User's Manual
Table Of Contents
- 1. Terminology
- 2. Introduction
- 3. Installation
- 4. Software configuration
- 5. FREQUENTLY ASKED QUESTIONS (FAQ)
- 5.1 What and how to find my PC’s IP and MAC address?
- 5.2 What is Wireless LAN?
- 5.3 What are ISM bands?
- 5.4 How does wireless networking work?
- 5.5 What is BSSID?
- 5.6 What is ESSID?
- 5.7 What are potential factors that may causes interference?
- 5.8 What are the Open System and Shared Key authentications?
- 5.9 What is WEP?
- 5.10 What is Fragment Threshold?
- 5.11 What is RTS (Request to Send) Threshold?
- 5.12 What is Beacon Interval?
- 5.13 What is Preamble Type?
- 5.14 What is SSID Broadcast?
- 5.15 What is Wi-Fi Protected Access (WPA)?
- 5.16 What is WPA2?
- 5.17 What is 802.1x Authentication?
- 5.18 What is Temporal Key Integrity Protocol (TKIP)?
- 5.19 What is Advanced Encryption Standard (AES)?
- 5.20 What is Inter-Access Point Protocol (IAPP)?
- 5.21 What is Wireless Distribution System (WDS)?
- 5.22 What is Universal Plug and Play (uPNP)?
- 5.23 What is Maximum Transmission Unit (MTU) Size?
- 5.24 What is Clone MAC Address?
- 5.25 What is DDNS?
- 5.26 What is NTP Client?
- 5.27 What is VPN?
- 5.28 What is IPSEC?
- 5.29 What is WLAN Block Relay between Clients?
- 5.30 What is WMM?
- 5.31 What is WLAN ACK TIMEOUT?
- 5.32 What is Modulation Coding Scheme (MCS)?
- 5.33 What is Frame Aggregation?
- 5.34 What is Guard Intervals (GI)?
2.4G Outdoor Router
User Manual
4.3.5 Firewall
4.3.5.1 MAC/IP/Port Filtering
Item Description
MAC/IP/Port
Filtering
Select Enable or Disable the MAC/IP/Port Filtering function.
Item Description
Source MAC
address
Fill in the MAC address of source NIC, to restrict data transmission.
Dest IP Address
Fill in the IP address of destination, to restrict data transmission.
Source IP Address
Fill in the IP address of source, to restrict data transmission.
Protocol Select the protocol that you want to restrict. There are four options: None, TCP,
UDP and ICMP.
Dest Port Range art-port and end-port number of destination, to restrict da Fill in the st ta
transmission.
Source Port Range smission. Fill in the start-port and end-port number of source, to restrict data tran
Action
Select Accept or Drop to specify the action of filtering policies.
Comment Make a comment for the filtering policy.
- 42 -