
Table of contents
SCALANCE W770/W730 to IEEE 802.11n Web Based Management
Configuration Manual, 11/2014, C79000-G8976-C323-03
7
6 Upkeep and maintenance ................................................................................................................... 271
6.1 Firmware update - via WBM ................................................................................................. 271
6.2 Restoring the default parameter settings .............................................................................. 272
7 Troubleshooting/FAQ .......................................................................................................................... 273
7.1 Firmware update via WBM or CLI not possible .................................................................... 273
7.2 Disrupted data transmission due to the received power being too high ............................... 274
7.3 Compatibility with predecessor products .............................................................................. 275
7.4 Instructions for secure network design ................................................................................. 275
A Appendix A ......................................................................................................................................... 277
A.1 MIB files supported by SCALANCE W700 ........................................................................... 277
B Appendix B ......................................................................................................................................... 279
B.1 Private MIB variables of the SCALANCE W700 ................................................................... 279
C Appendix C ......................................................................................................................................... 281
C.1 Underlying standards ............................................................................................................ 281
D Appendix D ......................................................................................................................................... 283
D.1 Messages in the event log .................................................................................................... 283
D.2 Messages in the WLAN authentication log ........................................................................... 287
Index................................................................................................................................................... 289
Kommentare zu diesen Handbüchern