TENDA TECHNOLOGY F452 Wireless N450 Gigabit Router User Manual II

SHENZHEN TENDA TECHNOLOGY CO., LTD. Wireless N450 Gigabit Router II

Contents

User manual II

Download: TENDA TECHNOLOGY F452 Wireless N450 Gigabit Router User Manual II
Mirror Download [FCC.gov]TENDA TECHNOLOGY F452 Wireless N450 Gigabit Router User Manual II
Document ID2084047
Application IDWoUOtZlzQMKs8WgFASVm9w==
Document DescriptionUser manual II
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize124.71kB (1558876 bits)
Date Submitted2013-09-27 00:00:00
Date Available2013-09-27 00:00:00
Creation Date2013-09-24 11:29:18
Producing SoftwareAcrobat Distiller 9.0.0 (Windows)
Document Lastmod2013-09-24 11:29:18
Document TitleMicrosoft Word - F452V1.0-TDE01说明书.doc
Document CreatorPScript5.dll Version 5.2.2
Document Author: User

●
Enable: Check/uncheck to enable/disable the DMZ host feature.
●
DMZ Host IP: Enter the IP address of a computer on your LAN which you want to set as a DMZ host. The
DMZ host should be connected to a LAN port on the router.
Note
1. Once a PC is set to a DMZ host, it will be completely exposed to Internet, and thus may be vulnerable to
attacks as related firewall settings become inoperative.
2. Users on the WAN can access the DMZ host through a corresponding WAN IP address.
4.5 UPnP
UPnP (Universal Plug and Play) allows a network device to discover and connect to other devices on the
network. With this feature enabled, hosts in the LAN can request the device to perform special port
forwarding so as to enable external hosts to access resources on internal hosts.
●
Enable UPnP: Check/uncheck to enable/disable the UPnP feature.
Note
UPnP works in Windows ME, Windows XP, or later, or in an environment with installed application software
that supports UPnP. Operational systems needs to be integrated with or installed with Directx 9.0.
51
4.6 IPTV
The IPTV feature makes it possible to enjoy online videos on your TV set via a set‐top box while surfing the
Internet concurrently without mutual interference.
●
Enable IPTV: Check/uncheck to enable/disable the IPTV feature.
● Enable IPTV STB Port: Check/uncheck to enable/disable the IPTV‐specific port.
See below for the network topology:
Note
1. If you enabled both options mentioned above, then note below: (a). Set IPTV set‐top box's connection
type to DHCP/dynamic IP or static IP (IMPORTANT: Note that the set‐top box's IP address should be on the
same IP net segment as the router’s LAN IP.) if the set‐top box is connected to any port of LAN ports 1‐3. (b).
Select the dialup mode provided by your ISP if the set‐top box is connected to the IPTV‐specific port.
52
2. After the IPTV port is set for IPTV purpose the PC that connects to such port will not be able to obtain
an IP address or access Internet. Consider this situation before configuring this feature. Additionally, LAN
ports1‐3 can only be used as LAN ports to connect PCs instead of an IPTV set‐top box.
3. The IPTV feature is currently not supported on WLAN.
4.7 Routing Table
This feature displays the routing table content.
4.8 Static Routing
Use this section to customize static routes of data through your network.
Click Add Static Route and here comes the screen below:
53
●
Destination Network: The IP address of a destination network.
●
Subnet Mask: The Subnet Mask that corresponds to the specified destination IP address.
●
Gateway: The IP address for next hop.
5 USB
This router provides a USB interface for USB device connection. The "USB" tab includes two submenus:
Storage Sharing and Printing Service.
5.1 Storage Sharing
The storage sharing feature allows you to share data files on the storage device attached to the router.
●
Enable Sharing: Check/uncheck to enable/disable storage sharing feature.
●
Device Name: Define a meaningful name for the device.
●
Work Group: Define a work group name for the device.
●
Add: Click to add a user account. Up to 5 accounts can be added.
54
●
Edit: Click to edit an existing account.
●
Delete: Click to delete an existing account.
Operation Instructions:
Before sharing files on a USB storage device, you must create a user account.
1. Create account: Click Add to display a dialogue box as shown below:
2. Enter a user name and a password, which will be used to authenticate users trying to access the USB
storage device for sharing files.Re‐type to confirm password.
Click the OK button and window below will open:
3. Set Access Rights
First select an account and click USB Storage Device. And then select a proper access right from below for
each entry.
Read/Write:The right to read and write.
Read: The right to read only.
No right: No right to share corresponding file.
Click Save to apply all settings.
55
4. Access shared file
To access resources on such storage device, double click “My Computer” on your PC and enter
\\192.168.0.1 into the address bar.
56
5.2 USB Printing Service
The USB printing service allows you to connect a USB printer to the device and allow all clients on your
network to print anything they want from their PCs. The router can identify a printer automatically as long
as it is successfully connected.
● Enable Printing Service: Check/uncheck to enable/disable USB printing service.
Operation Instructions:
1. Correctly connect your USB printer to the USB port on the device.
2. Enable Printing Service
3. On your PC (connected to the router), click Start——Settings——Printers and Faxes and select Add a
printer on appearing window (Take Windows XP for example).
57
4. Click Next.
5. Select Local printer attached to this computer” and click Next.
58
6. Select Create a new port, Type of port: Standard TCP/IP Port and click Next.
7. Click Next.
8. Enter Router’s LAN IP address and click Next.
59
9. Click Standard under Device Type and select Generic Network Card, then click Next.
10. Click Finish.
11. Select Have Disk.
12. Click Browse, select corresponding drive file and click Open. At last click OK.
60
13. Click Next.
14. Define a name for the printer and click Next.
15. Click Finish.
61
6 Security
The Security tab includes 6 submenus: MAC Filter, Client Filter, URL Filter, Remote Web Management, DDoS
Defence and SPI Firewall. Clicking any of them enters the corresponding interface for configuration. Details
are explained below:
6.1 MAC Filter
To better manage devices in the LAN, you may use the MAC Address Filter function to allow/disallow such
devices to access the Internet.
● Filter Mode:
● Disable: Disable the MAC Filter feature.
● Deny Access to Internet: Disallow only specified devices to access Internet, other devices are not
restricted.
● Allow Access to Internet: Allow only specified devices to access Internet, other devices are denied.
● Select: Select an ID for the current entry.
● Description: Briefly describe current entry.
● MAC: Specify the MAC address of the computer that you want to restrict.
● Time: Specify a time range for current entry to take effect.
62
● Day: select a day, or several days, for the entry to take effect.
● Enable: Select to enable/disable corresponding entry.
Example: To prevent a PC at the MAC address of 00:E0:4C:69:A4:10 from accessing Internet between 8:00
and16:00 on working days: from Monday to Friday, configure the same settings as shown in the screen
below, on your device:
Tips ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐
1. Maximum 10 entries can be configured in MAC Filter.
2. After saving your configurations, for correct time, please go to Tools>Time to configure your router’s
system time.
‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐
6.2 Client Filter
To better manage devices in the LAN, you can allow or disallow the devices to access certain ports on the
Internet using the Client Filter function.
63
● Filter Mode: Select Deny or Allow.
● Select: Select an ID for the current entry.
● Description: Briefly describe the current entry.
● Start IP: Enter a starting IP address.
● End IP: Enter an ending IP address.
● Port: Enter TCP/UDP protocol port number, it can be a single port or a range of ports.
● Traffic Type: Select a protocol or protocols for the traffic (TCP/UDP/Both).
● Time: Specify a time range for current entry to take effect.
● Day: select a day or several days for current entry to take effect.
● Enable: Check to enable or uncheck to disable a corresponding filter rule (allow/disallow matched
addresses to pass through router).
Example: To prohibit PCs within the IP address range of 192.168.0.100‐‐192.168.0.150 from accessing the
Internet, use the following example:
64
65
6.3 URL Filter
To better control LAN devices, you can use the URL filter function to allow or disallow PC’s to access certain
websites within a specified time range.
● Filter Mode: Select Deny or Allow.
● Select: Select an ID for current entry.
● Enable: Check to enable or uncheck to disable a corresponding filter rule (allow/disallow matched
addresses to pass through router).
● Description: Briefly describe the current entry.
● Start IP: Enter a starting IP address.
● Start IP: Enter a starting IP address.
● URL String: Enter domain names or a part of a domain name to be filtered out.
● Time: Specify a time range for current entry to take effect.
● Day: select a day or several days for current entry to take effect.
If you want to disallow all computers on your LAN to access Google.com from 8:00 to 18:00 on working
days: Monday‐ Friday, then use the following example:
66
Note
Each entry can include up to 16 domain names, each of which must be separated with the quotation
symbols " ".
6.4 Remote Web Management
The Remote management allows the router to be configured from the Internet via a web browser.
● Enable: Select to enable the Remote Web‐based Management feature.
● Port: Remote admin port is the port number used to access the router from Internet.
● IP Address: Enter the IP address of the PC on the Internet authorized to manage your router remotely.
For example: If you want to allow only the PC at the IP address of 218.88.93.33 from the Internet to access
the router’s web‐based utility via port 8080, then configure the same settings as shown below on your
router.
67
Note
1. The default port is 8080. Do not change it.
2. To access the router via port 8080, enter "http://x.x.x.x:8080" where "x.x.x.x" represents the Internet IP
address of the router and 8080 is the port used for the Web‐Management interface. Assuming the router's
Internet IP address is 220.135.211.56, then simply replace the "x.x.x.x" with "220.135.211.56" (namely,
http://220.135.211.56:8080).
Leaving the IP address field at "0.0.0.0" makes the router remotely accessible to all the PCs on the Internet.
Entering a specific IP address, such as 218.88.93.33, makes the router only remotely accessible to the PC at
the specified IP address.
6.5 DDOS Defence
The DDOS Defence feature effectively blocks ICMP, UDP, and SYN flooding attacks. When the number of
ICMP, UDP, or SYN packets received exceeds the defined threshold, the router will record its IP and MAC
addresses in the "DDOS Defence List".
● ICMP Flood: If an IP receives the number of ICMP request packets that exceeds the defined limit
continuously from the same sender within one second, then such IP is considered to encounter an ICMP
Flood attack.
● UDP Flood:If an IP receives, on an identical port, UDP packets exceeding the defined limit continuously
from the same sender within a second, then the port is suffering a UDP Flood attack.
● SYN Flood: If an IP receives, on an identical port, TCP SYN packets exceeding defined limit continuously
from the same sender within a second, then the port is suffering a SYN Flood attack.
68
6.6 SPI Firewall
Stateful Packet Inspection (SPI) helps to prevent cyber attacks by tracking more state per session. It
validates that the traffic passing through the session conforms to the protocol.
69
Tips ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐
Once SPI enabled, DMZ and remote web management will be invalid.
‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐
7 Tools
The "Tools" tab includes 9 submenus: Logs, Traffic Statistics, Time, Change Password, Backup, Restore,
Firmware Update, Restore to Factory Default, and Reboot. Clicking any of them enters the corresponding
interface for configuration. Details are explained below:
7.1 Logs
The Syslog option allows you to view all events that occur on system startup and checks whether there is an
attack present in your network. The logs are classified into 3 types: All, System, and WAN.
70
7.2 Traffic Statistics
Traffic Statistics displays current traffic of clients on your LAN.
● Enable Traffic Statistics: Determine whether to enable the Traffic Statistics feature on internal users.
● Refresh: Click it to update statistic data.
● Clear: Click it to remove statistic data.
Note
Enabling the Traffic Statistics feature may degrade the router’s performance. Do not enable it unless
necessary.
71
7.3 Time
This section lets you configure, update, and maintain the correct time on the internal system clock. You can
either select to set the time and date manually or automatically obtain the GMT time from Internet. Note
that the GMT time is obtained only when the router is connected to the Internet.
● Sync with Internet time servers: Time and date will be updated automatically from the Internet.
● Sync Interval: Specify a time interval for periodic update of time and date information from the Internet.
● Time Zone: Select your current time zone.
● Sync with Your PC: Click it to copy your PC’s time to the router.
7.4 Change Password
This section allows you to change login password and user name for accessing the router’s Web‐based
management interface.
72
Both login password and user name are preset to “admin” by default. To change either or both, do the
following:
1. Enter your current user name and password in Old User Name and Old Password fields.
2. Enter a new user name and a new password in New User Name and New Password fields.
3. Click Save.
Note
For security purpose, it is highly recommended that you change the default login password and user name
as part of the initial configuration of your router.
7.5 Backup
This feature allows you to backup current settings. Once you have configured the router, you can save these
settings to a configuration file on your local hard drive. The configuration file can later be imported to your
router in case the router is reset to factory default settings.
● Backup: To backup settings, click the Backup button and specify a directory to save settings to your local
hardware.
73
7.6 Restore
This section allows you to restore settings previously configured and saved to your local hard drive.
74
7.7 Firmware Update
Firmware upgrade is released periodically to improve the functionality of your router, and also to add any
new features. If you run into a problem with a specific feature of the router you could log on to our website
(www.tendacn.com) to download the latest firmware to update your device.
To update firmware, do the following:
1. Click Browse to locate and select the firmware file and Upgrade to update your router.
2. Device restarts automatically when the upgrade process is completed.
Note
DO NOT power off the router when the upgrade is in process otherwise the router may be permanently
damaged. When the upgrade is completed, the router will automatically reboot. The firmware upgrade may
take a few minutes to complete so please wait for the process to finish.
7.8 Restore to Factory Default
Click the Restore Factory Default button to reset the router to its factory default settings.
● Default IP Address: 192.168.0.1
● Default Subnet Mask: 255.255.255.0
● Default User Name: admin
● Default Password: admin
75
7.9 Reboot
This section allows you to reboot the router.
76
Appendix 1 Configure PC
In this section we explain how to configure your PC’s TCP/IP settings.
WIN7 OS
1. Click Start>Control Panel;
2. Enter Control Panel and click Network and Internet;
3. Click Network and Sharing Center;
77
4. Click Change adapter settings;
5. Right click Local Area Connection and select Properties;
78
6. Select Internet Protocol Version 4(TCP/IPv4) and click Properties;
7. Select Obtain an IP address automatically and click OK to save the configurations.
Back to Configure Router
79
Windows XP OS
1. Right click My Network Places and select Properties;
2. Right click Local and select Properties;
3. Select Internet Protocol(TCP/IP) and click Properties;
80
4. Select Obtain an IP address automatically and click OK to save the settings.
Back to Configure Router
81
Appendix 2 Join a Wireless Connection
Note
For wireless connection, desktop computers need to be equipped with wireless network cards first.
Win7 OS
1. Click Start>Control Panel;
2. Click Network and Internet;
82
3. Click Network and Sharing Center;
4. Click Change adapter settings;
1. Click Wireless Network Connection accordingly and select Connect/Disconnect;
83
2. Select the network you wish to connect, such as Tenda‐000090; According to different cipher types,
here goes two situations:
A. If you have configured security key, click Connect;
When the following dialog box appears, it indicates connecting to the network;
Enter your security key and click OK;
84
B. If you have configured security key, click Connect;
When the following dialog box appears, it indicates connecting to the network;
7. When displaying Connected, you have connected to network successfully.
85
Appendix 3 FAQs
This section provides solutions to problems that may occur during installation and operation of the device.
Read the following if you are running into problems. If your problem is not covered here, please feel free to
go to www.tendacn.com to find a solution or email your problems to: support@tenda.com.cn or
support02@tenda.com.cn. We will be more than happy to help you out as soon as possible.
1. Q: I entered the device’s LAN IP address in the web browser but cannot access the utility. What should
I do?
a.Check whether device is functioning correctly. The SYS LED should blink a few seconds after device is
powered up. If it does not light up, then some internal faults may have occurred.
b.Verify physical connectivity by checking whether a corresponding port’s link LED lights up. If not, try a
different cable. Note that an illuminated light does NOT ALWAYS indicate successful connectivity.
c. Run the "ping 192.168.0.1" command. If you get replies from 192.168.0.1, open your browser and verify
that Proxy server is disabled. In case that ping fails, press and hold the "RESET" button on your device for 7
seconds to restore factory default settings, and then run "ping192.168.0.1" again.
d. Contact our technical support for help if the problem still exists after you tried all the above.
2. Q: What should I do if I forget the login password to my device?
A: Reset your device by pressing the Reset button for over 7 seconds.
Note
All settings will be deleted and restored to factory defaults once you pressed the Reset button.
3. Q: My computer shows an IP address conflict error after having connected to the device. What should I
do?
a.Check if there are other DHCP servers present in your LAN. If there are other DHCP servers except your
router, disable them immediately.
b.The default IP address of the device is 192.168.0.1; make sure this address is not used by another PC or
device. In case that two computers or devices share the same IP addresses, change either to a different
address.
4.Q: I cannot access Internet and send/receive emails; what should I do?
This problem mainly happens to users who use the PPPoE or Dynamic IP Internet connection type. You
need to change the MTU size (1492 by default). In this case, go to “WAN Settings” to change the MTU value
from default 1480 to 1450 or 1400, etc.
5. Q: How do I share resources on my computer with users on Internet through the device?
To let Internet users access internal servers on your LAN such as e‐mail server, Web, FTP, via the device, use
the "Virtual Server" feature. To do so, follow steps below:
Step 1: Create your internal server, make sure the LAN users can access these servers and you need to know
related service ports, for example, port number for Web server is 80; FTP is 21; SMTP is 25 and POP3 is 110.
Step 2: Enter Port Forwarding (also called Port Range Forwarding on some products) screen from device
web UI.
Step 3: Complete the Start Port (also called External/Ext Port on some products) and End Port (also known
as Internal Port on some products) fields, say, 80‐80.
Step 4: Input the internal server’s IP address. For example, assuming that your Web server’s IP address is
192.168. 0.10, then simply input it.
Step 5: Select a proper protocol type: TCP, UDP, or Both depending on which protocol(s) your internal host
is using.
Step 6: Click Enable and save your settings.
For your reference, we collected a list of some well‐known service ports as follows:
Server
Protocol Service Port
Web Server
TCP
80
86
FTP Server
Telnet
TCP
TCP
Net Meeting
TCP
21
23
1503、1720
File Send:6891‐6900(TCP)
MSN Messenger TCP/UDP Voice:1863, 6901(TCP)
Voice:1863, 5190(UDP)
PPTP VPN
TCP
1723
Iphone5.0
TCP
22555
SMTP
TCP
25
POP3
TCP
110
87
Appendix 4 Glossary
Channel
A communication channel, also known as channel, refers either to a physical transmission medium such as a
wire or to a logical connection over a multiplexed medium such as a radio channel. It is used to transfer an
information signal, such as a digital bit stream, from one or more transmitters to one or more receivers. If
there is only one AP in the range, select any channel you like. The default is Auto.
If there are several APs coexisting in the same area, it is advisable that you select a different channel for
each AP to operate on, minimizing the interference between neighboring APs. For example, if 3 American‐
standard APs coexist in one area, you can set their channels respectively to 1, 6 and 11 to avoid mutual
interference.
SSID
Service set identifier (SSID) is used to identify a particular 802.11 wireless LAN. It is the name of a specific
wireless network. To let your wireless network adapter roam among different APs, you must set all APs’
SSID to the same name.
WPA/WPA2
The WPA protocol implements the majority of the IEEE 802.11i standard. It enhances data encryption
through the Temporal Key Integrity Protocol (TKIP) which is a 128‐bit per‐packet key, meaning that it
dynamically generates a new key for each packet. WPA also includes a message integrity check feature to
prevent data packets from being hampered with. Only authorized network users can access the wireless
network. The later WPA2 protocol features compliance with the full IEEE 802.11i standard and uses
Advanced Encryption Standard (AES) in addition to TKIP encryption protocol to guarantee better security
than that provided by WEP or WPA. Currently, WPA is supported by Windows XP SP1.
IEEE 802.1X Authentication
IEEE 802.1X Authentication is an IEEE Standard for port‐based Network Access Control (PNAC). It is part of
the IEEE 802.1 group of networking protocols. It provides an authentication mechanism to devices wishing
to attach to a LAN or WLAN.IEEE 802.1X defines the encapsulation of EAP over LAN or EAPOL. 802.1X
authentication involves three parties: a supplicant, an authenticator, and an authentication server. The
supplicant is a client device (such as a laptop) that wishes to attach to the LAN/WLAN ‐ though the term
'supplicant' is also used interchangeably to refer to the software running on the client that provides
credentials to the authenticator. The authenticator is a network device, such as an Ethernet switch or
wireless access point; and the authentication server is typically a host running software supporting the
RADIUS and EAP protocols. The authenticator acts like a security guard to a protected network. The
supplicant (i.e. client device) is not allowed access through the authenticator to the protected side of the
network until the supplicant’s identity has been validated and authorized. With 802.1X port‐based
authentication, the supplicant provides credentials, such as user name / password or digital certificate, to
the authenticator, and the authenticator forwards the credentials to the authentication server for
verification. If the authentication server determines the credentials are valid, the supplicant (client device)
is allowed to access resources located on the protected side of the network.
PPPOE
The Point‐to‐Point Protocol over Ethernet (PPPoE) is a network protocol for encapsulating PPP frames inside
Ethernet frames. Integrated PPP protocol implements authentication, encryption, and compression
functions that traditional Ethernet cannot provide and can also be used in the cable modem and digital
subscriber line (DSL) and Ethernet that provide access service to the users. Essentially, it is a protocol that
allows to establish a point‐to‐point tunnel between two Ethernet interfaces within an Ethernet broadcast
domain.
88
DNS
The Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any
resource connected to the Internet or a private network. It associates various information with domain
names assigned to each of the participating entities. A Domain Name Service resolves queries for these
names into IP addresses for the purpose of locating computer services and devices worldwide. An
often‐used analogy to explain the Domain Name System is that it serves as the phone book for the Internet
by translating human‐friendly computer hostnames into IP addresses.
WDS
A wireless distribution system (WDS) is a system enabling the wireless interconnection of access points in
an IEEE 802.11 network. It allows a wireless network to be expanded using multiple access points without
the traditional requirement for a wired backbone to link them. All base stations in a wireless distribution
system must be configured to use the same radio channel, method of encryption (none, WEP, or WPA) and
the same encryption keys. They may be configured to different service set identifiers. WDS also requires
every base station to be configured to forward to others in the system. WDS may also be considered a
repeater mode because it appears to bridge and accept wireless clients at the same time (unlike traditional
bridging).WDS may be incompatible between different products (even occasionally from the same vendor)
since it is not certified by the Wi‐Fi Alliance. WDS may provide two modes of wireless AP‐to‐AP connectivity:
Wireless bridging, in which WDS APs communicate only with each other and don't allow wireless clients or
stations (STA) to access them.
Wireless repeating, in which APs communicate with each other and with wireless STAs.
DMZ
In computer security, a DMZ (sometimes referred to as a perimeter networking) is a physical or logical
subnetwork that contains and exposes an organization's external‐facing services to a larger untrusted
network, usually the Internet. The purpose of a DMZ is to add an additional layer of security to an
organization's local area network (LAN); an external attacker only has access to equipment in the DMZ,
rather than any other part of the network. Hosts in the DMZ have limited connectivity to specific hosts in
the internal network, although communication with other hosts in the DMZ and to the external network is
allowed. This allows hosts in the DMZ to provide services to both the internal and external network, while
an intervening firewall controls the traffic between the DMZ servers and the internal network clients. Any
services such as Web servers, Mail servers, FTP servers and VoIP servers, etc. that are being provided to
users on the external network can be placed in the DMZ.
89
Appendix 5 Remove Wireless Network from Your PC
If you change wireless settings on your wireless device, you must remove them accordingly your PC;
otherwise, you may not be able to wirelessly connect to the device. Below describes how to do remove a
wireless network from your PC.
Windows XP OS
1. Right click My Network Places and select Properties.
2. Click Wireless Network Connection and then select Properties.
3. Click Wireless Networks, select the item under Preferred networks and then click the Remove button.
90
Windows 7 OS
1. Click Network from your desktop and select Properties.
2. Select Manage Wireless Networks.
3. Click the wireless connection and select Remove network.
91
Appendix 6 Safety and Emission Statement
CE Mark Warning
This is a Class B product in a domestic environment, this product may cause radio interference, in which
case the user may be required to take adequate measures. This device complies with EU 1999/5/EC.
NOTE: (1) The manufacturer is not responsible for any radio or TV interference caused by unauthorized
modifications to this equipment.(2) To avoid unnecessary radiation interference, it is recommended to use a
shielded RJ45 cable.
FCC Statement
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1)
This device may not cause harmful interference, and (2) this device must accept any interference received,
including interference that may cause undesired operation.
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to
Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful
interference in a residential installation. This equipment generates, uses and can radiate radio frequency
energy and, if not installed and used in accordance with the instructions, may cause harmful interference to
radio communications. However, there is no guarantee that interference will not occur in a particular
installation. If this equipment does cause harmful interference to radio or television reception, which can
be determined by turning the equipment off and on, the user is encouraged to try to correct the
interference by one of the following measures:
‐
Reorient or relocate the receiving antenna.
‐
Increase the separation between the equipment and receiver.
‐
Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected.
‐ Consult the dealer or an experienced radio/TV technician for help.
FCC Caution: Any changes or modifications not expressly approved by the party responsible for
compliance could void the user's authority to operate this equipment.
This transmitter must not be co‐located or operating in conjunction with any other antenna or transmitter.
The manufacturer is not responsible for any radio or TV interference caused by unauthorized modifications
to this equipment.
Radiation Exposure Statement
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This
equipment should be installed and operated with minimum distance 20cm between the radiator & your
body.
NOTE: (1) The manufacturer is not responsible for any radio or TV interference caused by unauthorized
modifications to this equipment. (2) To avoid unnecessary radiation interference, it is recommended to use
a shielded RJ45 cable.
92
NCC Notice
經型式認證合格之低功率射頻電機,非經許可,公司、商號或使用者均不得擅自變更頻率、加大功率
或變更設計之特性及功能。
低功率射頻電機之作用不得影響飛航安全及幹擾合法通信;經發現有幹擾現象時,應立即停用,並改
善至無幹擾時方得繼續使用。前項合法通信,指依電信規定作業之無線電信。低功率射頻電機須忍受
合法通信或工業、科學及醫療用電波輻射性電機設備之幹擾。
93

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.7
Linearized                      : No
XMP Toolkit                     : Adobe XMP Core 4.2.1-c041 52.342996, 2008/05/07-20:48:00
Modify Date                     : 2013:09:24 11:29:18+08:00
Create Date                     : 2013:09:24 11:29:18+08:00
Metadata Date                   : 2013:09:24 11:29:18+08:00
Creator Tool                    : PScript5.dll Version 5.2.2
Format                          : application/pdf
Title                           : Microsoft Word - F452V1.0-TDE01说明书.doc
Creator                         : User
Document ID                     : uuid:29cfe617-2c27-4c76-b358-5e3b250e8ebf
Instance ID                     : uuid:72dd8e75-2df2-481c-9c28-94ae60ee72fe
Producer                        : Acrobat Distiller 9.0.0 (Windows)
Page Count                      : 43
Author                          : User
EXIF Metadata provided by EXIF.tools
FCC ID Filing: V7TF452

Navigation menu