User's Manual
Table Of Contents
- Introducing the 802.11a/g Router
- Installing the 802.11a/g Router
- What’s in the Box?
- A physical look at the back panel
- A physical look at the front panel
- Connecting the Cables
- High Level Configuration Steps Required for the 802.11a/g Router
- Setting up a Windows PC or wireless client as DHCP clients
- Configuring a PC running MS-Windows 95/98/Me:
- Configuring a PC running MS-Windows XP/2000:
- Confirming your PC’s IP Configuration:
- Connecting More Devices Through A Switch/Hub To The 802.11a/g Router
- Basic Configuration of the 802.11a/g Router
- Advanced Settings
- Managing your 802.11a/g Router
- How to View the device Status
- How to View the System Log
- Security Log
- DHCP Client Table
- Wireless Client Table
- Bridge Table
- WAN Status
- LAN Status
- Upgrading Firmware
- How to Save or Restore Configuration Changes
- How to Restore the System Settings to the Factory Defaults
- How to Reboot your 802.11a/g Router
- What if you Forgot the Password?
- Command Line Interface
- Text Configuration
- Specification
802.11a/g Router User’s Guide
How to View the System Log
The 802.11a/g Router maintains a system log that you can use to track events that have occurred in the
system. Such event messages can sometimes be helpful in determining the cause of a problem that you
may have encountered.
You can select System Log on the left to view log events recorded in the system. The System Log
entries are shown in the main screen along with the log level, the severity level of messages that are
being displayed (a low number such as 2 means critical), and the uptime, the amount of time since the
802.11a/g Router was last reset. The maximum number of entries is 128. If there are more than 128
entries, older entries will be deleted.
Security Log
The 802.11 a/g Router maintains another log table for security logs. For each filter rule configured, the
802.11 a/g Router will monitor the traffic matching the rule. Once the rule’s hitting rate exceeds a
certain degree (twice per 10 seconds, that is, more than one packet matching the rule in 10 seconds), a
security log is generated and stored in the security log table. A security log entry contains a description
regarding the event and a time stamp when the event happened. You can see the current logged
security events from this page. Those log entries are not saved into flash, so all log messages are
removed after the system reboot. The maximum number of entries is 128. If there are more than 128
entries, older entries will be deleted.
55