1 Introduction
The Wireless SOHO Router operates seamlessly in the 2.4 GHz frequency spectrum supporting the 802.11b (2.4GHz, 11Mbps) and the newer, faster 802.11g (2.4GHz, 54Mbpswireless standard.
High output power and high sensitivity can extend range and coverage to reduce the roaming between APs to get more stability wireless connection. It also can reduce the expense of equipment in the same environment.
To protect your wireless connectivity, this device can encrypt all wireless transmissions through
This chapter describes the features & benefits, package contents, applications, and network configuration.
Features & Benefits
| Features |
|
| Benefits |
|
|
|
|
| ||
| High Speed Data Rate Up to 54Mbps |
| Capable of handling heavy data payloads such as | ||
|
|
|
| MPEG video streaming | |
|
|
|
| ||
| IEEE 802.11b/g Compliant |
| Fully Interoperable with IEEE | ||
|
|
|
| 802.11b/IEEE802.11g compliant devices with | |
|
|
|
| legacy protection | |
|
|
| |||
NAT Router |
| Multiple computer Internet Access, also act as | |||
|
|
|
| natural firewall | |
WEP/WPA/WPA2/ IEEE 802.1x support |
| Securing network from malicious access | |||
|
|
| |||
Hide SSID |
| Avoid | |||
DHCP |
| Simplify network configuration and management | |||
|
|
| |||
MAC address filtering |
| Ensures secure network connection | |||
|
|
| |||
UPnP(Universal Plug and Play) |
| Friendly to special application e.g. instant | |||
|
|
|
| messenger, VoIP | |
Port forwarding |
| Set up application server (FTP, Web, Email, …) on | |||
|
|
|
| LAN | |
Access control |
| ||||
|
|
|
| prevent users from access unwanted content | |
Firewall with SPI (Stateful Packet Inspection) |
| Prevent malicious access from Internet | |||
|
|
| |||
DoS (Denial of Service) protection |
| Prevent from | |||
|
|
| |||
| Easy local connectivity | ||||
cable type |
|
|
| ||
| Simple and intuitive network management | ||||
|
|
| |||
Firmware change via the |
| Allow easy upgrade/restore/dump system | |||
configuration screen |
| configuration via web interface | |||
System log |
| Logging critical event according to network | |||
|
|
|
| manager’s criteria |
5