Tenda F357 User Manual page 81

Table of Contents

Advertisement

Wireless N301 Easy Setup Router
(none, WEP, or WPA) and the same encryption keys. They may be
configured to different service set identifiers. WDS also requires
every base station to be configured to forward to others in the
system. WDS may also be considered a repeater mode because it
appears to bridge and accept wireless clients at the same time
(unlike traditional bridging).WDS may be incompatible between
different products (even occasionally from the same vendor) since it
is not certified by the Wi-Fi Alliance. WDS may provide two modes
of wireless AP-to-AP connectivity:
Wireless bridging, in which WDS APs communicate only with each
other and don't allow wireless clients or stations (STA) to access
them.
Wireless repeating, in which APs communicate with each other and
with wireless STAs.
DMZ
In computer security, a DMZ (sometimes referred to as a perimeter
networking) is a physical or logical subnetwork that contains and
exposes an organization's external-facing services to a larger
untrusted network, usually the Internet. The purpose of a DMZ is to
add an additional layer of security to an organization's local area
network (LAN); an external attacker only has access to equipment in
the DMZ, rather than any other part of the network. Hosts in the
DMZ have limited connectivity to specific hosts in the internal
network, although communication with other hosts in the DMZ and
to the external network is allowed. This allows hosts in the DMZ to
provide services to both the internal and external network, while an
intervening firewall controls the traffic between the DMZ servers
and the internal network clients. Any services such as Web servers,
77
.

Advertisement

Table of Contents
loading

Table of Contents