User manual
USER MANUAL OF WEBEE WIRELESS N ROUTER Version:1.1
Firmware Type 2
P/N: 60291092
3
4.3.28 Management - Time Zone Setting....................................................................... 66
4.3.29 Management – Denial-of-Service......................................................................... 67
4.3.30 Management – Log ............................................................................................... 68
4.3.31 Management - Upgrade Firmware....................................................................... 70
4.3.32 Management Save/ Reload Settings ................................................................... 70
4.3.33 Management – WatchDog..................................................................................... 71
4.3.34 Management – Reboot ......................................................................................... 72
4.3.35 Management - Password Setup........................................................................... 73
5. WARRANTY AND SUPPORT .................................................................................... 75
6. FREQUENTLY ASKED QUESTIONS (FAQ).............................................................. 76
6.1. WHAT AND HOW TO FIND MY PC’S IP AND MAC ADDRESS? .............................................. 76
6.2. WHAT IS WIRELESS LAN? ............................................................................................... 76
6.3. WHAT ARE ISM BANDS?................................................................................................... 76
6.4. HOW DOES WIRELESS NETWORKING WORK?.................................................................... 76
6.5. WHAT IS BSSID? .............................................................................................................77
6.6. WHAT IS ESSID? .............................................................................................................77
6.7. WHAT ARE POTENTIAL FACTORS THAT MAY CAUSES INTERFERENCE?....................................77
6.8. WHAT ARE THE OPEN SYSTEM AND SHARED KEY AUTHENTICATIONS?................................ 78
6.9. WHAT IS WEP? ............................................................................................................... 78
6.10. WHAT IS FRAGMENT THRESHOLD? ................................................................................... 78
6.11. WHAT IS RTS (REQUEST TO SEND) THRESHOLD?............................................................ 79
6.12. WHAT IS BEACON INTERVAL? ........................................................................................... 79
6.13. WHAT IS PREAMBLE TYPE? .............................................................................................. 79
6.14. WHAT IS SSID BROADCAST? ........................................................................................... 79
6.15. WHAT IS WI-FI PROTECTED ACCESS (WPA)?................................................................... 80
6.16. WHAT IS WPA2? ............................................................................................................. 80
6.17. WHAT IS 802.1X AUTHENTICATION?.................................................................................. 80
6.18. WHAT IS TEMPORAL KEY INTEGRITY PROTOCOL (TKIP)?.................................................. 80
6.19. WHAT IS ADVANCED ENCRYPTION STANDARD (AES)?....................................................... 80
6.20. WHAT IS INTER-ACCESS POINT PROTOCOL (IAPP)?..........................................................81
6.21. WHAT IS WIRELESS DISTRIBUTION SYSTEM (WDS)? .........................................................81
6.22. WHAT IS UNIVERSAL PLUG AND PLAY (UPNP)? .................................................................81
6.23. WHAT IS MAXIMUM TRANSMISSION UNIT (MTU) SIZE?........................................................ 81
6.24. WHAT IS CLONE MAC ADDRESS? ..................................................................................... 81
6.25. WHAT IS DDNS?..............................................................................................................81
6.26. WHAT IS NTP CLIENT?......................................................................................................81
6.27. WHAT IS VPN? ................................................................................................................ 82
6.28. WHAT IS IPSEC?............................................................................................................. 82
6.29. WHAT IS WLAN BLOCK RELAY BETWEEN CLIENTS? ........................................................ 82
6.30. WHAT IS WMM? .............................................................................................................. 82
6.31. WHAT IS WLAN ACK TIMOUT?...................................................................................... 82
6.32. WHAT IS MODULATION CODING SCHEME (MCS)?............................................................ 82
6.33. WHAT IS FRAME AGGREGATION? ...................................................................................... 82
6.34. WHAT IS GUARD INTERVALS (GI)?.................................................................................... 83
7. CONFIGURATION EXAMPLES .................................................................................84
7.1. EXAMPLE ONE – PPPOE ON THE WAN............................................................................ 84
7.2. EXAMPLE TWO – FIXED IP ON THE WAN.......................................................................... 88