USER’S MANUAL OF WLAN BROADBAND ROUTER Version: 1.0
I WDS Security Setup.................................................................................................... 22
II WDS AP Table............................................................................................................. 23
3.3.9 Site Survey............................................................................................................... 24
3.3.10 LAN Interface Setup................................................................................................ 24
3.3.11 WAN Interface Setup............................................................................................... 26
I Static IP........................................................................................................................ 26
II DHCP Client................................................................................................................ 28
III PPPoE ...................................................................................................................... 29
IV PPTP ........................................................................................................................ 31
3.3.12 Firewall - Port Filtering ........................................................................................... 32
3.3.13 Firewall - IP Filtering............................................................................................... 33
3.3.14 Firewall - MAC Filtering......................................................................................... 34
3.3.15 Firewall - Port Forwarding....................................................................................... 35
3.3.16 Firewall – URL Filtering.......................................................................................... 37
3.3.17 Firewall - DMZ........................................................................................................ 38
3.3.18 VPN Setting............................................................................................................. 38
I VPN Setup - Edit Tunnel ............................................................................................. 40
II Advanced IKE Setup.................................................................................................... 42
3.3.19 Management - Statistics........................................................................................... 43
3.3.20 Management - DDNS .............................................................................................. 44
3.3.21 Management - Time Zone Setting............................................................................ 45
3.3.22 Management – Denial-of-Service............................................................................ 45
3.3.23 Management - Log................................................................................................... 46
3.3.24 Management - Upgrade Firmware........................................................................... 47
3.3.25 Management Save/ Reload Settings......................................................................... 48
3.3.26 Management - Password Setup................................................................................ 49
3.3.27 Logout...................................................................................................................... 49
4 FREQUENTLY ASKED QUESTIONS (FAQ).................................................................... 51
4.1 WHAT AND HOW TO FIND MY PC’S IP AND MAC ADDRESS?............................................... 51
4.2 WHAT IS WIRELESS LAN? ................................................................................................. 51
4.3 WHAT ARE ISM BANDS? .................................................................................................... 51
4.4 HOW DOES WIRELESS NETWORKING WORK?....................................................................... 51
4.5 WHAT IS BSSID?............................................................................................................... 52
4.6 WHAT IS ESSID? ............................................................................................................... 52
4.7 WHAT ARE POTENTIAL FACTORS THAT MAY CAUSES INTERFERENCE? ................................. 53
ii
4.8 WHAT ARE THE OPEN SYSTEM AND SHARED KEY AUTHENTICATIONS? .............................. 53