Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/newdedyk/domains/bkmanuals.com/public_html/includes/pages/manual_inc.php on line 26
Edimax AR-7284WNB manuale d’uso - BKManuals

Edimax AR-7284WNB manuale d’uso

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97

Vai alla pagina of

Un buon manuale d’uso

Le regole impongono al rivenditore l'obbligo di fornire all'acquirente, insieme alle merci, il manuale d’uso Edimax AR-7284WNB. La mancanza del manuale d’uso o le informazioni errate fornite al consumatore sono la base di una denuncia in caso di inosservanza del dispositivo con il contratto. Secondo la legge, l’inclusione del manuale d’uso in una forma diversa da quella cartacea è permessa, che viene spesso utilizzato recentemente, includendo una forma grafica o elettronica Edimax AR-7284WNB o video didattici per gli utenti. La condizione è il suo carattere leggibile e comprensibile.

Che cosa è il manuale d’uso?

La parola deriva dal latino "instructio", cioè organizzare. Così, il manuale d’uso Edimax AR-7284WNB descrive le fasi del procedimento. Lo scopo del manuale d’uso è istruire, facilitare lo avviamento, l'uso di attrezzature o l’esecuzione di determinate azioni. Il manuale è una raccolta di informazioni sull'oggetto/servizio, un suggerimento.

Purtroppo, pochi utenti prendono il tempo di leggere il manuale d’uso, e un buono manuale non solo permette di conoscere una serie di funzionalità aggiuntive del dispositivo acquistato, ma anche evitare la maggioranza dei guasti.

Quindi cosa dovrebbe contenere il manuale perfetto?

Innanzitutto, il manuale d’uso Edimax AR-7284WNB dovrebbe contenere:
- informazioni sui dati tecnici del dispositivo Edimax AR-7284WNB
- nome del fabbricante e anno di fabbricazione Edimax AR-7284WNB
- istruzioni per l'uso, la regolazione e la manutenzione delle attrezzature Edimax AR-7284WNB
- segnaletica di sicurezza e certificati che confermano la conformità con le norme pertinenti

Perché non leggiamo i manuali d’uso?

Generalmente questo è dovuto alla mancanza di tempo e certezza per quanto riguarda la funzionalità specifica delle attrezzature acquistate. Purtroppo, la connessione e l’avvio Edimax AR-7284WNB non sono sufficienti. Questo manuale contiene una serie di linee guida per funzionalità specifiche, la sicurezza, metodi di manutenzione (anche i mezzi che dovrebbero essere usati), eventuali difetti Edimax AR-7284WNB e modi per risolvere i problemi più comuni durante l'uso. Infine, il manuale contiene le coordinate del servizio Edimax in assenza dell'efficacia delle soluzioni proposte. Attualmente, i manuali d’uso sotto forma di animazioni interessanti e video didattici che sono migliori che la brochure suscitano un interesse considerevole. Questo tipo di manuale permette all'utente di visualizzare tutto il video didattico senza saltare le specifiche e complicate descrizioni tecniche Edimax AR-7284WNB, come nel caso della versione cartacea.

Perché leggere il manuale d’uso?

Prima di tutto, contiene la risposta sulla struttura, le possibilità del dispositivo Edimax AR-7284WNB, l'uso di vari accessori ed una serie di informazioni per sfruttare totalmente tutte le caratteristiche e servizi.

Dopo l'acquisto di successo di attrezzature/dispositivo, prendere un momento per familiarizzare con tutte le parti del manuale d'uso Edimax AR-7284WNB. Attualmente, sono preparati con cura e tradotti per essere comprensibili non solo per gli utenti, ma per svolgere la loro funzione di base di informazioni e di aiuto.

Sommario del manuale d’uso

  • Pagina 1

    [...]

  • Pagina 2

    ii English Copyright © by Edimax T echnology Co, L TD. all rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, m agnetic, optical, chemical, manual or otherwise, without the [...]

  • Pagina 3

    iii Notice according to GNU/GPL-V ersion 2 This product includes software that is subject to the GNU/GPL-Version 2. You find t he text of the license on the product cd/dvd. The program is free software and distributed without any warranty of the author. We offer, val id for at least three years, to give you, for a charge no more than the costs of p[...]

  • Pagina 4

    i Contents 1 Introduction ......................................................................................... 1 1.1 Package List ....................................................................... 2 1.2 Safety Caut ions .................................................................. 3 1.3 LEDs and Inte rfaces ..........................[...]

  • Pagina 5

    ii 3.3.5 Filtering Op tions ....................................................... 47 3.3.6 QoS Configur ation ................................................... 52 3.3.7 Firewall Se ttings ...................................................... 56 3.3.8 DNS ......................................................................... 57 3.3.9 Dynamic[...]

  • Pagina 6

    1 1 Introduction The AR-7284WnA supports Annex A mode. It provides four 10/100 base-T Ethernet ports for user . The device provi des high-speed ADSL2+ broadband connection to the Internet or Intranet for high-end users, such as net bars and o ffice users. It provides high performance access to the Internet, downstream up to 24 Mbps and upstream up [...]

  • Pagina 7

    2 1.1 Package List 1 x AR-7284WnA or AR-7284WnB 1 x external splitter 1 x power adapter 2 x telephone cables (RJ-1 1) 1 x Ethernet cable (RJ-45) 1 x Quick Installation Guide(QIG) 1 x CD (Multi-langu ages EZmax Wiard / QIG , USB driver & English Manual)[...]

  • Pagina 8

    3 1.2 Safety Cautions Follow the following instructions to prevent the device from risks and damage caused by fire or electric power: Use volume labels to mark the type of power . Only use the power adapter packed within the device package. Pay attention to the power l oad of the electric outlet or power extension cord. An overload ed power outlet [...]

  • Pagina 9

    4 1.3 LEDs and Interfaces Front Panel Figure 1 Front panel The following table describes the LEDs of the device. LED Colo r Statu s Description Green Off The power is off. On The power is on and the initialization is normal. Red On The device is initiating. Blinks The firmware is upgrading. LAN 1/2/3/4 Green Off No LAN link. Blinks Data is being tr[...]

  • Pagina 10

    5 LED Colo r Statu s Description mode, DSL connection is not present, or the power is off. On Connected to network. Red On Network connection failed. WPS Green On The WPS indicator will light for 5 minutes after the WPS service is registered successfully . Blink Green The W PS indicator will light for 0.2s, and then off for 0.1s when the WPS button[...]

  • Pagina 11

    6 Rear Panel Figure 2 Rear panel The following table describes the interface of the de vice. Interface/Button Description Line RJ-1 1 interface that connects to the telephone set through the telephone cabl e. WPS/Reset Press the button for 3 seconds to enab le WPS. Press the button for 8 seco nds to restore factory default confi gurations and reboo[...]

  • Pagina 12

    7 Internet Explorer V5.0 or higher , Netscape V4.0 or highe r , or Firefox 1.5 or higher 1.5 Features The device supports the following features: V arious line modes External PPPoE dial-up access Internal PPPoE and PPPoA dial-up access Leased line mode Zero installation PPP bridge mode (ZIPB) 1483B, 1483R, and MER access Multiple PVCs (up to eight)[...]

  • Pagina 13

    8 2 Hardware Installation 2.1 Connecting the ADSL Router Step 1 Connect the ‘Line’ port of the device and the ‘Modem’ port of the ADSL splitter with a telephone cable. Connect the phone to the ‘Phone’ port of the splitter through a telephone cable. Connect the incoming line to the ‘Line’ port of the splitter . The splitter has three[...]

  • Pagina 14

    9 Figure 3 Connection diagram ( without telephone sets before the split ter) Connection type 2: Figure 4 disp lays the application diagram for the connection of the devic e, PC, splitter and telephone sets when a telephone set is placed before the splitter . As illustrated in the following figure, the splitter is installed close to the device. Figu[...]

  • Pagina 15

    10 Installing a telephone before the splitter may cause connection problem between the device and the central office, or failure of Internet access, or slow connection speed. If you really need to add a telephone set before the s plitter , you must add a microfilter before a telephone set. Do not connect several telephones before the splitter or co[...]

  • Pagina 16

    11 Step 5 The dialog will instruct you to choose driver from specific location.[...]

  • Pagina 17

    12 3 About the Web Configurator This chapter describes how to configure the device by the Web-based configuration utility . 3.1 Access the Device Follow the following instructions to access the device for the first time. Step 1 Open the Internet Explorer (IE) browser and enter http://192.168.2.1 . Step 2 The Login page shown in the following figure[...]

  • Pagina 18

    13 If you successfully logged in as the super user , the web page as shown in the following figure appears. 3.2 Setup 3.2.1 Wiz ar d Wizard enables fast and accurate configuration of Internet connection and other important parameters. The followin g sections describe these c onfiguration parameters. When subscribing to a broadband service, you shou[...]

  • Pagina 19

    14 Step 1 Choose Setup > Wiz ard . The page shown in the following figure appears. Step 2 Click Setup Wizard . The p age shown in the following figure appears. Step 3 There are four steps to configure the device. Click Next to continue.[...]

  • Pagina 20

    15 Step 4 Set the time and date.[...]

  • Pagina 21

    16 Step 5 Configure the Internet connection. Select the country and ISP . Se t the VPI and VCI. If you failed to find the country and ISP from the drop-down lists, select Others . Click Next . If the Protocol you selected is PPPoE or PPPoA, the page shown in either of the two following figures appears.[...]

  • Pagina 22

    17 Set the user name and password here,which is provided by your ISP . If the Protocol is Dyna mic IP , the page shown in the following figure appears. Click Next , the page shown in the following figure appears.[...]

  • Pagina 23

    18 Configure the wireless network. Enter the information and click Next .[...]

  • Pagina 24

    19 If the Protocol is Bridge , the page shown in the following figure appears.[...]

  • Pagina 25

    20 If the Protocol is Stati c IP , the page shown in the following figure appears.[...]

  • Pagina 26

    21 Enter the IP Address , Subnet Mask , Default Gatew ay , and Primary DNS Server . Click Next . The page shown in the following page appears. Figure 5[...]

  • Pagina 27

    22 Step 6 Configure the wireless netwo rk. Enter the information and click Next . Step 7 When the settings are complete, click Apply to apply the settings. Note: In each step of the Wizard page, you can click Back to review or modify settings in previous page. Click Cancel to exit the wizard page.[...]

  • Pagina 28

    23 3.2.2 Internet Setup Choose Setup > Internet Setup . The page shown in the following figure appears. In this page, you can co nfigure the W AN interface of the device. Click Add . The p age shown in the following figure appears.[...]

  • Pagina 29

    24 Click Apply . The page shown in the following figure appears.[...]

  • Pagina 30

    25 3.2.3 Wireless Setup This section describes the wireless LAN and some basic configuration. Wireless LANs can be as simple as two computers with wireless LAN cards communic ating in a pear-to-pear network or as complex as a number of computers with wireless LAN cards communicating through access point which bridges network traffic to wired LAN. C[...]

  • Pagina 31

    26 3.2.3.1 Wireless Basics In the Wireless Setup page, click Wireless Basics . The page shown in the following figure appears. In this p age, you can configure the parameters that wi reless LAN clients can used to connect to this device. Click Apply to save the settings.[...]

  • Pagina 32

    27 3.2.3.2 Wireless Security In the Wireless Setup page, click W ireless Security . The page shown in the following figure appears. Wireless security is vital to your network to protect the wireless communication among wireless stations, access point s and wired network. Click Apply to save the settings.[...]

  • Pagina 33

    28 3.2.4 Local Network Y ou can configure the LAN IP address according to actual requirements. The preset IP address is 192.168.1.1. Y ou can use the default settings and DHCP service to manage the IP settings for the private network. The IP address of the device is the base address used for DH CP . T o use the device as DHCP server on your LAN, th[...]

  • Pagina 34

    29 the pool used for DHCP . The IP address pool can contain up to 253 IP addresses. Click Apply to save the settings. In the Local Network page, you can assign IP addresses on the LAN to specific individual computers based on their MAC addresses. Click Add to add st atic DHCP addresses (optional). The page shown in the following figure appears. Sel[...]

  • Pagina 35

    30 The NUMBER OF DYNAMIC DHCP CLIENTS page shows the current DHCP clients (PC or Laptop) connected to the device and the detailed info rmation of the connected computer(s). 3.2.5 T ime and Date Choose Setup > Time and Date . The p age shown in the following figure appears. In the Time and Date page, you can setup the time of the internal system [...]

  • Pagina 36

    31 Select the specific time serv er and the time zone from the corresponding item in drop-down lists. Select Enable Daylight Saving if necessary . Click Apply to save the settings. 3.2.6 Logout Choose Setup > Logout . The page shown in the following figure appears. In this page, you can log out from web configuration menu. 3.3 Advanced This sect[...]

  • Pagina 37

    32 your wireless performan ce. The default settings provide the best wireless radio performance in most of environments.[...]

  • Pagina 38

    33 3.3.1.1 Advanced Settings Select Advance Settings. The page shown in the following figure appears. These settings are only for technically advanced users who have sufficient knowledge about wireless LAN. Do not change these settings unless you know the effect of changes on the device.[...]

  • Pagina 39

    34 Click Apply to save the settings. 3.3.1.2 MAC Filtering Select MAC Filtering . The page shown in the follo wing figure appears.[...]

  • Pagina 40

    35 Click Add . The page shown in the following figure appears. Click Apply to save the settings.[...]

  • Pagina 41

    36 3.3.1.3 Security Settings Select Security Settings . The page shown in the following figure appears. Select the SSID that you wa nt to configure from the drop-down list. Select the encryption type from the Security Mode drop-down list.Y ou can select None , WEP , AUTO (WP A or WP A2) , WP A Only , or WP A2 Only . If you select WEP , the page sho[...]

  • Pagina 42

    37 If you select AUT O (WP A or WP A2) , WP A Only , or WP A2 Only , the page shown in the following figure appears.[...]

  • Pagina 43

    38 Click Apply to save the settings.[...]

  • Pagina 44

    39 3.3.1.4 WPS Settings Select WPS Settings . The page shown in the following figure appears. WPS Authentication: The WPS service is enabled by default. There are three setting methods you can use in the Wi-Fi Protected Setup. In order to use wps authentication, you can select one method from three methods. Press the WPS button on the rear panel fo[...]

  • Pagina 45

    40 3.3.2 Port Forwarding This function is used to open ports on your device and redirect data from those ports to a single PC on your network (W AN-to-LAN traffic). It allows remote users to access services on your LAN, such as FTP for file transfers or SMTP and POP3 for e-mail. The device accepts remote request s for these services at your global [...]

  • Pagina 46

    41 Select a service for a preset application, or enter a name in the Custom Server field. Enter an IP a ddress in the Server IP A ddress field, to appoint the corresponding PC to receive forwarded packets. The Ports show the ports that you want to open on the device. The TCP/UDP means the protocol type of the opened ports. Click Apply to save the s[...]

  • Pagina 47

    42 3.3.3 DMZ Since some applications are not compatible with NA T , the device supports the use of a DMZ IP address for a single host on the LAN. This IP address is not protected by NA T and it is visible to agents on the Internet with the correct type of software. Note that any client PC in the DMZ is exposed to various types of security risks. If[...]

  • Pagina 48

    43 This page provides two useful tools for restricting the Internet access. Block Websites allows you to quickly create a list of all websites that you wish to stop users from accessing. Block MAC Address allows you to control when clients or PCs connected to the device are allowed to access the Internet.[...]

  • Pagina 49

    44 3.3.4.1 Block Website In the Parent al Control p age, click Block Website . The p age shown in the following figure appears. Click Add . The p age shown in the following page appears. Enter the website in the URL field. Select the Schedule from drop-down list, or select Manual Schedule and select the corresponding time and days.[...]

  • Pagina 50

    45 Click Submit to add the website to the BLOCK WEBSITE Ta b l e . The p age shown in the following figure appears. 3.3.4.2 Block MAC Address In the Parent al Control page, click Block MAC Address . The page shown in the following figure appears. b Click Add . The p age shown in the following figure appears.[...]

  • Pagina 51

    46 Enter the user name and MAC address and select the corresponding time and days. Click Submit to add the MAC address to the BLOCK MAC ADDRESS T able .[...]

  • Pagina 52

    47 3.3.5 Filtering Options Choose AD V ANCED > Filtering Options . The Filtering Options page shown in the following figure appears. 3.3.5.1 Inbound IP Filtering By default, all incoming IP traf fi c that does not originate from the internal network is blo cked when the firewall is enabled. Normal outbound requests creat ed by web browsing, emai[...]

  • Pagina 53

    48 Click Add to add an inbound IP filter . The page shown in the following figure appears.[...]

  • Pagina 54

    49 Enter the Filter Name and specify at least one of the following criteria: protocol, s ource/destination IP address, subnet mask, and source/destination port. Click Apply to save the settings. Note: The settings only apply when the firewall is enabled. The ACTIVE INBOUND FIL TER shows detailed information about every created inbound IP filter . C[...]

  • Pagina 55

    50 In the Filtering Options p age, click Outbound IP Filtering . The page shown in the following figure appears. Click Add to add an outbound IP filter . The p age shown in the following figure appears.[...]

  • Pagina 56

    51 Enter the Filter Name and specify at least one of the following criteria: protocol, s ource/destination IP address, subnet mask, and source/destination port. Click Apply to save the settings. 3.3.5.3 Bridge Filtering In the Filtering Options page, click Bridge Filtering . The page shown in the following figure appears.This page is used to config[...]

  • Pagina 57

    52 Click Apply to save the settings. 3.3.6 QoS Configuration Choose ADV ANCED > QOS Config . The QoS Configuration page shown in the following figure appears.[...]

  • Pagina 58

    53 3.3.6.1 QoS Interface In the QoS Configuration page, click QoS Interface Config . The page shown in the following figure appears. In this p age, you can configure bandwidth control. Click Edit , the p age shown in the following figure appears. After configuration, click Apply to make configurations take effect.[...]

  • Pagina 59

    54 3.3.6.2 QoS Queue Configuration In the QoS Configuration page, click QoS Queue Config . The page shown in the following figure appears. In this p age, you can configure the priority of queue. Click Add , the page shown in the following figure appears. After configuration, click Apply to take the configurations effect. 3.3.6.3 QoS Classify Config[...]

  • Pagina 60

    55 Click Add , the page shown in the following figure appears.[...]

  • Pagina 61

    56 After configurati on is done, click Apply to make the configuration take ef fect. 3.3.7 Firewall Settings A denial-of-service (DoS) attack is characterized by an explicit attempt by attackers to preven t legitimate users from using that service. Examples include the following The attackers attempt to flood a network, thereby preventing legitimat[...]

  • Pagina 62

    57 from accessing a service The attackers attempt to disrupt service to a specific system or person. Port scan protection is designed to block attempts to discover vulnerable ports or services that might be exploited in an attack from the W AN. Choose ADV ANCED > Firewall Settings . The page shown in the following figure appears. Click Apply to [...]

  • Pagina 63

    58 the name into the corresponding IP address. For example, the domain name www .example.com might be translated to 198.105.232.4. The DNS system is, in fact, it s own network. If one DNS server does not know how to translate a particular domain name, it asks another one, and so on, until the correct IP address is returned. Choose AD V ANCED > D[...]

  • Pagina 64

    59 3.3.9 Dynamic DNS The device supports dynamic domain name service (DDNS). The dynamic DNS service allows a dynamic public IP address to be associated with a static host name in any of the many domains, and allows access to a specified host from various locations on the Internet. Click a hyperlinked URL in the form of hostname.dyndns.org and allo[...]

  • Pagina 65

    60 DDNS provider : Select one of the DDNS service provider from the down-list. Available service providers include DynDns.org and dlinkddns.com. Host Name : Enter the host name that you registered with your DDNS service provider . Username : Enter the user name for your DDNS account. Password : Enter the password for your DDNS account. Click Apply [...]

  • Pagina 66

    61[...]

  • Pagina 67

    62 3.3.10.1 Port Mapping Choose AD V ANCED > Netw ork T ools and click Port Mapping . The page shown in the following figure appears. In this page, you can bind the W AN in terface and the LAN interface to the same group. Click Add to add a new port mapping. The page shown in the following figure appears.[...]

  • Pagina 68

    63 The procedure for creating a mapping gro up is listed as follows: Step 1 Enter the group name. Step 2 Select interfaces from the A vailable Interface list and click the <- arrow button to add them to the grouped interface list, in order to create the required mapping of the ports. The group name must be unique. Step 3 Click Submit to save the[...]

  • Pagina 69

    64 3.3.10.2 IGMP Proxy Choose ADV ANCED > Network T ools and click IGMP Proxy . The page shown in the following figure appears. IGMP proxy enables the syst em to issue IGMP host messages on behalf of hosts t hat the system discovered through standard IGMP interfaces. The system act s as a proxy for its hosts after you enable it. Click Apply t o [...]

  • Pagina 70

    65 After configuration, click Apply to save the settings. 3.3.10.4 UPnP Choose ADV ANCED > Network T ools and click UPnP . The page shown in the following figure appears.[...]

  • Pagina 71

    66 In this page, you can confi gure universal plug and play (UPnP). The system acts as a daemon af ter you enable UPnP . UPnP is used for popular audio / video software. It allows automatic discovery of your devi ce in the network. If you are concerned about UPnP security , you can disable it. Block ICMP ping should be enabled so that the device wi[...]

  • Pagina 72

    67 The AR-7284WnA supports Annex A mode, so the AnnexB is not enabled. Click Apply to save the settings.[...]

  • Pagina 73

    68 3.3.10.6 SNMP Choose ADV ANCED > Network T ools and click SNMP . The page shown in the following figure appears. In this page, you can set SNMP p arameters. Read Community : The network administrator must use this password to read the information of this device. Set Community : The network administrator must use this password to configure t h[...]

  • Pagina 74

    69 3.3.10.7 TR069 Choose ADV ANCED > Network T ools and click TR-069 . The page shown in the following figure appears. In this page, you can configure the TR069 CPE. Click Apply to save settings.[...]

  • Pagina 75

    70 3.3.10.8 Certificates Choose ADV ANCED > Network T ools and click Certificates . The Certificates page shown in the following figure appears. In the Certificates page, click T rusted CA . The page shown in the following figure appears. Click In put Certificate , the page shown in the following figure appears.[...]

  • Pagina 76

    71 Click Apply to save the settings.[...]

  • Pagina 77

    72 3.3.11 Routing Choose AD V ANCED > Routing . The page shown in the following page appears. 3.3.11.1 St atic Route Choose ADV ANCED > Routing and click S t atic Route . The page shown in the following figure appears. This page is used to configure the routing informat ion. In this page, you can add or delete IP routes.[...]

  • Pagina 78

    73 Click Add to add a static route. The page shown in the following figure appears. Destination Network Address : The destination network address. Subnet Mask : The subnet mask of the destination network. Use Gateway IP Address : The gateway IP address of the destination network. User Interface : The interface name of the router output port. Y ou c[...]

  • Pagina 79

    74 Click Apply t o save the settings. 3.3.11.2 Default Gatew ay Choose ADV ANCED > Routing and click Default Gatewa y . The page shown in the following figure appears. Click Apply to save the settings.[...]

  • Pagina 80

    75 3.3.11.3 RIP Settings Choose ADV ANCED > Routing and click RIP Settings . The page shown in the following figure appears. This page is used to select the interfaces on yo ur device that use RIP and the version of the prot ocol being used. If you are using this devic e as a RIP-enabled device to communicate with others us ing the routing infor[...]

  • Pagina 81

    76 3.3.12 Schedules Choose ADV ANCED > Schedules . The page shown in the following figure appears. Click Add to add schedule rule. The page shown in the following figure appears. Click Submit to save settings.[...]

  • Pagina 82

    77 3.4 Management 3.4.1 System Choose Management > System Management . The System page shown in the following figure appears. In this page, you can reboot device, back up the current settings to a file, restore the settings from the file saved previously , and restore the factory default settings. The buttons in this page are described as follow[...]

  • Pagina 83

    78 Backup Setting : Save the settings to the local hard drive. Select a location on your computer to back up the file. Y ou can name the conf iguration file. Up date Setting : Click Browse to select the configuration file of device and click Update Settings to begin restoring the device configuration.. Restore Default Setting : Reset the device to [...]

  • Pagina 84

    79 Step 2 Click Update Firm w are to copy the file. The device loads the file and reboots automatically . Notice : Do not turn off your device or press the reset button while this procedure is in progress. 3.4.3 Access Controls Choose Management > Acce ss Controls . The Access Controls page shown in the following figure appears. The page contain[...]

  • Pagina 85

    80 3.4.3.1 Account Password In the Access Controls page, click Account Password . The page shown in the following figure appears. In this p age, you can change the password of the user and set time for automatic logout. Y ou should change the default password to secure your network. Ensure that you remember the new password or write it down and kee[...]

  • Pagina 86

    81 Click Apply to save the settings. 3.4.3.2 Services In the Access Controls page, click Services . The page shown in the following figure appears. In this page, you can enable or disable the serv ices that are opened to remote host. For exampl e, if telnet service is enabled, the remote host can ac cess the device by telnet through port 23. Normal[...]

  • Pagina 87

    82 3.4.3.3 IP Address In the Access Controls page, click IP Address . The p age shown in the following figure appears. In this page, you can confi gure the IP address used with access control list (ACL). If ACL is enabled, only devices with the specified IP addresses can access the device. Select Enable Access Control Mode to enable ACL. Note : If [...]

  • Pagina 88

    83 3.4.4 Diagnostics Choose Management > Diagnostic . The page shown in the following figure appears. In this p age, you can test the device. Click Run Diagnostics T est to run diagnostics. 3.4.5 Log Configuration Choose Management > Log Configuration . The Syste m Log page shown in the following figure appears.[...]

  • Pagina 89

    84 This page displays event log dat a in the chronological manner . Y ou can read the event log from the local host or send it to a syslog server . Available event severity levels are as follows: Emergency , Alert, Critical, Error , W arning, Notice, Informational and Debugging. In this page, you can enable or disable the system log function. The p[...]

  • Pagina 90

    85 The page displays the summary of the device status. It includes the information of firm ware version, upstream rate, downstream rate, uptime and Internet configuration (both wireless and Ethernet statuses).[...]

  • Pagina 91

    86 3.5.2 Wireless Client s Choose Statu s > Wireless Client s . The page shown in the following page appears. The page displays authenticated wireless stations and their statuses. 3.5.3 DHCP Clients Choose St atu s > DHCP Client s . The page shown in the following page appears. This page displays all client devices that obtain IP address from[...]

  • Pagina 92

    87 3.5.4 Logs Choose Statu s > Logs . The page shown in the following figure appears. Click Refresh to refresh the system log shown in the table.[...]

  • Pagina 93

    88 3.5.5 S t atistics Choose Stat us > St atistics . The page shown in the following figure appears. This page displays the statis tics of the network and data transfer . This information helps technicians to identify if the device is functioning properly . T he info rmation does not affect the functionality of the device.[...]

  • Pagina 94

    89 3.5.6 Route Info Choose Statu s > Route Info . The page shown in the following figure appears. The table shows a list of destination routes commonly accessed by the network.[...]

  • Pagina 95

    90 F F e e d d e e r r a a l l C C o o m m m m u u n n i i c c a a t t i i o o n n C C o o m m m m i i s s s s i i o o n n I I n n t t e e r r f f e e r r e e n n c c e e S S t t a a t t e e m m e e n n t t This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits[...]

  • Pagina 96

    91 Federal Communications Commission (FCC) Radiation Exposure St atement This equipment must be installed and operated in accordance with provided instructions and a minimum 20 cm spacing must be provided between computer mounted antenna and person’s body (excluding extremities of hands, wrist and feet) during wireless modes of operation. The equ[...]

  • Pagina 97

    92 EFT A member states: Iceland, Liechtenstein, Norway , and Switzerland. EU Countries not intended for use None A declaration of conformity is available on www .edimax.com N20379[...]