Login:
Stimmen - 0, Durchschnittliche Bewertung: 0 ( )

Anleitung NETGEAR, modell WPN824v1

Hersteller: NETGEAR
Dateigröße: 2.62 mb
Dateiname:
Unterrichtssprache:en
Link zum kostenlosen Download Hinweise finden Sie am Ende der Seite



Dieses Gerät hat auch andere Anweisungen:
Netzwerk - WPN824v1 (346.43 kb)en
Netzwerk - WPN824v1 (584.56 kb)en

Anleitung Zusammenfassung


Reference Manual for the RangeMax Wireless Router WPN824 Contents Chapter 1 About This Manual Audience, Scope, Conventions, and Formats How to Use This Manual How to Print this Manual Chapter 2 Introduction Key Features RangeMax™ Multi-In, Multi-Out (MIMO) Technology 802.11g Wireless Networking A Powerful, True Firewall with Content Filtering Security Autosensing Ethernet Connections with Auto Uplink Extensive Protocol Support Easy Installation and Management Maintenance and Support NETGEAR Related Products Package Contents The Router’s Front Panel The Router’s Rear Panel A Road Map for ‘How to Get There From Here’ Chapter 3 Connecting the Router to the Internet Prepare to Install Your Wireless Router First, Use the Smart Wizard to Configure the Wireless Router Now, Set Up a Computer for Wireless Connectivity Troubleshooting Tips Overview of How to Access the Wireless Router How to Log On to the Wireless Router After Configuration Settings Have Been Applied How to Bypass the Configuration Assistant How to Manually Configure Your Internet Connection Using the Smart Setup Wizard NETGEAR Product Registration, Support, and Documentation Chapter 4 Wireless Configuration Observe Performance, Placement, and Range Guidelines Implement Appropriate Wireless Security Understanding Wireless Settings Information to Gather Before Changing Basic Wireless Settings Default Factory Settings How to Set Up and Test Basic Wireless Connectivity How to Configure WEP How to Configure WPA-PSK Wireless Security How to Restrict Wireless Access by MAC Address Chapter 5 Content Filtering Content Filtering Overview Blocking Access to Internet Sites Blocking Access to Internet Services Configuring a User Defined Service Configuring Services Blocking by IP Address Range Scheduling When Blocking Will Be Enforced Viewing Logs of Web Access or Attempted Web Access Configuring E-Mail Alert and Web Access Log Notifications Chapter 6 Maintenance Viewing Wireless Router Status Information Viewing a List of Attached Devices Configuration File Management Restoring and Backing Up the Configuration Erasing the Configuration Upgrading the Router Software Changing the Administrator Password Chapter 7 Troubleshooting Basic Functioning Power Light Not On Lights Never Turn Off LAN or WAN Port Lights Not On Troubleshooting the Web Configuration Interface Troubleshooting the ISP Connection Troubleshooting a TCP/IP Network Using a Ping Utility Testing the LAN Path to Your Router Testing the Path from Your Computer to a Remote Device Restoring the Default Configuration and Password Problems with Date and Time Chapter 8 Advanced Configuration of the Router Configuring Advanced Wireless Settings Wireless Card Access List Wireless Card Access Setup Configuring Port Triggering and Port Forwarding Configuring Port Forwarding to Local Servers Adding a Custom Service Editing or Deleting a Port Forwarding Entry Local Web and FTP Server Example Multiple Computers for Half Life, KALI or Quake III Example Configuring the WAN Setup Options Connect Automatically, as Required Disabling the SPI Firewall Setting Up a Default DMZ Server Responding to Ping on Internet WAN Port Setting the MTU Size Using the LAN IP Setup Options Configuring LAN TCP/IP Setup Parameters Using the Router as a DHCP server Using Address Reservation Using a Dynamic DNS Service Configuring Static Routes Enabling Remote Management Access Using Universal Plug and Play (UPnP) Appendix ATechnical Specifications Appendix BNetwork, Routing, Firewall, and Basics Related Publications Basic Router Concepts What is a Router? Routing Information Protocol IP Addresses and the Internet Netmask Subnet Addressing Private IP Addresses Single IP Address Operation Using NAT MAC Addresses and Address Resolution Protocol Related Documents Domain Name Server IP Configuration by DHCP Internet Security and Firewalls What is a Firewall? Stateful Packet Inspection Denial of Service Attack Ethernet Cabling Category 5 Cable Quality Inside Twisted Pair Cables Uplink Switches, Crossover Cables, and MDI/MDIX Switching Appendix CPreparing Your Network What You Need To Use a Router with a Broadband Modem Cabling and Computer Hardware Computer Network Configuration Requirements Internet Configuration Requirements Where Do I Get the Internet Configuration Parameters? Record Your Internet Connection Information Preparing Your Computers for TCP/IP Networking Configuring Windows 95, 98, and Me for TCP/IP Networking Install or Verify Windows Networking Components Enabling DHCP to Automatically Configure TCP/IP Settings in Windows 95B, 98, and Me Selecting Windows’ Internet Access Method Verifying TCP/IP Properties Configuring Windows NT4, 2000 or XP for IP Networking Install or Verify Windows Networking Components DHCP Configuration of TCP/IP in Windows XP, 2000, or NT4 DHCP Configuration of TCP/IP in Windows XP DHCP Configuration of TCP/IP in Windows 2000 DHCP Configuration of TCP/IP in Windows NT4 Verifying TCP/IP Properties for Windows XP, 2000, and NT4 Configuring the Macintosh for TCP/IP Networking MacOS 8.6 or 9.x MacOS X Verifying TCP/IP Properties for Macintosh Computers Verifying the Readiness of Your Internet Account Are Login Protocols Used? What Is Your Configuration Information? Obtaining ISP Configuration Information for Windows Computers Obtaining ISP Configuration Information for Macintosh Computers Restarting the Network Appendix DWireless Networking Basics Wireless Networking Overview Infrastructure Mode Ad Hoc Mode (Peer-to-Peer Workgroup) Network Name: Extended Service Set Identification (ESSID) Authentication and WEP Data Encryption 802.11 Authentication Open System Authentication Shared Key Authentication Overview of WEP Parameters Key Size WEP Configuration Options Wireless Channels WPA and WPA2 Wireless Security How Does WPA Compare to WEP? How Does WPA Compare to WPA2 (IEEE 802.11i)? What are the Key Features of WPA and WPA2 Security? WPA/WPA2 Authentication: Enterprise-level User Authentication via 802.1x/EAP and RADIUS WPA/WPA2 Data Encryption Key Management Is WPA/WPA2 Perfect? Product Support for WPA/WPA2 Supporting a Mixture of WPA, WPA2, and WEP Wireless Clients is Discouraged Changes to Wireless Access Points Changes to Wireless Network Adapters Changes to Wireless Client Progra...

Dieses Handbuch ist für folgende Modelle:
Netzwerk - WPN824v2 (2.62 mb)

Bewertungen



Bewerten
Vorname:
Geben Sie zwei Ziffern:
capcha





Kategorien