User Manual

Table Of Contents
FIGURE 5-26 CLIENT SURVEY ............................................................................................................................45
FIGURE 5-27 CLIENT AP LIST ............................................................................................................................46
FIGURE 5-28 CLIENT SECURITY.........................................................................................................................47
FIGURE 5-29 CLIENT STATUS .............................................................................................................................47
FIGURE 5-30 TOPOLOGY WDS PTP MODE.........................................................................................................47
FIGURE 5-31 TOPOLOGY WDS PTMP MODE .....................................................................................................48
FIGURE 5-32 WIRELESS BASIC SETTINGS WDS.................................................................................................49
FIGURE 5-33 TOPOLOGY WDS+AP MODE.........................................................................................................50
FIGURE 5-34 WIRELESS BASIC SETTINGS WDS+AP..........................................................................................51
FIGURE 5-35 WIRELESS ADVANCED SETTINGS .....................................................................................................53
FIGURE 5-36 WIRELESS SECURITY SETTINGS .......................................................................................................55
FIGURE 5-37 SECURITY SETTINGS WEP ............................................................................................................57
FIGURE 5-38 SECURITY SETTINGS WPA2 PERSONAL.........................................................................................58
FIGURE 5-39 SECURITY SETTINGS WPA2 ENTERPRISE ......................................................................................60
FIGURE 5-40 SECURITY SETTINGS WPA-MIXED PERSONAL ..............................................................................61
FIGURE 5-41 SECURITY SETTINGS WPA-MIXED ENTERPRISE............................................................................62
FIGURE 5-42 SECURITY SETTINGS 802.1X AUTHENTICATION ............................................................................62
FIGURE 5-43 WIRELESS ACCESS CONTROL...........................................................................................................63
FIGURE 5-44 WIRELESS ACCESS CONTROL DENY..............................................................................................64
FIGURE 5-45 WDS MODE.....................................................................................................................................66
FIGURE 5-46 WDS SETTINGS ...............................................................................................................................66
FIGURE 5-47 WDS SET SECURITY .....................................................................................................................67
FIGURE 5-48 SITE SURVEY ...................................................................................................................................68
FIGURE 5-49 WPS-PBC .......................................................................................................................................70
FIGURE 5-50 WPS-PBC .......................................................................................................................................70
FIGURE 5-51 WPS-PIN ........................................................................................................................................71
FIGURE 5-52 WPS-PIN ........................................................................................................................................71
FIGURE 5-53 WPS-PIN ........................................................................................................................................71
FIGURE 5-54 SCHEDULE .......................................................................................................................................72
FIGURE 5-55 FIREWALL MAIN MENU.................................................................................................................73
FIGURE 5-56 MANAGEMENT MAIN MENU .........................................................................................................80
FIGURE 5-57 STATUS ............................................................................................................................................81
FIGURE 5-58 STATISTICS .......................................................................................................................................82
FIGURE 5-59 DYNAMIC DNS SETTINGS................................................................................................................83
FIGURE 5-60 TIME ZONE SETTINGS ......................................................................................................................88
FIGURE 5-61 SCHEDULE REBOOT .........................................................................................................................89
FIGURE 5-62 SCHEDULE REBOOT - EXAMPLE.......................................................................................................90
FIGURE 5-63 SYSTEM LOG ...................................................................................................................................92
FIGURE 5-64 UPGRADE FIRMWARE.......................................................................................................................93
FIGURE 5-65 SAV E /RELOAD SETTINGS .................................................................................................................94
FIGURE 5-66 PASSWORD SETUP............................................................................................................................95
FIGURE 5-67 LOGOUT...........................................................................................................................................96
FIGURE 6-1 SYSTEM TRAY WIRELESS NETWORK ICON ......................................................................................97
FIGURE 6-2 CHOOSE A WIRELESS NETWORK .........................................................................................................97
FIGURE 6-3 ENTER THE NETWORK KEY.................................................................................................................98
VII