- 2 -
CONTENTS
CONTENTS..............................................................................................................................................................................2
Chapter 1 Administrator Settings......................................................................................................................................1-1
Administrator Menu...............................................................................................................................................................1-2
Network.................................................................................................................................................................................1-3
Network.............................................................................................................................................................................1-3
■ Addition...................................................................................................................................................................1-4
■ Deletion...................................................................................................................................................................1-7
■ Priority-Level Settings.............................................................................................................................................1-8
■ Basic Information.....................................................................................................................................................1-8
■ Wireless LAN...........................................................................................................................................................1-9
■ Encryption...............................................................................................................................................................1-9
■ When WEP is selected for Mode...........................................................................................................................1-10
■ When WPA-PSK is selected for Mode..................................................................................................................1-11
■ Authentication Method...........................................................................................................................................1-12
■ TCP/IP...................................................................................................................................................................1-13
■ SIP Outb Proxy......................................................................................................................................................1-14
■ NAT Traversal.......................................................................................................................................................1-15
■ QoS.......................................................................................................................................................................1-16
■ Coding...................................................................................................................................................................1-17
■ Jitter Buffer............................................................................................................................................................1-17
SIP..................................................................................................................................................................................1-18
■ User account.........................................................................................................................................................1-18
■ Server....................................................................................................................................................................1-19
■ IMS Server............................................................................................................................................................1-19
■ Outbound Proxy....................................................................................................................................................1-20
■ Expire....................................................................................................................................................................1-20
Network Connection........................................................................................................................................................1-21
■ Network Connection..............................................................................................................................................1-21
Certificate Management..................................................................................................................................................1-22
■ Certificate Management........................................................................................................................................1-22
Network Search...............................................................................................................................................................1-25
Ping.................................................................................................................................................................................1-27
■ Manual Operations................................................................................................................................................1-27
■ Proxy Server 1.......................................................................................................................................................1-28
■ Proxy Server 2.......................................................................................................................................................1-28
■ Default Gateway....................................................................................................................................................1-29
■ TFTP Server..........................................................................................................................................................1-29
Password.............................................................................................................................................................................1-30
Administrator Password..................................................................................................................................................1-30
User Password Reset.....................................................................................................................................................1-31
Version Upgrade..................................................................................................................................................................1-32
Error Log..............................................................................................................................................................................1-34
Web Server..........................................................................................................................................................................1-35
Initializing.............................................................................................................................................................................1-36
Memory Info (Memory Usage).............................................................................................................................................1-37
Chapter 2 Web Settings......................................................................................................................................................2-1
WirelessIP 3000 Web Settings..............................................................................................................................................2-2
Overview...........................................................................................................................................................................2-2
When setting via TELNET:................................................................................................................................................2-2
Access restrictions............................................................................................................................................................2-2
Management User Menu.......................................................................................................................................................2-3
Main..................................................................................................................................................................................2-3