User Manual
Table Of Contents
- Contents
- 1 Getting started
- 2 Installing the Access Point
- 3 Configuring the Access Point
- 3.1 Introduction
- 3.2 When to configure the Access Point
- 3.3 Starting the Web Interface
- 3.4 Launching Web Interface manually
- 3.5 Contents of Web Interface
- 3.5.1 Settings Summary
- 3.5.2 Wireless Settings
- 3.5.3 Security against unauthorized network access
- 3.5.4 To add a a client to the exception list
- 3.5.5 To delete a client from the exception list
- 3.5.6 Security against eavesdropping
- 3.5.7 Change WEP password
- 3.5.8 Security against unauthorized configuration
- 3.5.9 Identity
- 3.5.10 IP Settings
- 4 Troubleshooting
- 5 Technical specifications 11 Mbps WLAN Access Point
- 6 Regulatory notes and statements
- 6.1 Wireless LAN, Health and Authorization for use
- 6.2 Regulatory Information/disclaimers
- 6.3 USA-FCC (Federal Communications Commission) statement
- 6.4 FCC Radio Frequency Exposure statement
- 6.5 FCC Interference Statement
- 6.6 Export restrictions
- 6.7 Europe - EU R&TTE Declaration of Conformity
- 6.8 Restricted Wireless LAN device use in EU
- A TCP and IP settings
- B Wireless LAN
- Index
555004.doc
49
A TCP and IP settings
A.1 Introduction
Before installing a wireless network device you must analyze your the
network environment. The information in this appendix is only helpful in
determining which information is needed for a proper installation of such
a device.
This appendix explains how devices in a network are identified in order
to communicate with each other. Chapter 3: ‘Configuring the Access
Point’ on page 21 contains the instructions on how to apply this
information to your situation
A.2 How do computers communicate in a network
Computers use protocols to communicate to each other. The protocol
that is used between computers (and other network devices) that are
connected to the internet is TCP/IP (Transmission Control Protocol/
Internet Protocol). This is also the main protocol in many other computer
networks.
The internet resembles the telephone network to some extent. Like a
phone number that uniquely identifies one telephone connection, IP
addresses are used to determine to which computer the data must be
sent. An IP address looks like this: 192.168.201.160. Each of the four
groups is represented in the computer by one byte, so only numbers
from 0 to 255 can be used for a group.
IP addresses are meant to be unique world-wide. To achieve this, IP
addresses are assigned (you can’t just start using random addresses,
but you have to ask for them). Usually, your Internet Service Provider will
assign you a IP address range you can use.
Table A-1 Overview of this chapter
Section Description
A.2 Communication in a network
A.3 IP configuration