Cisco Linksys WAG200G 사용자 설명서 - 페이지 16

{카테고리_이름} Cisco Linksys WAG200G에 대한 사용자 설명서을 온라인으로 검색하거나 PDF를 다운로드하세요. Cisco Linksys WAG200G 39 페이지. Linksys wireless-g adsl home gateway

Cisco Linksys WAG200G 사용자 설명서
Chapter4
Wireless > Wireless Access
Wireless access can be filtered by using the MAC addresses
of the wireless devices transmitting within your network's
radius.
Wireless > Wireless Access
Wireless Network Access
Allow All/Restrct Access
To filter wireless users by MAC
address, either permitting or blocking access, select Restrct
Access. If you do not wish to filter users by MAC address,
keep the default, Allow All.
Prevent lsted computers from accessng the wreless
network
Select this to block wireless access by MAC
address. This setting is selected by default.
Permt only lsted computers to access the wreless
network
Select this to allow wireless access by MAC
address.
Edt MAC Address Access Lst
Address Filter List screen.
MAC Address Filter List
MAC Address Filter List
Wreless-G ADSL Home Gateway
Click this to open the MAC 
Advanced Configuration
MAC 01-20
Enter the MAC addresses of the devices
whose wireless access you want to block or allow.
Wreless Clent MAC Lst
Wireless Client List screen.
Wireless Client List
Wireless Client List
This screen lists the MAC addresses of the wireless
devices. Select Enable MAC Flter for any device you
want to add to the MAC Address Filter List. Then click
Update Flter Lst.
To retrieve the most up-to-date information, click
Refresh. To exit this screen and return to the Wireless 
MAC Filter List screen, click Close.
Click Save Settngs to apply your changes, or click Cancel
Changes to cancel your changes.
Wireless > Advanced Wireless Settings
The Advanced Wireless Settings screen is used to set up the
Gateway's advanced wireless functions. These settings
should only be adjusted by an expert administrator as
incorrect settings can reduce wireless performance.
Wireless > Advanced Wireless Settings
Advanced Wireless
Wireless-G Settings
Authentcaton Type
The default is Auto, which allows
either Open System or Shared Key authentication to be
used. With Open System authentication, the sender and
the recipient do NOT use a WEP key for authentication.
With Shared Key authentication, the sender and recipient
Click this to open the
1