User`s guide
G-3000H User’s Guide
10 Table of Contents
3.1.3 WEP Encryption ........................................................................................45
3.2 Wizard Setup: General Setup ............................................................................46
3.3 Wizard Setup: Wireless LAN ..............................................................................46
3.4 Wizard Setup: IP Address ..................................................................................48
3.4.1 IP Address Assignment ............................................................................48
3.4.2 IP Address and Subnet Mask ...................................................................48
3.5 Basic Setup Complete ........................................................................................50
Chapter 4
System Screens ..................................................................................................... 51
4.1 System Overview ...............................................................................................51
4.2 Configuring General Setup .................................................................................51
4.3 Configuring Password ........................................................................................52
4.4 Configuring Time Setting ...................................................................................53
Chapter 5
Wireless Configuration......................................................................................... 57
5.1 Wireless LAN Overview .....................................................................................57
5.1.1 BSS ...........................................................................................................57
5.1.2 ESS ...........................................................................................................58
5.2 Wireless LAN Basics ..........................................................................................59
5.3 WMM QoS ..........................................................................................................60
5.3.1 WMM QoS Priorities .................................................................................60
5.3.2 Type Of Service (ToS) ...............................................................................60
5.3.2.1 DiffServ ............................................................................................61
5.3.2.2 DSCP and Per-Hop Behavior ..........................................................61
5.3.3 ToS (Type of Service) and WMM QoS ......................................................61
5.4 Spanning Tree Protocol (STP) ...........................................................................62
5.4.1 Rapid STP ................................................................................................62
5.4.2 STP Terminology ......................................................................................62
5.4.3 How STP Works .......................................................................................63
5.4.4 STP Port States ........................................................................................63
5.5 Wireless Screen Overview .................................................................................63
5.6 Configuring Wireless ..........................................................................................64
5.6.1 Access Point Mode ...................................................................................64
5.6.2 Bridge/Repeater Mode ..............................................................................66
5.6.3 AP+Bridge Mode ......................................................................................70
5.6.4 Multiple ESS Mode ...................................................................................71
Chapter 6
Wireless Security Configuration........................................................................... 73
6.1 Wireless Security Overview ...............................................................................73
6.1.1 Encryption .................................................................................................73