Router szerokopasmowy Wireless-G
6
RYSUNEK 5-24: ZAKŁADKA ACCESS RESTRICTIONS – INTERNET ACCESS POLICY..................................................................34
RYSUNEK 5-25: ZAKŁADKA ACCESS RESTRICTIONS – SUMMARY .........................................................................................35
RYSUNEK 5-26: ZAKŁADKA ACCESS RESTRICTIONS - INTERNET ACCESS PCS LIST................................................................35
RYSUNEK 5-27: ZAKŁADKA APPLICATION AND GAMING – PORT RANGE FORWARDING ............................................................36
RYSUNEK 5-28: ZAKŁADKA APLICATIONS & GAMING – PORT TRIGGERING.............................................................................38
RYSUNEK 5-29: ZAKŁADKA APPLICATIONS & GAMING – DMZ................................................................................................39
RYSUNEK 5-30: ZAKŁADKA ADMINISTRATION – MANAGEMENT ............................................................................................40
RYSUNEK 5-31: ZAKŁADKA ADMINISTRATION – LOG ............................................................................................................42
RYSUNEK 5-32: DZIENNIK RUCHU WCHODZĄCEGO ..............................................................................................................42
RYSUNEK 5-33: ZAKŁADKA ADMINISTRATION – DIAGNOSTICS.............................................................................................43
RYSUNEK 5-34: TEST PING.................................................................................................................................................43
RYSUNEK 5-35: TEST TRACEROUTE ....................................................................................................................................43
RYSUNEK 5-36: ZAKŁADKA ADMINISTRATION – FACTORY DEFAULTS ....................................................................................44
RYSUNEK 5-37: ZAKŁADKA ADMINISTRATION – FIRMWARE UPGRADE ..................................................................................44
RYSUNEK 5-38: ZAKŁADKA ROUTER – STATUS ....................................................................................................................45
RYSUNEK 5-39: ZAKŁADKA STATUS – LOCAL NETWORK .......................................................................................................46
RYSUNEK 5-40: TABLICA KLIENTÓW DHCP..........................................................................................................................46
RYSUNEK 5-41: ZAKŁADKA STATUS – WIRELESS..................................................................................................................47
RYSUNEK C-1: ZAKŁADKA ADMINISTRATION – FIRMWARE UPGRADE.....................................................................................65
RYSUNEK E -1: OKNO KONFIGURACJA IP ..............................................................................................................................67
RYSUNEK E-2: ADRES MAC.................................................................................................................................................67
RYSUNEK E-3: ADRES MAC.................................................................................................................................................67
RYSUNEK E- 4: LISTA FILTROWANYCH ADRESÓW MAC.........................................................................................................68
RYSUNEK E- 5: KLONOWANIE ADRESU MAC .........................................................................................................................68
Kommentare zu diesen Handbüchern