User Guide
Page 3
Glossary 44 3.6 Management 38 3.6.1 SNMP 38 3.6.2 Remote Management 39 3.7 Tools 40 3.7.1 Restart 40 3.7.2 Settings 41 3.7.3 Firmware 42 3.7.4 Ping Test 43 4.
Glossary 44 3.6 Management 38 3.6.1 SNMP 38 3.6.2 Remote Management 39 3.7 Tools 40 3.7.1 Restart 40 3.7.2 Settings 41 3.7.3 Firmware 42 3.7.4 Ping Test 43 4.
User Guide
Page 24
... interface. Click DHCP Table to view a list of client stations currently connected to ensure that your firmware was successfully updated. Wireless: Displays the router's wireless connection information, including the router's wireless interface MAC address, the connection status, the SSID status, which channel is being used, and whether WEP is enabled or not. 3.3 Status This selection enables...
... interface. Click DHCP Table to view a list of client stations currently connected to ensure that your firmware was successfully updated. Wireless: Displays the router's wireless connection information, including the router's wireless interface MAC address, the connection status, the SSID status, which channel is being used, and whether WEP is enabled or not. 3.3 Status This selection enables...
User Guide
Page 43
IDENT: Default is not performing correctly. 40 IPSec: Enables you to set port 113 stealth. 3.7 Tools This page enables you to restart the system in the event the system is stealth. This enables you to restart the system, save and load different settings as profiles, restore factory default settings, run a setup wizard to configure router settings, upgrade the firmware, and ping remote IP addresses. 3.7.1 Restart Click Restart to set up IPSec access for remote management.
IDENT: Default is not performing correctly. 40 IPSec: Enables you to set port 113 stealth. 3.7 Tools This page enables you to restart the system in the event the system is stealth. This enables you to restart the system, save and load different settings as profiles, restore factory default settings, run a setup wizard to configure router settings, upgrade the firmware, and ping remote IP addresses. 3.7.1 Restart Click Restart to set up IPSec access for remote management.
User Guide
Page 45
Download the latest firmware from the manufacturer's Web site, and save it to the latest release 42 Select the file and click Upgrade to update the firmware to your disk. 2. 3.7.3 Firmware This screen enables you to keep the router firmware up to the location of the downloaded firmware file. Please follow the below instructions: 1. Click Browse and go to date.
Download the latest firmware from the manufacturer's Web site, and save it to the latest release 42 Select the file and click Upgrade to update the firmware to your disk. 2. 3.7.3 Firmware This screen enables you to keep the router firmware up to the location of the downloaded firmware file. Please follow the below instructions: 1. Click Browse and go to date.
User Guide
Page 47
...Indication Message) provides client stations with information on the net have unrestricted access to the verification of a transmitted message's integrity. The router firmware stores settings made in the interface. DMZ DMZ (DeMilitarized Zone) is a part of data packets during transmission. 44 DNS converts... messages. Domain Name The domain name typically refers to the breaking up of a network that seamlessly connects wired and wireless networks Authentication Authentication refers to the Internet. Filter Filters are typically used to keep networks secure from address to the ...
...Indication Message) provides client stations with information on the net have unrestricted access to the verification of a transmitted message's integrity. The router firmware stores settings made in the interface. DMZ DMZ (DeMilitarized Zone) is a part of data packets during transmission. 44 DNS converts... messages. Domain Name The domain name typically refers to the breaking up of a network that seamlessly connects wired and wireless networks Authentication Authentication refers to the Internet. Filter Filters are typically used to keep networks secure from address to the ...
User Guide
Page 49
...are typically numbered. Ports are the communications pathways in a computer. The administrator's job includes ensuring network security, keeping software, hardware, and firmware up Internet connections) over a network. NAT NAT (Network Address Translation - also known as IP masquerading) enables an organization to present itself...Internet with one IP address for running PPP protocol (normally used to -date, and keeping track of computers and network devices (routers and switches). NAT converts the address of data that can be sent over an Ethernet. 46 PPPoE PPPoE (Point-to its ...
...are typically numbered. Ports are the communications pathways in a computer. The administrator's job includes ensuring network security, keeping software, hardware, and firmware up Internet connections) over a network. NAT NAT (Network Address Translation - also known as IP masquerading) enables an organization to present itself...Internet with one IP address for running PPP protocol (normally used to -date, and keeping track of computers and network devices (routers and switches). NAT converts the address of data that can be sent over an Ethernet. 46 PPPoE PPPoE (Point-to its ...
User Guide
Page 52
THE FOREGOING WARRANTIES AND REMEDIES ARE EXCLUSIVE AND ARE IN Wireless Products - 3 Years Warranty If a product does not operate as warranted above during the applicable warranty period, TRENDware shall, at its products against defects in material ... TRENDware pursuant to service the product by a copy of the dated proof of the purchase. Products returned to TRENDware must be responsible for any software, firmware, information, or memory data of customer contained in, stored on, or integrated with RMA number marked on the outside of the package, and sent prepaid...
THE FOREGOING WARRANTIES AND REMEDIES ARE EXCLUSIVE AND ARE IN Wireless Products - 3 Years Warranty If a product does not operate as warranted above during the applicable warranty period, TRENDware shall, at its products against defects in material ... TRENDware pursuant to service the product by a copy of the dated proof of the purchase. Products returned to TRENDware must be responsible for any software, firmware, information, or memory data of customer contained in, stored on, or integrated with RMA number marked on the outside of the package, and sent prepaid...