User's Manual
Table Of Contents
- Table of Contents
- Product Overview
- Installation
- Web Configuration
- Basic Network Settings
- 4.1 System Status
- 4.2 System Setup
- 4.3 Router Setup
- 4.4 Configuring Wireless LAN
- 4.5 Management Setup
- 4.5.1 Configuring Administrator Account
- 4.5.2 Configuring Management VLAN
- 4.5.3 Configuring SNMP
- 4.5.4 Configuring Backup/Restore Settings
- 4.5.5 Configuring Auto Reboot Settings
- 4.5.6 Configuring Firmware Upgrade
- 4.5.7 Configuring System Time
- 4.5.8 Configuring Wi-Fi Schedule
- 4.5.9 Configuring Command Line Interface
- 4.5.10 Configuring Logging
- 4.5.11 Configuring Diagnostics
- 4.5.12 Viewing Device Discovery
- 4.5.13 Configure Denial of Service Protection
- 4.5.14 Logging Out
- Appendix A
- Appendix B
- Appendix C
TABLE OF CONTENTS
III
Configuring Operation Mode 4-9
Configuring IP Settings 4-10
Configuring Spanning Tree Settings 4-11
Router Setup 4-12
Configuring WAN Settings 4-12
Static IP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-12
Dynamic IP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-13
Point-to-Point Protocol over Ethernet (PPPoE). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-14
Point-to-Point Tunnelling Protocol (PPTP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-15
Configuring LAN Settings 4-17
Configuring VPN Pass-Through 4-18
Configuring Port Forwarding 4-19
Configuring Demilitarized Zone 4-21
Configuring Wireless LAN 4-22
Configuring Wireless Settings 4-22
Access Point Mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-22
Client Bridge Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-24
WDS Bridge Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-25
Client Router Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-27
Configuring Wireless Security 4-28