ZyXEL Communications G-102 Betriebsanweisung

Stöbern Sie online oder laden Sie Betriebsanweisung nach Router ZyXEL Communications G-102 herunter. ZyXEL Communications G-102 User`s guide Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 183
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - DEFAULT LOGIN DETAILS

Copyright © 2009 ZyXEL Communications Corporation DEFAULT LOGIN DETAILS IP Address http://192.168.100.1 Password 1234 Firmware Version 1.0 Edition

Seite 2 - Mobile Wireless Router

10 6.1 Overview ... 29 6.2 Connecting t

Seite 3 - About This User's Guide

100 Table 30 Subnet 1 IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address (Decimal) 192.168.1. 0 IP Address (Binary) 11000000.101010

Seite 4 - Customer Support

101 Table 33 Subnet 3 IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192.168.1. 128 IP Address (Binary) 11000000.10101000.0000

Seite 5 - Document Conventions

102 Example: Eight Subnets Similarly, use a 27-bit mask to create eight subnets (000, 001, 010, 011, 100, 101, 110 and 111). The following table sh

Seite 6 - Icons Used in Figures

103 NO. “BORROWED” HOST BITS SUBNET MASK NO. SUBNETS NO. HOSTS PER SUBNET 1 255.255.255.128 (/25) 2 126 2 255.255.255.192 (/26) 4 62 3 255.255

Seite 7 - Safety Warnings

104 7 255.255.254.0 (/23) 128 510 8 255.255.255.0 (/24) 256 254 9 255.255.255.128 (/25) 512 126 10 255.255.255.192 (/26) 1024 62 11 255.

Seite 8

105 need to change the subnet mask computed by the MWR102 unless you are instructed to do otherwise. Private IP Addresses Every machine on the Intern

Seite 9 - Table of Contents

106 After the appropriate TCP/IP components are installed, configure the TCP/IP settings in order to "communicate" with your network. If y

Seite 10

107 Figure 45 Windows 95/98/Me: Network: Configuration Installing Components The Network window Configuration tab displays a list of installed comp

Seite 11

108 If you need Client for Microsoft Networks: 1 Click Add. 2 Select Client and then click Add. 3 Select Microsoft from the list of manufacture

Seite 12

109 • If you know your DNS information, select Enable DNS and type the information in the fields below (you may not need to fill them all in).

Seite 13

11 10 Status ... 60 10.1 Overview ...

Seite 14 - 1 Getting to Know Your

110 Figure 47 Windows 95/98/Me: TCP/IP Properties: DNS Configuration 4 Click the Gateway tab. • If you do not know your gateway’s IP address, re

Seite 15 - 1.4 The Front Panel

111 1 Click start (Start in Windows 2000/NT), Settings, Control Panel. Figure 48 Windows XP: Start Menu 2 In the Control Panel, d

Seite 16 - 1.5 The Rear Panel

112 Figure 50 Windows XP: Control Panel: Network Connections: Properties 4 Select Internet Protocol (TCP/IP) (under the General tab in Win XP) an

Seite 17 - 2 Web-Based Management

113 • If you have a static IP address click Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields. • Cl

Seite 18 - 2.3 Resetting the MWR102

114 Figure 53 Windows XP: Advanced TCP/IP Properties 7 In the Internet Protocol TCP/IP Properties window (the General tab in Windows XP): • Clic

Seite 19 - 3 MWR102 Modes

115 Figure 54 Windows XP: Internet Protocol (TCP/IP) Properties 8 Click OK to close the Internet Protocol (TCP/IP) Properties window. 9 Click C

Seite 20 - 4 Router Mode

116 2 Click on Control Panel. Figure 55 Windows 7/Vista 3 Click on Network and Internet. Figure 56 Windows 7/Vista 4 Click on Network and Sha

Seite 21 - LINK FUNCTION

117 Figure 57 Windows 7/Vista 5 On the left side of the screen click on Change Adapter Settings (Windows 7), or Manag

Seite 22 - Password

118 Figure 59 Windows 7/Vista 8 Select Use the Following IP Address and enter your IP address, Subnet Mask, and Default Gateway. Enter your DNS ser

Seite 23 - 5 Access Point Mode

119 Macintosh OS 8/9 1 Click the Apple menu, Control Panel and double-click TCP/IP to open the TCP/IP Control Panel. Figure 61 Macintosh OS 8/9

Seite 24 - 5.3 AP Mode Status Screen

12 Appendix A: Pop-up Windows, JavaScripts and Java Permissions ... 85 Appendix B: IP Addresses and Subnetting ...

Seite 25 - 5.3.1 Navigation Panel

120 Figure 62 Macintosh OS 8/9: TCP/IP 3 For dynamically assigned settings, select Using DHCP Server from the Configure: list. 4 For stat

Seite 26

121 Figure 63 Macintosh OS X: Apple Menu 2 Click Network in the icon bar. • Select Automatic from the Location list. • Select Built-in Ether

Seite 27 - 5.4 LAN Screen

122 Figure 64 Macintosh OS X: Network 4 For statically assigned settings, do the following: • From the Configure box, select Manually. • Type yo

Seite 28 - LABEL DESCRIPTION

123 Linux This section shows you how to configure your computer’s TCP/IP settings in Red Hat Linux 9.0. Procedure, screens and file location may var

Seite 29 - 6 Tutorials

124 Figure 66 Red Hat 9.0: KDE: Ethernet Device: General • If you have a dynamic IP address click Automatically obtain IP address settings with an

Seite 30

125 6 Click the Activate button to apply the changes. The following screen displays. Click Yes to save the changes in all screens. Figure 68 Red H

Seite 31 - 6.3.2 PIN Configuration

126 DEVICE=eth0 ONBOOT=yes BOOTPROTO=static IPADDR=192.168.100.10 NETMASK=255.255.255.0 USERCTL=no PEERDNS=yes TYPE=Ethernet 2 If you know your DNS

Seite 32 - Security (No WPS)

127 Appendix D Appendix D Wireless LANs Wireless LAN Topologies This section discusses ad-hoc and infrastructure wireless LAN topologies. Ad-hoc

Seite 33

128 BSS A Basic Service Set (BSS) exists when all communications between wireless stations or between a wireless station and a wired network client g

Seite 34

129 An ESSID (ESS IDentification) uniquely identifies each ESS. All access points and their associated wireless stations within the same ESS must hav

Seite 35 - Part II: Wireless

13 Part I: Introduction

Seite 36 - 7 Wireless

130 Figure 76 Infrastructure WLAN Channel A channel is the radio frequency(ies) used by IEEE 802.11a/b/g wireless devices. Channels available depen

Seite 37 - 7.3.1.3 Encryption

131 When station A sends data to the AP, it might not know that the station B is already using the channel. If these two stations send data at the s

Seite 38 - 7.3.1.4 WPS

132 If the Fragmentation Threshold value is smaller than the RTS/CTS value (see previously) you set then the RTS (Request To Send)/CTS (Clear to Send

Seite 39

133 Table 38 IEEE 802.11g DATA RATE (MBPS) MODULATION 1 DBPSK (Differential Binary Phase Shift Keyed) 2 DQPSK (Differential Quadrature Phase Shif

Seite 40 - Threshold

134 Determines the network services available to authenticated users once they are connected to the network. • Accounting Keeps track of the client’

Seite 41

135 The type of authentication you use depends on the RADIUS server or the AP. Consult your network administrator for more information. EAP-MD5 (Mess

Seite 42 - 7.6 Security

136 Dynamic WEP Key Exchange The AP maps a unique key that is generated with the RADIUS server. This key expires when the wireless connection times o

Seite 43 - 7.6.2 WEP Encryption

137 WPA(2) Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. WPA2 (IEEE 802.11i) is a wireless security standard that defines s

Seite 44

138 password-guessing attacks but it's still an improvement over WEP as it employs an easier-to-use, consistent, single, alphanumeric password.

Seite 45 - 7.7 Access Control

139 Figure 78 WPA(2)-PSK Authentication WPA(2) with RADIUS Application Example You need the IP address of the RADIUS server, its port number (defau

Seite 46

14 1 Getting to Know Your MWR102 1.1 Overview The MWR102 is a mobile wireless router with 1T1R MIMO technology. It complies with IEEE 802.11n standa

Seite 47 - 7.8 WPS Screen

140 Table 40 Wireless Security Relational Matrix AUTHENTICATION METHOD/ KEY MANAGEMENT PROTOCOL ENCRYPTION METHOD ENTER MANUAL KEY IEEE 802.1X Ope

Seite 48

141 Appendix E Appendix E Common Services The following table lists some commonly-used services and their associated protocols and port numbers.

Seite 49

142 servers. BGP TCP 179 Border Gateway Protocol. BOOTP_CLIENT UDP 68 DHCP Client. BOOTP_SERVER UDP 67 DHCP Server. CU-SEEME TCP UDP 7648 2

Seite 50 - 8 Network Settings

143 IGMP (MULTICAST) User-Defined 2 Internet Group Management Protocol is used when sending packets to a specific group of hosts. IKE UDP 500 Th

Seite 51 - 8.3 What You Need To Know

144 RCMD TCP 512 Remote Command Service. REAL_AUDIO TCP 7070 A streaming audio service that enables real time sound over the web. REXEC TCP 5

Seite 52 - 8.4 LAN Interface

145 TACACS UDP 49 Login Host Protocol used for (Terminal Access Controller Access Control System). TELNET TCP 23 Telnet is the login and termin

Seite 53

146 Appendix F Appendix F Legal Information Copyright Copyright © 2010 by ZyXEL Communications Corporation. The contents of this publication may

Seite 54 - 8.5 WAN Interface

147 This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits a

Seite 55

148 Industry Canada Statement This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to the following two conditions: 1

Seite 56 - MAC Filtering

149 product has been modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions. Note Repair or replacem

Seite 57 - 9 MAC Filtering

15 1.3 Good Habits for Managing the MWR102 Do the following things regularly to make the MWR102 more secure and to manage the MWR102 more effectively

Seite 58 - 9.4 MAC Filtering

150 Appendix G Open Source Licenses Article I. End-User License Agreement for “MWR102” Article II. WARNING: ZyXEL Communications Corp. IS WILLIN

Seite 59 - Management

151 not exceed the scope of the license granted hereunder. Any rights not expressly granted by ZyXEL to you are reserved by ZyXEL, and all implied li

Seite 60 - 10 Status

152 License Agreement to those persons employed by you who come into contact with the Software, and to use reasonable best efforts to ensure their co

Seite 61 - Management > Status

153 INCLUDING REASONABLE ATTORNEYS' FEES, TO THE EXTENT SUCH CLAIMS ARISE OUT OF ANY BREACH OF THIS SECTION 8. 9.Audit Rights ZyXEL SHALL HAVE T

Seite 62

154 Article III. Article IV. NOTE: Some components of this product incorporate free software programs covered under the open source code licenses

Seite 63 - 11 Statistics

155 igmpproxy v1.2 http://sourceforge.net/projects/igmpproxy/ GPLv2 iproute2-2.6.29-1 v2.6.19 http://www.linuxfoundation.org/collaborate/workgroups/n

Seite 64

156 Notice Information herein is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwis

Seite 65 - 12 Log

157 rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know thei

Seite 66

158 2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such

Seite 67 - 13 Upgrade Firmware

159 medium customarily used for software interchange; or, c) Accompany it with the information you received as to the offer to distribute correspondi

Seite 68

16 1.5 The Rear Panel Figure 2 The rear panel of the Wireless Router.  LAN: Through this port, you can connect the router to your PCs and the o

Seite 69 - 14 Save/Reload Settings

160 then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program. If any portion of thi

Seite 70

161 MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PR

Seite 71

162 To protect your rights, we need to prevent others from denying you these rights or asking you to surrender the rights. Therefore, you have certai

Seite 72 - 15 Password

163 To “modify” a work means to copy from or adapt all or part of the work in a fashion requiring copyright permission, other than the making of an e

Seite 73 - Management > Password

164 activities. However, it does not include the work's System Libraries, or general-purpose tools or generally available free programs which ar

Seite 74 - Part V: Troubleshooting

165 work as a means of enforcing, against the work's users, your or third parties' legal rights to forbid circumvention of technological me

Seite 75 - 16 Troubleshooting

166 6. Conveying Non-Source Forms. You may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also conv

Seite 76 - Utility

167 by a particular user, “normally used” refers to a typical or common use of that class of product, regardless of the status of the particular user

Seite 77 - 16.4 Internet Access

168 material, added by you to a covered work, for which you have or can give appropriate copyright permission. Notwithstanding any other provision of

Seite 78

169 (including any patent licenses granted under the third paragraph of section 11). However, if you cease all violation of this License, then your l

Seite 79 - Defaults

17 2 Web-Based Management 2.1 Overview This chapter describes how to access the MWR102 Web-Based Management Interface and provides an overview of it

Seite 80 - AP mode

170 counterclaim in a lawsuit) alleging that any patent claim is infringed by making, using, selling, offering for sale, or importing the Program or

Seite 81 - 17 Product Specifications

171 A patent license is “discriminatory” if it does not include within the scope of its coverage, prohibits the exercise of, or is conditioned on the

Seite 82 - FEATURE DESCRIPTION

172 published by the Free Software Foundation. If the Program does not specify a version number of the GNU General Public License, you may choose any

Seite 83

173 How to Apply These Terms to Your New Programs If you develop a new program, and you want it to be of the greatest possible use to the public, the

Seite 84 - Appendices

174 library. If this is what you want to do, use the GNU Lesser General Public License instead of this License. But first, please read <http://www

Seite 85 - Pop-up Windows, JavaScripts

175 For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients all the rights that we gave you.

Seite 86

176 Although the Lesser General Public License is Less protective of the users' freedom, it does ensure that the user of a program that is linke

Seite 87

177 modified work must itself be a software library. b) You must cause the files modified to carry prominent notices stating that you changed the fil

Seite 88 - JavaScripts

178 Library". Such a work, in isolation, is not a derivative work of the Library, and therefore falls outside the scope of this License. However

Seite 89

179 exception, the materials to be distributed need not include anything that is normally distributed (in either source or binary form) with the majo

Seite 90 - Java Permissions

18 Figure 3 Login Screen The following table describes the labels in this screen. LABEL DESCRIPTION User Name Type “admin” (default) as the User na

Seite 91 - JAVA (Sun)

180 apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to co

Seite 92 - Figure 41 Java (Sun)

181 THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE

Seite 93 - IP Addresses and Subnetting

182 Zlib License zlib.h -- interface of the 'zlib' general purpose compression library version 1.2.2, October 3rd, 2004 Copyright (C) 1995

Seite 94 - Subnet Masks

183 product, an acknowledgment in the product documentation would be appreciated but is not required. 2. Altered source versions must be plainly mar

Seite 95 - Table 27 Subnet Masks

19 3 MWR102 Modes 3.1 Overview This chapter introduces the different modes available on your MWR102. 3.1.1 Device Modes This refers to the opera

Seite 96 - Notation

2 MWR102 Mobile Wireless Router

Seite 97 - Subnetting

20 4 Router Mode 4.1 Overview The MWR102 is set to router mode by default. Routers are used to connect the local network to another network (for ex

Seite 98

21 The following table describes the sub-menus. Table 2 Navigation Panel: Router Mode LINK FUNCTION Setup Wizard This screen guides you through th

Seite 99 - Example: Four Subnets

22 Status Shows the current status and basic settings of the travel router Statistics Shows packet counts for wired and wireless Ethernet connectio

Seite 100 - Table 32 Subnet 2

23 5 Access Point Mode 5.1 Overview Use your MWR102 as an access point (AP) if you already have a router or gateway on your network. In this mode yo

Seite 101 - Table 34 Subnet 4

24 5.2.3 Configuring your WLAN and Maintenance Settings The configuration of wireless and maintenance settings in Access Point mode is the same as f

Seite 102 - Subnet Planning

25 Encryption This shows the level of wireless security the MWR102 is currently using. BSSID This displays the MAC address of the wireless device. A

Seite 103

26 Figure 5 Navigation Panel The following table describes the sub-menus. Table 4 Navigation Panel: Router Mode LINK FUNCTION Setup Wizard This s

Seite 104 - Configuring IP Addresses

27 router. Site Survey This page provides a tool to scan the wireless network for nearby routers and APs. WPS This screen allows you to change the W

Seite 105 - Appendix C

28 Note: If you change the IP address of the MWR102 in the screen below, you will need to log into the MWR102 again using the new IP address. Figure

Seite 106 - Windows 95/98/Me

29 Diversion automatically detect conflicts in the WAN and LAN IP. If there are conflicts, the LAN IP and LAN DHCP Range will automatically jump to n

Seite 107 - Installing Components

3 About This User's Guide Intended Audience This manual is intended for people who want to configure the MWR102 using the Web-Based Management I

Seite 108 - Configuring

30 6.2 Connecting to Internet from an Access Point This section gives you an example of how to set up an access point (AP) and wireless client (a not

Seite 109

31 6.3.1 Push Button Configuration (PBC) 1 Make sure that your MWR102 is turned on and that it is within range of your computer. 2 Make sure

Seite 110 - Windows 2000/NT/XP

32 6.4 Enabling and Configuring Wireless Security (No WPS) Follow the steps below to configure the wireless settings on your MWR102. The instructions

Seite 111

33 2. Wireless adapters come with software sometimes called a “utility” that you install on your computer. See your wireless adapter’s User’s Guide

Seite 112 - Windows XP)

34 Figure 11 Confirm Save 7. Check the status of your wireless connection in the screen below. If your wireless connection is weak or y

Seite 113

35 Part II: Wireless

Seite 114

36 7 Wireless 7.1 Overview This chapter discusses how to configure the wireless network settings in your MWR102. See the appendices for more detail

Seite 115 - Windows 7/Vista

37 7.3.1 Wireless Security Overview The following sections introduce different types of wireless security you can set up in the wireless network. 7

Seite 116 - 2 Click on Control Panel

38 Table 6 Types of Encryption for Each Type of Authentication NO AUTHENTICATION Weakest No Security WEP WPA-Personal (TKIP) WPA-Enterprise Stro

Seite 117

39 7.4 General Wireless LAN Screen Use this screen to enable the Wireless LAN, enter the SSID and select the channel. Note: If you are configuring t

Seite 118

4 Customer Support Please have the following information ready when you contact Customer Support: • Product model and serial number • Warranty info

Seite 119 - Macintosh OS 8/9

40 Network Band Allows you to choose between Wireless B/G/N functionality. Channel Width Allows you to choose between the 20MHz and 40MHz channel. C

Seite 120 - Macintosh OS X

41 Figure 14 Wireless > Advanced Settings The following table describes the labels in this screen. Table 8 Wireless > Advanced Settings LAB

Seite 121 - • Click the TCP/IP tab

42 Output Power Set the output power of the MWR102 in this field. If there is a high density of APs in an area, decrease the output power of the MWR

Seite 122 - Verifying Settings

43 7.6.2 WEP Encryption WEP encryption scrambles the data transmitted between the wireless stations and the access points to keep network communicat

Seite 123

44 Key Length Select 64-bit or 128-bit. This dictates the length of the security key that the network is going to use. Key Format Select ASCII (5 Cha

Seite 124

45 The following table describes the labels in this screen. Table 10 Wireless > Security: WPA-PSK/WPA2-PSK/WPA2-Mixed LABEL DESCRIPTION Encrypti

Seite 125 - Using Configuration Files

46 Figure 18 Wireless > Access Control The following table describes the labels in this menu. Table 11 Wireless > Access Control LABEL DES

Seite 126 - 34.1.2 Verifying Settings

47 Apply Changes Click Apply to save your changes back to the MWR102. Reset Click Reset to reload the previous configuration for this screen. 7.8 WPS

Seite 127 - Appendix D

48 Status This displays Configured when the MWR102 has connected to a wireless network using WPS. The current wireless and wireless security settings

Seite 128 - Figure 75 Basic Service Set

49 The following table describes the labels in this screen. Table 13 Wireless > Site Survey LABEL DESCRIPTION Wireless Site Survey SSI

Seite 129

5 Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. Warnings tell you about things that could

Seite 130 - RTS/CTS

50 8 Network Settings 8.1 Overview This chapter discusses the MWR102’s Network Settings screens. Use these screens to configure your LAN and WAN set

Seite 131 - Fragmentation Threshold

51 8.3 What You Need To Know The information in this section can help you configure the screens for your WAN and LAN connections. 8.3.1 Configuring

Seite 132 - Preamble Type

52 8.4 LAN Interface The LAN Interface Setup screen allows you to set up your LAN interface, the private IP of your router’s LAN port, and the subnet

Seite 133 - IEEE 802.1x

53 default. Auto IP Address Diversion Click the drop down list, you may select “Enabled” to divert the IP Address automatically or select “Disabled”

Seite 134 - Types of Authentication

54 8.5 WAN Interface This page allows users to configure WAN settings. You may select the Internet connection type from the drop down list next to “W

Seite 135 - PEAP (Protected EAP)

55 Provider (ISP). MTU Size The Maximum packet size the router will transmit. Any packet over the specified size will be chopped into a smaller size

Seite 136 - Dynamic WEP Key Exchange

56 Part III: Security MAC Filtering

Seite 137 - Encryption

57 9 MAC Filtering 9.1 Overview This chapter shows you how to enable and configure MAC address filtering that allows your MWR102 to permit and d

Seite 138

58 9.4 MAC Filtering This page allows users to restrict data from passing onto the internet from certain devices. Go to Firewall > MAC Filtering t

Seite 139 - Security Parameters Summary

59 Part IV: Management Status Statistics Log Upgrade Firmware Save/Reload Settings Password

Seite 140

6 Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The MWR102 icon is not an exact representation of your devi

Seite 141 - Appendix E

60 10 Status 10.1 Overview This chapter discusses how to access and interpret information about the MWR102. 10.2 What You Can Do • Use the Sta

Seite 142

61 Table 18 Management > Status LABEL DESCRIPTION System Information Uptime This is the total time the MWR102 has been on. Firmware Build Time

Seite 143

62 Internet IP Address The IP address provided by your Internet Service Provider (ISP). Subnet Mask The Subnet Mask provided by your Internet Service

Seite 144

63 11 Statistics 11.1 Overview This page shows users data transfer information, and monitors packets sent and received 11.2 Statistics Screen .

Seite 145

64 This table shows the number of packets received over Ethernet LAN. Ethernet WAN This table shows the number of packets sent over the Ethernet WAN

Seite 146 - Appendix F

65 12 Log 12.1 Overview This page shows current activity on the router, and allows you to set what information the router logs. 12.2 Log Screen

Seite 147 - Notices

66 LABEL DESCRIPTION Enable Log Checking this box enables system log functionality. System All Checking this box shows all logged information pass

Seite 148 - ZyXEL Limited Warranty

67 13 Upgrade Firmware 13.1 Overview Occasionally, a firmware upgrade may be issued to address bugs or add functionality. This chapter discusses h

Seite 149 - GPL-OSS Software Notice

68 Table 21 Management > Upgrade Firmware LABEL DESCRIPTION Select File Type in the location of the file you want to upload in this field or c

Seite 150 - Open Source Licenses

69 14 Save/Reload Settings 14.1 Overview This chapter shows you how to backup, restore and reset your MWR102. 14.2 What You Can Do Save Setting

Seite 151

7 Safety Warnings • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do not leave the device exposed t

Seite 152

70 Figure 32 Management > Save/Reload Settings The following table describes the labels in this screen. Table 22 Management > Save/Reload Set

Seite 153

71 Reset Pressing the Reset button in this section clears all user-entered configuration information and returns the MWR102 to its factory defaults.

Seite 154 - Open-Sourced Components

72 15 Password 15.1 Overview This chapter discusses management of the MWR102’s Administrator user name and password. These are the User name and

Seite 155

73 Table 23 Management > Password LABEL DESCRIPTION User Name Type the user name you wish to use to log into the MWR102. New Password Typ

Seite 157

75 16 Troubleshooting 16.1 Overview This chapter offers some suggestions to solve problems you might encounter. The potential problems are divi

Seite 158

76 3 Inspect your cables for damage. Contact the vendor to replace any damaged cables. 4 Disconnect and re-connect the power adaptor to the MWR10

Seite 159

77 1 Make sure you are using the correct IP address. • The default IP address is 192.168.100.1. • If you changed the IP address (Chapter 5), use

Seite 160

78 1 Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide. 2 Make sure you entered your ISP

Seite 161

79 Advanced Suggestions • Check the settings for bandwidth management. If it is disabled, you might consider activating it. If it is enabled, you mi

Seite 162

8 • Do not leave unit exposed to a heat source or in a location that may become hot, such as a parked vehicle or in direct sunlight. Do not leave in

Seite 163

80 4 Make sure your computer (with a wireless adapter installed) is within the transmission range of the MWR102. 5 Check that both the MWR102 and

Seite 164

81 17 Product Specifications The following tables summarize the MWR102’s hardware and firmware features. Table 24 Hardware Features Dimensions (W

Seite 165

82 FEATURE DESCRIPTION Default IP Address 192.168.100.1 (router) 192.168.100.2. (AP) Default Subnet Mask 255.255.255.0 (24 bits) Default Password

Seite 166

83 DHCP (Dynamic Host Configuration Protocol) Use this feature to have the MWR102 assign IP addresses, an IP default gateway and DNS servers to compu

Seite 167

84 Appendices Pop-up Windows, JavaScripts and Java Permissions IP Addresses and Subnetting Setting up Your Computer’s IP Address Wireless LANs Comm

Seite 168

85 Appendix A Pop-up Windows, JavaScripts and Java Permissions In order to use the Web-Based Management Interface you need to allow: • Web browser

Seite 169

86 Figure 34 Pop-up Blocker You can also check if pop-up blocking is disabled in the Pop-up Blocker section in the Privacy tab. 1 In Internet Ex

Seite 170

87 2 Select Settings…to open the Pop-up Blocker Settings screen. Figure 36 Internet Options: Privacy 3 Type the IP address of yo

Seite 171

88 Figure 37 Pop-up Blocker Settings 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScripts If pages

Seite 172

89 Figure 38 Internet Options: Security 2 Click the Custom Level... button. 3 Scroll down to Scripting. 4 Under Active scripting make sure

Seite 173

9 Table of Contents About This User's Guide ...

Seite 174

90 Figure 39 Security Settings - Java Scripting Java Permissions 1 From Internet Explorer, click Tools, Internet Options and then the Security t

Seite 175

91 Figure 40 Security Settings – Java JAVA (Sun) 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 Make sur

Seite 176

92 Figure 41 Java (Sun)

Seite 177

93 Appendix B IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a net

Seite 178

94 How much of the IP address is the network number and how much is the host ID varies according to the subnet mask. Subnet Masks A subnet mask is

Seite 179

95 Table 26 Subnet Mask - Identifying Network Number 1ST OCTET: (192) 2ND OCTET: (168) 3RD OCTET: (1) 4TH OCTET (2) IP Address (Binary) 11000000

Seite 180

96 24-bit mask 11111111 11111111 11111111 00000000 255.255.255.0 29-bit mask 11111111 11111111 11111111 11111000 255.255.255.248 . Network

Seite 181

97 For example, 192.1.1.0 /25 is equivalent to saying 192.1.1.0 with subnet mask 255.255.255.128. The following table shows some possible subnet mas

Seite 182 - Zlib License

98 You can “borrow” one of the host ID bits to divide the network 192.168.1.0 into two separate sub-networks. The subnet mask is now 25 bits (255.25

Seite 183 - radvd License

99 In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of 27 – 2 or 126 possible hosts (a host ID of all zeroes is the subne

Kommentare zu diesen Handbüchern

Keine Kommentare