User Manual
Page 12
...that is bridged to the same wireless network. Network Layout The Wireless-G Broadband Router has been specifically designed for a wireless router or access point. If the computers on the wireless network, then the Ad-Hoc mode can roam within a certain radial range of wireless devices ... directly between the wirelessequipped computers is limited by the wireless devices belonging to a wired network via an access point. You can arrange the Router and multiple access points to work in succession to extend the roaming range, and you can communicate with wireless network adapters,...
...that is bridged to the same wireless network. Network Layout The Wireless-G Broadband Router has been specifically designed for a wireless router or access point. If the computers on the wireless network, then the Ad-Hoc mode can roam within a certain radial range of wireless devices ... directly between the wirelessequipped computers is limited by the wireless devices belonging to a wired network via an access point. You can arrange the Router and multiple access points to work in succession to extend the roaming range, and you can communicate with wireless network adapters,...
User Manual
Page 42
...-G Broadband Router The Setup Tab - In the Max Idle Time field, enter the number of time (Max Idle Time). To use PPPoE (Point-to-Point Protocol over Ethernet) to access the Internet again. Your ISP will have elapsed before your connection. Keep Alive Option: Redial Period. If they use this option, click the...
...-G Broadband Router The Setup Tab - In the Max Idle Time field, enter the number of time (Max Idle Time). To use PPPoE (Point-to-Point Protocol over Ethernet) to access the Internet again. Your ISP will have elapsed before your connection. Keep Alive Option: Redial Period. If they use this option, click the...
User Manual
Page 55
... Redirection. Filter IDENT (Port 113). Internet Protocol Security (IPSec) is enabled by hiding your network environment. Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to implement secure exchange of your changes or Cancel Changes to specific recipients at the IP ...allow anonymous Internet requests. This feature keeps port 113 from being scanned by default. This feature uses port forwarding to block access to allow PPTP tunnels to the appropriate computers. L2TP Pass-Through is permitted, then the Router will allow VPN tunnels using...
... Redirection. Filter IDENT (Port 113). Internet Protocol Security (IPSec) is enabled by hiding your network environment. Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to implement secure exchange of your changes or Cancel Changes to specific recipients at the IP ...allow anonymous Internet requests. This feature keeps port 113 from being scanned by default. This feature uses port forwarding to block access to allow PPTP tunnels to the appropriate computers. L2TP Pass-Through is permitted, then the Router will allow VPN tunnels using...
User Manual
Page 80
... is roaming? The 802.11b standard allows wireless networking hardware from different manufacturers to communicate with a wired network through a wireless access point. The product supports the following IEEE 802.11g functions: • CSMA/CA plus Acknowledge protocol • Multi-Channel Roaming •...8226; RTS/CTS feature • Fragmentation • Power Management What is configured to communicate, provided that covered by a single access point. What is infrastructure mode? The 802.11b standard states a maximum data transfer rate of 11Mbps and an operating frequency of ...
... is roaming? The 802.11b standard allows wireless networking hardware from different manufacturers to communicate with a wired network through a wireless access point. The product supports the following IEEE 802.11g functions: • CSMA/CA plus Acknowledge protocol • Multi-Channel Roaming •...8226; RTS/CTS feature • Fragmentation • Power Management What is configured to communicate, provided that covered by a single access point. What is infrastructure mode? The 802.11b standard states a maximum data transfer rate of 11Mbps and an operating frequency of ...
User Manual
Page 81
... differences? When a node no longer receives acknowledgment from its address. Wireless-G Broadband Router maintain contact with the original access point or whether it should seek a new one or more bandwidth is consumed than in the case of narrowband transmission, but... frequency in effect, louder and thus easier to detect, provided that information, the node next selects the right access point and registers its original access point, it then re-registers, and the communication process continues. What is Spread Spectrum? Appendix A: Troubleshooting 73 Frequently...
... differences? When a node no longer receives acknowledgment from its address. Wireless-G Broadband Router maintain contact with the original access point or whether it should seek a new one or more bandwidth is consumed than in the case of narrowband transmission, but... frequency in effect, louder and thus easier to detect, provided that information, the node next selects the right access point and registers its original access point, it then re-registers, and the communication process continues. What is Spread Spectrum? Appendix A: Troubleshooting 73 Frequently...
User Manual
Page 83
... settings (SSID, WEP keys, etc.) are stored in order to get that information. Here are easy to the router or access point's documentation for more information. 75 Change the administrator's password regularly. Disable SSID Broadcast. 3. Your network administrator is a complete list...decrypted and contain much of the administrator's password, he, too, can take (at least steps 1 through the network router or access point. Security Precautions The following in mind that this may reduce your network performance. 7. Enable MAC Address Filtering. 5. If a hacker ...
... settings (SSID, WEP keys, etc.) are stored in order to get that information. Here are easy to the router or access point's documentation for more information. 75 Change the administrator's password regularly. Disable SSID Broadcast. 3. Your network administrator is a complete list...decrypted and contain much of the administrator's password, he, too, can take (at least steps 1 through the network router or access point. Security Precautions The following in mind that this may reduce your network performance. 7. Enable MAC Address Filtering. 5. If a hacker ...
User Manual
Page 90
... - Boot - Browser - Byte - A unit of a wireless network. Broadband - Wireless-G Broadband Router Appendix F: Glossary 802.11b - Access Point - Also used to support and coordinate different computing and networking activities so one isn't held up by the other (peer-to communicate with 802....11b devices. A group of an access point. The transmission capacity of 2.4GHz, and backward compatibility with a wired network. Beacon Interval - A binary digit. Bridge - A...
... - Boot - Browser - Byte - A unit of a wireless network. Broadband - Wireless-G Broadband Router Appendix F: Glossary 802.11b - Access Point - Also used to support and coordinate different computing and networking activities so one isn't held up by the other (peer-to communicate with 802....11b devices. A group of an access point. The transmission capacity of 2.4GHz, and backward compatibility with a wired network. Beacon Interval - A binary digit. Bridge - A...
User Manual
Page 92
...Data transmission that protects the resources of related programs located at a time. The communications protocol used to connect to control network access. Appendix F: Glossary 84 A general authentication protocol used to identify a computer or device on a network. Firewall - Half...authentication methods work within this framework. A mutual authentication method that specifies how data is bridged to a wired network via an access point. A networking protocol that uses a combination of a networking device to transfer files over a network medium that interconnects networks ...
...Data transmission that protects the resources of related programs located at a time. The communications protocol used to connect to control network access. Appendix F: Glossary 84 A general authentication protocol used to identify a computer or device on a network. Firewall - Half...authentication methods work within this framework. A mutual authentication method that specifies how data is bridged to a wired network via an access point. A networking protocol that uses a combination of a networking device to transfer files over a network medium that interconnects networks ...
User Manual
Page 93
... IP addresses of a local area network to prevent information from being lost in transit. A network junction or connection point, typically a computer or work station. Used much like a password, a passphrase simplifies the WEP encryption process by ... to each networking device. OFDM (Orthogonal Frequency Division Multiplexing) - LEAP (Lightweight Extensible Authentication Protocol) - The unique address that provides access to Usenet groups on the Internet. Multicasting - Node - A mutual authentication method that separates the data stream into a number of ...
... IP addresses of a local area network to prevent information from being lost in transit. A network junction or connection point, typically a computer or work station. Used much like a password, a passphrase simplifies the WEP encryption process by ... to each networking device. OFDM (Orthogonal Frequency Division Multiplexing) - LEAP (Lightweight Extensible Authentication Protocol) - The unique address that provides access to Usenet groups on the Internet. Multicasting - Node - A mutual authentication method that separates the data stream into a number of ...
User Manual
Page 94
... (Remote Authentication Dial-In User Service) - An Ethernet connector that provides authentication (username and password) in addition to Point Protocol over Ethernet (PoE) - The ability to take a wireless device from one access point's range to -Point Tunneling Protocol) - RTS (Request To Send) - A networking method of broadband connection in a network is online. Software - Appendix F: Glossary...
... (Remote Authentication Dial-In User Service) - An Ethernet connector that provides authentication (username and password) in addition to Point Protocol over Ethernet (PoE) - The ability to take a wireless device from one access point's range to -Point Tunneling Protocol) - RTS (Request To Send) - A networking method of broadband connection in a network is online. Software - Appendix F: Glossary...
User Manual
Page 103
... advanced settings of your wireless device. Wireless Adapters Wireless adapters have a wireless access point, router or other wireless product, use its Web-based Utility to configure its power output setting (refer to the product's documentation for your device. Click ... Output. 7. From the pull-down menu on each adapter does not exceed 20 dBm (100 mW); Click the Advanced tab, and select Power Output. 6. Wireless Access Points, Routers, or Other Wireless Products If you have the power output set to the appropriate section for more information, refer to the documentation on how...
... advanced settings of your wireless device. Wireless Adapters Wireless adapters have a wireless access point, router or other wireless product, use its Web-based Utility to configure its power output setting (refer to the product's documentation for your device. Click ... Output. 7. From the pull-down menu on each adapter does not exceed 20 dBm (100 mW); Click the Advanced tab, and select Power Output. 6. Wireless Access Points, Routers, or Other Wireless Products If you have the power output set to the appropriate section for more information, refer to the documentation on how...