-Fi Protected Access 2 (WPA2)
- 59 Wi-Fi Protected Access (WPA) Mixed
- 60 4.4.3 Configuring Wireless MAC Filter
- 61 4.4.4 Configuring WDS Link Settings
- 62 4.4.5 Configuring Advanced Network Settings
- 62 Wireless Traffic Shaping
- 63 4.5 Management Setup
- 63 4.5.1 Configuring Administrator Account
- 64 4.5.2 Configuring Management VLAN
- 65 4.5.3 Configuring SNMP
- 67 4.5.4 Configuring Backup/Restore Settings
- 68 4.5.5 Configuring Auto Reboot Settings
- 69 4.5.6 Configuring Firmware Upgrade
- 70 4.5.7 Configuring System Time
- 71 4.5.8 Configuring Wi-Fi Schedule
- 71 Add a Schedule Service
- 72 Schedule Services Table
- 73 4.5.9 Configuring Command Line Interface
- 74 4.5.10 Configuring Logging
- 75 4.5.11 Configuring Diagnostics
- 76 4.5.12 Viewing Device Discovery
- 77 4.5.13 Configure Denial of Service Protection
- 78 4.5.14 Logging Out
- 79 Appendix
- 80 Appendix A
- 81 Appendix B