Войти:
Оценок - 0, средний балл: 0 ( )

Инструкция по эксплуатации NETGEAR, модель WGM124

Производитель: NETGEAR
Размер: 1.08 mb
Название файла:
Язык инструкции:en
Перейти к скачиванию



К этому устройству также есть другие инструкции:

Фрагмент инструкции


NETGEAR Wireless Router Setup Manual Product and Publication Details Contents Chapter 1 About This Guide Audience, Conventions, and Formats How to Use This Manual How to Print this Manual Chapter 2Getting to Know Your NETGEAR Wireless Router Package Contents The Front Panel The Rear Panel Chapter 3Connecting the Router to the Internet Prepare to Install Your Wireless Router Connect the Wireless Router to Your Network Troubleshooting Tips How to Manually Configure Your Internet Connection NETGEAR Product Registration, Support, and Documentation Chapter 4 Optimizing Wireless Connectivity and Security Observe Performance, Placement, and Range Guidelines Implement Appropriate Wireless Security Understanding Wireless Settings Information to Gather Before Changing Basic Wireless Settings Default Factory Settings Chapter 5Doing Basic Router Housekeeping Changing the Administrator Password Configuration File Management Restoring and Backing Up the Configuration Erasing the Configuration Upgrading the Wireless Router Software Chapter 6Troubleshooting Common Problems Basic Functioning Power Light Not On Lights Never Turn Off LAN or Internet (WAN) Port Lights Not On Troubleshooting the Web Configuration Interface Troubleshooting the ISP Connection Troubleshooting a TCP/IP Network Using a Ping Utility Testing the LAN Path to Your Router Testing the Path from Your Computer to a Remote Device Restoring the Default Configuration and Password Appendix ATechnical Specifications Appendix BNetwork, Routing, and Firewall Basics Related Publications Basic Router Concepts What is a Router? Routing Information Protocol IP Addresses and the Internet Netmask Subnet Addressing Private IP Addresses Single IP Address Operation Using NAT MAC Addresses and Address Resolution Protocol Related Documents Domain Name Server IP Configuration by DHCP Internet Security and Firewalls What is a Firewall? Stateful Packet Inspection Denial of Service Attack Ethernet Cabling Category 5 Cable Quality Inside Twisted Pair Cables Uplink Switches, Crossover Cables, and MDI/MDIX Switching Appendix CPreparing Your Network What You Need To Use a Router with a Broadband Modem Cabling and Computer Hardware Computer Network Configuration Requirements Internet Configuration Requirements Where Do I Get the Internet Configuration Parameters? Record Your Internet Connection Information Preparing Your Computers for TCP/IP Networking Configuring Windows 95, 98, and Me for TCP/IP Networking Install or Verify Windows Networking Components Enabling DHCP to Automatically Configure TCP/IP Settings in Windows 95B, 98, and Me Selecting Windows’ Internet Access Method Verifying TCP/IP Properties Configuring Windows NT4, 2000 or XP for IP Networking Install or Verify Windows Networking Components DHCP Configuration of TCP/IP in Windows XP, 2000, or NT4 DHCP Configuration of TCP/IP in Windows XP DHCP Configuration of TCP/IP in Windows 2000 DHCP Configuration of TCP/IP in Windows NT4 Verifying TCP/IP Properties for Windows XP, 2000, and NT4 Configuring the Macintosh for TCP/IP Networking MacOS 8.6 or 9.x MacOS X Verifying TCP/IP Properties for Macintosh Computers Verifying the Readiness of Your Internet Account Are Login Protocols Used? What Is Your Configuration Information? Obtaining ISP Configuration Information for Windows Computers Obtaining ISP Configuration Information for Macintosh Computers Restarting the Network Appendix DWireless Networking Basics Wireless Networking Overview Infrastructure Mode Ad Hoc Mode (Peer-to-Peer Workgroup) Network Name: Extended Service Set Identification (ESSID) Wireless Channels WEP Wireless Security WEP Authentication WEP Open System Authentication WEP Shared Key Authentication Key Size and Configuration How to Use WEP Parameters WPA Wireless Security How Does WPA Compare to WEP? How Does WPA Compare to IEEE 802.11i? What are the Key Features of WPA Security? WPA Authentication: Enterprise-level User Authentication via 802.1x/EAP and RADIUS WPA Data Encryption Key Management Is WPA Perfect? Product Support for WPA Supporting a Mixture of WPA and WEP Wireless Clients Changes to Wireless Access Points Changes to Wireless Network Adapters Changes to Wireless Client Programs Glossary List of Glossary Term...


Напишите ваш отзыв об устройстве



Текст отзыва
Ваше имя:
Введите две цифры:
capcha





Категории