Canon Wireless File Transmitter WFT-E6A 매뉴얼
112
In Windows, open the [Command Prompt], input ipconfig/all, and press the <Enter> key.
The IP address assigned to the computer is displayed, as well as the subnet mask, gateway,
and DNS server information.
To avoid using the same IP address for the computer and other devices on the network when
configuring the IP address assigned to the camera (page 23), change the rightmost numbers
here.
The IP address assigned to the computer is displayed, as well as the subnet mask, gateway,
and DNS server information.
To avoid using the same IP address for the computer and other devices on the network when
configuring the IP address assigned to the camera (page 23), change the rightmost numbers
here.
In Mac OS X, open the [Terminal] application, type ifconfig -a, and press the <Return> key.
The IP address assigned to the computer is indicated in the [en0] item by [inet], in the format
***.***.***.***.
To avoid using the same IP address for the computer and other devices on the network when
configuring the IP address assigned to the camera (page 23), change the rightmost numbers
here.
* For information on the [Terminal] application, refer to the Mac OS X help.
The IP address assigned to the computer is indicated in the [en0] item by [inet], in the format
***.***.***.***.
To avoid using the same IP address for the computer and other devices on the network when
configuring the IP address assigned to the camera (page 23), change the rightmost numbers
here.
* For information on the [Terminal] application, refer to the Mac OS X help.
If security settings have not been properly set, the following problems may occur.
Transmission monitoring
Third parties with malicious intent may monitor the wireless LAN transmissions and attempt
to acquire the data you are sending.
Third parties with malicious intent may monitor the wireless LAN transmissions and attempt
to acquire the data you are sending.
Unauthorized network access
Third parties with malicious intent may gain unauthorized access to the network you are
using to steal, modify, or destroy information.
Additionally, you could fall victim to other types of unauthorized access such as
impersonation (where someone assumes an identity to gain access to unauthorized
information) or springboard attacks (where someone gains unauthorized access to your
network as a springboard to cover their tracks when infiltrating other systems).
Third parties with malicious intent may gain unauthorized access to the network you are
using to steal, modify, or destroy information.
Additionally, you could fall victim to other types of unauthorized access such as
impersonation (where someone assumes an identity to gain access to unauthorized
information) or springboard attacks (where someone gains unauthorized access to your
network as a springboard to cover their tracks when infiltrating other systems).
To prevent these types of problems from occurring, be sure to thoroughly secure your network.
Checking Network Settings
Windows
Macintosh
Security