Wireless RouterRNX-N400LX User Manual
3.53 Firewall - MAC Filtering..........................................................................................40
3.54 Firewall – Port Forwarding......................................................................................41
3.55 Firewall – URL Filtering ..........................................................................................42
3.56 Firewall – DMZ .........................................................................................................43
3.6 QOS:............................................................................................................................................44
3.7 MANAGEMENT: ...........................................................................................................................45
3.71 Management – Status................................................................................................45
3.72 Management – Statistics...........................................................................................47
3.73 Management – DDNS................................................................................................47
3.74 Management – Time Zone Setting...........................................................................48
3.75 Management – Denial-of-Service.............................................................................49
3.76 Management – Log....................................................................................................50
3.77 Management – Upgrade Firmware..........................................................................50
3.78 Management – Save/Reload Settings.......................................................................51
3.79 Management – Password..........................................................................................51
APPENDIX A – FREQUENTLY ASKED QUESTIONS (FAQ) ......................................................52
1. WHAT IS AND HOW TO FIND MY COMPUTER’S IP AND MAC ADDRESS?....................................52
2. WHAT IS WIRELESS LAN? .........................................................................................................53
3. WHAT ARE ISM BANDS? .............................................................................................................53
4. HOW DOES WIRELESS NETWORKING WORK?.............................................................................53
5. WHAT IS BSSID? ........................................................................................................................54
6. WHAT IS ESSID? ........................................................................................................................55
7. WHAT ARE POTENTIAL FACTORS THAT MAY CAUSES INTERFERENCE? .....................................55
8. WHAT ARE THE OPEN SYSTEM AND SHARED KEY AUTHENTICATIONS? ...................................55
9. WHAT IS WEP?...........................................................................................................................55
10. WHAT IS FRAGMENT THRESHOLD?............................................................................................56
11. WHAT IS RTS (REQUEST TO SEND) THRESHOLD?.....................................................................56
12. WHAT IS BEACON INTERVAL? ....................................................................................................57
13. WHAT IS PREAMBLE TYPE?........................................................................................................57
14. WHAT IS SSID BROADCAST?......................................................................................................57
15. WHAT IS WI-FI PROTECTED ACCESS (WPA)?...........................................................................57
16. WHAT IS WPA2?.........................................................................................................................58
17. WHAT IS 802.1X AUTHENTICATION? PROTOCOL (TKIP)?........................................................58
18. WHAT IS TEMPORAL KEY INTEGRITY PROTOCOL (TKIP)? .....................................................58
19. WHAT IS ADVANCED ENCRYPTION STANDARD (AES)? .............................................................58
20. WHAT IS INTER-ACCESS POINT PROTOCOL (IAPP)?................................................................59
21. WHAT IS WIRELESS DISTRIBUTION SYSTEM (WDS)?...............................................................59
22. WHAT IS UNIVERSAL PLUG AND PLAY (UPNP)? ........................................................................59
23. WHAT IS MAXIMUM TRANSMISSION UNIT (MTU) SIZE?..........................................................59
24. WHAT IS CLONE MAC ADDRESS?..............................................................................................59
25. WHAT IS DDNS?.........................................................................................................................60
26. WHAT IS NTP CLIENT?...............................................................................................................60
27. WHAT IS VPN?............................................................................................................................60
28. WHAT IS IPSEC?........................................................................................................................60
29. WHAT IS WLAN BLOCK RELAY BETWEEN CLIENTS?...............................................................60
30. WHAT IS WMM? ........................................................................................................................60
31. WHAT IS WLAN ACK TIMEOUT?..........................................................................................61
32. WHAT IS MODULATION CODING SCHEME (MCS)?...................................................................61
33. WHAT IS FRAME AGGREGATION? ..............................................................................................61
APPENDIX B – PRODUCT SPECIFICATION................................................................................62
APPENDIX C – FCC INTERFERENCE STATEMENT .................................................................63
APPENDIX D – IC INTERFERENCE STATEMENT.....................................................................65
4