- 2 -
CONTENTS
CONTENTS..............................................................................................................................................................................2
Chapter 1 Administrator Settings......................................................................................................................................1-1
Administrator Menu...............................................................................................................................................................1-2
Network.................................................................................................................................................................................1-3
Network.............................................................................................................................................................................1-3
■Addition...................................................................................................................................................................1-4
■Deletion...................................................................................................................................................................1-7
■Priority-Level Settings.............................................................................................................................................1-8
■Basic Information.....................................................................................................................................................1-8
■Wireless LAN...........................................................................................................................................................1-9
■Encryption...............................................................................................................................................................1-9
■When WEP is selected for Mode...........................................................................................................................1-10
■When WPA-PSK is selected for Mode..................................................................................................................1-11
■Authentication Method...........................................................................................................................................1-12
■TCP/IP...................................................................................................................................................................1-13
■SIP Outb Proxy......................................................................................................................................................1-14
■NAT Traversal.......................................................................................................................................................1-15
■QoS.......................................................................................................................................................................1-16
■Coding...................................................................................................................................................................1-17
■Jitter Buffer............................................................................................................................................................1-17
SIP..................................................................................................................................................................................1-18
■User account.........................................................................................................................................................1-18
■Server....................................................................................................................................................................1-19
■IMS Server............................................................................................................................................................1-19
■Outbound Proxy....................................................................................................................................................1-20
■Expire....................................................................................................................................................................1-20
Network Connection........................................................................................................................................................1-21
■Network Connection..............................................................................................................................................1-21
Certificate Management..................................................................................................................................................1-22
■Certificate Management........................................................................................................................................1-22
Network Search...............................................................................................................................................................1-25
Ping.................................................................................................................................................................................1-27
■Manual Operations................................................................................................................................................1-27
■Proxy Server 1.......................................................................................................................................................1-28
■Proxy Server 2.......................................................................................................................................................1-28
■Default Gateway....................................................................................................................................................1-29
■TFTP Server..........................................................................................................................................................1-29
Password.............................................................................................................................................................................1-30
Administrator Password..................................................................................................................................................1-30
User Password Reset.....................................................................................................................................................1-31
Version Upgrade..................................................................................................................................................................1-32
Error Log..............................................................................................................................................................................1-34
Web Server..........................................................................................................................................................................1-35
Initializing.............................................................................................................................................................................1-36
Memory Info (Memory Usage).............................................................................................................................................1-37
Chapter 2 Web Settings......................................................................................................................................................2-1
WirelessIP 3000 Web Settings..............................................................................................................................................2-2
Overview...........................................................................................................................................................................2-2
When setting via TELNET:................................................................................................................................................2-2
Access restrictions............................................................................................................................................................2-2
Management User Menu.......................................................................................................................................................2-3
Main..................................................................................................................................................................................2-3