Winmate Inc. 1200 Benutzerhandbuch

Seite von 65
ACCESS POINT 
 
iii 
5.2.3 Wireless LAN...............................................................................................22 
5.2.4 Privacy Options ..........................................................................................23 
5.2.5 Operational Settings ...................................................................................24 
5.2.6 Advance Operational Setting ......................................................................26 
5.2.7 Authorized MAC addresses.........................................................................29 
5.2.8 SNMP Traps................................................................................................30 
5.2.9 Authorization ..............................................................................................31 
5.3 C
OMMANDS 
M
ENU
.............................................................................................32 
5.4 I
NFORMATION 
M
ENU
...........................................................................................33 
5.4.1 Wireless Statistics........................................................................................34 
5.4.2Ethernet Statistics ........................................................................................35 
5.5 T
RAP 
M
ENU
........................................................................................................36 
5.6 N
ETWORK 
M
ENU
................................................................................................38 
5.7 W
INDOW 
M
ENU
..................................................................................................40 
5.8 H
ELP 
M
ENU
........................................................................................................41 
6. TUTORIAL ........................................................................................ 42
 
6.1 P
ACKET 
F
RAGMENTATION
...................................................................................42 
6.2 E
NCRYPTION
.......................................................................................................43 
Authentication Type .............................................................................................44 
How is encryption key generated?.......................................................................44 
6.3 S
UBNETTING
.......................................................................................................45 
7. TROUBLESHOOTING...................................................................... 46
 
7.1 C
HECKING 
V
ALID 
IP A
DDRESSES
........................................................................49 
7.2 C
ONNECTION 
T
ROUBLESHOOTING
......................................................................50 
7.3 R
ESETTING THE 
A
CCESS 
P
OINT
...........................................................................51 
7.4 E
NCRYPTION 
T
ROUBLESHOOTING
.......................................................................52 
7.5 T
ROUBLESHOOTING 
C
HECK 
T
ABLE
.....................................................................53 
8. FAQ..................................................................................................... 54
 
9. WLAN GLOSSARY........................................................................... 56
 
FEDERAL COMMUNICATIONS COMMISSION INTERFERENCE STATEMENT......... 60