beautypg.com

List of figures – Lantronix Ethernet User Manual

Page 7

background image

Contents

WiBox2100E User Guide

7

List of Figures

Figure 2-1. Serial Tunneling Infrastructure Network Example _________________________ 11

Figure 2-2. Ad Hoc Network Example ___________________________________________ 12

Figure 2-3. Serial Tunneling Infrastructure Example ________________________________ 12

Figure 2-4. Direct WiBox to WiBox Connection ____________________________________ 13

Figure 2-5. DB9M DTE Serial Connector _________________________________________ 15

Figure 2-6. RS-422/485 4-Wire Pinouts __________________________________________ 15

Figure 2-7. RS-485 2-Wire Pinouts _____________________________________________ 16

Figure 2-8. Network Interface__________________________________________________ 16

Figure 2-9. RJ45 Ethernet Connector____________________________________________ 17

Figure 3-1. WiBox Connected for Configuration____________________________________ 20

Figure 4-1. Web-Manager ____________________________________________________ 28

Figure 4-2. Network Settings __________________________________________________ 29

Figure 4-3. Server Settings____________________________________________________ 31

Figure 4-4. Hostlist Settings ___________________________________________________ 32

Figure 4-5. Channel Serial Settings _____________________________________________ 34

Figure 4-6. TCP Connection Settings____________________________________________ 37

Figure 4-7. UDP Connection Settings ___________________________________________ 40

Figure 4-8. WLAN Settings____________________________________________________ 42

Figure 5-1. MAC Address_____________________________________________________ 46

Figure 5-2. Setup Menu Options _______________________________________________ 46

Figure 7-1. Serial Port Parameters______________________________________________ 50

Figure 7-2. Manual Connection Address Example __________________________________ 55

Figure 8-1. Expert Settings____________________________________________________ 67

Figure 8-2. Encryption Keys ___________________________________________________ 71

Figure 10-1. TFTP Window ___________________________________________________ 78