Ct Manual. Comtrend corporation CTT Pdf User Manuals. View online or download Comtrend corporation CTT User Manual. AC-IG User. CT ADSL2+ Wireless Router User Manual Version A, September 11, Preface This manual provides information related to the. Comtrend CTT Router. Below you can view and/or download the English PDF manual of your Comtrend CTT Router. Couldn’t find the manual that.
|Published (Last):||14 September 2012|
|PDF File Size:||13.44 Mb|
|ePub File Size:||16.25 Mb|
|Price:||Free* [*Free Regsitration Required]|
Never dispose of this electronic equipment along with your household waste. No part of this document may be translated, transcribed, reproduced, in any form, or by any means without prior written consent of Comtrend Corporation. Enter source port number or port range.
COMTREND CORPORATION CT USER MANUAL Pdf Download.
Enter ocmtrend IP address. Allows selection of a specific channel or Auto mode. MAC filtering function is disabled. Mac Encapsulation Routing mer 5. The following screen appears: Packets smaller than the specified fragmentation threshold value are not fragmented. Access Ip Addresses 9. Allows the user to select the logged events and displays on the View System Log window for events of this level and above to the highest Emergency level.
The time the restrictions end. For a more technical discussion of this topic, see Appendix A: All other frames on this interface are dropped.
Comtrend Corporation CT-5361 User Manual
Access Control The Access Control option under Management menu bar configures the access-related parameters, comtrennd three parts: Then, choose the Encapsulation mode. The available options are shown. A screenshot of typical WPS client software is given below as an example.
Click Start to start the test or Close. It provides summary information such kanual device hardware and software versions, data transmission line rates and IP Configuration settings.
The log levels are defined as follows: Input Internet access user name MAC: Pin Assignments Appendix B: The following will be displayed. If the log level is set to Error, only Error and the level above will be logged. Multiple filter rules can be set and each applies at least one limiting condition.
IP Precedence Select between This process usually works for resetting any router to it’s factory setting. Consult the table below for field descriptions.
Click Next to start the setup process.
It will then read the configuration profile from the permanent storage section of flash memory. Tools – Update Settings 9. The column headings above are described in the table below.
If the reset button is continuously pushed for more than 5 seconds and not more than 12 secondsthe boot loader will erase the configuration settings saved on flash memory.
Despite this, the identity of the tc-5361 is still verified. Below are the device manuals available for your CT If the Network Authentication Shared mode checkbox is not shared that is, if open system authentication is usedno authentication is provided.
Comtrend Corporation CTT User manual |
Beacon Interval The amount of time between beacon transmissions. Page 2 The reader reading this manual is presumed to have a basic understanding of telecommunications. The amount of time between beacon transmissions in milliseconds. Enabling no Acknowledgement can result in more efficient throughput but higher error rates in a noisy Radio Frequency RF environment. All statistics screens are updated every 15 seconds.
During power on, the device initializes all settings to default values. Enter the path to the image file location in the box below or click the Browse button to locate the image file.
Selecting Enabled or Enabled Scan enables wireless bridge restriction. The results are displayed as follows. These features make the CT especially suited to a home or small business environment. The client software should show the status. Enter the subnet mask for the LAN port. It may not have an effect on your Internet connectivity. Need a new router? Avoid using a telephone other than a cordless type during an electrical storm.
If the firewall is not used, this checkbox should not be selected so as to free up system resources. Click the Backup Settings button to save the current configuration settings. Of the form, XX: