![Well DA-300N User Manual Download Page 210](http://html.mh-extra.com/html/well/da-300n/da-300n_user-manual_954630210.webp)
User’s Guide
Glossary
machines, modems, etc. to a telephone port. It is a 6-pin
connector usually containing four wires.
RJ-45
Registered Jack Standard-45
The 8-pin plug used in transmitting data over phone lines.
Ethernet cabling usually uses this type of connector.
Forwarding data between your network and
routing
the Internet on
SDNS
et
network. The subnet is
ed as though they were on a separate network. See
subnet mask
TCP
P
tocol
ile IP is responsible
Telnet
TP
vides WPA with a
shed using one port,
nd
them.
edded IP address of each
ct destination. You can
y out address replacement, and
ly, UDP
the most efficient route, based on the data’s destination IP
address and current network conditions. A device that
performs routing is called a Router.
Secondary Domain Name System (server)
A DNS server that can be used if the primary DSN server is
not available.
See DNS
.
subn
A subnet is a portion of a
distinguished from the larger network by a
subnet mask
that
selects some of the computers of the network and excludes
all others. The subnet's computers remain physically
connected to the rest of the parent network, but they are
treat
network mask
.
A mask that defines a subnet. See
network mask
.
See
TCP/IP
.
TCP/I
Transmission Control Protocol/Internet Pro
The basic protocols used on the Internet. TCP is responsible
for dividing data up into packets for delivery and
reassembling them at the destination, wh
for delivering the packets from source to destination. When
TCP and IP are bundled with higher-level applications such
as HTTP, FTP, Telnet, etc., TCP/IP refers to this whole suite
of protocols.
An interactive, character-based program used to access a
remote computer. While HTTP (the web protocol) and F
only allow you to download files from a remote computer,
Telnet allows you to log into and use a computer from a
remote location.
TFTP
Trivial File Transfer Protocol
A protocol for file transfers, TFTP is easier to use than File
Transfer Protocol (FTP) but not as capable or secure.
TKIP
Temporal Key Integrity Protocol (TKIP) pro
data encryption function. It ensures that a unique master key is
generated for each packet, supports message integrity and
sequencing rules and supports re-keying mechanisms.
triggers
Triggers are used to deal with application protocols that create
separate sessions. Some applications, such as NetMeeting,
open secondary connections during normal operations, for
example, a connection to a server is establi
but data transfers are performed on a separate connection. A
trigger tells the device to expect these secondary sessions a
how to handle
Once you set a trigger, the emb
incoming packet is replaced by the correct host address so that
NAT can translate packets to the corre
specify whether you want to carr
if so, whether to replace addresses on TCP packets on
packets only, or both.
210
Summary of Contents for DA-300N
Page 1: ...Wireless ADSL2 Router User s Guide WELL DA 300N Wireless ADSL2 Router User s Manual 1 ...
Page 15: ...Wireless ADSL2 Router User s Guide Figure3 RESET button 15 ...
Page 22: ...Wireless ADSL2 Router User s Guide 4 Double click on Internet Protocol Version 4 TCP IPv4 22 ...
Page 33: ...Wireless ADSL2 Router User s Guide Figure 1 Homepage 33 ...
Page 38: ...Wireless ADSL2 Router User s Guide 38 ...
Page 41: ...Wireless ADSL2 Router User s Guide 41 ...
Page 53: ...Wireless ADSL2 Router User s Guide 53 ...
Page 58: ......
Page 60: ...User s Guide Configuring your Computers 60 ...
Page 82: ...User s Guide Configuring your Computers 82 ...
Page 98: ...User s Guide Configuring your Computers 11 Enter AP s Self PIN Number and click next 98 ...
Page 100: ...User s Guide Configuring your Computers 13 Enter the Passphrase and then click Next 100 ...
Page 139: ...User s Guide Configuring your Computers 139 ...
Page 171: ...User s Guide Configuring your Computers 171 ...