TABLE OF CONTENTS
CHAPTER 1 INTRODUCTION...........................................................................................................1
1.1
P
ACKAGE
C
ONTENTS
......................................................................................................................1
1.2
S
YSTEM
R
EQUIREMENTS
................................................................................................................1
1.3
F
EATURES
.......................................................................................................................................2
1.4
S
PECIFICATION
................................................................................................................................2
1.5
W
IRELESS
P
ERFORMANCE
..............................................................................................................3
CHAPTER 2 HARDWARE INSTALLATION ....................................................................................4
2.1
H
ARDWARE
C
ONNECTION
...............................................................................................................4
2.2
LED
I
NDICATORS
............................................................................................................................4
CHAPTER 3 CONFIGURE THROUGH WEB BROWSER .............................................................6
3.1
W
IZARD
..........................................................................................................................................7
3.2
WAN ............................................................................................................................................10
3.2.1 Connection Type...................................................................................................................10
3.2.2 Dynamic DNS.......................................................................................................................14
3.3
W
IRELESS
.....................................................................................................................................15
3.3.1 Basic.....................................................................................................................................15
3.3.2 Security ................................................................................................................................16
3.3.2.1 WEP .........................................................................................................................................16
3.3.2.2 WPA .........................................................................................................................................17
3.3.2.3 WPA2 .......................................................................................................................................18
3.3.3 Advanced..............................................................................................................................20
3.4
LAN .............................................................................................................................................21
3.4.1 Basic.....................................................................................................................................21
3.4.2 DHCP...................................................................................................................................22
3.5
A
CCESS
C
ONTROL
.........................................................................................................................23
3.5.1 Filters...................................................................................................................................23
3.5.2 Virtual Server .......................................................................................................................28
3.5.3 Special AP............................................................................................................................29
3.5.4 DMZ.....................................................................................................................................30
3.5.5 Firewall Rule........................................................................................................................31
3.6
S
YSTEM
........................................................................................................................................32
3.6.1 Password..............................................................................................................................32
3.6.2 Time......................................................................................................................................33
3.6.3 Device Information ..............................................................................................................35
3.6.4 Log .......................................................................................................................................36