Key Renewal. Enter a Key Renewal timeout period, which instructs the Access Point how often it should change the encryption keys. Shared Secret. If you do not wish to filter users by MAC address, select Disable.
In most cases, these settings do not need to be changed. Advanced Wireless You can change the data transmission and output power settings for the Access Point. Authentication Type.
This selection is for choosing which antenna transmits data, left or right. If you are not sure which antenna to use, keep the default, Diversity, to increase reception. Beacon Interval. It provides network administrators with the ability to monitor the status of the Access Point and receive notification of any critical events as they occur on the Access Point.
To view these permanent logs, you must use Logviewer software, which can be downloaded free of charge from www. View Log. After you upgrade its firmware, you will have to re-enter all of your configuration settings. Download the firmware upgrade file from the Linksys website, www. Extract the firmware upgrade file on your computer. Seite Appendix A: Troubleshooting This appendix provides solutions to problems that may occur during the installation and operation of the Wireless-G Access Point.
Read the description below to solve your problems. If you can't find an answer here, check the Linksys website at www. The product supports the following IEEE Seite Can Linksys wireless products support file and printer sharing? Linksys wireless products perform the same function as LAN products. The Media Access Control MAC address is a unique number assigned by the manufacturer to any Ethernet networking device, such as a network adapter, that allows the network to identify it at the hardware level.
For all practical purposes, this number is usually permanent. The current generation of Linksys products provide several network security features, but they require specific action on your part for implementation. Seite This includes hackers. Wireless networking products come with a default SSID set by the factory.
Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use. Seite These security recommendations should help keep your mind at ease while you are enjoying the most flexible and convenient technology Linksys has to offer. Follow these instructions: 1.
Windows is the most used operating system in the world and comes with many features that help make networking easier. These features can be accessed through Windows Help and are described in this appendix.
Seite Wireless-G Access Point Cable Modem - A device that connects a computer to the cable television network, which in turn connects to the Internet. Many specific authentication methods work within this framework. Seite Packet - A unit of data sent over a network.
Passphrase - Used much like a password, a passphrase simplifies the WEP encryption process by automatically generating the WEP encryption keys for Linksys products. PEAP Protected Extensible Authentication Protocol - A mutual authentication method that uses a combination of digital certificates and another system, such as passwords. Port - The connection point on a computer or networking device used for plugging in cables or adapters.
Power over Ethernet PoE - A technology enabling an Ethernet network cable to deliver both data and power. Seite Wireless-G Access Point Spread Spectrum - Wideband radio frequency technique used for more reliable and secure data transmission. Static IP Address - A fixed address assigned to a computer or device that is connected to a network. Static Routing - Forwarding data in a network via a fixed path.
WEP Wired Equivalent Privacy - A method of encrypting network data transmitted on a wireless network for greater security. Seite Appendix F: Specifications Seite Appendix G: Warranty Information Your exclusive remedy and Linksys' entire liability under this warranty will be for Linksys at its option to repair or replace the Product or refund Your purchase price less any rebates.
These limits are designed to provide reasonable protection against harmful interference in a residential installation. Visit www. Then select your product. Check the CE label on the product to find out which notified body was involved during the assessment.
Both of these cables are 9 meters long and have a cable loss attenuation of 5 dB. Maximum power output on each adapter does not exceed 20 dBm mW ; Seite 7. Click the type of documentation you want. The document will automatically open in PDF format.
Appendix H: Regulatory Information Linksys ist eine eingetragene Marke bzw. Alle Rechte vorbehalten. Andere Handelsmarken und Produktnamen sind Marken bzw. Ein integriertes Wireless- und verdrahtetes Netzwerk wird als Infrastrukturnetzwerk bezeichnet. Mit diesen Produkten, wie mit vielen weiteren Linksys Produkten auch, stehen Ihnen grenzenlose Netzwerk- betriebsoptionen offen. Abbildung Fenster zum Einschalten des Access Points 6. Die Standardeinstellung ist linksys Kleinbuchstaben. Wenn Sie Daten aus.
So aktualisieren Sie die Firmware des Access Points: 1. Laden Sie die Firmware-Aktualisierungsdatei unter www. Abbildung Fenster Administration Verwaltung — 2. Seite Verbesserung von Sicherheit und Zugriffskontrolle. Was ist WEP? Die aktuellen Produkte von Linksys bieten verschiedene Netzwerksicherheitsfunktionen. Beachten Sie daher Folgendes beim Einrichten bzw. Topologie: Die physische Anordnung eines Netzwerks. Richten Sie alle Anfragen direkt an: Linksys, P.
Rufen Sie www. Beide Kabel sind neun Meter lang. Seite Technische Dokumente unter www. Klicken Sie auf Ihre Region. Klicken Sie auf den Namen Ihres Landes. Sans fil - Chapitre 1 : Introduction Connexions pour configuration 2. Il est uniquement disponible aux Etats-Unis et au Canada.
Puis cliquez sur le bouton Next Suivant. Cliquez sur le OK pour continuer. Passphrase Phrase mot de passe. Frame Burst Mode Mode Rafale de trames. View Log Afficher journal. Visitez www. Seite 1 drucken Dokument drucken Seiten. Lesezeichen umbenennen. Anmelden ODER. RESE … 3. RF exposure warning This equipment must be installed and operated in accordance with provided instructions and the antenna s used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter.
End-users and installers must be provided with antenna installation instructions and transmitter operating … End-users and installers must be provided with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance.
Operation is subject to the following two conditions: 1 this device may not cause interference, and 2 this device must accept any interference, including interference that may cause undesired operation of the device. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio co … 6.
The modem provides high-spe e dInternet access over existing telephone lines,features analways-on digital connection, and provides wide equip-ment interoperability and syst
0コメント