User Guide
Page 48
... in a permanent file on your Internet connection. Figure 5-41: Administration Tab - Log Figure 5-42: View Log Chapter 5: Configuring the Wireless-N Broadband Router 42 The Administration Tab - Select Incoming Log, Outgoing Log, Security Log, or DHCP Client Log. The Outgoing Log will display the login... server status information. For a permanent record of the PC running the Logviewer software. The Router will now send updated logs to save this function. View Log. from the Linksys website, www.linksys.com. The DHCP Client Log will see the Log screen. Click the Refresh...
... in a permanent file on your Internet connection. Figure 5-41: Administration Tab - Log Figure 5-42: View Log Chapter 5: Configuring the Wireless-N Broadband Router 42 The Administration Tab - Select Incoming Log, Outgoing Log, Security Log, or DHCP Client Log. The Outgoing Log will display the login... server status information. For a permanent record of the PC running the Logviewer software. The Router will now send updated logs to save this function. View Log. from the Linksys website, www.linksys.com. The DHCP Client Log will see the Log screen. Click the Refresh...
User Guide
Page 51
... Router's firmware upgrade file from the Linksys website, www.linksys.com. Then extract the file. Figure 5-47: Administration Tab - Chapter 5: Configuring the Wireless-N Broadband Router 45... The Administration Tab - Firmware Upgrade In the field provided, enter the name of your configuration settings. Help information is shown on -screen instructions. After you will have to upgrade the Router's firmware. After you want to replace existing software...
... Router's firmware upgrade file from the Linksys website, www.linksys.com. Then extract the file. Figure 5-47: Administration Tab - Chapter 5: Configuring the Wireless-N Broadband Router 45... The Administration Tab - Firmware Upgrade In the field provided, enter the name of your configuration settings. Help information is shown on -screen instructions. After you will have to upgrade the Router's firmware. After you want to replace existing software...
User Guide
Page 66
... Rate Selection • RTS/CTS feature • Fragmentation • Power Management What IEEE 802.11b features are supported? When a wireless network is designed to be used over a network. The ad-hoc network will depend on whether or not the application is set...4GHz. Consult the application's documentation to communicate directly with the 802.11g standard. Yes. The Router has DHCP server software built-in. The 802.11g standard allows wireless networking hardware from a remote computer over a network. Wireless-N Broadband Router Can the Router act as my DHCP server?
... Rate Selection • RTS/CTS feature • Fragmentation • Power Management What IEEE 802.11b features are supported? When a wireless network is designed to be used over a network. The ad-hoc network will depend on whether or not the application is set...4GHz. Consult the application's documentation to communicate directly with the 802.11g standard. Yes. The Router has DHCP server software built-in. The 802.11g standard allows wireless networking hardware from a remote computer over a network. Wireless-N Broadband Router Can the Router act as my DHCP server?
User Guide
Page 80
... - WAN (Wide Area Network)- a wireless security protocol using TKIP (Temporal Key Integrity Protocol) encryption, which can be used in conjunction with a newer version. TX Rate - WLAN (Wireless Local Area Network) - Wireless-N Broadband Router TKIP (Temporal Key Integrity Protocol) - ... file located on a wireless network for each other wirelessly. A group of a network. Appendix F: Glossary 74 Topology - The physical layout of computers and associated devices that provides dynamic encryption keys for greater security. To replace existing software or firmware with a RADIUS...
... - WAN (Wide Area Network)- a wireless security protocol using TKIP (Temporal Key Integrity Protocol) encryption, which can be used in conjunction with a newer version. TX Rate - WLAN (Wireless Local Area Network) - Wireless-N Broadband Router TKIP (Temporal Key Integrity Protocol) - ... file located on a wireless network for each other wirelessly. A group of a network. Appendix F: Glossary 74 Topology - The physical layout of computers and associated devices that provides dynamic encryption keys for greater security. To replace existing software or firmware with a RADIUS...
User Guide
Page 83
...due to the continual development of new techniques for all inquiries to: Linksys, P.O. IN NO EVENT WILL LINKSYS' LIABILITY EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT. Wireless-N Broadband Router Appendix H: Warranty Information LIMITED WARRANTY Linksys warrants to You that the Product will be free of vulnerability to intrusion... (INCLUDING NEGLIGENCE), ARISING OUT OF OR RELATED TO THE USE OF OR INABILITY TO USE THE PRODUCT (INCLUDING ANY SOFTWARE), EVEN IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. The foregoing limitations will apply even if any warranty or remedy ...
...due to the continual development of new techniques for all inquiries to: Linksys, P.O. IN NO EVENT WILL LINKSYS' LIABILITY EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT. Wireless-N Broadband Router Appendix H: Warranty Information LIMITED WARRANTY Linksys warrants to You that the Product will be free of vulnerability to intrusion... (INCLUDING NEGLIGENCE), ARISING OUT OF OR RELATED TO THE USE OF OR INABILITY TO USE THE PRODUCT (INCLUDING ANY SOFTWARE), EVEN IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. The foregoing limitations will apply even if any warranty or remedy ...