Ir para a página of
Manuais similares
-
Router
Edimax BR-6314K
38 páginas -
Router
Edimax BR-6574n
160 páginas -
Router
Edimax AR‐7167WnA
16 páginas -
Router
Edimax 3G-6200n
117 páginas -
Router
Edimax 3G-6210n
157 páginas -
Router
Edimax BR-6228nC V2
17 páginas 0.65 mb -
Router
Edimax EW-7206PDg
31 páginas 1.64 mb -
Router
Edimax RE11
20 páginas 4.6 mb
Bom manual de uso
As regras impõem ao revendedor a obrigação de fornecer ao comprador o manual com o produto Edimax AR-7284WNB. A falta de manual ou informações incorretas fornecidas ao consumidor são a base de uma queixa por não conformidade do produto com o contrato. De acordo com a lei, pode anexar o manual em uma outra forma de que em papel, o que é frequentemente utilizado, anexando uma forma gráfica ou manual electrónicoEdimax AR-7284WNB vídeos instrutivos para os usuários. A condição é uma forma legível e compreensível.
O que é a instrução?
A palavra vem do latim "Instructio" ou instruir. Portanto, no manual Edimax AR-7284WNB você pode encontrar uma descrição das fases do processo. O objetivo do manual é instruir, facilitar o arranque, a utilização do equipamento ou a execução de determinadas tarefas. O manual é uma coleção de informações sobre o objeto / serviço, um guia.
Infelizmente, pequenos usuários tomam o tempo para ler o manual Edimax AR-7284WNB, e um bom manual não só permite conhecer uma série de funcionalidades adicionais do dispositivo, mas evita a formação da maioria das falhas.
Então, o que deve conter o manual perfeito?
Primeiro, o manual Edimax AR-7284WNB deve conte:
- dados técnicos do dispositivo Edimax AR-7284WNB
- nome do fabricante e ano de fabricação do dispositivo Edimax AR-7284WNB
- instruções de utilização, regulação e manutenção do dispositivo Edimax AR-7284WNB
- sinais de segurança e certificados que comprovam a conformidade com as normas pertinentes
Por que você não ler manuais?
Normalmente, isso é devido à falta de tempo e à certeza quanto à funcionalidade específica do dispositivo adquirido. Infelizmente, a mesma ligação e o arranque Edimax AR-7284WNB não são suficientes. O manual contém uma série de orientações sobre funcionalidades específicas, a segurança, os métodos de manutenção (mesmo sobre produtos que devem ser usados), possíveis defeitos Edimax AR-7284WNB e formas de resolver problemas comuns durante o uso. No final, no manual podemos encontrar as coordenadas do serviço Edimax na ausência da eficácia das soluções propostas. Atualmente, muito apreciados são manuais na forma de animações interessantes e vídeos de instrução que de uma forma melhor do que o o folheto falam ao usuário. Este tipo de manual é a chance que o usuário percorrer todo o vídeo instrutivo, sem ignorar especificações e descrições técnicas complicadas Edimax AR-7284WNB, como para a versão papel.
Por que ler manuais?
Primeiro de tudo, contem a resposta sobre a construção, as possibilidades do dispositivo Edimax AR-7284WNB, uso dos acessórios individuais e uma gama de informações para desfrutar plenamente todos os recursos e facilidades.
Após a compra bem sucedida de um equipamento / dispositivo, é bom ter um momento para se familiarizar com cada parte do manual Edimax AR-7284WNB. Atualmente, são cuidadosamente preparados e traduzidos para sejam não só compreensíveis para os usuários, mas para cumprir a sua função básica de informação
Índice do manual
-
Página 1
[...]
-
Página 2
ii English Copyright © by Edimax T echnology Co, L TD. all rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, m agnetic, optical, chemical, manual or otherwise, without the [...]
-
Página 3
iii Notice according to GNU/GPL-V ersion 2 This product includes software that is subject to the GNU/GPL-Version 2. You find t he text of the license on the product cd/dvd. The program is free software and distributed without any warranty of the author. We offer, val id for at least three years, to give you, for a charge no more than the costs of p[...]
-
Página 4
i Contents 1 Introduction ......................................................................................... 1 1.1 Package List ....................................................................... 2 1.2 Safety Caut ions .................................................................. 3 1.3 LEDs and Inte rfaces ..........................[...]
-
Página 5
ii 3.3.5 Filtering Op tions ....................................................... 47 3.3.6 QoS Configur ation ................................................... 52 3.3.7 Firewall Se ttings ...................................................... 56 3.3.8 DNS ......................................................................... 57 3.3.9 Dynamic[...]
-
Página 6
1 1 Introduction The AR-7284WnA supports Annex A mode. It provides four 10/100 base-T Ethernet ports for user . The device provi des high-speed ADSL2+ broadband connection to the Internet or Intranet for high-end users, such as net bars and o ffice users. It provides high performance access to the Internet, downstream up to 24 Mbps and upstream up [...]
-
Página 7
2 1.1 Package List 1 x AR-7284WnA or AR-7284WnB 1 x external splitter 1 x power adapter 2 x telephone cables (RJ-1 1) 1 x Ethernet cable (RJ-45) 1 x Quick Installation Guide(QIG) 1 x CD (Multi-langu ages EZmax Wiard / QIG , USB driver & English Manual)[...]
-
Página 8
3 1.2 Safety Cautions Follow the following instructions to prevent the device from risks and damage caused by fire or electric power: Use volume labels to mark the type of power . Only use the power adapter packed within the device package. Pay attention to the power l oad of the electric outlet or power extension cord. An overload ed power outlet [...]
-
Página 9
4 1.3 LEDs and Interfaces Front Panel Figure 1 Front panel The following table describes the LEDs of the device. LED Colo r Statu s Description Green Off The power is off. On The power is on and the initialization is normal. Red On The device is initiating. Blinks The firmware is upgrading. LAN 1/2/3/4 Green Off No LAN link. Blinks Data is being tr[...]
-
Página 10
5 LED Colo r Statu s Description mode, DSL connection is not present, or the power is off. On Connected to network. Red On Network connection failed. WPS Green On The WPS indicator will light for 5 minutes after the WPS service is registered successfully . Blink Green The W PS indicator will light for 0.2s, and then off for 0.1s when the WPS button[...]
-
Página 11
6 Rear Panel Figure 2 Rear panel The following table describes the interface of the de vice. Interface/Button Description Line RJ-1 1 interface that connects to the telephone set through the telephone cabl e. WPS/Reset Press the button for 3 seconds to enab le WPS. Press the button for 8 seco nds to restore factory default confi gurations and reboo[...]
-
Página 12
7 Internet Explorer V5.0 or higher , Netscape V4.0 or highe r , or Firefox 1.5 or higher 1.5 Features The device supports the following features: V arious line modes External PPPoE dial-up access Internal PPPoE and PPPoA dial-up access Leased line mode Zero installation PPP bridge mode (ZIPB) 1483B, 1483R, and MER access Multiple PVCs (up to eight)[...]
-
Página 13
8 2 Hardware Installation 2.1 Connecting the ADSL Router Step 1 Connect the ‘Line’ port of the device and the ‘Modem’ port of the ADSL splitter with a telephone cable. Connect the phone to the ‘Phone’ port of the splitter through a telephone cable. Connect the incoming line to the ‘Line’ port of the splitter . The splitter has three[...]
-
Página 14
9 Figure 3 Connection diagram ( without telephone sets before the split ter) Connection type 2: Figure 4 disp lays the application diagram for the connection of the devic e, PC, splitter and telephone sets when a telephone set is placed before the splitter . As illustrated in the following figure, the splitter is installed close to the device. Figu[...]
-
Página 15
10 Installing a telephone before the splitter may cause connection problem between the device and the central office, or failure of Internet access, or slow connection speed. If you really need to add a telephone set before the s plitter , you must add a microfilter before a telephone set. Do not connect several telephones before the splitter or co[...]
-
Página 16
11 Step 5 The dialog will instruct you to choose driver from specific location.[...]
-
Página 17
12 3 About the Web Configurator This chapter describes how to configure the device by the Web-based configuration utility . 3.1 Access the Device Follow the following instructions to access the device for the first time. Step 1 Open the Internet Explorer (IE) browser and enter http://192.168.2.1 . Step 2 The Login page shown in the following figure[...]
-
Página 18
13 If you successfully logged in as the super user , the web page as shown in the following figure appears. 3.2 Setup 3.2.1 Wiz ar d Wizard enables fast and accurate configuration of Internet connection and other important parameters. The followin g sections describe these c onfiguration parameters. When subscribing to a broadband service, you shou[...]
-
Página 19
14 Step 1 Choose Setup > Wiz ard . The page shown in the following figure appears. Step 2 Click Setup Wizard . The p age shown in the following figure appears. Step 3 There are four steps to configure the device. Click Next to continue.[...]
-
Página 20
15 Step 4 Set the time and date.[...]
-
Página 21
16 Step 5 Configure the Internet connection. Select the country and ISP . Se t the VPI and VCI. If you failed to find the country and ISP from the drop-down lists, select Others . Click Next . If the Protocol you selected is PPPoE or PPPoA, the page shown in either of the two following figures appears.[...]
-
Página 22
17 Set the user name and password here,which is provided by your ISP . If the Protocol is Dyna mic IP , the page shown in the following figure appears. Click Next , the page shown in the following figure appears.[...]
-
Página 23
18 Configure the wireless network. Enter the information and click Next .[...]
-
Página 24
19 If the Protocol is Bridge , the page shown in the following figure appears.[...]
-
Página 25
20 If the Protocol is Stati c IP , the page shown in the following figure appears.[...]
-
Página 26
21 Enter the IP Address , Subnet Mask , Default Gatew ay , and Primary DNS Server . Click Next . The page shown in the following page appears. Figure 5[...]
-
Página 27
22 Step 6 Configure the wireless netwo rk. Enter the information and click Next . Step 7 When the settings are complete, click Apply to apply the settings. Note: In each step of the Wizard page, you can click Back to review or modify settings in previous page. Click Cancel to exit the wizard page.[...]
-
Página 28
23 3.2.2 Internet Setup Choose Setup > Internet Setup . The page shown in the following figure appears. In this page, you can co nfigure the W AN interface of the device. Click Add . The p age shown in the following figure appears.[...]
-
Página 29
24 Click Apply . The page shown in the following figure appears.[...]
-
Página 30
25 3.2.3 Wireless Setup This section describes the wireless LAN and some basic configuration. Wireless LANs can be as simple as two computers with wireless LAN cards communic ating in a pear-to-pear network or as complex as a number of computers with wireless LAN cards communicating through access point which bridges network traffic to wired LAN. C[...]
-
Página 31
26 3.2.3.1 Wireless Basics In the Wireless Setup page, click Wireless Basics . The page shown in the following figure appears. In this p age, you can configure the parameters that wi reless LAN clients can used to connect to this device. Click Apply to save the settings.[...]
-
Página 32
27 3.2.3.2 Wireless Security In the Wireless Setup page, click W ireless Security . The page shown in the following figure appears. Wireless security is vital to your network to protect the wireless communication among wireless stations, access point s and wired network. Click Apply to save the settings.[...]
-
Página 33
28 3.2.4 Local Network Y ou can configure the LAN IP address according to actual requirements. The preset IP address is 192.168.1.1. Y ou can use the default settings and DHCP service to manage the IP settings for the private network. The IP address of the device is the base address used for DH CP . T o use the device as DHCP server on your LAN, th[...]
-
Página 34
29 the pool used for DHCP . The IP address pool can contain up to 253 IP addresses. Click Apply to save the settings. In the Local Network page, you can assign IP addresses on the LAN to specific individual computers based on their MAC addresses. Click Add to add st atic DHCP addresses (optional). The page shown in the following figure appears. Sel[...]
-
Página 35
30 The NUMBER OF DYNAMIC DHCP CLIENTS page shows the current DHCP clients (PC or Laptop) connected to the device and the detailed info rmation of the connected computer(s). 3.2.5 T ime and Date Choose Setup > Time and Date . The p age shown in the following figure appears. In the Time and Date page, you can setup the time of the internal system [...]
-
Página 36
31 Select the specific time serv er and the time zone from the corresponding item in drop-down lists. Select Enable Daylight Saving if necessary . Click Apply to save the settings. 3.2.6 Logout Choose Setup > Logout . The page shown in the following figure appears. In this page, you can log out from web configuration menu. 3.3 Advanced This sect[...]
-
Página 37
32 your wireless performan ce. The default settings provide the best wireless radio performance in most of environments.[...]
-
Página 38
33 3.3.1.1 Advanced Settings Select Advance Settings. The page shown in the following figure appears. These settings are only for technically advanced users who have sufficient knowledge about wireless LAN. Do not change these settings unless you know the effect of changes on the device.[...]
-
Página 39
34 Click Apply to save the settings. 3.3.1.2 MAC Filtering Select MAC Filtering . The page shown in the follo wing figure appears.[...]
-
Página 40
35 Click Add . The page shown in the following figure appears. Click Apply to save the settings.[...]
-
Página 41
36 3.3.1.3 Security Settings Select Security Settings . The page shown in the following figure appears. Select the SSID that you wa nt to configure from the drop-down list. Select the encryption type from the Security Mode drop-down list.Y ou can select None , WEP , AUTO (WP A or WP A2) , WP A Only , or WP A2 Only . If you select WEP , the page sho[...]
-
Página 42
37 If you select AUT O (WP A or WP A2) , WP A Only , or WP A2 Only , the page shown in the following figure appears.[...]
-
Página 43
38 Click Apply to save the settings.[...]
-
Página 44
39 3.3.1.4 WPS Settings Select WPS Settings . The page shown in the following figure appears. WPS Authentication: The WPS service is enabled by default. There are three setting methods you can use in the Wi-Fi Protected Setup. In order to use wps authentication, you can select one method from three methods. Press the WPS button on the rear panel fo[...]
-
Página 45
40 3.3.2 Port Forwarding This function is used to open ports on your device and redirect data from those ports to a single PC on your network (W AN-to-LAN traffic). It allows remote users to access services on your LAN, such as FTP for file transfers or SMTP and POP3 for e-mail. The device accepts remote request s for these services at your global [...]
-
Página 46
41 Select a service for a preset application, or enter a name in the Custom Server field. Enter an IP a ddress in the Server IP A ddress field, to appoint the corresponding PC to receive forwarded packets. The Ports show the ports that you want to open on the device. The TCP/UDP means the protocol type of the opened ports. Click Apply to save the s[...]
-
Página 47
42 3.3.3 DMZ Since some applications are not compatible with NA T , the device supports the use of a DMZ IP address for a single host on the LAN. This IP address is not protected by NA T and it is visible to agents on the Internet with the correct type of software. Note that any client PC in the DMZ is exposed to various types of security risks. If[...]
-
Página 48
43 This page provides two useful tools for restricting the Internet access. Block Websites allows you to quickly create a list of all websites that you wish to stop users from accessing. Block MAC Address allows you to control when clients or PCs connected to the device are allowed to access the Internet.[...]
-
Página 49
44 3.3.4.1 Block Website In the Parent al Control p age, click Block Website . The p age shown in the following figure appears. Click Add . The p age shown in the following page appears. Enter the website in the URL field. Select the Schedule from drop-down list, or select Manual Schedule and select the corresponding time and days.[...]
-
Página 50
45 Click Submit to add the website to the BLOCK WEBSITE Ta b l e . The p age shown in the following figure appears. 3.3.4.2 Block MAC Address In the Parent al Control page, click Block MAC Address . The page shown in the following figure appears. b Click Add . The p age shown in the following figure appears.[...]
-
Página 51
46 Enter the user name and MAC address and select the corresponding time and days. Click Submit to add the MAC address to the BLOCK MAC ADDRESS T able .[...]
-
Página 52
47 3.3.5 Filtering Options Choose AD V ANCED > Filtering Options . The Filtering Options page shown in the following figure appears. 3.3.5.1 Inbound IP Filtering By default, all incoming IP traf fi c that does not originate from the internal network is blo cked when the firewall is enabled. Normal outbound requests creat ed by web browsing, emai[...]
-
Página 53
48 Click Add to add an inbound IP filter . The page shown in the following figure appears.[...]
-
Página 54
49 Enter the Filter Name and specify at least one of the following criteria: protocol, s ource/destination IP address, subnet mask, and source/destination port. Click Apply to save the settings. Note: The settings only apply when the firewall is enabled. The ACTIVE INBOUND FIL TER shows detailed information about every created inbound IP filter . C[...]
-
Página 55
50 In the Filtering Options p age, click Outbound IP Filtering . The page shown in the following figure appears. Click Add to add an outbound IP filter . The p age shown in the following figure appears.[...]
-
Página 56
51 Enter the Filter Name and specify at least one of the following criteria: protocol, s ource/destination IP address, subnet mask, and source/destination port. Click Apply to save the settings. 3.3.5.3 Bridge Filtering In the Filtering Options page, click Bridge Filtering . The page shown in the following figure appears.This page is used to config[...]
-
Página 57
52 Click Apply to save the settings. 3.3.6 QoS Configuration Choose ADV ANCED > QOS Config . The QoS Configuration page shown in the following figure appears.[...]
-
Página 58
53 3.3.6.1 QoS Interface In the QoS Configuration page, click QoS Interface Config . The page shown in the following figure appears. In this p age, you can configure bandwidth control. Click Edit , the p age shown in the following figure appears. After configuration, click Apply to make configurations take effect.[...]
-
Página 59
54 3.3.6.2 QoS Queue Configuration In the QoS Configuration page, click QoS Queue Config . The page shown in the following figure appears. In this p age, you can configure the priority of queue. Click Add , the page shown in the following figure appears. After configuration, click Apply to take the configurations effect. 3.3.6.3 QoS Classify Config[...]
-
Página 60
55 Click Add , the page shown in the following figure appears.[...]
-
Página 61
56 After configurati on is done, click Apply to make the configuration take ef fect. 3.3.7 Firewall Settings A denial-of-service (DoS) attack is characterized by an explicit attempt by attackers to preven t legitimate users from using that service. Examples include the following The attackers attempt to flood a network, thereby preventing legitimat[...]
-
Página 62
57 from accessing a service The attackers attempt to disrupt service to a specific system or person. Port scan protection is designed to block attempts to discover vulnerable ports or services that might be exploited in an attack from the W AN. Choose ADV ANCED > Firewall Settings . The page shown in the following figure appears. Click Apply to [...]
-
Página 63
58 the name into the corresponding IP address. For example, the domain name www .example.com might be translated to 198.105.232.4. The DNS system is, in fact, it s own network. If one DNS server does not know how to translate a particular domain name, it asks another one, and so on, until the correct IP address is returned. Choose AD V ANCED > D[...]
-
Página 64
59 3.3.9 Dynamic DNS The device supports dynamic domain name service (DDNS). The dynamic DNS service allows a dynamic public IP address to be associated with a static host name in any of the many domains, and allows access to a specified host from various locations on the Internet. Click a hyperlinked URL in the form of hostname.dyndns.org and allo[...]
-
Página 65
60 DDNS provider : Select one of the DDNS service provider from the down-list. Available service providers include DynDns.org and dlinkddns.com. Host Name : Enter the host name that you registered with your DDNS service provider . Username : Enter the user name for your DDNS account. Password : Enter the password for your DDNS account. Click Apply [...]
-
Página 66
61[...]
-
Página 67
62 3.3.10.1 Port Mapping Choose AD V ANCED > Netw ork T ools and click Port Mapping . The page shown in the following figure appears. In this page, you can bind the W AN in terface and the LAN interface to the same group. Click Add to add a new port mapping. The page shown in the following figure appears.[...]
-
Página 68
63 The procedure for creating a mapping gro up is listed as follows: Step 1 Enter the group name. Step 2 Select interfaces from the A vailable Interface list and click the <- arrow button to add them to the grouped interface list, in order to create the required mapping of the ports. The group name must be unique. Step 3 Click Submit to save the[...]
-
Página 69
64 3.3.10.2 IGMP Proxy Choose ADV ANCED > Network T ools and click IGMP Proxy . The page shown in the following figure appears. IGMP proxy enables the syst em to issue IGMP host messages on behalf of hosts t hat the system discovered through standard IGMP interfaces. The system act s as a proxy for its hosts after you enable it. Click Apply t o [...]
-
Página 70
65 After configuration, click Apply to save the settings. 3.3.10.4 UPnP Choose ADV ANCED > Network T ools and click UPnP . The page shown in the following figure appears.[...]
-
Página 71
66 In this page, you can confi gure universal plug and play (UPnP). The system acts as a daemon af ter you enable UPnP . UPnP is used for popular audio / video software. It allows automatic discovery of your devi ce in the network. If you are concerned about UPnP security , you can disable it. Block ICMP ping should be enabled so that the device wi[...]
-
Página 72
67 The AR-7284WnA supports Annex A mode, so the AnnexB is not enabled. Click Apply to save the settings.[...]
-
Página 73
68 3.3.10.6 SNMP Choose ADV ANCED > Network T ools and click SNMP . The page shown in the following figure appears. In this page, you can set SNMP p arameters. Read Community : The network administrator must use this password to read the information of this device. Set Community : The network administrator must use this password to configure t h[...]
-
Página 74
69 3.3.10.7 TR069 Choose ADV ANCED > Network T ools and click TR-069 . The page shown in the following figure appears. In this page, you can configure the TR069 CPE. Click Apply to save settings.[...]
-
Página 75
70 3.3.10.8 Certificates Choose ADV ANCED > Network T ools and click Certificates . The Certificates page shown in the following figure appears. In the Certificates page, click T rusted CA . The page shown in the following figure appears. Click In put Certificate , the page shown in the following figure appears.[...]
-
Página 76
71 Click Apply to save the settings.[...]
-
Página 77
72 3.3.11 Routing Choose AD V ANCED > Routing . The page shown in the following page appears. 3.3.11.1 St atic Route Choose ADV ANCED > Routing and click S t atic Route . The page shown in the following figure appears. This page is used to configure the routing informat ion. In this page, you can add or delete IP routes.[...]
-
Página 78
73 Click Add to add a static route. The page shown in the following figure appears. Destination Network Address : The destination network address. Subnet Mask : The subnet mask of the destination network. Use Gateway IP Address : The gateway IP address of the destination network. User Interface : The interface name of the router output port. Y ou c[...]
-
Página 79
74 Click Apply t o save the settings. 3.3.11.2 Default Gatew ay Choose ADV ANCED > Routing and click Default Gatewa y . The page shown in the following figure appears. Click Apply to save the settings.[...]
-
Página 80
75 3.3.11.3 RIP Settings Choose ADV ANCED > Routing and click RIP Settings . The page shown in the following figure appears. This page is used to select the interfaces on yo ur device that use RIP and the version of the prot ocol being used. If you are using this devic e as a RIP-enabled device to communicate with others us ing the routing infor[...]
-
Página 81
76 3.3.12 Schedules Choose ADV ANCED > Schedules . The page shown in the following figure appears. Click Add to add schedule rule. The page shown in the following figure appears. Click Submit to save settings.[...]
-
Página 82
77 3.4 Management 3.4.1 System Choose Management > System Management . The System page shown in the following figure appears. In this page, you can reboot device, back up the current settings to a file, restore the settings from the file saved previously , and restore the factory default settings. The buttons in this page are described as follow[...]
-
Página 83
78 Backup Setting : Save the settings to the local hard drive. Select a location on your computer to back up the file. Y ou can name the conf iguration file. Up date Setting : Click Browse to select the configuration file of device and click Update Settings to begin restoring the device configuration.. Restore Default Setting : Reset the device to [...]
-
Página 84
79 Step 2 Click Update Firm w are to copy the file. The device loads the file and reboots automatically . Notice : Do not turn off your device or press the reset button while this procedure is in progress. 3.4.3 Access Controls Choose Management > Acce ss Controls . The Access Controls page shown in the following figure appears. The page contain[...]
-
Página 85
80 3.4.3.1 Account Password In the Access Controls page, click Account Password . The page shown in the following figure appears. In this p age, you can change the password of the user and set time for automatic logout. Y ou should change the default password to secure your network. Ensure that you remember the new password or write it down and kee[...]
-
Página 86
81 Click Apply to save the settings. 3.4.3.2 Services In the Access Controls page, click Services . The page shown in the following figure appears. In this page, you can enable or disable the serv ices that are opened to remote host. For exampl e, if telnet service is enabled, the remote host can ac cess the device by telnet through port 23. Normal[...]
-
Página 87
82 3.4.3.3 IP Address In the Access Controls page, click IP Address . The p age shown in the following figure appears. In this page, you can confi gure the IP address used with access control list (ACL). If ACL is enabled, only devices with the specified IP addresses can access the device. Select Enable Access Control Mode to enable ACL. Note : If [...]
-
Página 88
83 3.4.4 Diagnostics Choose Management > Diagnostic . The page shown in the following figure appears. In this p age, you can test the device. Click Run Diagnostics T est to run diagnostics. 3.4.5 Log Configuration Choose Management > Log Configuration . The Syste m Log page shown in the following figure appears.[...]
-
Página 89
84 This page displays event log dat a in the chronological manner . Y ou can read the event log from the local host or send it to a syslog server . Available event severity levels are as follows: Emergency , Alert, Critical, Error , W arning, Notice, Informational and Debugging. In this page, you can enable or disable the system log function. The p[...]
-
Página 90
85 The page displays the summary of the device status. It includes the information of firm ware version, upstream rate, downstream rate, uptime and Internet configuration (both wireless and Ethernet statuses).[...]
-
Página 91
86 3.5.2 Wireless Client s Choose Statu s > Wireless Client s . The page shown in the following page appears. The page displays authenticated wireless stations and their statuses. 3.5.3 DHCP Clients Choose St atu s > DHCP Client s . The page shown in the following page appears. This page displays all client devices that obtain IP address from[...]
-
Página 92
87 3.5.4 Logs Choose Statu s > Logs . The page shown in the following figure appears. Click Refresh to refresh the system log shown in the table.[...]
-
Página 93
88 3.5.5 S t atistics Choose Stat us > St atistics . The page shown in the following figure appears. This page displays the statis tics of the network and data transfer . This information helps technicians to identify if the device is functioning properly . T he info rmation does not affect the functionality of the device.[...]
-
Página 94
89 3.5.6 Route Info Choose Statu s > Route Info . The page shown in the following figure appears. The table shows a list of destination routes commonly accessed by the network.[...]
-
Página 95
90 F F e e d d e e r r a a l l C C o o m m m m u u n n i i c c a a t t i i o o n n C C o o m m m m i i s s s s i i o o n n I I n n t t e e r r f f e e r r e e n n c c e e S S t t a a t t e e m m e e n n t t This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits[...]
-
Página 96
91 Federal Communications Commission (FCC) Radiation Exposure St atement This equipment must be installed and operated in accordance with provided instructions and a minimum 20 cm spacing must be provided between computer mounted antenna and person’s body (excluding extremities of hands, wrist and feet) during wireless modes of operation. The equ[...]
-
Página 97
92 EFT A member states: Iceland, Liechtenstein, Norway , and Switzerland. EU Countries not intended for use None A declaration of conformity is available on www .edimax.com N20379[...]