User manual COMET LABS WRM54

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual COMET LABS WRM54. We hope that this COMET LABS WRM54 user guide will be useful to you.


COMET LABS WRM54 : Download the complete user guide (9699 Ko)

You may also download the following manuals related to this product:

   COMET LABS WRM54 (6847 ko)
   COMET LABS WRM54 1 (287 ko)
   COMET LABS WRM54 1 (413 ko)

Manual abstract: user guide COMET LABS WRM54

Detailed instructions for use are in the User's Guide.

[. . . ] Wireless 802. 11g Router with ADSL Modem and 4-Port switch built-in User's Manual Version 1. 01 ­ Dec. 2003 1 Copyright The contents of this publication may not be reproduced in any part or as a whole, stored, transcribed in an information retrieval system, translated into any language, or transmitted in any form or by any means, mechanical, magnetic, electronic, optical, photocopying, manual, or otherwise, without the prior written permission. Trademarks All product, company, brand names are trademarks or registered trademarks of their respective companies. Specifications are subject to be changed without prior notice. FCC Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against radio interference in a commercial environment. [. . . ] Connection control Check "Connection control" to enable the controlling of which wired and wireless clients can connect to this device. If a client is denied to connect to this device, it means the client can't access to the Internet either. Choose "allow" or "deny" to allow or deny the clients, whose MAC addresses are not in the "Control table" (please see below), to connect to this device. Association control Check "Association control" to enable the Controlling of which wireless client can associate to the wireless LAN. If a client is denied to associate to the wireless LAN, it means the client can't send or receive any data via this device. Choose "allow" or "deny" to allow or deny the clients, whose MAC addresses are not in the "Control table", to associate to the wireless LAN. Control table 41 "Control table" is the table at the bottom of the "MAC Address Control" page. Each row of this table indicates the MAC address and the expected IP address mapping of a client. There are four columns in this table: MAC Address IP Address MAC address indicates a specific client. Keep it empty if you don't care its IP address. C When "Connection control" is checked, check "C" will allow the corresponding client to connect to this device. A When "Association control" is checked, check "A" will allow the corresponding client to associate to the wireless LAN. In this page, we provide the following Combo box and button to help you to input the MAC address. You can select a specific client in the "DHCP clients" Combo box, and then click on the "Copy to" button to copy the MAC address of the client you select to the ID selected in the "ID" Combo box. Previous page and Next Page To make this setup page simple and clear, we have divided the "Control table" into several pages. You can use these buttons to navigate to different pages. 42 4. 6. 5 VPN setting VPN Settings are settings that are used to create virtual private tunnels to remote VPN gateways. The tunnel technology supports data confidentiality, data origin authentication and data integrity of network information by utilizing encapsulation protocols, encryption algorithms, and hashing algorithms. VPN enable item VPN protects network information from ill network inspectors. number of tunnels item Since VPN greatly degrades network throughput, the allowable maximum number of tunnels is limited. Be careful to set the value for allowing the number of tunnels can be created simultaneously. Method IPSec VPN supports two kinds of key-obtained methods: manual key and automatic key exchange. Manual key approach indicates that two end VPN gateways setup authenticator and encryption key by system managers manually. System managers of both end gateways only need set the same pre-shared key. Function of Buttons More: To setup detailer configuration for manual key or IKE approaches by clicking the "More" button. 43 4. 6. 5. 1 VPN Settings ­ IPSEC VPN Settings - IKE There are three parts that are necessary to setup the configuration of IKE for the dedicated tunnel: basic setup, IKE proposal setup, and IPSec proposal setup. Basic setup includes the setting of following items: local subnet, local netmask, remote subnet, remote netmask, remote gateway, and pre-shared key. IKE proposal setup includes the setting of a set of frequent-used IKE proposals and the selecting from the set of IKE proposals. Similarly, IPSec proposal setup includes the setting of a set of frequent-used IPSec proposals and the selecting from the set of IPSec proposals. [. . . ] Set authentication type of wireless client and RADIUS server both to PEAP_TLS. 4. The DUT will send the user's certificate to the RADIUS server, and then send the message of authentication result to PC2. Windows XP will prompt that the authentication process is success or fail and end the authentication procedure. Terminate the test steps when PC2 get dynamic IP and PING remote host successfully. Support Type: Comet Labs supports the types of 802. 1x Authentication: PEAP-CHAPv2 and PEAP-TLS. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE COMET LABS WRM54




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual COMET LABS WRM54 will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.