User Guide
Vigor2910 Series User’s Guide 
124
3
3
.
.
1
1
1
1
W
W
i
i
r
r
e
e
l
l
e
e
s
s
s
s
L
L
A
A
N
N
This function is used for G models only. 
3
3
.
.
1
1
1
1
.
.
1
1
B
B
a
a
s
s
i
i
c
c
C
C
o
o
n
n
c
c
e
e
p
p
t
t
s
s
Over recent years, the market for wireless communications has enjoyed tremendous growth. 
Wireless technology now reaches or is capable of reaching virtually every location on the 
surface of the earth. Hundreds of millions of people exchange information every day via 
wireless communication products. The Vigor G model, a.k.a. Vigor wireless router, is 
designed for maximum flexibility and efficiency of a small office/home. Any authorized 
staff can bring a built-in WLAN client PDA or notebook into a meeting room for conference 
without laying a clot of LAN cable or drilling holes everywhere. Wireless LAN enables high 
mobility so WLAN users can simultaneously access all LAN facilities just like on a wired 
LAN as well as Internet access. 
The Vigor wireless routers are equipped with a wireless LAN interface compliant with the 
standard IEEE 802.11g protocol. To boost its performance further, the Vigor Router is also 
loaded with advanced wireless technology Super G 
TM
 to lift up data rate up to 108 Mbps*. 
Hence, you can finally smoothly enjoy stream music and video. 
Note: * The actual data throughput will vary according to the network conditions 
and environmental factors, including volume of network traffic, network 
overhead and building materials. 
In an Infrastructure Mode of wireless network, Vigor wireless router plays a role as an 
Access Point (AP) connecting to lots of wireless clients or Stations (STA). All the STAs will 
share the same Internet connection via Vigor wireless router. The General Settings will set 
up the information of this wireless network, including its SSID as identification, located 
channel etc. 
S
S
e
e
c
c
u
u
r
r
i
i
t
t
y
y
O
O
v
v
e
e
r
r
v
v
i
i
e
e
w
w
Real-time Hardware Encryption: Vigor Router is equipped with a hardware AES 
encryption engine so it can apply the highest protection to your data without influencing user 
experience. 
Complete Security Standard Selection: To ensure the security and privacy of your wireless 
communication, we provide several prevailing standards on market. 










