User`s guide
Table Of Contents
- About This User's Guide
- Document Conventions
- Safety Warnings
- Table of Contents
- Part I: Introduction
- 1. Getting to Know Your MWR222
- 2.
- 2. Introducing the Web Configurator
- 3. Monitor
- 4.
- 4.
- 4. MWR222 Modes
- 5. Router Mode
- 6. Access Point Mode
- 5.
- 5.
- 7. WISP Mode
- 7
- 7
- 8 Tutorials
- 8.3 Connecting to Internet from an Access Point
- 8.4 Configuring Wireless Security Using WPS
- 9 Wireless LAN
- 9.1 Overview
- 9.2 What You Can Do
- Use the General screen to enable the Wireless LAN, enter the SSID and select the wireless security mode.
- 9.3 What You Should Know
- 9.4 General Wireless LAN Screen
- 9.5 Security
- 9.6 MAC Filter
- 9.7 Wireless LAN Advanced Screen
- 9.8 Quality of Service (QoS) Screen
- 9.9 WPS Screen
- 9.10 WPS Station Screen
- 9.11 Scheduling Screen
- 9.12 WDS Screen
- 10.1 Overview
- 10.2 What You Can Do
- 10.3 What You Need To Know
- 10.2
- 10.3
- 10.4 Internet Connection
- 10.5 Mobile WAN
- 10.7 IGMP Snooping Screen
- 11 LAN
- 12 DHCP Server
- 13. Network Address Translation (NAT)
- 14 Dynamic DNS
- 15. OpenDNS
- 16 Static Route
- 17.
- 17.
- 17. Routing Information Protocol
- Part III
- Part V
- Maintenance and Troubleshooting
- Part VI
- Appendices and Index
- Appendix A
- Pop-up Windows, JavaScripts and Java Permissions
- End-User License Agreement for “MWR222”
- NOTE: Some components of this product incorporate free software programs covered under the open source code licenses which allows you to freely copy, modify and redistribute the software. For at least three (3) years from the date of distribution of t...
- Notice
- Information herein is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any p...
- Notice
- GNU GENERAL PUBLIC LICENSE
- GNU LESSER GENERAL PUBLIC LICENSE

MWR211 User’s Guide
235
octet. This is usually specified by writing a “/” followed by the number of bits in
the mask after the address.
For example, 192.1.1.0 /25 is equivalent to saying 192.1.1.0 with subnet mask
255.255.255.128.
The following table shows some possible subnet masks using both notations.
Table 76 Alternative Subnet Mask Notation
SUBNET
MASK
ALTERNATIV
E NOTATION
LAST OCTET
(BINARY)
LAST OCTET
(DECIMAL)
255.255.255.0 /24 0000 0000 0
255.255.255.1
28
/25 1000 0000 128
255.255.255.1
92
/26 1100 0000 192
255.255.255.2
24
/27 1110 0000 224
255.255.255.2
40
/28 1111 0000 240
255.255.255.2
48
/29 1111 1000 248
255.255.255.2
52
/30 1111 1100 252
Subnetting
You can use subnetting to divide one network into multiple sub-networks. In the
following example a network administrator creates two sub-networks to isolate a
group of servers from the rest of the company network for security reasons.
In this example, the company network address is 192.168.1.0. The first three
octets of the address (192.168.1) are the network number, and the remaining
octet is the host ID, allowing a maximum of 2
8
– 2 or 254 possible hosts.