Tenda n150 — понимание беспроводных маршрутизаторов и DMZ в сетевой безопасности [70/81]
![Tenda n150 Инструкция по эксплуатации онлайн [70/81] 166096](/views2/1190864/page70/bg46.png)
11N Broadband Wireless Router
.
66
computer hostnames into IP addresses.
WDS
A wireless distribution system (WDS) is a system enabling the wireless
interconnection of access points in an IEEE 802.11 network. It allows a wireless
network to be expanded using multiple access points without the traditional
requirement for a wired backbone to link them. All base stations in a wireless
distribution system must be configured to use the same radio channel, method of
encryption (none, WEP, or WPA) and the same encryption keys. They may be
configured to different service set identifiers. WDS also requires every base
station to be configured to forward to others in the system. WDS may also be
considered a repeater mode because it appears to bridge and accept wireless
clients at the same time (unlike traditional bridging).WDS may be incompatible
between different products (even occasionally from the same vendor) since it is
not certified by the Wi-Fi Alliance. WDS may provide two modes of wireless
AP-to-AP connectivity:
Wireless bridging, in which WDS APs communicate only with each other and
don't allow wireless clients or stations (STA) to access them.
Wireless repeating, in which APs communicate with each other and with
wireless STAs.
DMZ
In computer security, a DMZ (sometimes referred to as a perimeter networking)
is a physical or logical subnetwork that contains and exposes an organization's
external-facing services to a larger untrusted network, usually the Internet. The
purpose of a DMZ is to add an additional layer of security to an organization's
local area network (LAN); an external attacker only has access to equipment in
the DMZ, rather than any other part of the network. Hosts in the DMZ have
limited connectivity to specific hosts in the internal network, although
communication with other hosts in the DMZ and to the external network is
allowed. This allows hosts in the DMZ to provide services to both the internal
and external network, while an intervening firewall controls the traffic between
the DMZ servers and the internal network clients. Any services such as Web
servers, Mail servers, FTP servers and VoIP servers, etc. that are being provided
to users on the external network can be placed in the DMZ.
Содержание
- Copyright statement p.1
- Copyright statement p.2
- Contents p.3
- Front panel p.5
- Leds and ports p.5
- Chapter 1 product overview p.5
- Package contents p.5
- Back panel p.6
- Please p.7
- Chapter 2 installation and quick setup guide p.7
- Preparation p.7
- Physical installation p.7
- Physical installation p.8
- Internet connection setup p.9
- Log in to web manager p.9
- Internet connection setup p.11
- Dhcp select dhcp dynamic ip if you can access internet as soon as your computer directly connects to an internet enabled adsl cable modem configure a security key 8 63 characters to p.11
- Verify internet connection settings p.13
- No response is received from your isp please verify that you can access internet when you directly connect your pc to an internet enabled modem if not contact your local isp for help p.14
- Connect to device wirelessly p.15
- Win7 operation p.15
- Windows xp operation p.19
- Advanced p.22
- Status p.22
- Internet connection setup p.22
- Chapter 3 advanced settings p.22
- Static ip p.23
- Pppoe dual access p.27
- Lan settings p.28
- Wan speed p.28
- Mac clone p.28
- Dns settings p.29
- Dhcp client list p.30
- Dhcp server p.30
- Wireless security setup p.32
- Wireless settings p.32
- Wireless security p.32
- Wireless basic settings p.32
- Channe p.32
- Wireless extender p.35
- Wisp mode p.35
- Universal repeater mode p.38
- Wds bridge mode p.40
- Wireless access control p.45
- Configure router 1 p.45
- Wireless client p.46
- Of wireless connection rate p.47
- Note the bandwidth here refers to the channel bandwidth instead p.47
- Bandwidth control p.48
- Traffic statistics p.49
- Special applications p.51
- Port range forwarding p.51
- Dmz host p.53
- Static routing p.55
- Routing table p.56
- Security p.57
- Url filter p.57
- Mac filter p.58
- Client filter p.60
- Reboot p.62
- Backup restore p.62
- Restore to factory default settings p.62
- Syslog p.64
- Remote web management p.64
- Login password p.66
- Firmware upgrade p.67
- Appendix 1 glossary p.68
- Then click ok p.71
- Run on pc3 input cmd on the appearing window and p.71
- Appendix 2 verify the wds connection p.71
- Appendix 3 faqs p.75
- Your pc p.77
- Appendix 4 remove wireless network from your pc p.77
- Appendix 4 remove wireless network from p.77
- Appendix 5 safety and emission statement p.80
Похожие устройства
-
Tenda N60Инструкция по эксплуатации -
Tenda FH330Инструкция по эксплуатации -
Tenda AC6Инструкция по эксплуатации -
Tenda AC18Инструкция по эксплуатации -
Tenda 4G630Инструкция по эксплуатации -
Tenda w308rИнструкция по эксплуатации -
Tenda n301Инструкция по эксплуатации -
Tenda w1800rИнструкция по эксплуатации -
Tenda f300Инструкция по эксплуатации -
MikroTik RB951Ui-2nDРуководство по эксплуатации -
Tp-Link Archer A6Руководство по эксплуатации -
Tp-Link tl-wr940n 450mИнструкция по быстрому старту
Изучите, как беспроводные маршрутизаторы и системы распределения WDS работают для расширения сетей. Узнайте о DMZ и ее роли в безопасности сетей.