User manual SITECOM WLM-4550

Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Lastmanuals provides you a fast and easy access to the user manual SITECOM WLM-4550. We hope that this SITECOM WLM-4550 user guide will be useful to you.

Lastmanuals help download the user guide SITECOM WLM-4550.


Mode d'emploi SITECOM WLM-4550
Download
Manual abstract: user guide SITECOM WLM-4550

Detailed instructions for use are in the User's Guide.

[. . . ] WLM-4550 Wireless ADSL2+ Gigabit Modem Router User Manual Version: 1. 0 Table of Contents INTRODUCTION. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1 2 3 4 KEY FEATURES. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 PACKAGE CONTENTS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 CAUTIONS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [. . . ] Click "Show Active Clients" button and you can see the wireless clients connected to the router. When you finish, click `Apply Changes' to save the settings made and restart the router so the settings will take effect after it reboots. Security Settings This router provides complete wireless LAN security functions, include WEP, IEEE 802. 1x, IEEE 802. 1x with WEP, WPA with pre-shared key and WPA with RADIUS. With these security functions, you can prevent your wireless LAN from illegal access. Please make sure your wireless stations use the same security function. Parameter Encryption Description You can choose "None" to disable the encryption or select "WEP", "WPA(TKIP)", "WPA2(AES)" or "WPA2 Mixed" mode for security. When "WEP" is enabled, please click "Set WEP Key" button to choose the default key and set the four sets of WEP keys. WEP ­WEP is less level of security than WPA. WEP supports 64-bit and 128-bit key lengths to encrypt the wireless data. WPA(TKIP) ­ WPA uses Temporal Key Integrity Protocol (TKIP) for data encryption. TKIP utilized a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers. WPA2(AES) ­ WPA2, also known as 802. 11i, uses Advanced Encryption Standard (AES) for data encryption. AES utilized a symmetric 128-bit block data encryption. WPA Mixed ­ The router supports WPA (TKIP) and WPA2 (AES) for data encryption. The actual selection of the encryption methods will depend on the clients. IEEE 802. 1x is an authentication protocol. Every user must use a valid account to login to this wireless router before accessing the wireless LAN. The authentication is processed by a RADIUS server. Check this box to authenticates user by Use 802. 1x Authentication WEP-64Bits WEP-128Bits WPA Authentication Mode IEEE 802. 1x. WEP supports 64-bit and 128-bit key lengths to encrypt the wireless data. The longer key length will provide higher security. When "WEP64Bits" is selected, you have to enter exactly 5 ASCII characters ("a-z" and "0-9") or 10 hexadecimal digits ("0-9", "a-f") for each Key (1-4). When "WEP-128Bits" is selected, you have to enter exactly 13 ASCII characters ("a-z" and "0-9") or 26 hexadecimal digits ("0-9", "a-f") for each Key (1-4). There are two types of authentication mode for WPA. Enterprise (RADIUS) ­ It uses an external RADIUS server to perform user authentication. [. . . ] The URL block Here it's possible to block certain websites. Filter type Enter the website you wish to block and make sure the rule is active. Click `Save' to apply the new rule. URL Filter Listing Shows all entered URL block rules. DMZ The DMZ Host is a local computer exposed to the Internet. When setting a particular internal IP Address as the DMZ Host, all incoming packets will be checked by the firewall and NAT algorithms then passed to the DMZ Host. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE SITECOM WLM-4550

Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets...
In any way can't Lastmanuals be held responsible if the document you are looking for is not available, incomplete, in a different language than yours, or if the model or language do not match the description. Lastmanuals, for instance, does not offer a translation service.

Click on "Download the user manual" at the end of this Contract if you accept its terms, the downloading of the manual SITECOM WLM-4550 will begin.

Search for a user manual

 

Copyright © 2015 - LastManuals - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.

flag