User's Manual
Table Of Contents
- 1. Terminology
- 2. Introduction
- 3. Installation
- 4. Software configuration
- 5. FREQUENTLY ASKED QUESTIONS (FAQ)
- 5.1 What and how to find my PC’s IP and MAC address?
- 5.2 What is Wireless LAN?
- 5.3 What are ISM bands?
- 5.4 How does wireless networking work?
- 5.5 What is BSSID?
- 5.6 What is ESSID?
- 5.7 What are potential factors that may causes interference?
- 5.8 What are the Open System and Shared Key authentications?
- 5.9 What is WEP?
- 5.10 What is Fragment Threshold?
- 5.11 What is RTS (Request to Send) Threshold?
- 5.12 What is Beacon Interval?
- 5.13 What is Preamble Type?
- 5.14 What is SSID Broadcast?
- 5.15 What is Wi-Fi Protected Access (WPA)?
- 5.16 What is WPA2?
- 5.17 What is 802.1x Authentication?
- 5.18 What is Temporal Key Integrity Protocol (TKIP)?
- 5.19 What is Advanced Encryption Standard (AES)?
- 5.20 What is Inter-Access Point Protocol (IAPP)?
- 5.21 What is Wireless Distribution System (WDS)?
- 5.22 What is Universal Plug and Play (uPNP)?
- 5.23 What is Maximum Transmission Unit (MTU) Size?
- 5.24 What is Clone MAC Address?
- 5.25 What is DDNS?
- 5.26 What is NTP Client?
- 5.27 What is VPN?
- 5.28 What is IPSEC?
- 5.29 What is WLAN Block Relay between Clients?
- 5.30 What is WMM?
- 5.31 What is WLAN ACK TIMEOUT?
- 5.32 What is Modulation Coding Scheme (MCS)?
- 5.33 What is Frame Aggregation?
- 5.34 What is Guard Intervals (GI)?
2.4G Outdoor Router
User Manual
4.3.5.2 Port Forwarding ....................................................................43
4.3.5.3 DMZ......................................................................................45
4.3.5.4 System Security ....................................................................46
4.3.5.5 4.4.5.5 Content Filtering .......................................................46
4.3.6 Administration .............................................................................48
4.3.6.1 Management..........................................................................48
4.3.6.2 Upload Firmware ..................................................................49
4.3.6.3 Settings Management............................................................50
4.3.6.4 Status.....................................................................................51
4.3.6.5 System Log ...........................................................................51
4.4 Configuration Examples ......................................................................52
4.4.1 Example one – PPPoE on the WAN ............................................52
4.4.2 Example two – fixed IP on the WAN...........................................54
4.4.3 Example three –set WLAN to be WAN as WiFi Client...............56
5. FREQUENTLY ASKED QUESTIONS (FAQ)................................................59
5.1 What and how to find my PC’s IP and MAC address?........................59
5.2 What is Wireless LAN? .......................................................................59
5.3 What are ISM bands?...........................................................................59
5.4 How does wireless networking work? .................................................59
5.5 What is BSSID? ...................................................................................60
5.6 What is ESSID? ...................................................................................60
5.7 What are potential factors that may causes interference?....................60
5.8 What are the Open System and Shared Key authentications? .............60
5.9 What is WEP? ......................................................................................60
5.10 What is Fragment Threshold?..............................................................61
5.11 What is RTS (Request to Send) Threshold?.........................................61
5.12 What is Beacon Interval?.....................................................................61
5.13 What is Preamble Type? ......................................................................61
5.14 What is SSID Broadcast?.....................................................................61
5.15 What is Wi-Fi Protected Access (WPA)?.............................................62
5.16 What is WPA2? ....................................................................................62
5.17 What is 802.1x Authentication?...........................................................62
5.18 What is Temporal Key Integrity Protocol (TKIP)?..............................62
- 3 -