Jump to: navigation , search. Key Modem Pages. Categories : DSL Modems. Navigation menu Personal tools Log in. Namespaces Page Discussion. Views Read View source View history. This page was last edited on 31 October , at Privacy policy About Support Disclaimers. NCF HelpWiki. With a purpose-built network, world-class expertise and solutions, and Australia-based customer support, you can trust Vocus to deliver. Trusted by leading organisations.
Read case studies. Our network and expertise. We connect people, businesses, governments, and communities across Australia and New Zealand, to the world. Enterprise From network and collaboration services, to data centre and cloud solutions, you can count on us to meet your needs. Government As a critical infrastructure provider, we're experts in secure, reliable, and high-performance solutions for government.
Wholesale Across Australia, New Zealand, and into Asia Pacific, we provide wholesale connectivity, voice, and data centre solutions you can depend on. What's going on at Vocus.
Security level is low security disabled for an easy first use, meaning the data will not be encrypted. Wireless security settings are described in. Registration is not activated. New stations are allowed automatically. The Access Control List is open and empty.
For more information, see the documentation of your wireless client adapter. The wireless client must be correctly configured for the default network name. Some wireless clients do not automatically join a wireless network.
If so, follow the instructions for the wireless client software to initiate association. For other Operating Systems the wireless client will in most cases be configured via dedicated client managers.
To secure your wireless network, the following wireless access point settings can be personalised:. Allowed via registration : Only allowed stations in the ACL have access. You can add new stations via:. The Search for wireless devices task. Not allowed : Only allowed stations in the ACL have access.
You can add new stations to the ACL only via the Search for wireless devices task. No security; the data will not be encrypted, no authentication process will be used. The highest form of security available for home users.
Make sure that your wireless client and client manager are compatible with it. Wireless access points may already have been configured during the Home Install Wizard. If you change wireless settings, wireless clients will be disconnected.
In this case, you need to reconfigure the wireless clients before you can connect to the Internet again. The wireless client adapters have been installed on all the computers you want to connect to the WLAN. Proceed as follows to register new wireless network clients via the association button:.
The ACL will be unlocked for a time frame of one minute. If so, follow the instructions for the WLAN client software to initiate the association. This feature allows you to extend the range of your wireless network by introducing one or more WDS-enabled devices into your wireless network. WDS enables data packets to pass from one wireless access point to another, as if the access points were ports on a wired Ethernet switch.
Repeaters extend the coverage area of your wireless LAN. However, bear in mind that throughput is reduced for wireless clients that are connected through a repeater.
Welcome to ManualMachine. We have sent a verification link to to complete your registration. Log In Sign Up. Forgot password? Enter your email address and check your inbox.
Please check your email for further instructions. Enter a new password. Technicolor - Thomson. SpeedTouch WL. A caution warns you about potential problems or specific precautions that need to be taken. Terminology Documentation and software updates. Proceed as follows: 1 Open a Web browser. You can use the Command Prompt window. Upgrade your configuration. Proceed as follows: 1 Open a Command Prompt window. File system structure The structure of the file system is very simple: it consists of a single root directory called root and a subdirectory called dl download.
Common FTP commands. Depending on the access rights you have in a directory, you can use one of the following commands: Use the to A configuration file must be uploaded to the dl directory. Downloading the configuration file must be done from the dl directory.
Password requir ed. Only complete CLI commands in other words, the complete command syntax with all the parameters already specified can be executed. Chapter 2 Local Network Setup 2. Device settings Once you have connected a device, you can personalise its settings. This feature maximizes your network performance.
0コメント