Chapter 5
Wireless
Security ....................................................................................................................5-2
Placement and Range ..............................................................................................5-2
Wireless LAN Setup .......................................................................................................5-3
Firmware Upgrade ..........................................................................................................5-4
Security ...........................................................................................................................5-5
Authentication Type ...........................................................................................5-5
Access Control ...............................................................................................................5-7
Station List ......................................................................................................................5-8
Chapter 6
E-Mail .......................................................................................................................6-2
Block Sites ...............................................................................................................6-4
Schedule ..................................................................................................................6-5
Logs .........................................................................................................................6-6
Chapter 7
System Status .................................................................................................................7-1
Attached Devices ............................................................................................................7-4
Router Software Upgrade ...............................................................................................7-4
Erase the Configuration ...........................................................................................7-6
Chapter 8
Add a Custom Service .......................................................................................8-3
Security ...........................................................................................................................8-4
Contents
vii