User manual SITECOM WLM-4550

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual SITECOM WLM-4550. We hope that this SITECOM WLM-4550 user guide will be useful to you.


SITECOM WLM-4550 : Download the complete user guide (7610 Ko)

Manual abstract: user guide SITECOM WLM-4550

Detailed instructions for use are in the User's Guide.

[. . . ] WLM-4550 Wireless ADSL2+ Gigabit Modem Router User Manual Version: 1. 0 Table of Contents INTRODUCTION. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1 2 3 4 KEY FEATURES. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 PACKAGE CONTENTS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 CAUTIONS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [. . . ] While upper band is selected, the channel number you can select is from channel 5 to channel 11. While lower band is selected, the channel number you can select is from channel 1 to channel 7. Please select the country you are located and designate a channel that the router will use. If you want to let the router automatically to find an available channel with the highest signal strength, please select "Auto". Click "Show Active Clients" button and you can see the wireless clients connected to the router. When you finish, click `Apply Changes' to save the settings made and restart the router so the settings will take effect after it reboots. Security Settings This router provides complete wireless LAN security functions, include WEP, IEEE 802. 1x, IEEE 802. 1x with WEP, WPA with pre-shared key and WPA with RADIUS. With these security functions, you can prevent your wireless LAN from illegal access. Please make sure your wireless stations use the same security function. Parameter Encryption Description You can choose "None" to disable the encryption or select "WEP", "WPA(TKIP)", "WPA2(AES)" or "WPA2 Mixed" mode for security. When "WEP" is enabled, please click "Set WEP Key" button to choose the default key and set the four sets of WEP keys. WEP supports 64-bit and 128-bit key lengths to encrypt the wireless data. WPA(TKIP) ­ WPA uses Temporal Key Integrity Protocol (TKIP) for data encryption. TKIP utilized a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers. WPA2(AES) ­ WPA2, also known as 802. 11i, uses Advanced Encryption Standard (AES) for data encryption. WPA Mixed ­ The router supports WPA (TKIP) and WPA2 (AES) for data encryption. The actual selection of the encryption methods will depend on the clients. Every user must use a valid account to login to this wireless router before accessing the wireless LAN. Check this box to authenticates user by Use 802. 1x Authentication WEP-64Bits WEP-128Bits WPA Authentication Mode IEEE 802. 1x. WEP supports 64-bit and 128-bit key lengths to encrypt the wireless data. When "WEP64Bits" is selected, you have to enter exactly 5 ASCII characters ("a-z" and "0-9") or 10 hexadecimal digits ("0-9", "a-f") for each Key (1-4). When "WEP-128Bits" is selected, you have to enter exactly 13 ASCII characters ("a-z" and "0-9") or 26 hexadecimal digits ("0-9", "a-f") for each Key (1-4). Enterprise (RADIUS) ­ It uses an external RADIUS server to perform user authentication. To use RADIUS, enter the IP address of the RADIUS server, the RADIUS port (default is 1812) and the shared secret from the RADIUS server. Please refer to "Authentication RADIUS Server" setting below for RADIUS setting. Personal (Pre-Shared Key) ­ Pre-Shared Key authentication is based on a shared secret that is known only by the parties involved. [. . . ] Subnet Mask: It is the destination IP addresses based on above destination subnet IP Destination Port Number: This is the Port or Port Ranges that defines the application. Protocol: It is the packet protocol type used by the application, select either TCP or UDP or ICMP Rule Unmatched: Select action for the traffic unmatching current rule; Forward to leave it pass through, and NEXT to check it by the next rule. IP Filter Listing · #: Item number. · Src IP Mask: The source IP address or range of packets to be monitored. · Src port: This Port or Port Ranges defines the port allowed to be used by the Remote/WAN to connect to the application. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE SITECOM WLM-4550




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual SITECOM WLM-4550 will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.