User's Manual
Table Of Contents
- WavePoint™ Product Safety
- Preface
- Chapter 1: Introduction
- Key Features and Supported Protocols
- Requirements
- Accessories
- Product Variations
- WavePoint 10e Labels
- WavePoint™ Components
- Certified Antennas
- Connect Power
- Network Deployment Scenarios
- Connecting and Logging In
- Configuration Pages
- Chapter 2: Configuring Basic WavePoint™ Network Features
- Chapter 3: Additional Data Networking Features
- Chapter 4: Configuring Wireless Access
- Example: Point-to-Point Configuration
- Point-to-Multipoint Configuration Examples
- Configuring Wireless Communication
- Defining Advanced Radio Settings
- Verify the Wireless Connection
- Enabling Virtual Access Points
- Wireless Security
- Scheduling When Wireless Connections are Available
- Chapter 5: Security
- Chapter 6: Management and Administration
- Set Up Remote Access to the WAN Port
- User Access Management
- Software Maintenance
- System Logging
- Simple Network Management Protocol (SNMP)
- Authentication Certificates
- Setting the Date and Time
- System Statistics
- Chapter 7: Diagnostics and Troubleshooting
- Appendix A: Factory Default Settings
- Chapter B: Installation Instructions
- Appendix C: WavePoint™ Configurations
- Appendix D: Bench Test Verification of WavePoint™ Configuration
- Appendix E: WavePoint 10e Technical Specifications
- Glossary
- Index
(PPP) is wrapped inside the TCP/IP
protocol, allowing for a secure
connection.
PVID
Port VLAN ID.
R
Rogue AP
Any access point that is installed in a
network that is not authorized for
operation within that network.
RSTP
Rapid Spanning Tree Protocol.
S
STP
Spanning Tree Protocol. A link
management protocol for access control
bridges. STP provides path redundancy
while preventing bridge loops created by
multiple active paths between points.
T
TCP/IP
Transmission Control Protocol/Internet
Protocol. A protocol for communication
between computers. Used as a standard
for transmitting data over networks and as
the basis for standard Internet protocols.
W
WPA
Wi-Fi Protected Access. An
authentication protocol used to protect
wireless networks from unauthorized
access.
Page 166 of 171 LUM0063AA Rev 05/05/2014
This document is the property of FreeWave Technologies, Inc. and contains proprietary information owned by
FreeWave®. This document cannot be reproduced in whole or in part by any means without written permission from
FreeWave Technologies, Inc.
Glossary