User manual BUFFALO WLM-L11G

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual BUFFALO WLM-L11G. We hope that this BUFFALO WLM-L11G user guide will be useful to you.


BUFFALO WLM-L11G : Download the complete user guide (1197 Ko)

Manual abstract: user guide BUFFALO WLM-L11G

Detailed instructions for use are in the User's Guide.

[. . . ] PART I 1. 0 Introduction I The WLM-L11G protects customers' investments over the long term. Buffalo's new WLAN product, WLM-L11G, is the IEEE802. 11b-based access point (AP) with room to grow to IEEE802. 11a or IEEE802. 11g, depending on the user's needs. The Buffalo solution offers simultaneous communication on both 5GHz and 2. 4GHz bands without annoying bottlenecks. High reliability, manageability and standard Buffalo features are integrated in the product and will assure easy management and high quality signal communication. [. . . ] This will prohibit access to the WLML11G's configuration screen from a wireless client. 12 · A setup from a wired LAN is forbidden. This will disable access to the configuration screens from a wired LAN PC. This keeps anyone who is actually connected to a DIFFERENT AP from configuring the WLM-L11G. If you make a mistake here and "lock yourself out, " the WLML11G can be returned to the factory default settings (ALL of them!) by holding down the INIT button on the back of the unit for 3 seconds. To change a setting, check the box on the item to be changed and click "delete the checked rules. " The setting can be reset to the default by clicking "Initialize Rule. " 8. 8 Security Security features include Authentication, Privacy and Access Authorization. Note: For MAC Access Restriction, do not check the "Enable" box until you have set up Authorized MAC addresses (Section 9. 8. 4. 3). 8. 8. 2 Privacy, WEP Encryption Code Set the encryption method used in wireless communications for the protection of your data. It is necessary that the WEP key match between two parties for secure communications. If multiple keys are used, the order must match between communicating devices. · If WEP is not used, leave the box blank or input all 0s, which is equivalent to no-WEP. When a client requests communication with the WLM-L11G access point, the WLM-L11G reports its own MAC address to the RADIUS server and asks for communication approval to the client. Once the client is recognized by the RADIUS, the RADIUS issues a key to the AP as well as the client for initiation of communications. Shared Secret=The secret key to be used between the WLM-L11G and the client. It is the same key used between the RADIUS server and the AP for communication. Use numeral characters between 1~255. Figure 8. 8. 3 Access Authorization, RADIUS 13 8. 8. 4 MAC Restrict Enable or disable access by MAC address through the wireless LAN network infrastructure mode. 8. 8. 4. 1 Manual Setting MAC addresses may be added to the authorized list manually. Enter the MAC address in the "MAC address of wireless LAN PC" field and click "add. " The MAC address must be in two-digit groups separated by colons. For example, 00:40:26:00:11:22. Figure 8. 8. 4. 1 Manual Setting 8. 8. 4. 2 List of the Wireless PCs Displays the PCs that are communicating with the WLM-L11G. Check the "registration" box and click the "change" button to add a MAC address. 8. 8. 4. 3 Authorized Wireless LAN PCs Displays all MAC addresses that are allowed to communicate with the WLM-L11G. To eliminate a specific MAC address from the network, check the "delete" box and click the "change" button. Note: If configuring from a wireless PC, add your MAC address to the list of authorized wireless LAN PCs (MAC restrict screen). [. . . ] 23 RADIUS (Remote Authentication Dial In User Service): A server that issues authentication keys to clients. Repeater Hub: A device that collects, strengthens and transmits information to all connected devices, allowing the network to be extended to accommodate additional workstations. RC4: The encryption algorithm that is used in WEP RJ-45 connector: An 8-pin connector used for connecting twisted pair cable to a data transmissions device. Router: A device that can connect individual LANs and remote sites to a server. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE BUFFALO WLM-L11G




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual BUFFALO WLM-L11G will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.