EasyManua.ls Logo

Eminent EM4218 - Configuration for DHCP providers; Configuration for other providers; Securing the wireless network

Eminent EM4218
23 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
6 |
ENGLISH
6. Enter your password in the ‘Input Password’ field.
7. Enter your password once more in the ‘Confirm Password’ field.
8. Click ‘Save’ to save the settings and restart the wSURF.
4.4 Configuration for DHCP providers
1. Click ‘Setup Wizard’.
2. Select the country where you live in the ‘Country’ field (For instance
‘Netherlands).
3. Select your Internet provider in the ‘ISP’ field.
4. Select ‘DHCP (Get IP dynamically from ISP)’ in the ‘Connection Type’ field.
5. Click ‘Next’.
6. Click ‘Save’ to save the settings and restart the wSURF.
4.5 Configuration for other providers
If you can not find your provider in the Wizard list, you can ask your provider for the
correct settings. Follow the procedure below to enter these settings into the EM4218:
1. Click ‘Advanced’.
2. Click ‘WAN’.
3. Enter the settings given to you by the provider.
4. Click ‘Add’.
5. Click ‘Save’ (upper right corner).
6. Click ‘Ok’ to reboot the wSURF.
5.0 Securing the wireless network
To avoid having uninvited guests probing your wireless network we strongly
recommend securing your wireless network. You can protect your wireless network in
a number of ways. To apply a method to your network, it is necessary for all the
wireless devices to support this method. Currently the strongest form of protecting is
WPA (WiFi Protected Access).
1. Open your Internet browser (for instance Internet Explorer, Netscape or Firefox).
2. Enter ‘http://192.168.1.1’ in the address bar.
3. Press Enter or click ‘Go to’.
4. Enter ‘admin’ in the ‘User Name’ field (Note! This field is case sensitive).
5. Enter ‘admin’ in the ‘Password’ field (Note! This field is case sensitive).
6. Click ‘Advanced’.
7. Click ‘Wireless’.
8. Click ‘Security’.
9. For WPA2 security continue with section 5.1 (recommended), for WEP security
continue with section 5.2.

Table of Contents

Related product manuals