Do you have a question about the Steren COM-818 and is the answer not in the manual?
Frequency Band | 2.4 GHz |
---|---|
Wireless Standards | IEEE 802.11b/g |
Ports | 1 x RJ-45 (10/100 Mbps) |
Security | WEP, WPA, WPA2 |
Operating Modes | Repeater |
Antenna | External |
Essential safety guidelines for device usage, including avoiding water, extreme temperatures, and electrical instability.
Lists requirements like broadband internet access and advises consulting ISP for modem installation.
Instructions on connecting the ADSL/cable modem to the COM-818 router's LAN port and plugging into power.
Details how to restart the router by pressing the RESET button for 10 seconds.
Instructions to connect the device to a wall outlet and then connect a computer to its wireless network.
Details the default IP address (192.168.10.253) and login credentials for the router interface.
Guide to navigate through Control Panel to reach the Local Area Connection Properties.
Instructions for manually setting the IP address, subnet mask, and default gateway for a computer.
Instructions to start the configuration wizard after logging into the router interface.
Details the different operating modes: Router, AP, Repeater, and WISP, for user selection.
Instructions to select the target SSID from the list and proceed with repeater setup.
Details on entering the network password (Key) and saving the configuration.
Guide to select the SSID of the access point for Wireless ISP mode and initiate setup.
Details on enabling wireless expansion, setting SSID, and security mode for Wireless ISP.
Guide for configuring WAN connection with a static IP address, subnet mask, and gateway.
Instructions for setting up a PPTP connection, including server IP, user credentials, and DNS settings.
Instructions to start the firmware update process by selecting a file.
Guidance on downloading the latest firmware from the website for the update.
Crucial warning against interrupting the firmware update process to avoid device failure.
Guide to configure wireless security and encryption to prevent unauthorized access.
Allows enabling and configuring port filtering rules to control network traffic.
Enables and configures IP filtering to manage how IP addresses are processed or discarded.
Controls network access by filtering MAC addresses, allowing or denying specific devices.
Protects against web threats by controlling and monitoring URL access.