35
WAN Connection
See section 4.9: ‘Network Setup in general.’
DHCP Server
See section 4.7: ‘Using a DHCPserver’
5.3 Event reporting/logging
The Access Point keeps a log of important events. Go to the Event
reporting page to access it. The event log contains the following
information:
˙
Report level: shows how important the event (or how critical the error)
is
˙
ID: an internal number for the event
˙
Description: description for the event
˙
Count: the number of times this event has occurred
˙
Occurrence: when this eve nt has occurred, in months, days a hours:
minutes since the Access Point was started
Click
Reset eventlog
to remove all entries.
5.4 Identifying the Access Point
You have a number of options for identifying the Access Point. This is
especially useful when you have multiple Access Points in your
network.
To access the identity data of the Access Point, go to the
Identity
page.
You can use the first two fields on this page to identify the Access Point
for yourself. These fields do not influence the behavior of the Access
Point.
˙
Location: This field can be used to indicate the physical location of
the device (for example: 2nd floor, room 3).
˙
Contact: This field can be used to indicate the person responsible for
the device, this can be an E-mail address (for example:
When you have entered or changed your data, click Apply to apply the
changes to the Access Point.
The following fields cannot be changed (they are factory-set or
controlled by the Access Point’s firmware):
˙
MAC address: the MAC address of the Access Point.
˙
Access Point Type: information on your type of Access Point.
˙
Firmware Version: the version number of the software that controls
the Access Point.