Netgear PR2000 - Trek N300 Travel Router and Range Extender 사용자 설명서

다운로드
페이지 149
Hardware Setup 
15
 Trek N300 Travel Router and Range Extender PR2000
Different Ways You Can Connect to the Internet
Whether you use the Internet in the home or on the go (or both), the Trek is your solution to a 
better Internet experience.
The Trek gives you a way to connect to the Internet while away from home.
Do you want to connect your devices to the Internet at a WiFi hotspot? Connect your Trek to 
the WiFi hotspot and then connect your devices to your Trek. The Trek’s firewall protects 
your personal devices from known DoS attacks and port scans from the Internet. For more 
information, see 
15.
Do you want to connect your devices to your cellular service while traveling? Connect your 
Trek to your cellular service and then connect your devices to your Trek (this feature is 
available only in certain regions). For more information, see 
The Trek gives you a way to extend and expand the home network that you already have 
with your existing Internet connection. Use the Trek for any of the following situations:
Add a WiFi router to your home network.
Do you want to connect your wireless devices to your network? Convert your home 
network into a home WiFi network. For more information, see 
19.
Extend the range of your home WiFi network.
Do you want to use your wireless devices at a greater distance from your WiFi router? 
Extend the range of your WiFi router with a WiFi range extender. For more information, 
see 
17.
Bridge the distance to your Internet-ready TV.
Is your Internet-ready TV or other Ethernet-enabled device too far from your router for an 
Ethernet cable connection? Bridge the distance with a WiFi bridge. Examples of 
Ethernet-enabled devices include an Internet-ready TV, Blu-ray player, gaming console, 
and desktop or laptop computer. For more information, see 
WiFi Connection at a Public Hotspot Setup
Use the Trek as a WiFi connection to a wireless network in a WiFi hotspot zone. The Trek’s 
firewall protects your devices from known DoS attacks and port scans from the Internet.