home networking series Advanced manual - HOME NETWORKING
|
|
|
- Harvey Ball
- 10 years ago
- Views:
Transcription
1 home networking series Advanced manual - HOME NETWORKING
2 TABLE OF CONTENTS Table of contents...1 Why an Eminent advanced manual?...2 Your tips and suggestions in the Eminent Advanced Manual?...2 Service and support...2 DHCP, Automatic allocation of ip-addresses...3 Translating ip-adresses and domain names...3 Using a single ip-address for your entire network...3 Security for your computer and your network...4 Making a computer available for Internet users in your network...4 Simplifying network management...4 Blocking websites with explicit content...5 Checking data traffic at package level...5 Blocking a complete domain...5 Carrying out actions based on date or time...5 A safe remote connection...5 Remote network management...6 Allocating or blocking network access...6 Making your wireless network secure...6 Expanding the range of your wireless network...7 Index...8 1
3 WHY AN EMINENT ADVANCED MANUAL? Eminent has developed the Eminent Advanced Manual especially for your ease of use. The Eminent Advanced Manual enables you to discover the advanced possibilities of your house network. The Eminent Advanced Manual will for example, help you setting up your firewall so your own network is optimally protected at all times. Of course, extensive consideration is also given to the protection of your wireless network. The Eminent Advanced Manual is a wealth of information and a handy reference source. This will enable you to have access to functions previously only available to professional and highly advanced users. Your tips and suggestions in the Eminent Advanced Manual? The Eminent Advanced Manual was created in cooperation with a number of satisfied Eminent users. If you would like a certain option to be included in the Eminent Advanced Manual or you have suggestions or tips regarding the Eminent Advanced Manual, you can contact [email protected]. Your tips and suggestions will be collected and processed in the new edition of the Eminent Advanced Manual. Service and support The Eminent Advanced Manual was carefully written by users and technical experts from Eminent.s Should you nevertheless experience problems with the installation or in using your Eminent product, please send an to [email protected]. You can also use the free Eminent service number: 0800-EMINENT ( ). Flemish users dial Using your mobile phone, dial 0900-EMINENT ( ) or if you live in Flanders, dial If you use your mobile phone, you pay 45 eurocents per minute excluding costs of using your mobile phone. 2
4 DHCP, AUTOMATIC ALLOCATION OF IP-ADDRESSES For the development of DHCP (Dynamic Host Configuration Protocol), TCP/IP settings are configured manually on each TCP/IP client (such as your computer for example). This can be a difficult job if it is a big network or if something has to be changed regularly in the network. DHCP was developed to avoid always having to set up an IP address. With DHCP, IP addresses are allocated automatically when necessary and released when no longer required. A DHCP server has a series ( pool ) of valid addresses that it can allocate to the client. When a client starts for example, it will send a message requesting an IP address. A DHCP server (there can be several in a network) responds by sending back an IP address and configuration details. The client will send a confirmation of receipt after which it can operate on the network. TRANSLATING IP-ADRESSES AND DOMAIN NAMES IP addresses are far from user-friendly. Domain names are however easier to remember and use. The process of translating a domain name into an address that is understandable for a machine (such as your computer) is known as name resolution. A Domain Name System server carries out the afore-mentioned process. Thanks to DNS, you use domain names instead of IP addresses when visiting a website or sending s. Dynamic DNS or DDNS is a DNS-related option. You can still link your IP address to a domain name using DDNS if your provider works with dynamic IP addresses ( dynamic here means that the IP addresses change frequently). After all, the IP address to which your domain name refers will also change when your provider changes your IP address. You must register with a Dynamic DNS provider such as and in order to use Dynamic DNS. USING A SINGLE IP-ADDRESS FOR YOUR ENTIRE NETWORK Network Address Translation (NAT) is an Internet standard with which a local network can use private IP addresses. Private IP addresses are those used within an own network. Private IP addresses are neither recognized nor used on the Internet. An IP address used on the Internet is also called a public IP address. NAT enables you to share a single public IP address with several computers in your network. NAT ensures the computers in your network can use the Internet without any problems but users on the Internet will not have access to the computers in your network. You will understand that NAT also offers a certain level of security partly due to the fact that private IP addresses are not visible on the Internet. Fortunately, most routers currently use NAT. 3
5 SECURITY FOR YOUR COMPUTER AND YOUR NETWORK A firewall can be a software- or a hardware solution placed, as it were, between the internal network and the outside world. Firewalls generally control incoming and outgoing data. Firewalls can be adjusted to stop or allow certain information from the Internet. Firewalls can also be adjusted to stop or allow requests from outside. Rules or policies are used to adjust firewalls. These state what a firewall must stop or allow and thus form a sort of filter. Most routers have various firewall functions. The big advantage of a firewall in a router (hardware solution) is that an attack from outside is averted before reaching your network. If you wish to use a software firewall, you could for example, use the firewall built into Windows XP Service Pack 2. There are better alternatives such as the free ZoneAlarm and the commercial packages from Norman, Norton, Panda and McAfee. These commercial packages also offer protection against viruses if required. Making a computer available for Internet users in your network The DMZ or DeMilitarized Zone is the zone between the outside world the Internet and the secure internal network. The computer placed within the DMZ is accessible via the Internet. This is in contrast to the computers that are outside the DMZ and are therefore secure. The DMZ is therefore also often used for servers that host websites. Websites must after all always be accessible via the Internet. A computer is also often placed within the DMZ if one plays a lot of online games. It is however advisable when you place a computer in the DMZ to fit a software firewall (such as the free ZoneAlarm). This is because the firewall opens all ports of the router for a computer within the DMZ. There is therefore no restriction on data transmission while this is however desirable in some situations. Just like the DMZ function, Virtual Server enables you to make a computer, set up for example, as an FTP- or a web server, accessible from the Internet. You can state which ports in the firewall must be opened when using a Virtual Server. This is also the most important difference with the DMZ: when you place a computer in the DMZ, all ports are opened for the respective computer. If you use Virtual Server, you can open only the ports important for the respective computer. Port Triggering or Special Apps is based on the same principle as Virtual Server. Port Triggering also enables you to make a computer within your network set up for example as an FTP- or webserver, accessible from the Internet. The ports you allocate always remain open when you use Virtual Server. With Port Triggering however, the respective ports will only be opened if requested by the respective application. SIMPLIFYING NETWORK MANAGEMENT UPnP Universal Plug and Play : The name suggests that UpnP is very similar to the well-known and notorious Plug & Play. Nothing is further from the truth. UPnP is completely different technology. The line of approach is that UPnP appliances must be able to communicate with one another via TCP/IP irrespective of the operating system, the programming language or the hardware. UPnP should make the user s life considerably easier. As well as the products from a limited number of other manufacturers, most Eminent network manufacturers support UPnP. For more information on UPnP, visit: 4
6 BLOCKING WEBSITES WITH EXPLICIT CONTENT Parental Control enables you to prevent one or more computers in your network from accessing the Internet. Parental Control often consists of several functions such as URL Blocking. This function blocks websites by way of so-called keywords or catchwords. Websites with explicit content are blocked in this way. URL Blocking is often combined with time and/or date blocks. Such blocks enable you to allow or block Internet access at certain times. You use rules or policies to set up your own schedule of blocks (see also Schedule Rule ). These rules describe exactly when and on what, a certain action, in this case, a block, must be applied. CHECKING DATA TRAFFIC AT PACKAGE LEVEL The package filter (or Packet Inspection ) is a programme that checks data packages while they are passing. The intelligent package filter checks the passing dataflow or business-specific definitions such as the IP- or user address, time and date, function and a number of other definitions. The package filter can best be imagined as a gatekeeper. The gatekeeper screens the passers-by: Who are you and where are you going? The passers-by whom the gatekeeper considers unsafe or unreliable are kept out. You do not have to configure the package filter in most appliances. You only have the option of activating these. The use of this option is therefore also definitely recommended. BLOCKING A COMPLETE DOMAIN A Domain Filter will enable you to block an entire domain. A domain is a location on the Internet such as a website. A Domain Filter is therefore very similar to a URL Filter, apart from the fact that a Domain Filter blocks the entire domain. If, for example, you wish to protect your children from explicit content on a certain website, as well as blocking the website by way of catchwords (see: Parental Control ), you can block the entire website. You can do this using the Domain Filter. CARRYING OUT ACTIONS BASED ON DATE OR TIME You can configure when a certain option may be available using the Schedule Rule function. Imagine you wish to make your Virtual Server available at set times. You can use the Schedule Rule to stipulate when Internet users may approach your Virtual Server. It will then not be possible for Internet users to make a connection with your Virtual Server outside the period set. Schedule Rule is a handy option for automating certain access blocks. A SAFE REMOTE CONNECTION VPN (Virtual Private Networking) enables you to create a secure connection so you can, for example, use your business network while at home. A VPN connection is actually nothing more than a highly secure tunnel, which makes a connection with another computer or network via the Internet. Data sent via a VPN and received by third parties will still be unusable thanks to advanced encryption technology. 5
7 REMOTE NETWORK MANAGEMENT The Simple Network Management Protocol (SNMP) is a control function enabling you to collect information from the router. The above-mentioned information consists of details on the number of computers connected to the router, their IP- and MAC addresses and the amount of data traffic processed when the information is requested. SNMP enables the system administrator to control the router remotely. This is often done using special applications supporting the SNMP protocol. ALLOCATING OR BLOCKING NETWORK ACCESS A MAC address is a unique code which each network product has. This code can often be found on a sticker on the product. You can also find the MAC address by clicking on Start, Execute. Type CMD and press Enter. Then type ipconfig /all and press Enter again. The MAC address is shown under Physical Address. A MAC address consists of six pairs each of two hexadecimal characters. For example, 00-0C-6E MAC Address Control enables you to set up rules for MAC addresses and therefore to deny for example, certain network products access to your network. When you use a wireless network, you can meanwhile use MAC Address Control to configure for example, your wireless network adapter to be able to connect to your network without the neighbouring network adapter being able to do so. MAC Address Control is a possibility, as well as WEP or WPA of providing extra security for your wireless network. MAKING YOUR WIRELESS NETWORK SECURE WEP encryption is a form of security encoding the wireless signal from your wireless router or modem so the data cannot be simply intercepted by third parties. The security level is expressed in bits. 64-Bit WEP encryption is the lowest security level ranging up to 128-Bit for the highest level of security offered by WEP encryption: 256-Bit. You must enter a hexadecimal- or an ASCII series of characters in order to set up WEP encryption. Hexadecimal characters consist of the characters A to F and 0 to 9. ASCII characters include all characters, including symbols. When you have selected the correct level of security and entered the key, you must also enter exactly the same key into all wireless appliances within the same network. Bear in mind that when you activate the key in the first appliance the connection with the network will be broken. You can re-establish the network by systematically providing all wireless appliance products with the same key. WPA is a form of security encoding the wireless signal from your wireless router or modem so the data cannot be simply intercepted by third parties. WPA stands for Wi-Fi Protected Access and is a big improvement on wireless security. WPA uses a Pre Shared Key (PSK). This is a key that must be put into operation on all appliances connected to the wireless network. This WPA key may not be any longer than 63 (random) characters and no shorter than 8 (random) characters. The best form of wireless protection is currently however formed by WPA2. The above-mentioned standard is only supported by a few manufacturers including Eminent and is therefore difficult to combine with other makes of wireless networks. If you wish to use WPA or perhaps even WPA2, make sure that all appliances in your wireless network support this form of security. The combining of various types of security in a wireless network is not possible and will result in the loss of the connection. 6
8 EXPANDING THE RANGE OF YOUR WIRELESS NETWORK WDS (Wireless Distribution System) or Bridging is an option with which you can easily expand the range of your wireless network should the range of your wireless network remain limited. Appliances linked via WDS can share your Internet connection. You therefore do not need to interlink appliances sharing WDS by way of a physical connection (such as a cable). Appliances supporting WDS or Bridging recognize one another automatically in most cases. You can use a so-called Range Extender if you wish to expand your network using WDS or Bridging. This is an appliance largely similar to an Access Point. The advantage of using a Range Extender rather than a second router if the second router bridging is supported is that a Range Extender is considerably cheaper. 7
9 INDEX Access blocks...5 Access Point...Zie Range Extender Administrator...6 Application...4 ASCII...6 Block...5 Bridging...Zie WDS Business network...5 Data traffic...6 DDNS Dynamic DNS...Zie DNS DHCP Dynamic Host Configuration Protocol...3 DMZ DeMilitarized Zone...4 DNS Domain Name System...3 Domain...5 Domain Filter...5 Domain name...3 Dynamic...3 Dynamic DNS...3 Explicit content...5 Firewall...2 Firewall software solution...4 Gatekeeper...5 Hardware...4 Hexadecimal...6 Key...6 Key words Catchwords...5 MAC address...6 Name resolution...3 NAT Network Address Translation...3 Online games...4 Operating system...4 Package filter Packet inspection...5 Packet inspection...5 Parental Control...5 Plug & Play...4 Policies...5, Zie Rules Pool...3 Port Triggering...4 Ports...4 Pre Shared Key (PSK)...6 Private IP addresses...3 Programming language...4 Public IP address...3 Range...7 Range Extender...7 Rules...5 Schedule Rule...5 SNMP Simple Network Management Protocol...6 Tunnel...5 UPnP Universal Plug and Play...4 URL Blocking...5 Virtual Server...5 Viruses...4 VPN Virtual Private Networking...5 WDS Wireless Distribution System...7 WEP encryption...6 Wi-Fi Protected Access...Zie WPA WPA...6 WPA
Chapter 4 Customizing Your Network Settings
. Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the Wireless-G Router Model WGR614v9, including LAN, WAN, and routing settings. It
Chapter 3 Security and Firewall Protection
Chapter 3 Security and Firewall Protection This chapter describes how to use the basic firewall features of the ADSL2+ Modem Router to protect your network. Firewall Settings You can set up the ADSL2+
9 Simple steps to secure your Wi-Fi Network.
9 Simple steps to secure your Wi-Fi Network. Step 1: Change the Default Password of Modem / Router After opening modem page click on management - access control password. Select username, confirm old password
Chapter 4 Customizing Your Network Settings
Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the RangeMax Dual Band Wireless-N Router WNDR3300, including LAN, WAN, and routing settings.
Security Awareness. Wireless Network Security
Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition
AC 1200. Wireless Dual Band ADSL2+ Modem Router. Highlights
AC 1200 Wireless Dual Band ADSL2+ Modem Router Highlights 1200Mbps Wireless Speed 300Mbps on 2.4GHz + 867Mbps on 5GHz Broad Coverage Two external antennas provide maximum omni-directional wireless coverage
Wireless Cable Gateway CG3100Dv3
Wireless Cable Gateway CG3100Dv3 User Manual 350 East Plumeria Drive San Jose, CA 95134 USA October 2011 202-10942-01 v1.0 2011 NETGEAR, Inc. All rights reserved No part of this publication may be reproduced,
MN-700 Base Station Configuration Guide
MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station
AC 750. Wireless Dual Band ADSL2+ Modem Router. Highlights
AC 750 Wireless Dual Band ADSL2+ Modem Router Highlights 750Mbps Wireless Speed 300Mbps on 2.4GHz + 433Mbps on 5GHz Broad Coverage 2 external antennas provide maximum omni-directional wireless coverage
SMC7901WBRA2-B1 Installation Guide
SMC7901WBRA2-B1 Installation Guide Model number: SMC7901WBR2- B1 Topic: Wireless Encryption (WPA) c. Click WLAN Security. Choose WPA2 Mixed under Encryption. Enter a password in the Pre- Shared Key and
Lab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
How To Get A Wireless Router For Free From $99.99 On Amazon.Com (For A Limited Time) (For An Extra $99) ( For A Long Distance) (On A 2.99/99) For A Year
AC 750 Wireless Dual Band Gigabit ADSL2+ Modem Router Highlights 750Mbps Wireless Speed 300Mbps on 2.4GHz + 433Mbps on 5GHz Broad Coverage 3 external detachable antennas provide maximum omni-directional
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
AC 1200. Wireless Dual Band Gigabit Router. Highlights
AC 1200 Wireless Dual Band Gigabit Router Highlights Fast Wi-Fi 300Mbps on 2.4GHz + 867Mbps on 5GHz totals 1.2Gbps Wi-Fi speeds Maximum Range 2 dual band external antennas provide maximum Omni-directional
AC 750. Wireless Dual Band Router. Highlights
AC 750 Wireless Dual Band Router Highlights Fast Wi-Fi 300Mbps on 2.4GHz + 433Mbps on 5GHz totals 733Mbps Wi-Fi speeds Superior Coverage 2 dual band fixed antennas provide incredible Omni-directional wireless
Sweex Wireless BroadBand Router + 4 port switch + print server
Sweex Wireless BroadBand Router + 4 port switch + print server Advantages Internet Sharing - A broadband internet connection makes it possible for several PCs to use the internet simultaneously. Wireless
Chapter 5 Customizing Your Network Settings
Chapter 5 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the RangeMax NEXT Wireless Router WNR834B, including LAN, WAN, and routing settings.
DSL-2600U. User Manual V 1.0
DSL-2600U User Manual V 1.0 CONTENTS 1. OVERVIEW...3 1.1 ABOUT ADSL...3 1.2 ABOUT ADSL2/2+...3 1.3 FEATURES...3 2 SPECIFICATION...4 2.1 INDICATOR AND INTERFACE...4 2.2 HARDWARE CONNECTION...4 2.3 LED STATUS
Chapter 3 Safeguarding Your Network
Chapter 3 Safeguarding Your Network The RangeMax NEXT Wireless Router WNR834B provides highly effective security features which are covered in detail in this chapter. This chapter includes: Choosing Appropriate
How To Connect Xbox 360 Game Consoles to the Router by Ethernet cable (RJ45)?
Is it really necessary for the three ports mentioned in Troubleshooting (UDP 88, UDP 3074, and TCP 3074) to be opened for Xbox Live to work properly? Most cable/dsl routers implement Network Address Translation
your Gateway Windows network installationguide 802.11b wireless series Router model WBR-100 Configuring Installing
your Gateway Windows network installationguide 802.11b wireless series Router model WBR-100 Installing Configuring Contents 1 Introduction...................................................... 1 Features...........................................................
DV230 Web Based Configuration Troubleshooting Guide
DV230 Web Based Configuration Troubleshooting Guide 1. Login settings After getting a DHCP IP address from your P1 W1MAX Modem DV-230), open any Internet browser and type in the URL address: http://10.1.1.254
Security. TestOut Modules 12.6 12.10
Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card
THE 123 OF WIRELESS SECURITY AT HOME 家 居 WIFI 保 安 123
THE 123 OF WIRELESS SECURITY AT HOME 家 居 WIFI 保 安 123 CONFIGURING YOUR HOME WIRELESS NETWORK Presented by: Mr. Eric Fan, Chairman, PISA Knowledge 123 Firmware 軟 韌 體 Knowledge 123 Home Network Functions
Wireless Encryption Protection
Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost
Load Balance Router R258V
Load Balance Router R258V Specification Hardware Interface WAN - 5 * 10/100M bps Ethernet LAN - 8 * 10/100M bps Switch Reset Switch LED Indicator Power - Push to load factory default value or back to latest
Configuring Routers and Their Settings
Configuring Routers and Their Settings When installing a router on your home network the routers settings are usually defaulted to automatically protect your home, and simplify setup. This is done because
Networking Basics and Network Security
Why do we need networks? Networking Basics and Network Security Shared Data and Functions Availability Performance, Load Balancing What is needed for a network? ISO 7-Layer Model Physical Connection Wired:
Quick Installation Guide
V2.01 IP Wired / Wireless Camera Quick Installation Guide (For Windows OS) Model: FI8602/FI8602W ShenZhen Foscam Intelligent Technology Co., Ltd Packing List Quick Installation Guide 1) IP CAMERA X 1 2)
NETWORK SET UP GUIDE FOR
NETWORK SET UP GUIDE FOR USZ11ZS USX21ZS USX31ZAND DVRX16D DVRX32D HDDX13D SUPPORTING ROUTER D-Link Linksys NETGEAR BELKI IP Addresses on the Internet When you connect to the Internet, through dialup connection,
AC 750. Wireless Dual Band 4G LTE Router. Highlights
AC 750 Wireless Dual Band 4G LTE Router Highlights Share Your 4G LTE Network Share your 4G LTE network with multiple Wi-Fi devices and enjoy download speeds of up to 150Mbps Great Coverage Powerful, integrated
Quick Installation Guide For Mac users
Quick Installation Guide For Mac users Packing List 1) IP CAMERA X 1 2) Wi-Fi Antenna (only available for wireless model) 3) DC Power Supply X 1 4) Network Cable X 1 5) Mounting bracket 1 6) CD X 1 (Include
Domain 3.0 Networking... 1
Table of Contents Domain 3.0 Networking... 1 DOMAIN 3.0 NETWORKING 1. You are installing a cable modem in a client s home. How should you select where to put the cable modem? A. Placing the modem right
AC 1900. Wireless Dual Band Gigabit Router. Highlights
AC 1900 Wireless Dual Band Gigabit Router Highlights Superfast Wi-Fi 600Mbps on 2.4GHz + 1300Mbps on 5GHz totals 1.9Gbps Wi-Fi speeds Maximum Range 3 dual band detachable antennas provide maximum Omni-directional
Cable Modem/Router with Wireless-N
Cable Modem/Router with Wireless-N U S E R M A N U A L NOTICE This document contains proprietary information protected by copyright, and this Manual and all the accompanying hardware, software, and documentation
ENHWI-N3. 802.11n Wireless Router
ENHWI-N3 802.11n Wireless Router Product Description Encore s ENHWI-N3 802.11n Wireless Router s 1T1R Wireless single chip can deliver up to 3x faster speed than of 802.11g devices. ENHWI-N3 supports home
Polycom. RealPresence Ready Firewall Traversal Tips
Polycom RealPresence Ready Firewall Traversal Tips Firewall Traversal Summary In order for your system to communicate with end points in other sites or with your customers the network firewall in all you
ECB1220R. Wireless SOHO Router/Client Bridge
Wireless SOHO Router/Client Bridge 2.4GH 802.11 b/g 54Mbps PRODUCT DESCRIPTION ECB-1220R is a 2.4GHz 802.11b/g broadband Wi-Fi Router with advanced AP/Client Bridge/Repeater functions. So you could implement
Network Security. Network Security. Protective and Dependable. > UTM Content Security Gateway. > VPN Security Gateway. > Multi-Homing Security Gateway
PLANET Product Guide 2011 Protective and Dependable With the growth of the Internet threats, network security becomes the fundamental concerns of family network and enterprise network. To enhance your
Quick Installation Guide-For MAC users
Quick Installation Guide-For MAC users Packing List 1) IP CAMERA X 1 2) Wi-Fi Antenna (only available for wireless model) 3) DC Power Supply X 1 4) Network Cable X 1 5) Mounting bracket 1 6) CD X 1 (Include
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
A Division of Cisco Systems, Inc. Wireless-G. User Guide. Broadband Router WIRELESS WRT54GL (EU/LA) Model No.
A Division of Cisco Systems, Inc. WIRELESS Wireless-G Broadband Router User Guide Model No. WRT54GL (EU/LA) Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered
Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list)
Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list) Hackers can easily trap information transmitted over wireless network, it has to be encrypted to avoid unauthorized users
A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G USB Network Adapter with RangeBooster User Guide Model No. WUSB54GR Copyright and Trademarks Specifications are subject to change without
WL830RT4 Wireless G Broadband Router
WL830RT4 Wireless G Broadband Router User Manual VERSION 1.0 Contents About the Manual... 6 About the Router... 7 Specifications...8 Requirements...9 Device Design...9 Front Panel...9 Rear Panel...10 Getting
EM4544 Wireless Router, Access Point and Signal Booster
EM4544 Wireless Router, Access Point and Signal Booster 2 ENGLISH EM4544 - Wireless Router, Access Point and Signal Booster Table of contents 1.0 Introduction... 3 1.1 Packing contents... 3 2.0 Configure
WL-366. Wireless Broadband Router. (802.11b/g/n)
WL-366 Wireless Broadband Router (802.11b/g/n) User Manual Revision: 1 TABLE OF CONTENTS 1KEY FEATURES...4 2PACKAGE CONTENTS...5 3PRODUCT LAYOUT...6 4NETWORK + SYSTEM REQUIREMENTS...8 5WL-366 PLACEMENT...8
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee
Designing AirPort Extreme Networks
Designing AirPort Extreme Networks Contents 1 Getting Started 5 About AirPort 5 How AirPort Works 6 How Wireless Internet Access Is Provided 6 Configuring AirPort Extreme Base Station Internet Access
ZyWALL 5. Internet Security Appliance. Quick Start Guide Version 3.62 (XD.0) May 2004
ZyWALL 5 Internet Security Appliance Quick Start Guide Version 3.62 (XD.0) May 2004 Introducing the ZyWALL The ZyWALL 5 is the ideal secure gateway for all data passing between the Internet and the LAN.
108Mbps Super-G TM Wireless LAN Router with XR USER MANUAL
108Mbps Super-G TM Wireless LAN Router with XR USER MANUAL Contents 1. Overview...1 1.1 Product Feature...1 1.2 System Requirements...1 1.3 Applications...1 2. Getting Start...2 2.1 Know the 108Mbps Wireless
Cisco RV110W Wireless-N VPN Firewall
Data Sheet Cisco RV110W Wireless-N VPN Firewall Simple, Secure Connectivity for the Small Office/Home Office Figure 1. Cisco RV110W Wireless-N VPN Firewall The Cisco RV110W Wireless-N VPN Firewall provides
CONCEPTRONIC C54BRS4A 802.11g Wireless Broadband Router
CONCEPTRONIC C54BRS4A 802.11g Wireless Broadband Router About This Manual This manual provides descriptions of the Conceptronic C54BRS4A 802.11g Wireless Broadband Router, its hardware and software features,
300Mbps Wireless N VoIP VDSL/ADSL Modem Router
300Mbps Wireless N VoIP VDSL/ADSL Modem Router TD-VG5612 Highlights Fast Broadband Speeds Up to 100Mbps broadband speeds, ideal for smooth streaming media and online gaming Cost-Effective VoIP Supports
AC 750. Wireless Dual Band ADSL2+ Modem Router. Highlights
AC 750 Wireless Dual Band ADSL2+ Modem Router Highlights 750Mbps Wireless Speed 300Mbps on 2.4GHz + 433Mbps on 5GHz Broad Coverage 2 external antennas provide maximum omni-directional wireless coverage
WHR-300HP2 User Manual
AirStation WHR-300HP2 User Manual www.buffalotech.com 35020025-01 Contents Chapter 1 - Product Overview...6 Package Contents...6 Diagrams and Layout...6 Front Panel...6 Back Panel...8 Bottom...9 Chapter
Firewalls. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Firewalls. Characteristics.
ITS335: IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 25 October 2013 its335y13s2l08, Steve/Courses/2013/s2/its335/lectures/firewalls.tex,
Firewalls. Contents. ITS335: IT Security. Firewall Characteristics. Types of Firewalls. Firewall Locations. Summary
2 : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 25 October 2013 its335y13s2l08, Steve/Courses/2013/s2/its335/lectures/firewalls.tex, r2958
Nokia Siemens Networks. CPEi-lte 7212. User Manual
Nokia Siemens Networks CPEi-lte 7212 User Manual Contents Chapter 1: CPEi-lte 7212 User Guide Overview... 1-1 Powerful Features in a Single Unit... 1-2 Front of the CPEi-lte 7212... 1-2 Back of the CPEi-lte
Tutorial 3. June 8, 2015
Tutorial 3 June 8, 2015 I. Basic Notions 1. Multiple-choice (Review Questions Chapter 6, 8 and 11) 2. Answers by a small paragraph (Chapter 2: viruses: MBR, rootkits, ) Multiple choice X. Which is the
AC 1750. Wireless Dual Band Gigabit ADSL2+ Modem Router. Highlights
AC 1750 Wireless Dual Band Gigabit ADSL2+ Modem Router Highlights Superfast Wi-Fi 450Mbps on 2.4GHz + 1300Mbps on 5GHz Maximum Range 3 external dual band detachable antennas provide maximum Omni-directional
Chapter 3: File and Printer Sharing Overview 27 Share Files (photos, MP3s, household files) 30 Use Shared Files and Printers 30
Table of Contents Chapter 1: Comcast Home Networking Overview 1 Chapter 2: Feature Setup 5 Built-in Firewall Overview 6 Parental Control Setup 9 Password Setup 13 Gateway Settings and Information 15 Security
Basic Network Configuration
Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the
Quick Installation Guide
Packing List Quick Installation Guide Quick Installation Guide 1) IP CAMERA X 1 2) Wi-Fi Antenna (only available for wireless model) 3) DC Power Supply X 1 4) Network Cable X 1 5) Mounting bracket 1 6)
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Wonderful Communication, Mobile Life.
Wonderful Communication, Mobile Life. Vodafone B970 3G Router from Vodafone User Guide Notice Copyright 2008 Huawei Technologies Co., Ltd. All Rights Reserved 1 No part of this manual may be reproduced
Protecting the Home Network (Firewall)
Protecting the Home Network (Firewall) Basic Tab Setup Tab DHCP Tab Advanced Tab Options Tab Port Forwarding Tab Port Triggers Tab DMZ Host Tab Firewall Tab Event Log Tab Status Tab Software Tab Connection
First of all Let's look at how you would connect your laptop via Ethernet, as it is the easier of the two methods.
How to get a Internet Connection on your laptop This guide will help you to get an internet connection on your laptop either via Wi-Fi (e.g. in a café or hotel) or via Ethernet (the RJ45 type connector
Linksys E800. User Guide
User Guide Contents Contents Product overview Package contents 1 Features 1 Back view 2 Bottom view 2 Setting Up: Basics How to create a home network 3 What is a network? 3 How to set up a home network
Cisco RV215W Wireless-N VPN Router
Data Sheet Cisco RV215W Wireless-N VPN Router Simple, Secure Connectivity for the Small Office and Home Office Figure 1. Cisco RV215W Wireless-N VPN Router The Cisco RV215W Wireless-N VPN Router provides
Chapter 4 Firewall Protection and Content Filtering
Chapter 4 Firewall Protection and Content Filtering This chapter describes how to use the content filtering features of the ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN to protect your network.
Broadband Router User s Manual
Broadband Router User s Manual Table of Contents Chapter 1 Introduction...4 1.1 The Broadband Router......4 1.2 Physical Features of Broadband Router...4 1.3 Non-Physical Features of Broadband Router..
How To Set Up A Net Integration Firewall
Net Integration Technologies, Inc. http://www.net itech.com Net Integrator Firewall Technical Overview Version 1.00 TABLE OF CONTENTS 1 Introduction...1 2 Firewall Architecture...2 2.1 The Life of a Packet...2
Using Remote Desktop Software with the LAN-Cell
Using Remote Desktop Software with the LAN-Cell Technote LCTN0010 Proxicast, LLC 312 Sunnyfield Drive Suite 200 Glenshaw, PA 15116 1-877-77PROXI 1-877-777-7694 1-412-213-2477 Fax: 1-412-492-9386 E-Mail:
Connecting to and Setting Up a Network
Chapter 9 Connecting to and Setting Up a Network Reviewing the Basics 1. How many bits are in a MAC address? 48 bits 2. How many bits are in an IPv4 IP address? In an IPv6 IP address? 32 bits, 128 bits
Firewalls for the Home & Small Business. Gordon Giles DTEC 6810. Professor: Dr. Tijjani Mohammed
1 Firewalls for the Home & Small Business Gordon Giles DTEC 6810 Professor: Dr. Tijjani Mohammed 2 Abstract A firewall can be in the form of hardware, software or a combination of the two. It is basically
The PostBase Connectivity Wizard
The PostBase Connectivity Wizard The PostBase Connectivity Wizard allows you to easily set up your PostBase postage machine to suit your organization s arrangements. This document will guide you through
N150 WiFi Router (N150R)
Easy, Reliable & Secure N150 WiFi Router (N150R) User Manual 350 East Plumeria Drive San Jose, CA 95134 USA August 2012 202-11000-01 v1.0 Trademarks Brand and product names are trademarks or registered
How to configure your Thomson SpeedTouch 780WL for ADSL2+
How to configure your Thomson SpeedTouch 780WL for ADSL2+ Connecting up your router This guide assumes that you have successfully: unpacked your router connected it up to your phone socket using the DSL
Cisco RV082 Dual WAN VPN Router Cisco Small Business Routers
Cisco RV082 Dual WAN VPN Router Cisco Small Business Routers Secure Remote Access at the Heart of the Small Business Network Highlights Dual WAN connections for load balancing and connection redundancy
Networking. General networking. Networking overview. Common home network configurations. Wired network example. Wireless network examples
Networking General networking Networking overview A network is a collection of devices such as computers, printers, Ethernet hubs, wireless access points, and routers connected together for communication
How To Set Up A Cisco Rv110W Wireless N Vpn Network Device With A Wireless Network (Wired) And A Wireless Nvv (Wireless) Network (Wireline) For A Small Business (Small Business) Or Remote Worker
Cisco RV110W Wireless-N VPN Firewall Simple, Secure Connectivity for the Small Office/Home Office Figure 1 Cisco RV110W Wireless-N VPN Firewall The Cisco RV110W Wireless-N VPN Firewall provides simple,
AC 3200. Wireless Tri-Band Gigabit Router. Highlights
AC 3200 Wireless Tri-Band Gigabit Router Highlights Tri-Band technology Three separate Wi-Fi bands for connecting more devices to your network without a drop in performance Up to 3200Mbps Wi-Fi speed 600Mbps
EM4543 / EM4544 / EM4571 Wireless Router, Access Point and Signal Booster
EM4543 / EM4544 / EM4571 Wireless Router, Access Point and Signal Booster 2 ENGLISH EM4543 / EM4544 / EM4571- Wireless Router, Access Point and Signal Booster Table of contents 1.0 Introduction... 3 1.1
Cisco RV110W Wireless-N VPN Firewall
Data Sheet Cisco RV110W Wireless-N VPN Firewall Simple, Secure Connectivity for the Small Office/Home Office Figure 1. Cisco RV110W Wireless-N VPN Firewall The Cisco RV110W Wireless-N VPN Firewall provides
Wireless-G. User Guide. GHz 2.4 802.11g. A Division of Cisco Systems, Inc. WIRELESS. Model No.WRT54GP2
Your Internet Telephone Company offering you more - connecting you for less A Division of Cisco Systems, Inc. GHz 2.4 802.11g Wireless-G WIRELESS User Guide Model No.WRT54GP2 Copyright and Trademarks Specifications
Advanced Configuration Guide. Vodafone Mobile Broadband Sharing Dock Vodafone R101
Vodafone R101 Table of Contents Welcome...3 1. Getting Started Initial Connection and Security Settings... 4 1.1 Overview... 5 System Requirements... 5 Device overview... 5 Sharing Dock and USB Stick LEDs...
High Speed. Internet BroadBand Router. User Guide
High Speed Internet BroadBand Router User Guide FCC Warning This equipment has been tested and found to comply with the regulations for a Class B digital device, pursuant to Part 15 of the FCC Rules. These
High Speed. Internet BroadBand Router. User Guide
High Speed Internet BroadBand Router User Guide FCC Warning This equipment has been tested and found to comply with the regulations for a Class B digital device, pursuant to Part 15 of the FCC Rules.
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
Computer Networking. Definitions. Introduction
Computer Networking Definitions DHCP Dynamic Host Configuration Protocol It assigns IP addresses to client devices, such as desktop computers, laptops, and phones, when they are plugged into Ethernet or
Lab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
Tech-Note Bridges Vs Routers Version 1.0-02/06/2009. Bridges Vs Routers
Tech-Note Bridges Vs Routers - 02/06/2009 1 2 Index 1. About this tech-note... 3 2. Recommended configurations... 4 3. Issues that may arise with other types of connections... 5 3.1. Connected to a router
Wireless N 300 Gigabit Green Router. User s Manual. Model # AR695W. Ver. 1A
Wireless N 300 Gigabit Green Router Model # AR695W User s Manual Ver. 1A Copyright Copyright Airlink101, 2010. The contents of this publication may not be reproduced in any part or as a whole, stored,
Firewall VPN Router. Quick Installation Guide M73-APO09-380
Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,
Access Point Configuration
Access Point Configuration Developed by IT +46 Based on the original work of: Onno Purbo and Sebastian Buettrich Goals Provide a general methodology to installation and configuration of access points Give
