User Manual
Table Of Contents
- Chapter 1. Product Introduction
- Chapter 2. Hardware Installation
- Chapter 3. Connecting to the AP
- Chapter 4. Quick Installation Guide
- Chapter 5. Configuring the AP
- 5.1 Status
- 5.2 Quick Setup
- 5.3 WPS
- 5.4 Operation Mode
- 5.5 Network
- 5.6 Wireless
- 5.6.1 Wireless Settings
- 5.6.2 Wireless Security
- 5.6.2.1. Operation Mode – Access Point
- 5.6.2.2. Operation Mode – Multi-SSID
- 5.6.2.3. Operation Mode – Client
- 5.6.2.4. Operation Mode – Repeater
- 5.6.2.5. Operation Mode – Universal Repeater
- 5.6.2.6. Operation Mode – Bridge with AP
- 5.6.2.7. Operation Mode – AP Router
- 5.6.2.8. Operation Mode – AP Client Router
- 5.6.3 Wireless MAC Filtering
- 5.6.4 Wireless Advanced
- 5.6.5 Antenna Alignment
- 5.6.6 Distance Setting
- 5.6.7 Throughput Monitor
- 5.6.8 Wireless Statistics
- 5.7 DHCP
- 5.8 Forwarding
- 5.9 Security
- 5.10 Parental Control
- 5.11 Access Control
- 5.12 Static Routing
- 5.13 Bandwidth Control
- 5.14 IP & MAC Binding
- 5.15 Dynamic DNS
- 5.16 System Tools
- Appendix A: FAQ
- A.1 What and how to find my PC’s IP and MAC address?
- A.2 What is Wireless LAN?
- A.3 What are ISM bands?
- A.4 How does wireless networking work?
- A.5 What is BSSID?
- A.6 What is ESSID?
- A.7 What are potential factors that may causes interference?
- A.8 What are the Open System and Shared Key authentications?
- A.9 What is WEP?
- A.10 What is Fragment Threshold?
- A.11 What is RTS (Request to Send) Threshold?
- A.12 What is Beacon Interval?
- A.13 What is Preamble Type?
- A.14 What is SSID Broadcast?
- A.15 What is Wi-Fi Protected Access (WPA)?
- A.16 What is WPA2?
- A.17 What is 802.1x Authentication?
- A.18 What is Temporal Key Integrity Protocol (TKIP)?
- A.19 What is Advanced Encryption Standard (AES)?
- A.20 What is Inter-Access Point Protocol (IAPP)?
- A.21 What is Wireless Distribution System (WDS)?
- A.22 What is Universal Plug and Play (UPnP)?
- A.23 What is Maximum Transmission Unit (MTU) Size?
- A.24 What is Clone MAC Address?
- A.25 What is DDNS?
- A.26 What is NTP Client?
- A.27 What is VPN?
- A.28 What is IPSEC?
- A.29 What is WLAN Block Relay between Clients?
- A.30 What is WMM?
- A.31 What is WLAN ACK TIMEOUT?
- A.32 What is Modulation Coding Scheme (MCS)?
- A.33 What is Frame Aggregation?
- A.34 What is Guard Intervals (GI)?
- Appendix B: Configuring the PC in Windows 7
- Appendix C: Specifications
- Appendix D: Factory Default Settings
- EC Declaration of Conformity
User Manual of WNAP-7206
-118-
Add New...
Click the Add New... button to add a new Parental Control entry
Enable All
Click the Enable All button to enable all the rules in the list.
Disable All
Click the Disable All button to disable all the rules in the list.
Delete All
Click the Delete All button to delete all the entries in the table.
Next
Click the Next button to go to the next page.
Previous
Click the Previous button return to the previous page.
MAC Address of
Childen's PC
Enter the MAC address of the PC you want to control, or you can
make use of the All MAC Address In Current LAN item below. If you
leave it blank, then the rule will be applied to all of the PCs except
the parental PC.
ALL MAC Address
In Current LAN
You can see the MAC addresses of all PCs in current LAN by
clicking on the drop-down button. Choose one of them, then this
MAC address will be filled to the MAC Address of Child PC field.
Website
description
In this field, create a description for the website(s). Note that this
description should be unique.
Allowed Website
Name
In this field, you can enter 8 domain names allowed for the child to
access, either the full name or the keywords (for example google).
Any domain name with keywords in it (www.google.com,
news.google.com) will be allowed.
Effective Time
In this field, choose the effective time for the rule or you can make
use of Access Control > Schedule to create the schedule as you
like. The default value is Anytime.
Status
In this field, there are two options, Enabled or Disabled. Enabled
means that this rule will take effect while Disabled means that this
rule won't take effect.
Save
Click the Save button to save the changes.
Back
Click the Back button to back to the previous page.
5.11 Access Control
There are four submenus under the Access Control menu: Rule, Host, Target and Schedule. Click any of them,
and you will be able to configure the corresponding function.
The Device, providing convenient and strong Internet access control function, can control the Internet activities
of hosts in the LAN. Moreover, you can flexibly combine the Host List, Target List and Schedule to restrict the
Internet surfing of these hosts.