Winmate Inc. 1200 Benutzerhandbuch
ACCESS POINT
iii
5.2.3 Wireless LAN...............................................................................................22
5.2.4 Privacy Options ..........................................................................................23
5.2.5 Operational Settings ...................................................................................24
5.2.6 Advance Operational Setting ......................................................................26
5.2.7 Authorized MAC addresses.........................................................................29
5.2.8 SNMP Traps................................................................................................30
5.2.9 Authorization ..............................................................................................31
5.2.4 Privacy Options ..........................................................................................23
5.2.5 Operational Settings ...................................................................................24
5.2.6 Advance Operational Setting ......................................................................26
5.2.7 Authorized MAC addresses.........................................................................29
5.2.8 SNMP Traps................................................................................................30
5.2.9 Authorization ..............................................................................................31
5.3 C
OMMANDS
M
ENU
.............................................................................................32
5.4 I
NFORMATION
M
ENU
...........................................................................................33
5.4.1 Wireless Statistics........................................................................................34
5.4.2Ethernet Statistics ........................................................................................35
5.4.2Ethernet Statistics ........................................................................................35
5.5 T
RAP
M
ENU
........................................................................................................36
5.6 N
ETWORK
M
ENU
................................................................................................38
5.7 W
INDOW
M
ENU
..................................................................................................40
5.8 H
ELP
M
ENU
........................................................................................................41
6. TUTORIAL ........................................................................................ 42
6.1 P
ACKET
F
RAGMENTATION
...................................................................................42
6.2 E
NCRYPTION
.......................................................................................................43
Authentication Type .............................................................................................44
How is encryption key generated?.......................................................................44
How is encryption key generated?.......................................................................44
6.3 S
UBNETTING
.......................................................................................................45
7. TROUBLESHOOTING...................................................................... 46
7.1 C
HECKING
V
ALID
IP A
DDRESSES
........................................................................49
7.2 C
ONNECTION
T
ROUBLESHOOTING
......................................................................50
7.3 R
ESETTING THE
A
CCESS
P
OINT
...........................................................................51
7.4 E
NCRYPTION
T
ROUBLESHOOTING
.......................................................................52
7.5 T
ROUBLESHOOTING
C
HECK
T
ABLE
.....................................................................53
8. FAQ..................................................................................................... 54
9. WLAN GLOSSARY........................................................................... 56
FEDERAL COMMUNICATIONS COMMISSION INTERFERENCE STATEMENT......... 60