
Accessing Web Conguration Interface in Conguration Mode .....................................30
Conguration......................................................................................................................................32
Connecting Non-wireless Devices ..............................................................................................35
4-2. Conguration Using Smart Wireless Setup (Push Switch)..................................................37
Conguration......................................................................................................................................38
4-3. Conguration Using Smart Wireless Setup(Pin Code) ......................................................... 42
Accessing Web Conguration Interface in Conguration Mode .....................................42
Checking a PIN Code........................................................................................................................44
Conguration......................................................................................................................................47
5. List of Functions........................................................................ 49
5-1. How to Access Web Conguration Interface...........................................................................49
Accessing Web Conguration Interface in Conguration Mode .....................................50
Conguration via Web Conguration Interface.....................................................................52
5-2. IEEE802.1X Authentication ............................................................................................................54
Network Conguration ...................................................................................................................54
IEEE802.1X Authentication ............................................................................................................56
Certicate Standard..........................................................................................................................58
MAC Address Filtering.....................................................................................................................59
Before Using the IEEE802.1X Authentication..........................................................................59
IEEE802.1X Authentication Settings...........................................................................................60
5-3. Saving Log............................................................................................................................................62
Types of Log ........................................................................................................................................62
Retrieving/Deleting System Log..................................................................................................66
Retrieving/Deleting Event Log..................................................................................................... 68
Time Synchronization of Log ........................................................................................................ 70
5-4. Address Management Table..........................................................................................................71
About Address Management Table Feature............................................................................71
Registering Address to Management Table.............................................................................72
Deleting Address from Management Table.............................................................................74
5-5. Maintenance .......................................................................................................................................76