Edimax AR-7284WNB Bedienungsanleitung
- Schauen Sie die Anleitung online durch oderladen Sie diese herunter
- 97 Seiten
- N/A
Zur Seite of
Ähnliche Gebrauchsanleitungen
-
Router
Edimax BR-6424n
161 Seiten -
Router
Edimax 3G-6210n
157 Seiten -
Router
Edimax 3G-6200nL V2
110 Seiten 2.26 mb -
Router
Edimax IAP1200
21 Seiten 1.79 mb -
Router
Edimax AR-7211B
61 Seiten -
Router
Edimax EW-7206PDg
31 Seiten 1.64 mb -
Router
Edimax AR-7266WNA
124 Seiten -
Router
Edimax AR-7265WnB
80 Seiten 2.05 mb
Richtige Gebrauchsanleitung
Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Edimax AR-7284WNB an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Edimax AR-7284WNB, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.
Was ist eine Gebrauchsanleitung?
Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Edimax AR-7284WNB die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.
Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Edimax AR-7284WNB. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.
Was sollte also eine ideale Gebrauchsanleitung beinhalten?
Die Gebrauchsanleitung Edimax AR-7284WNB sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Edimax AR-7284WNB
- Den Namen des Produzenten und das Produktionsjahr des Geräts Edimax AR-7284WNB
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Edimax AR-7284WNB
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen
Warum lesen wir keine Gebrauchsanleitungen?
Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Edimax AR-7284WNB zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Edimax AR-7284WNB und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Edimax finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Edimax AR-7284WNB zu überspringen, wie es bei der Papierform passiert.
Warum sollte man Gebrauchsanleitungen lesen?
In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Edimax AR-7284WNB, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.
Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Edimax AR-7284WNB widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.
Inhaltsverzeichnis der Gebrauchsanleitungen
-
Seite 1
[...]
-
Seite 2
ii English Copyright © by Edimax T echnology Co, L TD. all rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, m agnetic, optical, chemical, manual or otherwise, without the [...]
-
Seite 3
iii Notice according to GNU/GPL-V ersion 2 This product includes software that is subject to the GNU/GPL-Version 2. You find t he text of the license on the product cd/dvd. The program is free software and distributed without any warranty of the author. We offer, val id for at least three years, to give you, for a charge no more than the costs of p[...]
-
Seite 4
i Contents 1 Introduction ......................................................................................... 1 1.1 Package List ....................................................................... 2 1.2 Safety Caut ions .................................................................. 3 1.3 LEDs and Inte rfaces ..........................[...]
-
Seite 5
ii 3.3.5 Filtering Op tions ....................................................... 47 3.3.6 QoS Configur ation ................................................... 52 3.3.7 Firewall Se ttings ...................................................... 56 3.3.8 DNS ......................................................................... 57 3.3.9 Dynamic[...]
-
Seite 6
1 1 Introduction The AR-7284WnA supports Annex A mode. It provides four 10/100 base-T Ethernet ports for user . The device provi des high-speed ADSL2+ broadband connection to the Internet or Intranet for high-end users, such as net bars and o ffice users. It provides high performance access to the Internet, downstream up to 24 Mbps and upstream up [...]
-
Seite 7
2 1.1 Package List 1 x AR-7284WnA or AR-7284WnB 1 x external splitter 1 x power adapter 2 x telephone cables (RJ-1 1) 1 x Ethernet cable (RJ-45) 1 x Quick Installation Guide(QIG) 1 x CD (Multi-langu ages EZmax Wiard / QIG , USB driver & English Manual)[...]
-
Seite 8
3 1.2 Safety Cautions Follow the following instructions to prevent the device from risks and damage caused by fire or electric power: Use volume labels to mark the type of power . Only use the power adapter packed within the device package. Pay attention to the power l oad of the electric outlet or power extension cord. An overload ed power outlet [...]
-
Seite 9
4 1.3 LEDs and Interfaces Front Panel Figure 1 Front panel The following table describes the LEDs of the device. LED Colo r Statu s Description Green Off The power is off. On The power is on and the initialization is normal. Red On The device is initiating. Blinks The firmware is upgrading. LAN 1/2/3/4 Green Off No LAN link. Blinks Data is being tr[...]
-
Seite 10
5 LED Colo r Statu s Description mode, DSL connection is not present, or the power is off. On Connected to network. Red On Network connection failed. WPS Green On The WPS indicator will light for 5 minutes after the WPS service is registered successfully . Blink Green The W PS indicator will light for 0.2s, and then off for 0.1s when the WPS button[...]
-
Seite 11
6 Rear Panel Figure 2 Rear panel The following table describes the interface of the de vice. Interface/Button Description Line RJ-1 1 interface that connects to the telephone set through the telephone cabl e. WPS/Reset Press the button for 3 seconds to enab le WPS. Press the button for 8 seco nds to restore factory default confi gurations and reboo[...]
-
Seite 12
7 Internet Explorer V5.0 or higher , Netscape V4.0 or highe r , or Firefox 1.5 or higher 1.5 Features The device supports the following features: V arious line modes External PPPoE dial-up access Internal PPPoE and PPPoA dial-up access Leased line mode Zero installation PPP bridge mode (ZIPB) 1483B, 1483R, and MER access Multiple PVCs (up to eight)[...]
-
Seite 13
8 2 Hardware Installation 2.1 Connecting the ADSL Router Step 1 Connect the ‘Line’ port of the device and the ‘Modem’ port of the ADSL splitter with a telephone cable. Connect the phone to the ‘Phone’ port of the splitter through a telephone cable. Connect the incoming line to the ‘Line’ port of the splitter . The splitter has three[...]
-
Seite 14
9 Figure 3 Connection diagram ( without telephone sets before the split ter) Connection type 2: Figure 4 disp lays the application diagram for the connection of the devic e, PC, splitter and telephone sets when a telephone set is placed before the splitter . As illustrated in the following figure, the splitter is installed close to the device. Figu[...]
-
Seite 15
10 Installing a telephone before the splitter may cause connection problem between the device and the central office, or failure of Internet access, or slow connection speed. If you really need to add a telephone set before the s plitter , you must add a microfilter before a telephone set. Do not connect several telephones before the splitter or co[...]
-
Seite 16
11 Step 5 The dialog will instruct you to choose driver from specific location.[...]
-
Seite 17
12 3 About the Web Configurator This chapter describes how to configure the device by the Web-based configuration utility . 3.1 Access the Device Follow the following instructions to access the device for the first time. Step 1 Open the Internet Explorer (IE) browser and enter http://192.168.2.1 . Step 2 The Login page shown in the following figure[...]
-
Seite 18
13 If you successfully logged in as the super user , the web page as shown in the following figure appears. 3.2 Setup 3.2.1 Wiz ar d Wizard enables fast and accurate configuration of Internet connection and other important parameters. The followin g sections describe these c onfiguration parameters. When subscribing to a broadband service, you shou[...]
-
Seite 19
14 Step 1 Choose Setup > Wiz ard . The page shown in the following figure appears. Step 2 Click Setup Wizard . The p age shown in the following figure appears. Step 3 There are four steps to configure the device. Click Next to continue.[...]
-
Seite 20
15 Step 4 Set the time and date.[...]
-
Seite 21
16 Step 5 Configure the Internet connection. Select the country and ISP . Se t the VPI and VCI. If you failed to find the country and ISP from the drop-down lists, select Others . Click Next . If the Protocol you selected is PPPoE or PPPoA, the page shown in either of the two following figures appears.[...]
-
Seite 22
17 Set the user name and password here,which is provided by your ISP . If the Protocol is Dyna mic IP , the page shown in the following figure appears. Click Next , the page shown in the following figure appears.[...]
-
Seite 23
18 Configure the wireless network. Enter the information and click Next .[...]
-
Seite 24
19 If the Protocol is Bridge , the page shown in the following figure appears.[...]
-
Seite 25
20 If the Protocol is Stati c IP , the page shown in the following figure appears.[...]
-
Seite 26
21 Enter the IP Address , Subnet Mask , Default Gatew ay , and Primary DNS Server . Click Next . The page shown in the following page appears. Figure 5[...]
-
Seite 27
22 Step 6 Configure the wireless netwo rk. Enter the information and click Next . Step 7 When the settings are complete, click Apply to apply the settings. Note: In each step of the Wizard page, you can click Back to review or modify settings in previous page. Click Cancel to exit the wizard page.[...]
-
Seite 28
23 3.2.2 Internet Setup Choose Setup > Internet Setup . The page shown in the following figure appears. In this page, you can co nfigure the W AN interface of the device. Click Add . The p age shown in the following figure appears.[...]
-
Seite 29
24 Click Apply . The page shown in the following figure appears.[...]
-
Seite 30
25 3.2.3 Wireless Setup This section describes the wireless LAN and some basic configuration. Wireless LANs can be as simple as two computers with wireless LAN cards communic ating in a pear-to-pear network or as complex as a number of computers with wireless LAN cards communicating through access point which bridges network traffic to wired LAN. C[...]
-
Seite 31
26 3.2.3.1 Wireless Basics In the Wireless Setup page, click Wireless Basics . The page shown in the following figure appears. In this p age, you can configure the parameters that wi reless LAN clients can used to connect to this device. Click Apply to save the settings.[...]
-
Seite 32
27 3.2.3.2 Wireless Security In the Wireless Setup page, click W ireless Security . The page shown in the following figure appears. Wireless security is vital to your network to protect the wireless communication among wireless stations, access point s and wired network. Click Apply to save the settings.[...]
-
Seite 33
28 3.2.4 Local Network Y ou can configure the LAN IP address according to actual requirements. The preset IP address is 192.168.1.1. Y ou can use the default settings and DHCP service to manage the IP settings for the private network. The IP address of the device is the base address used for DH CP . T o use the device as DHCP server on your LAN, th[...]
-
Seite 34
29 the pool used for DHCP . The IP address pool can contain up to 253 IP addresses. Click Apply to save the settings. In the Local Network page, you can assign IP addresses on the LAN to specific individual computers based on their MAC addresses. Click Add to add st atic DHCP addresses (optional). The page shown in the following figure appears. Sel[...]
-
Seite 35
30 The NUMBER OF DYNAMIC DHCP CLIENTS page shows the current DHCP clients (PC or Laptop) connected to the device and the detailed info rmation of the connected computer(s). 3.2.5 T ime and Date Choose Setup > Time and Date . The p age shown in the following figure appears. In the Time and Date page, you can setup the time of the internal system [...]
-
Seite 36
31 Select the specific time serv er and the time zone from the corresponding item in drop-down lists. Select Enable Daylight Saving if necessary . Click Apply to save the settings. 3.2.6 Logout Choose Setup > Logout . The page shown in the following figure appears. In this page, you can log out from web configuration menu. 3.3 Advanced This sect[...]
-
Seite 37
32 your wireless performan ce. The default settings provide the best wireless radio performance in most of environments.[...]
-
Seite 38
33 3.3.1.1 Advanced Settings Select Advance Settings. The page shown in the following figure appears. These settings are only for technically advanced users who have sufficient knowledge about wireless LAN. Do not change these settings unless you know the effect of changes on the device.[...]
-
Seite 39
34 Click Apply to save the settings. 3.3.1.2 MAC Filtering Select MAC Filtering . The page shown in the follo wing figure appears.[...]
-
Seite 40
35 Click Add . The page shown in the following figure appears. Click Apply to save the settings.[...]
-
Seite 41
36 3.3.1.3 Security Settings Select Security Settings . The page shown in the following figure appears. Select the SSID that you wa nt to configure from the drop-down list. Select the encryption type from the Security Mode drop-down list.Y ou can select None , WEP , AUTO (WP A or WP A2) , WP A Only , or WP A2 Only . If you select WEP , the page sho[...]
-
Seite 42
37 If you select AUT O (WP A or WP A2) , WP A Only , or WP A2 Only , the page shown in the following figure appears.[...]
-
Seite 43
38 Click Apply to save the settings.[...]
-
Seite 44
39 3.3.1.4 WPS Settings Select WPS Settings . The page shown in the following figure appears. WPS Authentication: The WPS service is enabled by default. There are three setting methods you can use in the Wi-Fi Protected Setup. In order to use wps authentication, you can select one method from three methods. Press the WPS button on the rear panel fo[...]
-
Seite 45
40 3.3.2 Port Forwarding This function is used to open ports on your device and redirect data from those ports to a single PC on your network (W AN-to-LAN traffic). It allows remote users to access services on your LAN, such as FTP for file transfers or SMTP and POP3 for e-mail. The device accepts remote request s for these services at your global [...]
-
Seite 46
41 Select a service for a preset application, or enter a name in the Custom Server field. Enter an IP a ddress in the Server IP A ddress field, to appoint the corresponding PC to receive forwarded packets. The Ports show the ports that you want to open on the device. The TCP/UDP means the protocol type of the opened ports. Click Apply to save the s[...]
-
Seite 47
42 3.3.3 DMZ Since some applications are not compatible with NA T , the device supports the use of a DMZ IP address for a single host on the LAN. This IP address is not protected by NA T and it is visible to agents on the Internet with the correct type of software. Note that any client PC in the DMZ is exposed to various types of security risks. If[...]
-
Seite 48
43 This page provides two useful tools for restricting the Internet access. Block Websites allows you to quickly create a list of all websites that you wish to stop users from accessing. Block MAC Address allows you to control when clients or PCs connected to the device are allowed to access the Internet.[...]
-
Seite 49
44 3.3.4.1 Block Website In the Parent al Control p age, click Block Website . The p age shown in the following figure appears. Click Add . The p age shown in the following page appears. Enter the website in the URL field. Select the Schedule from drop-down list, or select Manual Schedule and select the corresponding time and days.[...]
-
Seite 50
45 Click Submit to add the website to the BLOCK WEBSITE Ta b l e . The p age shown in the following figure appears. 3.3.4.2 Block MAC Address In the Parent al Control page, click Block MAC Address . The page shown in the following figure appears. b Click Add . The p age shown in the following figure appears.[...]
-
Seite 51
46 Enter the user name and MAC address and select the corresponding time and days. Click Submit to add the MAC address to the BLOCK MAC ADDRESS T able .[...]
-
Seite 52
47 3.3.5 Filtering Options Choose AD V ANCED > Filtering Options . The Filtering Options page shown in the following figure appears. 3.3.5.1 Inbound IP Filtering By default, all incoming IP traf fi c that does not originate from the internal network is blo cked when the firewall is enabled. Normal outbound requests creat ed by web browsing, emai[...]
-
Seite 53
48 Click Add to add an inbound IP filter . The page shown in the following figure appears.[...]
-
Seite 54
49 Enter the Filter Name and specify at least one of the following criteria: protocol, s ource/destination IP address, subnet mask, and source/destination port. Click Apply to save the settings. Note: The settings only apply when the firewall is enabled. The ACTIVE INBOUND FIL TER shows detailed information about every created inbound IP filter . C[...]
-
Seite 55
50 In the Filtering Options p age, click Outbound IP Filtering . The page shown in the following figure appears. Click Add to add an outbound IP filter . The p age shown in the following figure appears.[...]
-
Seite 56
51 Enter the Filter Name and specify at least one of the following criteria: protocol, s ource/destination IP address, subnet mask, and source/destination port. Click Apply to save the settings. 3.3.5.3 Bridge Filtering In the Filtering Options page, click Bridge Filtering . The page shown in the following figure appears.This page is used to config[...]
-
Seite 57
52 Click Apply to save the settings. 3.3.6 QoS Configuration Choose ADV ANCED > QOS Config . The QoS Configuration page shown in the following figure appears.[...]
-
Seite 58
53 3.3.6.1 QoS Interface In the QoS Configuration page, click QoS Interface Config . The page shown in the following figure appears. In this p age, you can configure bandwidth control. Click Edit , the p age shown in the following figure appears. After configuration, click Apply to make configurations take effect.[...]
-
Seite 59
54 3.3.6.2 QoS Queue Configuration In the QoS Configuration page, click QoS Queue Config . The page shown in the following figure appears. In this p age, you can configure the priority of queue. Click Add , the page shown in the following figure appears. After configuration, click Apply to take the configurations effect. 3.3.6.3 QoS Classify Config[...]
-
Seite 60
55 Click Add , the page shown in the following figure appears.[...]
-
Seite 61
56 After configurati on is done, click Apply to make the configuration take ef fect. 3.3.7 Firewall Settings A denial-of-service (DoS) attack is characterized by an explicit attempt by attackers to preven t legitimate users from using that service. Examples include the following The attackers attempt to flood a network, thereby preventing legitimat[...]
-
Seite 62
57 from accessing a service The attackers attempt to disrupt service to a specific system or person. Port scan protection is designed to block attempts to discover vulnerable ports or services that might be exploited in an attack from the W AN. Choose ADV ANCED > Firewall Settings . The page shown in the following figure appears. Click Apply to [...]
-
Seite 63
58 the name into the corresponding IP address. For example, the domain name www .example.com might be translated to 198.105.232.4. The DNS system is, in fact, it s own network. If one DNS server does not know how to translate a particular domain name, it asks another one, and so on, until the correct IP address is returned. Choose AD V ANCED > D[...]
-
Seite 64
59 3.3.9 Dynamic DNS The device supports dynamic domain name service (DDNS). The dynamic DNS service allows a dynamic public IP address to be associated with a static host name in any of the many domains, and allows access to a specified host from various locations on the Internet. Click a hyperlinked URL in the form of hostname.dyndns.org and allo[...]
-
Seite 65
60 DDNS provider : Select one of the DDNS service provider from the down-list. Available service providers include DynDns.org and dlinkddns.com. Host Name : Enter the host name that you registered with your DDNS service provider . Username : Enter the user name for your DDNS account. Password : Enter the password for your DDNS account. Click Apply [...]
-
Seite 66
61[...]
-
Seite 67
62 3.3.10.1 Port Mapping Choose AD V ANCED > Netw ork T ools and click Port Mapping . The page shown in the following figure appears. In this page, you can bind the W AN in terface and the LAN interface to the same group. Click Add to add a new port mapping. The page shown in the following figure appears.[...]
-
Seite 68
63 The procedure for creating a mapping gro up is listed as follows: Step 1 Enter the group name. Step 2 Select interfaces from the A vailable Interface list and click the <- arrow button to add them to the grouped interface list, in order to create the required mapping of the ports. The group name must be unique. Step 3 Click Submit to save the[...]
-
Seite 69
64 3.3.10.2 IGMP Proxy Choose ADV ANCED > Network T ools and click IGMP Proxy . The page shown in the following figure appears. IGMP proxy enables the syst em to issue IGMP host messages on behalf of hosts t hat the system discovered through standard IGMP interfaces. The system act s as a proxy for its hosts after you enable it. Click Apply t o [...]
-
Seite 70
65 After configuration, click Apply to save the settings. 3.3.10.4 UPnP Choose ADV ANCED > Network T ools and click UPnP . The page shown in the following figure appears.[...]
-
Seite 71
66 In this page, you can confi gure universal plug and play (UPnP). The system acts as a daemon af ter you enable UPnP . UPnP is used for popular audio / video software. It allows automatic discovery of your devi ce in the network. If you are concerned about UPnP security , you can disable it. Block ICMP ping should be enabled so that the device wi[...]
-
Seite 72
67 The AR-7284WnA supports Annex A mode, so the AnnexB is not enabled. Click Apply to save the settings.[...]
-
Seite 73
68 3.3.10.6 SNMP Choose ADV ANCED > Network T ools and click SNMP . The page shown in the following figure appears. In this page, you can set SNMP p arameters. Read Community : The network administrator must use this password to read the information of this device. Set Community : The network administrator must use this password to configure t h[...]
-
Seite 74
69 3.3.10.7 TR069 Choose ADV ANCED > Network T ools and click TR-069 . The page shown in the following figure appears. In this page, you can configure the TR069 CPE. Click Apply to save settings.[...]
-
Seite 75
70 3.3.10.8 Certificates Choose ADV ANCED > Network T ools and click Certificates . The Certificates page shown in the following figure appears. In the Certificates page, click T rusted CA . The page shown in the following figure appears. Click In put Certificate , the page shown in the following figure appears.[...]
-
Seite 76
71 Click Apply to save the settings.[...]
-
Seite 77
72 3.3.11 Routing Choose AD V ANCED > Routing . The page shown in the following page appears. 3.3.11.1 St atic Route Choose ADV ANCED > Routing and click S t atic Route . The page shown in the following figure appears. This page is used to configure the routing informat ion. In this page, you can add or delete IP routes.[...]
-
Seite 78
73 Click Add to add a static route. The page shown in the following figure appears. Destination Network Address : The destination network address. Subnet Mask : The subnet mask of the destination network. Use Gateway IP Address : The gateway IP address of the destination network. User Interface : The interface name of the router output port. Y ou c[...]
-
Seite 79
74 Click Apply t o save the settings. 3.3.11.2 Default Gatew ay Choose ADV ANCED > Routing and click Default Gatewa y . The page shown in the following figure appears. Click Apply to save the settings.[...]
-
Seite 80
75 3.3.11.3 RIP Settings Choose ADV ANCED > Routing and click RIP Settings . The page shown in the following figure appears. This page is used to select the interfaces on yo ur device that use RIP and the version of the prot ocol being used. If you are using this devic e as a RIP-enabled device to communicate with others us ing the routing infor[...]
-
Seite 81
76 3.3.12 Schedules Choose ADV ANCED > Schedules . The page shown in the following figure appears. Click Add to add schedule rule. The page shown in the following figure appears. Click Submit to save settings.[...]
-
Seite 82
77 3.4 Management 3.4.1 System Choose Management > System Management . The System page shown in the following figure appears. In this page, you can reboot device, back up the current settings to a file, restore the settings from the file saved previously , and restore the factory default settings. The buttons in this page are described as follow[...]
-
Seite 83
78 Backup Setting : Save the settings to the local hard drive. Select a location on your computer to back up the file. Y ou can name the conf iguration file. Up date Setting : Click Browse to select the configuration file of device and click Update Settings to begin restoring the device configuration.. Restore Default Setting : Reset the device to [...]
-
Seite 84
79 Step 2 Click Update Firm w are to copy the file. The device loads the file and reboots automatically . Notice : Do not turn off your device or press the reset button while this procedure is in progress. 3.4.3 Access Controls Choose Management > Acce ss Controls . The Access Controls page shown in the following figure appears. The page contain[...]
-
Seite 85
80 3.4.3.1 Account Password In the Access Controls page, click Account Password . The page shown in the following figure appears. In this p age, you can change the password of the user and set time for automatic logout. Y ou should change the default password to secure your network. Ensure that you remember the new password or write it down and kee[...]
-
Seite 86
81 Click Apply to save the settings. 3.4.3.2 Services In the Access Controls page, click Services . The page shown in the following figure appears. In this page, you can enable or disable the serv ices that are opened to remote host. For exampl e, if telnet service is enabled, the remote host can ac cess the device by telnet through port 23. Normal[...]
-
Seite 87
82 3.4.3.3 IP Address In the Access Controls page, click IP Address . The p age shown in the following figure appears. In this page, you can confi gure the IP address used with access control list (ACL). If ACL is enabled, only devices with the specified IP addresses can access the device. Select Enable Access Control Mode to enable ACL. Note : If [...]
-
Seite 88
83 3.4.4 Diagnostics Choose Management > Diagnostic . The page shown in the following figure appears. In this p age, you can test the device. Click Run Diagnostics T est to run diagnostics. 3.4.5 Log Configuration Choose Management > Log Configuration . The Syste m Log page shown in the following figure appears.[...]
-
Seite 89
84 This page displays event log dat a in the chronological manner . Y ou can read the event log from the local host or send it to a syslog server . Available event severity levels are as follows: Emergency , Alert, Critical, Error , W arning, Notice, Informational and Debugging. In this page, you can enable or disable the system log function. The p[...]
-
Seite 90
85 The page displays the summary of the device status. It includes the information of firm ware version, upstream rate, downstream rate, uptime and Internet configuration (both wireless and Ethernet statuses).[...]
-
Seite 91
86 3.5.2 Wireless Client s Choose Statu s > Wireless Client s . The page shown in the following page appears. The page displays authenticated wireless stations and their statuses. 3.5.3 DHCP Clients Choose St atu s > DHCP Client s . The page shown in the following page appears. This page displays all client devices that obtain IP address from[...]
-
Seite 92
87 3.5.4 Logs Choose Statu s > Logs . The page shown in the following figure appears. Click Refresh to refresh the system log shown in the table.[...]
-
Seite 93
88 3.5.5 S t atistics Choose Stat us > St atistics . The page shown in the following figure appears. This page displays the statis tics of the network and data transfer . This information helps technicians to identify if the device is functioning properly . T he info rmation does not affect the functionality of the device.[...]
-
Seite 94
89 3.5.6 Route Info Choose Statu s > Route Info . The page shown in the following figure appears. The table shows a list of destination routes commonly accessed by the network.[...]
-
Seite 95
90 F F e e d d e e r r a a l l C C o o m m m m u u n n i i c c a a t t i i o o n n C C o o m m m m i i s s s s i i o o n n I I n n t t e e r r f f e e r r e e n n c c e e S S t t a a t t e e m m e e n n t t This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits[...]
-
Seite 96
91 Federal Communications Commission (FCC) Radiation Exposure St atement This equipment must be installed and operated in accordance with provided instructions and a minimum 20 cm spacing must be provided between computer mounted antenna and person’s body (excluding extremities of hands, wrist and feet) during wireless modes of operation. The equ[...]
-
Seite 97
92 EFT A member states: Iceland, Liechtenstein, Norway , and Switzerland. EU Countries not intended for use None A declaration of conformity is available on www .edimax.com N20379[...]