Planet 802.11g Wireless Broadband Router WRT-410 manuel d'utilisation
- Voir en ligne ou télécharger le manuel d’utilisation
- 69 pages
- 3.83 mb
Aller à la page of
Les manuels d’utilisation similaires
-
Network Router
Planet ADSL Firewall Router ADE-4120
47 pages 4.58 mb -
Network Router
Planet VRT-311
147 pages 2.78 mb -
Network Router
Planet Bridge/Router ADU-2100
24 pages 1.03 mb -
Network Router
Planet GRT-501
51 pages 4.4 mb -
Network Router
Planet ADSL 2/2+ Router ADE-3410
63 pages 3.64 mb -
Network Router
Planet 802.11g Wireless Broadband Router WRT-410
69 pages 3.83 mb -
Network Router
Planet WAP-4030A
28 pages 1.38 mb -
Network Router
Planet ADW-4401 A/B
42 pages 0.88 mb
Un bon manuel d’utilisation
Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation Planet 802.11g Wireless Broadband Router WRT-410. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel Planet 802.11g Wireless Broadband Router WRT-410 ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.
Qu'est ce que le manuel d’utilisation?
Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation Planet 802.11g Wireless Broadband Router WRT-410 décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.
Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.
Donc, ce qui devrait contenir le manuel parfait?
Tout d'abord, le manuel d’utilisation Planet 802.11g Wireless Broadband Router WRT-410 devrait contenir:
- informations sur les caractéristiques techniques du dispositif Planet 802.11g Wireless Broadband Router WRT-410
- nom du fabricant et année de fabrication Planet 802.11g Wireless Broadband Router WRT-410
- instructions d'utilisation, de réglage et d’entretien de l'équipement Planet 802.11g Wireless Broadband Router WRT-410
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes
Pourquoi nous ne lisons pas les manuels d’utilisation?
Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage Planet 802.11g Wireless Broadband Router WRT-410 ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles Planet 802.11g Wireless Broadband Router WRT-410 et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service Planet en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées Planet 802.11g Wireless Broadband Router WRT-410, comme c’est le cas pour la version papier.
Pourquoi lire le manuel d’utilisation?
Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif Planet 802.11g Wireless Broadband Router WRT-410, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.
Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation Planet 802.11g Wireless Broadband Router WRT-410. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.
Table des matières du manuel d’utilisation
-
Page 1
80 2 .11g W ir e les s Broadband Router WRT-410 User ’ s Manual[...]
-
Page 2
Co p y right Copyright 2003 by PLANE T T echnology Corp . A ll righ t s r eserved . No par t of t his publication ma y be reproduced, t r ansmit t ed, t r anscribed, s t ored in a ret r ieval system, or translated into any language or compu t er language , in any form or by any means , electronic, mechanical , magne t ic, optical , chemical, ma[...]
-
Page 3
Federal Communication Commissio n (FCC) Radiation Exposure Statement This equipment complies w ith FCC radia t ion e x posure set f orth for an uncontrolled envi r onment. In orde r to avoid the possibility of e x ceeding the FCC r adio f r equency e x posure limi t s , human p r o x imity to the an t enna shall not be less than 20 cm(8 inches) dur[...]
-
Page 4
T A BLE OF CONTENTS C H A P T ER 1 IN T RODUC T I O N ................................................................................................. .1 1.1 P ACKAGE C ON T ENTS ........................................................................................................ .1 1.2 S YSTEM R EQUIREME N TS ..................................[...]
-
Page 5
3.5. 5 Fire w all R u l e .......................................................................................................... . 25 3.6 M ANAGEMENT ................................................................................................................ . 26 3.6. 1 S N M P ...............................................................[...]
-
Page 6
- 1 - Chapter 1 I ntroduction Thank you f or purchasing W R T -410. This device features the latest innovation w ireless technology making the w ireless net w orking w orld happened . This manual guides you on ho w to ins t all and properl y use t he W R T -410 in order to t ake full advan t age of i t s features. 1.1 Package Con t ents M ake sure [...]
-
Page 7
- 2 - 1.4 Speci f ica t ion S t a n dards IEEE 8 02 . 11b , IEEE 8 0 2. 1 1g Si g n a l T y pe DSSS ( D irect Seq u ence S p read Spectru m ) Mod u la t i o n BPSK / QPSK / C C K / OF D M Port W A N: 10/1 0 0Base- T X (RJ-45) * 1 LAN: 10 / 10 0 Base- T X (RJ- 4 5) * 4 Ant e nna One Detacha b le D i p ole An t enna Ant e nn a Gain 2dBi Output P o we[...]
-
Page 8
- 3 - 1.5 W ireles s P e rf o rmance The follo w ing info r ma t ion w ill help you utilizing t he w ireless performance, and opera t ing co v erage of W R T -410. 1. Site se l ection T o avoid interfe r ences , please locate W R T -410 and w ireless clien t s a w ay from trans f orme r s, mic r o w ave ovens, heavy-duty moto r s, refrigerato r s, [...]
-
Page 9
- 4 - Chapter 2 H ard w a re Installation Before you p r oceed w ith the ins t allation, it is necessary that you have enough info r ma t ion about the W R T -410. 2.1 H a r d w a re Connection 1. Locate an opt i mum loca t ion for the WR T - 410. T h e be s t place fo r your W R T -410 is usually a t the cente r of your w ireless ne tw ork, w ith [...]
-
Page 10
- 5 - Chapter 3 C onf i gure through Web Br o w ser W eb configura t ion provides a user-f r iendly graphical user in t erface ( w eb pages ) to manage you r W R T -410. A W R T -410 w ith an assigned I P add r ess w ill allo w s you to monitor and configure via w eb bro w ser (e.g. , M S Internet E x plorer o r Ne t scape). 1. Open your w eb bro w[...]
-
Page 11
- 6 - This page enables you to se t LAN and DHCP properties, such as the host name , IP address, subne t mask, and domain name. L A N and DHCP profiles are lis t ed in the DHCP table a t the bottom o f the screen. Host Name: Type the host name in the te x t bo x . The host name is r equired by some ISP s. The defaul t host name is "AP-Router .[...]
-
Page 12
- 7 - M A C A ddress: If required b y your ISP , type the M AC address fo r the W RT-410 W A N in t erface in this field. Y ou can also copy the MAC address of your PC ’ s ne tw ork card to t he W RT - 410 W A N inter f ace b y clicking “ Clone M AC address ” . W hen using PPPoE, en t er the follo w ing info r mation in t he fields ( some in [...]
-
Page 13
- 8 - W hen using PPT P , enter the f ollo w ing info r ma t ion in t he f ields (some information are pro v ided by your ISP): IP A ddress: Type the IP add r ess w hich your ISP provides . Subnet Mask: Type the Subnet M ask w hich your ISP provides. Gate wa y: Type the IP address of Ga t e w ay w hich your ISP provides. Server IP: Type the IP addr[...]
-
Page 14
- 9 - A dministrator: Type the pass w ord the Administrato r w ill use to login to the sys t em . The pass w ord mus t be typed again for confi r ma t ion. User: Users can type a pass w ord t o be used fo r logging in t o the system. The pass w ord mus t be typed again for con f irmation. 3.1.4 T ime This screen enables you to set the time and date[...]
-
Page 15
- 10 - 3.1.5 D y namic DNS Y ou can configure W R T -410 t o use DDNS service if you already have a regis t ered DDNS account. DDN S : Y ou can enable or disable DDNS func t ion here. Server A ddress : Please type in t he url of you r DDNS ser v ice provide r . Currently, W RT - 410 suppor t s DynDNS only, thus you have t o key in “ ww w .dyndns.[...]
-
Page 16
- 11 - Enable/D i sable: Enable or disable w ireless LAN via t he W R T-410. SSID: Type an SSID in the field . The SSI D o f any w ireless device mus t ma t ch the SSI D typed here in order f or the w ireless device t o access the LAN and W A N via the W RT - 410. Channel: Select a w ork channel for w ireless communications. The channel of any w ir[...]
-
Page 17
- 12 - Lifetime : Select prope r time interval from t he d r op-do w n list. Once t he life t ime e x pires, t he Encryption key w ill be rene w ed by RADIUS server automatically. Encr y ption K e y : Select the E ncryption key length t o be 64 - bits or 128-bits. RADIUS Server 1 : Enter the IP address, communicate port number, and shared sec r e t[...]
-
Page 18
- 13 - Beacon Interval: Type the beacon interval in the field . Y ou can specify a value from 20 to 1000. The default beacon interval is 100 . RTS Threshold: Type the RTS (Request-To-Send ) th r eshold in the f ield. This value stabilizes da t a f lo w. If data flo w is irregular , choose values bet w een 1 and 2346 until data flo w is normalized. [...]
-
Page 19
- 14 - Firm w a r e Version : Displays the lates t build o f the W RT-410 f irm w are inter f ace. Af t er upgrading the firm w are in Tools -> Fi r m w are, check this to ensure t hat you r firm w are w as successfully upgraded. L A N : This field displays the W RT-410 LAN inte r face M AC address, IP address, subnet mask, and DHC P server sta [...]
-
Page 20
- 15 - First Page : Vie w the f irst page of the log message list. Last Page : Vie w the last page of the log message list. Previous Page: Vie w the page just before the current page . Next Page : Vie w the page jus t after t he current page. Clear Log : Delete the conten t s of t he log and begin a ne w log. Refresh: Rene w log s t atistics . Time[...]
-
Page 21
- 16 - SMTP Server : Type the SMTP server address f or the email that the log w ill be sent t o in the ne x t field. Send to : Type an email address for t he log to be sent to. C lick “ Email Log Now ” to send the current log immediately. S y slog Server : Type the I P address of t he Syslog Server if you w ant the W RT-410 t o lis t en and rec[...]
-
Page 22
- 17 - Click “ Reset ” to erase all s t a t istics and begin logging s t atistics again. Utilization: Separates packe t transmission statistics in t o send and receive categories. Peak indicates the ma x imum packet transmission reco r ded since logging began, w hile Average indicates t he average o f the to t al packet transmission since recor[...]
-
Page 23
- 18 - Ne t w ork A ddress : Type the static IP add r ess your net w ork uses to access t he In t ernet . Y our ISP or net w ork administ r ator p r ovides you w ith this in f ormation. Ne t w ork Mask : Type the ne tw ork (subnet) mask fo r your net w ork. I f you do not type a value he r e, t he net w ork mask de f aul t s t o 255.255.255.255. Y [...]
-
Page 24
- 19 - N A T : Select the op t ion to enable o r disable NAT. Transmit : Select t he option to set t he desired t r ansmit pa r amete r s. Disabled , RIP 1 o r R I P 2. Receive : Select t he option to set t he desi r ed t r ansmi t parameters . Disabled, RIP 1 or RIP 2. 3.4.3 Routing T able This screen w ill sho w you t he routing t able o f W R T [...]
-
Page 25
- 20 - 3.5 A ccess 3.5.1 Filte r s This screen enables you to allo w and deny user access based upon the filte r s you set. I f MAC Filte r s i s selected, the screen appea r s as belo w . M A C Filter: Enables you to allo w or deny In t erne t access f o r users w ithin the LA N based upon the M AC address of their net w ork in t er f ace. C lick [...]
-
Page 26
- 21 - The follo w ing screen appea r s once you select I P Filte r s . It enables you to de f ine a minimum and ma x imum IP address r ange filter; all IP addresses falling in the range are not allo w ed Internet access . The I P filter p r ofiles are lis t ed in the t able a t the bot t om of the page. Note: W hen selecting i t ems in the t able [...]
-
Page 27
- 22 - Select Domain B locking, and t he follo w ing screen appea r . Domain Blocking : There are three options in this f ield. S elect the proper setting acco r ding t o you r demand. Permitted Domains : Ente r the domain name in the te x t field, and click “ Add ” but t on to add it to t he lis t . Blocked Domains : Enter the domain name in t[...]
-
Page 28
- 23 - Note: W hen selecting i t ems in the t able at t he bottom, click any w here in the item. The line is selected, and the fields automatically load t he item ' s pa r ameters, w hich you can edit. Protocol Fil t er : Enables you t o allo w or deny In t erne t access to use r s based upon t he communications protocol of the origin. Click t[...]
-
Page 29
- 24 - Public Port: Type the port number on the W A N t hat w ill be used to p r ovide access to the virtual server. L A N Server: Type the LAN I P address tha t w ill be assigned to the vi r tual server. A d d: Click to add the virtual server to the table at the bottom of the screen. Update : Click t o update info r mation for t he virtual server [...]
-
Page 30
- 25 - 3.5.4 DMZ This screen enables you to c r eate a D M Z for those compu t ers that cannot access In t ernet applica t ions prope r ly through the W R T -410 and associated secu r ity se t tings. Enable : Click to enable or disable the D M Z. DMZ Host IP: Type a host I P address for t he D M Z. The compu t er w ith this IP address acts as a D M[...]
-
Page 31
- 26 - Enable : Click to enable or disable the f ire w all rule p r ofile. Name : Type a desc r iptive name fo r the fire w all r ule profile . A ction : Select w hether to allo w or deny packets that confo r m to t he rule. Source : Defines the source o f the incoming packet t hat t he r ule is applied t o. Interface : Select w hich in t erface ( [...]
-
Page 32
- 27 - Enabled/D i sab l ed : Click to enable or disable SN M P. By default is disabled. S y stem Name: Displays the name given t o the W RT-410. S y stem Location : Displays the location of the W RT-410 (normally, t he DNS name ) . S y stem Contact: Displays the con t act in f ormation for t he pe r son r esponsible for the W RT-410. Communi t y :[...]
-
Page 33
- 28 - Enable : Click to enable or disable HTTP access for remo t e management. Remote IP Range: Type the r ange of IP addresses t hat can be used f or remote access. A llo w s t o Ping W A N Port : T h is func t ion allo w s remo t e use r s to ping W RT-410 W A N port I P address. Enable : Click to enable or disable W A N port pinged function. Re[...]
-
Page 34
- 29 - Save Settings : Click to save t he current configuration as a profile tha t you can load w hen necessary. Load Settings: Click “ B r o w se ” and go to the location of a s t ored profile. Click Load t o load the p r ofile's settings. Restore Fac t or y Default Settings : Click t o restore t he de f ault set t ings. All configuration[...]
-
Page 35
- 30 - 3.8 W izard The setup w izard enables you to configure the W RT-410 quickly and conveniently. Click “ W izard ” button, the w indo w belo w w ill appea r . Please click “ Ne x t> ” and follo w the steps to configu r e W RT-410. Y ou are promp t ed to select a pass w ord. Type a pass w ord in t he t e x t bo x , and then type it ag[...]
-
Page 36
- 31 - Chapter 4 802 . 1X A uthenticat i on Setup 4.1 8 02. 1 X Infra s tructure An 802.1 X Infrastructu r e is composed o f three majo r componen t s: Authenticato r , Au t hen t ication serve r , and Supplicant. A uthentication server: An entity t hat provides an authentication service to an authenticator . This service de t ermines, from the cre[...]
-
Page 37
- 32 - 6. The client validates the digi t al cer t ificate, and replies i t s o w n digi t al cer t ifica t e to t he R A DIUS serve r . 7. The RADIUS server valida t es client ’ s digi t al cer t ificate. 8. The client and RADIUS se r ver derive encryption keys. 9. The RADIUS server sends W R T -410 a RADIUS ACCEP T message, including t he clien[...]
-
Page 38
- 33 - 6. Enter the info r ma t ion tha t you w ant for your Ce r tifica t e Service, and click “ Next ” to continue . 7. Go to S t art > Program > A dministra t ive Tools > Certif i cate A uthori t y . 8. Right-click on the “ Poli c y S etting ” , select “ new ” . 9. Select “ Certi f ica t e to Issue ” . 10. Selec t “ A [...]
-
Page 39
- 34 - 11. Go to Start > Program > A dministrative Tools > A ctive Director y Users and Computers . 12. Right-click on domain, and select ” Properties ” to con t inue. 13. Selec t “ Group Pol i cy ” tab and click “ Properties ” to con t inue .[...]
-
Page 40
- 35 - 14. Go to “ Compu t er Configuration ” > “ Securi t y Settings ” > “ Public K e y Policies ” 15. Right-click “ A utomatic Certificate Request S etting ” , and select “ New ” 16. Click “ A utomatic Certif i cate Request ... ”[...]
-
Page 41
- 36 - 17. The Au t oma t ic C erti f icate Request Setup W iza r d w ill guide you th r ough the Automa t ic Certi f icate Request setup , simply click “ Next ” th r ough to t he last step. 18. Click “ Fin i sh ” to complete the Au t omatic Certi f icate Request Setup 19. Go to Start > Run , and type “ command ” and click “ Enter [...]
-
Page 42
- 37 - Setting In t ernet Authenticat i on Service 24. Go to Start > Program > A dministrative Tools > Inte r net A uthentication Service . 25. Right-click “ Cl i ent ” , and select “ N e w C l ient ” . 26. Enter the IP address of W RT-410 in the Cl i ent address te x t field, a memo r able name f or W RT-410 in the Client-Vendor t[...]
-
Page 43
- 38 - 28. In the Inte r net Authentication Service, right - click “ R emo t e A ccess Pol i cies ” 29. Selec t “ New Remote A ccess Pol i cy ” . 30. Selec t “ D a y - A nd-Time-Restriction ” , and click “ A dd ” to continue .[...]
-
Page 44
- 39 - 31. Unless you w ant to specif y the active dura t ion for 802.1 X authentication, click “ OK ” to accept for having 802.1 x authentication enabled a t all times. 32. Selec t “ Grant remo t e access pe r miss i on ” , and click “ Next ” to continue.[...]
-
Page 45
- 40 - 33. C lic k “ Edit Profile ” . For TLS Authenticat i on Setup (Steps 34 ~ 35 ) 34. Selec t “ A uthentication ” Tab. 35. Enable “ Extensible A uthentication Protocol ” , and select “ Smart C ard or other Cert i ficate ” f or TLS au t hen t ication. Click “ OK ” . Then go t o step 38.[...]
-
Page 46
- 41 - For M D5 Authentication S e t up (Steps 36 ~ 37 ) 36. Selec t “ A uthentication ” Tab. 37. Enable “ Extensible A uthentication Protocol ” . Select “ MD5-Challenge ” and enable “ E ncr y pted A uthentication (CH A P) ” for MD5 authentication. Click “ OK ” .[...]
-
Page 47
- 42 - 38. Selec t “ Internet A uthentication Service (Local) ” , click on “ Action ” f r om t op panel. Then click “ Register Service i n A ctive Directory ” . 39. Go to Start > Program > A dministrative Tools > A ctive Director y Users and Computers. 40. Right click on the domain, and select “ Properties ” . 41. Selec t ?[...]
-
Page 48
- 43 - 42. Go to “ Computer Conf i guration ” > “ Windows S ettings ” > “ Securi t y Settings ” > “ A ccount Policies ” > “ Password Pol i c i es ” . D ouble click on “ S t ore password us i ng reversib l e enc r y ption for all users in the domain ” .[...]
-
Page 49
- 44 - 43. Click “ Define this poli c y s etting ” , select “ E nab l ed ” , and click “ OK ” to continue . 44. Go to Start > Program > A dministrative Tools > A ctive Director y Users and Computers . 45. Go to Users . R ight - click on the use r tha t you are granting access, and selec t “ Propert i es ” . 46. Go to “ A [...]
-
Page 50
- 45 - 48. Go to the “ Dial-in ” tab , and check “ A llo w access ” op t ion for Remote Access Pe r mission and “ No Call-back ” for Callback Options. Then click “ OK ” .[...]
-
Page 51
- 46 - 4.3 A uthenticator Setup 1. For E A P-MD5 Au t hen t ication, W E P key must be set previously. Go t o Wireless> A uthentication. Enable W E P key, and ente r a desi r ed key string. Y ou can skip this step i f using E A P-TLS Authen t ication . 2. Click on 802.1X for detailed con f iguration. 3. Enable 802 . 1 X Authentica t ion by selec[...]
-
Page 52
- 47 - 6. En t er the IP address, Por t number, and S hared Secre t K e y used by the Secondar y Radius Server. 7. Click “ A pp ly ” . The 802.1 x settings w ill t ake effect r igh t af t er W RT-410 reboo t s i t sel f. 4.4 W ireles s Clie n t Setup W indo w s XP is originally 802 . 1 X support . As t o o t her opera t ing sys t ems ( w indo w[...]
-
Page 53
- 48 - 5. Click “ Properties ” of one a v ailable w ireless net w ork, w hich you w ant to associate w ith . 6. Select “ Da t a encr y ption (WEP enabled ) ” option, but leave othe r op t ions unselected .[...]
-
Page 54
- 49 - 7. Enter the net w ork key in “ N e t w ork k ey ” t e x t bo x . The string must be t he same as the fi r st set o f W E P key w hich you set t o W RT-410. 8. Click “ OK ” . 9. Select “ A uthentication ” tab. 10. Selec t “ Enab l e ne t work access contro l using IEEE 802.1X ” to enable 802 . 1 x authentica t ion. 11. Selec [...]
-
Page 55
- 50 - 12. Click “ OK ” . 13. W hen w ireless client has associated w ith W RT - 410, a user authen t ica t ion no t ice appears in system tray. Click on the no t ice to continue. 14. En t er the user name , pass w ord and the logon domain t hat your account belongs. 15. Click “ OK ” to comple t e the valida t ion process. 4.4.2 E A P-TLS A[...]
-
Page 56
- 51 - CA server. Fu r the r more , you mus t have a valid account/pass w ord to access the server . 1. Ac t ive w eb bro w ser, en t er “ http:/ / 192 . 168 . 1.10/ce r tsrv ” in t he Add r ess field w hich 192.168.1.10 is the IP address of our server. This w ill directly access t o Cer t ifica t e Service of a W indo w s 2000 server. A dialog[...]
-
Page 57
- 52 - 5. Click “ Submit > ” to con t inue. 6. The Certi f icate Service is no w processing the cer t ificate request.[...]
-
Page 58
- 53 - 7. The cer t ifica t e is issued by t he server, click “ Install t his certificate ” t o do w nload and sto r e the certi f icate t o your local compu t er. 8. Click “ Y es ” to s t ore the certifica t e to your local computer . 9. Certi f icate is no w installed. Wireless Adapter S etup 1. Go to S t art > Control P anel, double -[...]
-
Page 59
- 54 - 2. Right-click on the W ireless Net w ork Connection w hich using W L - 3555. 3. Click “ Properties ” to open up the P r oper t ies setting w indo w . 4. Click on the “ Wireless Ne t work ” t ab. 5. Click “ Properties ” of one a v ailable w ireless net w ork, w hich you w ant to associate w ith .[...]
-
Page 60
- 55 - 6. Select “ The k e y is provided for me automatica l ly ” option. 7. Click “ OK ” .[...]
-
Page 61
- 56 - 8. Click “ A uthentication ” tab 9. Select “ Enable ne t work access control using IEEE 802 . 1X ” op t ion t o enable 802.1 x authen t ica t ion. 10. Selec t “ Smart Card or other Certificate ” from the drop-do w n list bo x for EAP type. 11. Click “ OK ” . 12. W hen w ireless client has associated w ith W RT - 410, W indo w[...]
-
Page 62
- 57 - 13. Selec t the cer t ifica t e that w as issued by the server (in ou r demons t ration: W irelessCA), and click “ OK ” to continue. 14. M ake su r e this cer t ificate is issued by correct server, and click “ OK ” to complete the au t hentica t ion process.[...]
-
Page 63
- 58 - Chapter 5 Troubleshooting This chapter provides solutions to problems usually encoun t ered during the ins t alla t ion and ope r ation of the Wireless Broadband Router . Read t he descrip t ion belo w to solve your problems. 5.1 F requent l y A s ked Questions What is W P A (Wi-Fi Protected A ccess)? W P A resolves the issue of w eak W E P [...]
-
Page 64
- 59 - This ne w produc t s use the A CX 100 chip from T e x as Instrumen t s. In addition to mee t ing t he e x isting s t andard, t he chip also suppo rt s a ne w modulation scheme developed by TI, called Packet Binar y Convolution C ode (PBCC). I t's t his scheme that gives the produc t s the e x tra kick : Even at lo w e r speeds, PBCC pro[...]
-
Page 65
- 60 - DNS DNS s t ands for D omain Name Sys t em . DNS conver t s machine names to the I P add r esses tha t a l l machines on the net have. It t r anslates from name to address and from address t o name . DOM A IN N A ME The domain name typically re f ers to an I nte r net site add r ess . DTIM DT I M ( Delivery T ra f fic I ndication M essage) p[...]
-
Page 66
- 61 - IP I P (Internet Pro t ocol) is the protocol in the TCP/I P communications protocol suite that con t ains a net w or k address and allo w s messages to be routed to a di f ferent net w ork or subnet. H o w eve r , I P does not ensu r e delivery of a complete message — TC P provides the f unction of ensuring deliver y . IP A DDRESS The I P [...]
-
Page 67
- 62 - PING Ping (Packet INte r net Groper) is a utility used to find out if a p articular I P address is present online, and is usually used by net w orks f or debugging. PORT Por t s a r e the communications pa t h w ays in and out of compu t ers and net w ork devices (route r s and s w itches ) . M ost PCs have se r ial and p arallel por t s, w [...]
-
Page 68
- 63 - w ith an incoming I P address to dete r mine w hether t o accept or reject t he p acket. SYSLOG SERVER A SysLog server monitors incoming Syslog messages and decodes the messages f or logging purposes. TCP ( T ransmission C ontrol P r otocol) is the t r anspor t pro t ocol in TCP/I P t ha t ensures messages ove r th e net w ork are t r ansmit[...]
-
Page 69
- 64 - W LAN. W AN W A N ( W ide Area Net w ork ) is a communica t ions net w ork t hat covers a w ide geographic area such as a country (cont r as t ed w ith a L A N, w hich cove r s a small area such as a com p any building).[...]