11g Wireless Security Router User Guide
Table of Contents
1
1
G
W
I
R
E
L
E
S
1
1
G
W
I
R
E
L
E
FCC INTERFERENCE STATEMENT ............................................................................................................................II
CE DECLARATION OF CONFORMITY: .....................................................................................................................II
INTRODUCTION .................................................................................................................................................................. 1
About this Guide............................................................................................................................................................. 1
Chapter 3: Internet Access............................................................................................................................................ 2
Chapter 4: Advanced Applications.............................................................................................................................. 2
Chapter 5: Management................................................................................................................................................ 2
Chapter 6: Macintosh Setup......................................................................................................................................... 2
Chapter 7: Trouble Shooting ........................................................................................................................................ 2
Conventions..................................................................................................................................................................... 2
11
Ethernet / Fast Ethernet ................................................................................................................................................ 3
Wireless LAN ................................................................................................................................................................... 3
Installing the TCP/IP Protocol..................................................................................................................................... 7
Fixed IP Addresses Configuration............................................................................................................................. 11
CHAPTER 3: INTERNET ACCESS ..............................................................................................................................13
-
S
S
E
C
U
R
I
T
Y
S
S
S
E
C
U
R
I
T
Y
11
11
.....................................................................................................................................6
.......................................................................................................................................................6
..........................................................................................................................7
..................................................................................................................13
....................................................................................................................................13
R
O
U
T
E
R
R
O
U
T
E
R
............................................................................. I
........................................................................................................3
...........................................................................4
..............................................................................................4
- iv -