Page 176 / 178 Scroll up to view Page 171 - 175
2
Index
front panel
2-7, 2-8
fully qualified domain name (FQDN)
4-6, 4-8
G
gateway address
C-20
H
host name
3-10
I
IANA
contacting
B-2
IETF
B-1
Web site address
B-7
infrastructure mode
D-2
installation
2-5
Internet account
address information
C-18
establishing
C-18
Internet Service Provider
3-1
IP addresses
C-19, C-20
and NAT
B-8
and the Internet
B-2
assigning
B-2, B-9
auto-generated
8-3
private
B-7
translating
B-9
IP configuration by DHCP
B-10
IP networking
for Macintosh
C-16
for Windows
C-2, C-7
ISP
3-1
L
LAN IP Setup Menu
7-9
LEDs
description
2-7
troubleshooting
8-2
log
sending
5-8
log entries
5-6
Login
3-14, 3-15
M
MAC address
8-7, B-9
spoofing
3-10, 3-14, 3-16, 8-5
Macintosh
C-19
configuring for IP networking
C-16
DHCP Client ID
C-16
Obtaining ISP Configuration Information
C-20
masquerading
C-18
MDI/MDI-X
B-15, G-2
MDI/MDI-X wiring
B-14, G-6
metric
7-14
N
NAT
C-18
NAT.
See
Network Address Translation
netmask
translation table
B-6
Network Address Translation
2-5, B-8, C-18
Network Time Protocol
8-7
NTP
8-7
O
Open System authentication
D-3
P
package contents
2-6
Passphrase
4-11, 4-13, 4-17
passphrase
2-2
Password
3-14, 3-15
password
restoring
8-7
PC, using to configure
C-21
ping
7-7
placement
4-1
port filtering
5-3
Page 177 / 178
Index
3
port forwarding behind NAT
B-9
Port Forwarding Menu
7-2
port numbers
5-3
PPP over Ethernet
2-5, C-18
PPPoE
C-18
Primary DNS Server
3-10, 3-12, 3-14, 3-15
protocols
Address Resolution
B-9
DHCP
B-10
Routing Information
2-5, B-2
support
2-2
publications, related
B-1
R
range
4-1
range, port forwarding
7-4, 7-6
rear panel
2-8
Remote Management
7-16
remote management
7-16
requirements
hardware
3-1
reserved IP adresses
7-11
restore configuration
6-7
restore factory settings
6-8
Restrict Wireless Access by MAC Address
4-15
RFC
1466
B-7, B-9
1597
B-7, B-9
1631
B-8, B-9
finding
B-7
RIP (Router Information Protocol)
7-9
router concepts
B-1
Router Status
6-1
Routing Information Protocol
2-5, B-2
S
Scope of Document
1-1
Secondary DNS Server
3-10, 3-12, 3-14, 3-15
security
2-1, 2-4
service numbers
5-4
Setup Wizard
3-1
Shared Key authentication
D-3
SMTP
5-8
spoof MAC address
8-5
SSID
4-5, 4-7, 4-14, 4-15, D-2
Start Port
7-4
stateful packet inspection
2-3, B-11
Static Routes
7-8
subnet addressing
B-5
subnet mask
B-5, C-19, C-20
T
TCP/IP
configuring
C-1
network, troubleshooting
8-5
TCP/IP properties
verifying for Macintosh
C-17
verifying for Windows
C-6, C-15
time of day
8-7
troubleshooting
8-1
Trusted Host
5-2
U
Universal Plug and Play
7-17
Uplink switch
B-14
UPnP
7-17
USB
C-18
W
WAN
7-6
WAN Setup
7-6
WEP
D-3
Wi-Fi
D-1
Wi-Fi Protected Access (WPA)
4-18
Windows, configuring for IP routing
C-2, C-7
winipcfg utility
C-6
WinPOET
C-18
Page 178 / 178
4
Index
Wired Equivalent Privacy.
See
WEP
Wireless Access
3-3
Wireless Authentication
4-9
Wireless Encryption
4-9
Wireless Ethernet
D-1
Wireless Performance
4-1
Wireless Range Guidelines
4-1
Wireless Security
4-2
World Wide Web
1-4
WPA
4-18

Rate

4.3 / 5 based on 3 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top