User manual MOTOROLA WE800G

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual MOTOROLA WE800G. We hope that this MOTOROLA WE800G user guide will be useful to you.


MOTOROLA WE800G : Download the complete user guide (2365 Ko)

You may also download the following manuals related to this product:

   MOTOROLA WE800G DATA SHEET (61 ko)
   MOTOROLA WE800G QUICK START (339 ko)
   MOTOROLA WE800G SUPPLEMENTARY GUIDE (127 ko)

Manual abstract: user guide MOTOROLA WE800G

Detailed instructions for use are in the User's Guide.

[. . . ] User Guide Wireless Ethernet Bridge WE800G WARNING: TO PREVENT FIRE OR SHOCK HAZARD, DO NOT EXPOSE THIS PRODUCT TO RAIN OR MOISTURE. CAUTION: TO ENSURE REGULATORY COMPLIANCE, USE ONLY THE PROVIDED POWER AND INTERFACE CABLES. DO NOT PERFORM ANY SERVICING OTHER THAN THAT CONTAINED IN THE INSTALLATION AND TROUBLESHOOTING INSTRUCTIONS. This device must be installed and used in strict accordance with the manufacturer's instructions as described in the user documentation that comes with the product. [. . . ] Auto (802. 11b and 802. 11g) G Only (802. 11g only) B Only (802. 11b only) Mode SECTION 3, CONFIGURATION 3-3 SECTION 3 Site Survey ­ Site Monitor CONFIGURATION This screen displays information about wireless Access Points (AP) and stations, and their associated information. The settings displayed here help you to configure the Ethernet Bridge appropriately. Click APPLY to save your settings or CANCEL to cancel changes. Field or Button Scan Type Description Click to search for more access points/routers. The security protocol used. SSID MAC Address Channel Signal Strength Wireless Mode Security 3-4 SECTION 3, CONFIGURATION CONFIGURATION Configuring Wireless Profile 1 or 2 SECTION 3 The Wireless Profile 1 or 2 screens enable you to adjust settings for your wireless connection for a specific wireless profile. ! Basic Security Advanced Professional Wireless ­ Basic This screen enables you to setup your Service Set Identifier (SSID) parameters for your network. The SSID is the name of your network that is shared among all the devices in a wireless network. The SSID must be identical on all of the devices in your wireless network. The SSID is case-sensitive and must not exceed 32 alphanumeric characters. Click APPLY to save your settings or CANCEL to cancel changes. Field or Button Network ID (SSID) Description Enter a Network ID (SSID) of no more than 32 alphanumeric characters. The same SSID has to be entered on every wireless device on your wireless network. For a discussion of Network Types, refer to Section 1:Type of Networks. Infrastructure Ac-Hoc Network Type SECTION 3, CONFIGURATION 3-5 SECTION 3 Wireless ­ Security CONFIGURATION This screen enables wireless security settings. Click APPLY to save your settings or CANCEL to cancel changes. Field SSID Broadcast Description Service Set Identifier (SSID). Broadcasts the SSID of the Wireless Ethernet Bridge to devices on your network. This enables wireless clients, like a laptop, to receive the Wireless Ethernet Bridge's SSID and then join the Ad-Hoc network. If you don't want the SSID to be broadcast, disable this feature. The default is enabled. 3-6 SECTION 3, CONFIGURATION CONFIGURATION Field ESS Auth Mode Description SECTION 3 Extended Service Set (ESS) Authentication Mode. Authentication differs from Encryption in that you are establishing either an open or secure verification of communication with an AP. The options are: Open System The Open System Authentication method is used, meaning the AP you are trying to associate with will not verify the identification of your unit. You need to share the same key between your AP and client. Pre-Shared Key (PSK) Select the option that best meets your needs. Encryption Status Determines the type of security encryption algorithms for the Key Index. The options are: None WEP64 WEP128 No security Wired Equivalent Privacy - 64-bit strength (provides 4 Keys) Wired Equivalent Privacy 128-bit strength (provides 2 Keys) Select the option that best matches your needs. [. . . ] Switch On an Ethernet network, a switch filters frames based on the MAC address, in a manner similar to a bridge. A switch is more advanced because it can connect more than two segments. T TCP Transmission Control Protocol on OSI transport layer four, provides reliable transport over the network for data transmitted using IP (network layer three). It is an end-to-end protocol defining rules and procedures for data exchange between hosts on top of connectionless IP. TCP uses a timer to track outstanding packets, checks error in incoming packets, and retransmits packets if requested. SECTION 5, GLOSSARY 5-9 SECTION 5 TCP/IP GLOSSARY The Transmission Control Protocol/Internet Protocol suite provides standards and rules for data communication between networks on the Internet. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE MOTOROLA WE800G




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual MOTOROLA WE800G will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.