Wireless Devices and Security Settings
Make sure that the wireless device or computer that you are using supports WPA or WPA2
wireless security, which is the wireless security that the EOC slave supports.
2.2 Types of Logins and Access
Separate types of logins have different purposes. It is important that you understand the
difference so that you know which login to use when.
•
EOC Slave login logs you in to the router interface from EOC slave. For details about this
login, see next section.
•
ISP login logs you in to your Internet service. Your service provider has provided you with
this login information in a letter or some other way. If you cannot find this login information,
contact your service provider.
•
Wireless network key or password. Your router is preset with a unique wireless network
name (SSID) and password for wireless access. This information is on the label on the
bottom of your EOC slave.
2.3 Log In to the EOC Slave
The first time that you connect to the EOC salve, the installation screen displays. After
initial setup, you can log in to the salve to view or change its settings.
To log in:
1.With an Internet browser, browse to http://192.168.1.1
2. Enter guest for the user name and admin for the password, both in lowercase letters.
Note:As explained in the previous section, the EOC slave user name and password are
different from the user name and password for logging in to your Internet connection.