Compex NetPassage WP18 Specifikace

Procházejte online nebo si stáhněte Specifikace pro Přístupové body WLAN Compex NetPassage WP18. Compex NetPassage WP18 Specifications [en] Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 187
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 2

5 Chapter 1: Introduction Introducing the access point His access point is a Wireless 54Mbps A+G Dualband Access Point. It doesn’t just operat

Strany 3

95 WAN Setup The configuration for each type of broadband Internet connection is shown in the following individual sections. The system has to be

Strany 4 - Technical Support Centres

96 Static IP If you have subscribed to a specific IP address or to a fixed range of IP addresses from your ISP, follow these steps. Static IP

Strany 5

97 Dynamic IP This is the default WAN Type of the access point. In this connection mode, your ISP will automatically assign its IP address. T

Strany 6

98 PPPoE Select this connection type if you have subscribed to ADSL in a country utilising standard PPPoE for authentication, for instance:  If

Strany 7

99 Follow these steps to setup PPPoE. PPPoE Configuration Select PPP over Ethernet from the Select WAN Type menu.

Strany 8

100 PPTP The Point-to-Point Tunneling Protocol (PPTP) enables the implementation of secure multi-protocol Virtual Private Networks (VPNs) through

Strany 9

101 L2TP L2TP (Layer 2 Tunneling Protocol) is an extension to the PPP protocol used for Virtual Private Networks (VPNs) that supports multiple pr

Strany 10 - Chapter 1: Introduction

102 Email Notification This feature notifies you by email if there is a change in the WAN IP address. Follow these steps to setup Email Notific

Strany 11 - Key features

103 Email address of Sender: This is the email address that will appear as the sender. Needs Authentication specifies whether the SMTP server r

Strany 12

104 MAC Address Cloning The access point has the ability to clone MAC addresses. Follow these steps to clone MAC address. MAC Address Cloning

Strany 13 - Security Features

6 Chapter 2: Getting to know the Access Point The following will help you get more acquainted with the rich suite of features offered by the ac

Strany 14 - Additional Features

105 Link Speed & Duplex The access point supports connection link speeds of 100Mbps at full duplex and 10Mbps at half duplex, and can also au

Strany 15 - Panel Views

106 Using NAT NAT (Network Address Translation) functions by transforming the private IP address of packets originating from hosts on your LAN so

Strany 16

107 When NAT is enabled, your LAN is not accessible to the WAN. However, implementing virtual servers allows you to host Internet servers such as

Strany 17 - Name Description

108 DMZ 1. Click NAT from theCONFIGURATION menu. 2. Ensure that NAT Status is setto Enable. At the Advanced NAT

Strany 18

109 To Setup Port Forwarding Port forwarding allows the access point to redirect any incoming Internet request bearing a public IP address to a

Strany 19

110 Follow these steps to setup port forwarding. Port Forwarding 1. Click NAT from theCONFIGURATION menu. 2. Ensure that NAT Statu

Strany 20 - Chapter 3: Hardware Setup

111 The Port Forward Entries table displaysthe list of current port-based entries

Strany 21

112 NAT Static Port Based Entries reflects the new entry. To assign more servers in your LAN: 1. Click Add. This will bring yo

Strany 22

113 The following is a non-exhaustive list of well-known port numbers: Application Port Number Echo 7 Daytime 13 FTP 21 SMTP (Simple Mail Trans

Strany 23

114 IP Forwarding If you have subscribed to more than one IP address from your ISP, you may define Virtual Servers based on their IP address so

Strany 24

7 Easy Management & Configuration You can browse or uConfig to the web interface of the access point for ef

Strany 25 - Overview of alternatives

115 NAT Static IP Address Entries reflectsyour new entry. To assign more servers in your LAN: 1. Click Add. This will bring

Strany 26 - Running uConfig

116 Routing The access point supports both static routing for manual routing table entry addition, and dynamic routing for automatic routing tabl

Strany 27

117 Static Routing Follow these steps to add entries to your access point’s routing table for rerouting of IP packets to another network. Static

Strany 28 - Chapter 5: Setting up a WLAN

118 The IP Routing Table reflects the newentry. To add more routes: 1. Click Add. This will bring you back to Add IPRoute GUI. 2

Strany 29 - Operation Modes

119 Bandwidth Control for WAN Bandwidth Control allows you to decide the available bandwidth in levels of 1kbit. Follow these steps to setup Ban

Strany 30

120 Bandwidth Control for LAN Bandwidth Control allows you to decide the available bandwidth in levels of 1kbit. Follow these steps to setup Ban

Strany 31

121 1. Enter the Bandwidth Control Rule Name. 2. Enter the Committed Rate in kbit. This sets the bandwidth committed. 3. En

Strany 32

122 Remote Management This feature is especially helpful for users who work away from the office or from home. The user only requires Internet a

Strany 33

123 Universal Plug and Play (UPnP) The following are issues that can arise when using NAT: • Some network applications assume the IP address and

Strany 34 - To Set Up a Wireless LAN

124 Although NAT traversal does not solve all NAT-related issues, it allows several applications to run behind NAT-enabled devices. It is recomme

Strany 35

8 Security Features Security elements have been put in place to better protect your data and privacy. 64-bit / 128-bit WEP Encryption

Strany 36

125 Parallel Broadband The access point is equipped with the exclusive Parallel Broadband technology, which features scalable Internet bandwidth,

Strany 37

126 To Enable Parallel Broadband Parallel Broadband can be implemented when:  More than one access point is interconnected (LAN port to LAN por

Strany 38

127 DNS Redirection DNS Redirection allows you to redirect DNS requests to a local or closer DNS server. This improves the response time and enab

Strany 39

128 Dynamic DNS Setup It is difficult to remember the IP addresses used by computers to communicate on the Internet. It gets even more complicate

Strany 40

129 On Enable/Disable Dynamic DNS page, Dynamic DNS Status is disabled by default. If you have already created a list earlier, click R

Strany 41 - Channel Survey

130 There are two predefined DDNS providers. Please note that you need to be connected to the Internet to register your DDNS account. To select

Strany 42 - Description

131 Optional: In the Mail Exchanger field, enter the Static WAN IP address of the mail server configured to handle email for your domain. Sel

Strany 43

132 To select DtDNS as DDNS Service Provider Under the Choice column in the Choice DDNS Provider check the radio button for DtDNS. Click Next.

Strany 44 -  WPA Auto Enterprise

133 SNMP Setup SNMP (Simple Network Management Protocol) is a set of protocols that facilitates the exchange of management information between ne

Strany 45 - Selecting a security mode

134 SNMP Trap The SNMP Trap provides notification of significant network events through unsolicited SNMP messages. This results in substantial s

Strany 46

9 Additional Features These features reveal the comprehensive range of advanced routing functionalities. Static IP, Dynam

Strany 47

135 Telnet/SSH Setup Telnet allows a computer to remotely connect to the access point CLI (Command Line Interface) for control and monitoring.

Strany 48

136 Follow these steps to setup Telnet/SSH. Telnet/SSH Setup 1 Click Telnet/SSH Setup from the Device Access Managementmenu.

Strany 49 - How to Setup 802.1x

137 User Management User Management To add user: 1. Click Add button. 2. In Add User Entry Page, enter User Name, Password, Confirm P

Strany 50 - WPA Enterprise

138 TELNET CLI Telnet CLI (Command Line Interface) The user may connect to the CLI (Command Line Interface) via a TELNET session to the default

Strany 51 - WPA Personal

139 SSH CLI (Secure Shell Host Command Line Interface) SSH CLI (Secure Shell Host Command Line Interface) SSH is designed and created to provid

Strany 52 - Advanced WLAN Settings

140 SSH CLI has a command line interface like shown below for example.

Strany 53

141 Web Management Setup HTTPS (SSL) is supported in addition to the standard HTTP. HTTP (SSL) features additional authentication and encrypti

Strany 54 - Long Distance Parameters

142 Web service restarts automatically. Web session logouts. You may reconnect using the new web service using the relogin link displayed on

Strany 55

143 Chapter 10: Web Interface Utilities This chapter describes the use of:  The System Tools menu  The Help menu Using the SYSTEM TOOLS Men

Strany 56

144 The Ping Utility pings the target with 10 packets of 56 bytes data and displays the results and statistics at the end. Click Back to re

Strany 57 - Setting WMM

10 Panel Views The access point can either be placed standing upright on the 2 rest feet included or mounted onto a wall. LED indicators denot

Strany 58

145 Syslog Syslog forwards system log messages in a network to a machine running a Syslog listening application. It is used to help in managing

Strany 59 - Statistics

146 SStteepp 22:: Select to EEnnaabbllee SSyysslloogg. SStteepp 33:: Enter the RReemmoottee IIPP AAddddrreessss oorr DDoommaaiinn NN

Strany 60 - Virtual AP (Multiple SSID)

147 SStteepp 44:: Install Syslog listening application. SStteepp 55:: View logged information on Syslog listening application.

Strany 61 - Virtual AP

148 To Identify Your System If your network operates with several access points, a means of identifying each individual access point would be us

Strany 62 - Preferred APs

149 Follow these steps to set your system’s clock. System Clock Setup To Upgrade the Firmware Version The products are

Strany 63 - Antenna Alignment

150 Settings Profile A profile is the set of parameters with which the access point is configured. You may choose to:  Sav

Strany 64 - Chapter 6: Configuration

151 Backup Browse To return system to earlierconfiguration using backup file: 1. Click Browse to searc

Strany 65

152 To Reboot Most changes in system settings require rebooting to take effect. Follow these steps to reboot the access point. Reboot System

Strany 66 - LAN Setup

153 Change Your Login Password The login password is required to access the web configuration interface, through which the access point settings

Strany 67

154 To Logout Follow these steps to logout. Logout Click Logout from the System Tools menu. A login prompt displays.

Strany 68 - Advanced DHCP Options

11 Front View 7 8 9 10 11 12

Strany 69

155 Using the HELP Menu To Get Technical Support This page contains the contact information of worldwide technical support centres. Follow these

Strany 70 - Spanning Tree Protocol

156 About Your System The About System page displays a summary of system configuration information that might be required by support technicians

Strany 71

157 Appendix A: Configuring Your PC for Network Access This section illustrates the configuration of your computer’s TCP/IP settings for communi

Strany 72 - MAC Filtering

158 Double-click the Network icon. The network configuration screendisplays. Check your list of networkcomponents in th

Strany 73

159 Configuring Dynamic IP Address Allocation Microsoft Windows 98/98SE/ME/2000 Follow these steps to configure your PC for dynamic IP address al

Strany 74

160 1. Click IP Address. 2. Select Obtain an IP addressautomatically. 3. Click Gateway. 4. Check that InstalledGateways list is bl

Strany 75

161 Configuring Static IP Address Allocation Microsoft Windows 98/98SE/ME/2000 Follow these steps to enable static IP address allocation. Stati

Strany 76

162 1. Click IP Address. 2. Select Specify an IP address. 3. In IP Address enter192.168.168.X, where X isany value fr

Strany 77

163 Configuring Wireless Network Settings for Windows XP It is recommended to configure the wireless client PC or notebook with automatic IP addr

Strany 78

164 Appendix B: Dual Card Application Example This is an application example for a dual WLAN card access point installed with the following s

Strany 79

12 Panel Description Name Description Steady Green The device is powered up. 1 Power (LED) Off No power is supplied to the device. Steady G

Strany 80

165 How it works 1. The connection path when WPC-1 is connected to VAP-WLAN1 flows from AP to the Ethernet port of the access point to switch V

Strany 81

Appendix C: Troubleshooting Solutions to Common Problems In this section we list suggested steps to rectify some common problems that may arise d

Strany 82

167 2. I am unable to surf the Internet. A. Make sure that the Ethernet cable is properly connecting your Cable/ADSL modem to the WAN port of th

Strany 83 - Firewall Configuration

168 ♦ For Netscape 4.7 or later versions  Start Netscape Navigator. From the Edit menu bar, select Preferences, then Advanced, and finally Pro

Strany 84

169  If it does, click on it and press the Properties button. Check whether Device Status displays this message “This device is working properl

Strany 85

170 Appendix D Command Line Interface Commands Get Operation List SYNTAX DESCRIPTION Get tasks Display all active process/tasks. Get sysinfo Di

Strany 86

171 TX Rate SYNTAX DESCRIPTION Set txrate <string> Values are: (default auto) (802.11a)-- 6, 9, 12, 18, 24, 36, 48, 54, auto (802.11b/g m

Strany 87

172 {CTRY_EL_SALVADOR, "SV" }, {CTRY_ESTONIA, "EE" }, {CTRY_FINLAND, "FI" }, {CTRY_FRANCE, "

Strany 88

173 {CTRY_SPAIN, "ES" }, {CTRY_SWEDEN, "SE" }, {CTRY_SWITZERLAND, "CH" }, {CTRY_SYRIA, "

Strany 89 - Firewall Logs

174 WLAN State SYNTAX DESCRIPTION Get wlanstate Display whether status of current wireless operation is Enabled or Disabled. Set wlanstate enabl

Strany 90 - Packet Filtering

13 6 Rest Feet These rest feet hold the access point in the standing position. 7 External Antennas SMA antennas 8 R232 (Integrated Serial I

Strany 91

175 Appendix E Glossary of Terms List of Commonly Used Terms 10Base-T An IEEE Ethernet standard for 10Mbps data transmission using unshielde

Strany 92

176 DSSS Direct Sequence Spread Spectrum is a modulation scheme employed by the 802.11b standard that uses a chipping code (redundant bit

Strany 93 -  Any time

177 protocol allow a host to inform its local access point, using Host Membership Reports, that it wants to receive messages addressed to a spec

Strany 94 - URL Filtering

178 PPTP Point-to-Point Tunneling Protocol supports the creation of Virtual Private Networks by ensuring that messages transmitted from one V

Strany 95

179 WEP Wired Equivalent Privacy is a wireless data privacy encryption protocol based on a 64-bit or 128-bit shared key algorithm. WLA

Strany 96 - Multicast Filtering

180 Appendix F Technical Specifications Safety and Electromagnetic Conformance • FCC Part 15 SubPart B and SubPart C [for wireless module] •

Strany 97 - Setting Up as Router

181 Network Interface WAN Interface: 1 x 10/100 Mbps LAN Interface: 3 x 10/100 Mbps Power over Ethernet: 1 x PoE Security • 64 - bit /

Strany 98 - Setting Up as Access Point

182 Certifications • FCC • CE Mark • Gost • C-tick N 12030 Environment Requirements Operating Temp: Storage Temp: Operating Humidity: 0

Strany 99 - Chapter 9: Router Setup

14 ! NOTE: Although the Ethernet ports are numbered 1 to 4, they DO NOT have to be connected sequentially. For example: in a network

Strany 100

© Copyright 2006 Compex Systems Pte Ltd All Rights Reserved This document contains information that is protected by copyright. Reproduction, adapt

Strany 101

15 Chapter 3: Hardware Setup The access point can be powered using either the power adapter, or PoE* or IEEE 802.3af PoE. The installation proc

Strany 102

16 Insert one end of the RJ45 Ethernet cable to any of the LAN ports (1, 2, 3, or 4) on the access point and the other end to your PC’s Ethernet

Strany 103

17 Option 2: Using PoE to Supply Power PoE (Power-Over-Ethernet) can be used to power the access point. This accessory supplies operational power

Strany 104

18 Connect the RJ45 Ethernet cable attached to the PoE Injector to your PC’s Ethernet network adapter. Once you have finished configuring the a

Strany 105

19 Turn on your power supply. Notice that the Power LEDs have lighted up. This indicates that the access point is receiving power through the Po

Strany 106

20 Chapter 4: Accessing the Web Interface This chapter consists of the following:  Overview of alternatives to access the web interface  How

Strany 107

21 After installation, your PC will automatically detect connected products. Double-click on the uConfig utility icon to run the program. Runn

Strany 108

22 How to Browse to the Web Interface Browsing to the web interface You will then reach the home page of the access point

Strany 109

23 Chapter 5: Setting up a WLAN This chapter applies exclusively to Wireless Setup (a/b/g) and Wireless Setup (b/g). Wireless Setup (a/b/g) s

Strany 110

24 Operation Modes Access Point Mode This is the default mode of your access point. The Access Point mode enables you to bridge wireless clients

Strany 111 - Using NAT

FCC Compliance Statement This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: 1. This devi

Strany 112

25 Client Mode In Client mode, the device acts as a wireless Client. When connected to an access point, it will create a network link between th

Strany 113

26 Wireless Routing Client Mode An application of this mode would be for the Ethernet port of the Wireless Routing Client to be used for connecti

Strany 114

27 Transparent Client Mode In Transparent Client Mode, the access point provides connection with an AP* acting as Root AP. This operation mode i

Strany 115 - Port Forwarding

28 Difference Between other client modes and Transparent Client Mode Other client modes Transparent Client Mode Connectivity with any standard A

Strany 116

29 To Set Up a Wireless LAN Follow these steps to setup your wireless LAN. WLAN Setup (a/b/g) Click on WLA

Strany 117

30 Operation Mode : These operation modes are supported: • Access Point • Client Mode • Wireless Routing Client •

Strany 118 - Application Port Number

31 Wireless mode : Select from the list of wireless modes available: 802.11a (not supported by WLAN Setup for b/g) This mode support

Strany 119 - IP Forwarding

32 Point-to-Point & Point-to-MultiPoint Setup You can implement Point-to-Point connection by simply setting one access point as RootAP in Ac

Strany 120

33 RRoooottAAPP SStteepp 22:: Select AAcctt aass RRoooottAAPP, click on the AAppppllyy button and reboot your device to let your changes tak

Strany 121 - Routing

34 Follow these steps to setup Transparent Client/s. TTrraannssppaarreenntt CClliieenntt SStteepp 11:: Click on WWLLAANN SSeettuupp from the

Strany 122 - Static Routing

Technical Support Information The warranty information and registration form are found in the Quick Install Guide. For technical support, you may

Strany 123

35 TTrraannssppaarreenntt CClliieenntt SStteepp 22:: Select the RReemmoottee AAPP MMAACC checkbox. Enter the RReemmoottee AAPP MMAACC.

Strany 124 - Bandwidth Control for WAN

36 Channel Survey Follow these steps to perform a channel survey to get the recommended channel for the access point. Channel Survey Click

Strany 125 - Bandwidth Control for LAN

37 Channel Survey This table describes the read-only parameters of all channels that can be viewed from the Channel Survey page. Parameters

Strany 126

38 How to Make Your WLAN More Secure All your network clients MUST share the same wireless settings as the access point to be able to communicat

Strany 127 - Remote Management

39  WPA2 Enterprise WPA2 Enterprise mode implements the full IEEE 802.11i standard and 802.1X authentication. There MUST be a RADIUS server on

Strany 128

40 The subsequent sections illustrate how to configure each security mode. Begin with following the two common preliminary steps shown below to

Strany 129

41 How to Setup WEP WEP You can define up to 4 WEPkeys. For each key, you can specify:  The Key Entry Method, byselectin

Strany 130 - Parallel Broadband

42 For hexadecimal key entry: 1. Select the Hex radio button. 2. Select the radio button ofthe k

Strany 131

43 For ASCII key entry: 1. Select the ASCII radiobutton. 2. Select the radio buttonof the key to beentered. 3. Select the keyencryp

Strany 132 - DNS Redirection

44 How to Setup 802.1x 802.1x 1. Key in the IP address of thePrimary RADIUS S

Strany 133 - Dynamic DNS Setup

About This Document This document may be superseded, in which case you may find its latest version at: http://www.compex.com.sg The product desc

Strany 134

45 How to Setup WPA Enterprise Modes Follow these steps to setup the access point to use WPA Enterprise, WPA2 Enterprise, and WPA Auto Enterprise

Strany 135

46 How to Setup WPA Personal Follow these steps to setup the access point for using WPA Personal, WPA2 Personal, and WPA Auto Personal. WPA Pers

Strany 136

47 Advanced WLAN Settings Follow these steps to change the radio settings of the access point. Editing Advanced Settings

Strany 137

48 6. Select whether to enable StationIsolation. This security feature implementsisolation, in order to prevent

Strany 138 - SNMP Setup

49 Long Distance Parameters It is necessary to adjust the long distance parameters, only if the distance is 100 meters and beyond. Follow these s

Strany 139 - SNMP Trap

50 1. Select whether to Enable or Disable Outdoor operation. 2. Enter Distance of the unit in meters. 3. Enter the SlotTime. 4. Enter the

Strany 140 - Telnet/SSH Setup

51 WMM Wireless Multimedia (WMM) is a QoS (Quality of Service) standard in IEEE802.11E that we have adopted to improve and support the user expe

Strany 141 - Telnet/SSH Setup

52 Follow these steps to change the setup Wireless Multimedia on your access point. Setting WMM Click WMM Settings. 1. Select

Strany 142 - User Management

53 WMM Parameters (for advanced users) AIFs (Arbitrary Inter-Frame Space) Arbitrary Inter-Frame Space is the minimum wait time interval between

Strany 143 - TELNET CLI

54 Statistics Follow these steps to view the WLAN detailed connections statistics per WLAN station. Statistics 1. Click on WLAN Setup (a/b/g

Strany 144

i TABLE OF CONTENTS © COPYRIGHT 2006 COMPEX SYSTEMS PTE LTD... I TRADEMARK INFORMATION ...

Strany 145

55 Virtual AP (Multiple SSID) Virtual AP implements mSSID (Multi-SSID) whereby a single wireless card can be setup with up to 16 virtual AP conne

Strany 146 - Web Management Setup

56 Virtual AP 1. Click on WLAN Setup (a/b/g) from the CONFIGURATION menu. 2. Select Virtual AP. Virtual AP List page dis

Strany 147

57 Preferred APs (Only available in Client Mode) When there is more than one AP with the same SSID, the Preferred APs function allows you defin

Strany 148 - Using the SYSTEM TOOLS Menu

58 Antenna Alignment The Antenna Alignment function helps you find the best alignment for the access point antenna by measuring the quality of th

Strany 149

59 Chapter 6: Configuration This chapter describes the different features of the access point and explains how to customise them to meet your ne

Strany 150

60 respectively, the DHCP End IP Address should be 192.168.168.X where X is any value from 2 to 254. It is preset as 192.168.168.254. DHCP Gat

Strany 151

61 Setting Up Your LAN Follow these steps to change the values and customise them for your LAN settings. LAN Setup Click

Strany 152

62 To View the Active DHCP Leases Follow these steps to display the active IP address leases allocated by the built-in DHCP server. To view the

Strany 153 - System Identity

63 To Reserve Specific IP Addresses for Predetermined DHCP Clients You can reserve a fixed IP address for a predetermined client (identified by i

Strany 154

64 If you do not need the DHCPserver to reserve an IP addressanymore, you can delete theDHCP Server Reservation: 1. Select the reserved IPad

Strany 155

ii How to Setup WPA Enterprise Modes ...45 How to Setup WPA Personal ...

Strany 156

65 Spanning Tree Protocol Spanning Tree Protocol is a link management protocol that provides path redundancy while preventing undesirable loops

Strany 157

66 STP Status: Spanning Tree Protocol (STP) function makes your network more resilient to link failure and avoids loop formation. Priority: S

Strany 158 - Change Password

67 MAC Filtering MAC Filtering acts as a security measure by controlling the users accessing to the network through their MAC address. Each WLAN

Strany 159

68 Add a MAC address to the MAC Address List. SStteepp 11:: Select MMAACC FFiilltteerriinngg from WWLLAANN SSeettuupp((aa//bb//gg)). MAC Addr

Strany 160 - Using the HELP Menu

69 SStteepp 22:: MAC Filter Address List page displays. Click the AAdddd button. SStteepp 33:: Add MAC Address page displays.

Strany 161

70 SStteepp 44:: Enter the MAC Address of the client in the format xx-xx-xx-xx-xx-xx, where x can take any value in the range 0-9 or a-f. E

Strany 162 - Adding TCP/IP Protocol

71 Delete a MAC address from all access points. SStteepp 11:: Select MMAACC FFiilltteerriinngg from WWLLAANN SSeettuupp((aa//bb//gg)). MAC Ad

Strany 163 - from Networ

72 SStteepp 33:: MAC Filter Address List page displays with updated MAC Address List.

Strany 164

73 Delete a MAC address from individual access point. SStteepp 11:: Select MMAACC FFiilltteerriinngg from WWLLAANN SSeettuupp((aa//bb//gg)).

Strany 165

74 SStteepp 33:: MAC Filter Address List page displays with updated MAC Address List.

Strany 166

iii To Setup a De-Militarised Zone Host ...107 To Setup Port Forwarding...

Strany 167

75 Edit MAC address from the MAC Address List. SStteepp 11:: Select MMAACC FFiilltteerriinngg from WWLLAANN SSeettuupp((aa//bb//gg)). MAC Add

Strany 168 - Microsoft Windows XP:

76 SStteepp 33:: The Edit MAC Address page displays. Edit the MAC address settings accordingly. Click SSaavvee. SStteepp 44:: MAC Filter

Strany 169

77 Chapter 7: Security Configuration The Security Configuration chapter covers:  Firewall Configuration  Firewall Logs  Packet Filtering 

Strany 170 - How it works

78 Firewall Configuration Follow these steps to configure the firewall. Firewall Configuration 1. Enable the firewall. You c

Strany 171 - Appendix C: Troubleshooting

79 5. More firewall rules can be added for specific security purposes. Rule Name : Enter a unique name to identify this firewall rule. Disp

Strany 172

80 it sends datagrams because of congestion. Redirect Informs the host of a preferred route. Time exceeded Indicates that the Time-to-Live (TTL

Strany 173

81 Check Options : This parameter refers to the options in the packet header. The available selection options are abbreviated as follows: SEC

Strany 174

82 1. Rule Number ranges from 1 to40. Precedence is determined inascending order such that rule

Strany 175

83 9. Similarly, determine theDestination Port. 10. Select from Check Options. 11. Select whether to

Strany 176

84 Firewall Logs As described previously, from the Firewall Configuration page the data traffic to be logged by the access point can be defined.

Strany 177

iv HOW IT WORKS...165 Appendix C: Troubleshooting.

Strany 178

85 Packet Filtering With Packet Filtering enabled, the access point examines all outgoing packets before deciding - according to predefined rules

Strany 179

86 Follow these steps to setup packet filtering. Packet Filtering Clicking Change select Packet Filter Type. Select from three

Strany 180 - Appendix E Glossary of Terms

87 4b). From the IP Address dropdown list, select whether to apply the rule to:  A Range of IP addresses. Defin

Strany 181

88 The format is HH:MM - where HH can take any value from 00 to 23, and MM can take any value from 00 to 59.  Any time Both (From) and (T

Strany 182

89 URL Filtering The URL Filtering feature of the access point makes it easy to block certain websites from LAN users. URL Filtering

Strany 183

90 Selecting Allow In Host Name, enter the web site address to be blocked. For example: www.objectionableweb

Strany 184

91 Multicast Filtering This feature lets you allow or disallow streaming over the Internet, if you have registered to ISP services providing vi

Strany 185

92 Chapter 8: Enabling and Disabling Router The unit can operate either as:  Access Point  Access Point and Router (when routing is enabled)

Strany 186

93 Setting Up as Access Point Follow these steps to disable the unit as a router and switch back as an access point. Disable Router

Strany 187

94 Chapter 9: Router Setup This chapter describes the different features when it is set to operate as a router.  Broadband Internet  Using N

Komentáře k této Příručce

Žádné komentáře