Internet Filtering Appliance. User s Guide VERSION 1.2
|
|
|
- Griselda Lawson
- 9 years ago
- Views:
Transcription
1 Internet Filtering Appliance User s Guide VERSION 1.2
2 User s Guide VERSION 1.2 InternetSafety.com, Inc 3979 South Main Street Suite 230 Acworth, GA Phone Fax
3 Table of Contents Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 GETTING STARTED Chapter 7 Appendix A 3 Introduction 3 Proper Care For Your EtherShield Hardware 3 What is a Bridge? 4 GPL Code 4 A brief note about the Picture icons 5 Getting Started 5 Connecting Your EtherShield 6 Activating Your EtherShield 8 Logging in to the EtherShield Administration 9 Shutting Down and Restarting Your EtherShield 11 EtherShield Configuration 12 Changing the Network Configuration 13 Changing the Filtering Defaults 15 Changing the Administrator Password 16 Chapter 4 Defining Usage Policies 16 The Default Policy 17 Creating a New Policy 19 Changing an Existing Policy 19 Registering Computers With Your EtherShield 22 Changing the Policy Assigned to a Computer 24 Removing A Computer s Registration 25 Usage Logs 26 Clearing the Usage Logs 27 Ethershield Remote 27 Configuring Your Ethershield 30 Configuring Your Client 34 Reporting Bugs and Technical Support 35 Software Updates 35 Checking for Updates 36 Advanced Configurations 36 Routing Tables 3
4 Introduction 1 This document provides detailed instructions for using your Ethershield. It will describe how to install, configure, and maintain the Ethershield in your network environment. Proper Care For Your EtherShield Hardware Your EtherShield hardware should be cared for in much the same way you care for server or network equipment. Exposure to extreme heat or dusty conditions can limit the life of your hardware. Your EtherShield contains a hard drive. It is recommended that when shutting down the EtherShield that you do so from the EtherShield interface so the hard drive will be shut down properly. If the EtherShield is not shut down through the administrator interface, please allow a longer time for the EtherShield to reboot. The EtherShield will need to verify the integrity of the hard drive, and can take several minutes to boot. What is a Bridge? The EtherShield is a network device that is commonly called a bridge. But what is a network bridge? A network bridge is very similar to a bridge over a river. The two banks of the river are connected by the bridge. The only way to travel from one bank to the other is by crossing the bridge. A network bridge accomplishes the same task; it connects two network segments. All traffic traveling from one segment to the other must cross the bridge. When this bridge is used to connect your LAN to the Internet it becomes an effective place to deploy Internet Filtering just as a toll booth becomes an effective way to control access to a bridge over a river. This becomes important when you decide where in your network to place the EtherShield. While our recommendation is directly behind your Internet router or firewall, there are other possibilities in advanced networks. You should bear in mind that a computer will only be filtered if its traffic to the Internet MUST cross the bridge. INTRODUCTION 5
5 GPL Code Your EtherShield contains software that is covered under GNU General Public License. While all of the GPL-code can be downloaded from various Internet websites, the source code in its entirety can be purchased in a multi-cd set for $ This fee covers the cost of media and CD preparation only. To order, please call ICON KEY 1 Valuable information : Trouble-shooting guide & Notes Section A brief note about the Picture icons The picture icons are used throughout this manual to provide a quick visual reference. Information following these icons will either represent valuable information, trouble-shooting tips or the notes section. The icons located to the left will be used throughout this manual. 6 INTRODUCTION
6 Getting Started 2 This section provides the basics for installing your EtherShield. This chapter covers the following topics: vv vv vv vv Wiring Your EtherShield. Completing the Initial Configuration Wizard Logging in to the EtherShield Administration Shutting Down or Restarting Your EtherShield Connecting Your EtherShield Connecting your EtherShield is simple 3-step process. 1. Plug an Ethernet cable into jack 1 on the back of the EtherShield unit. Connect the other end of the cable into an available Ethernet jack on your Internet router s hub or switch. 2. Plug an Ethernet cable into jack 2 on the back of the EtherShield unit. Connect the other end of the cable into an available Ethernet jack on the LAN hub or switch to which other computers in your network are connected. This should not be the same hub or switch that your Internet router is connected to. 3. Plug the power adapter into the EtherShield and then plug the power into an AC power source. At this point your EtherShield will begin to start up and configure itself on your network. This process will take about 2 minutes. Once the EtherShield is started up, you should have Link lights on Ports 1 and 2 as shown below. You should also be able to access the Internet just as you had prior to installing your EtherShield. At this point the filter will not be active. : If a Link light is not lit, first check that all cables are securely connected and have clicked into the port. After you have checked the connections, if a Link light is still not lit it is possible that you need to use a Crossover cable. Once link lights for ports 1 and 2 are lit, you can test your Internet connection which should function as it did prior to installation of the EtherShield. GETTING STARTED 7
7 Activating Your EtherShield Once your EtherShield is connected to your network and powered up you need to activate your EtherShield. To do this, open the Internet browser on your computer and go to the following address: The following screen will appear: The on-screen instructions will guide you through the activation process. At the end of the activation process the EtherShield will be restarted again, and your Internet connection will be filtered. You will be redirected to the EtherShield administrator interface once the appliance has restarted. 8 GETTING STARTED
8 Logging in to the EtherShield Administration To access the EtherShield administrator interface, open the Internet Browser on your computer and go to the following address: The following login box will appear: When the login screen appears enter admin as the username and admin as the password, then click Login. GETTING STARTED 9
9 Shutting Down and Restarting Your EtherShield From time to time you may need to restart or shut down your EtherShield. You should always do this using the administrative interface. Failure to shut down your EtherShield properly can damage your hard drive. To shut down or restart the EtherShield: 1. Log in to the administrative interface. 2. From the Home Page under System Controls click either Restart or Shut down. When restarting the EtherShield it will take about 2-3 minutes to completely restart. If you have shutdown the EtherShield you should wait 1-2 minutes before unplugging the EtherShield. 10 GETTING STARTED
10 EtherShield Configuration 3 This section provides detail instructions for configuring the system settings of your EtherShield. This chapter covers the following topics: vv vv vv Changing the Network Configuration Changing the Filtering Defaults Changing the Administrator Password After you have successfully logged into the EtherShield Administration interface, click on the System Configuration link located in the blue bar. ETHERSHIIELD CONFIGURATION 11
11 Changing the Network Configuration The network configuration of the Ethershield can be changed at anytime, but the Ethershield will need to be restarted for changes to take effect. The Network Configuration section shows the current IP information for the local bridge, and if applicable the remote interface. You would use this section to enable and configure the Ethershield Remote functionality, which is defined in Chapter 6. Once you have chosen the desired settings and have completed any necessary configuration, click the Apply button. 12 ETHERSHIIELD CONFIGURATION
12 Changing the Filtering Defaults Several defaults control how the Internet is filtered by the EtherShield. These settings do not control what is filtered but rather how the filtering acts in general. (How to configure the type of content that is filtered is covered in the Chapter 4.) Redirect banned websites to: 1. EtherShield built-in page This is a built in page that the EtherShield will display to indicate that a website has been banned. 2. Custom URL This allows you to specify your own site to send users to when a page is banned by the filter. This allows you to create a custom denied page for your organization. ETHERSHIIELD CONFIGURATION 13
13 Category Cache Size and Time To Live: These values have been preset by the EtherShield engineers and should only be changed under the guidance of technical support. Changing them can adversely affect the performance of your EtherShield. Keep Violation Logs: This setting allows you to specify how many days to keep violation logs on your EtherShield. Setting this to zero will mean that the EtherShield will not keep any violation data. Failsafe Mode: In the event that the EtherShield is unable to connect to the filtering database do you want it to Drop all Traffic which would cause all websites to be blocked, or Allow all Traffic which would allow all websites, even ones that are normally filtered, to be accessed. Once you have set these settings to the desired values, click Apply. These settings do not require a restart to become effective. Changing the Administrator Password The password used to access the administrative interface can be changed at anytime. Simply enter the old password, the new password and reenter the new password to confirm and click Change. The new password will take effect immediately. 14 ETHERSHIIELD CONFIGURATION
14 Defining Usage Policies 4 A Usage Policy is the basis for all filtering with your EtherShield. Policies are used to determine what things should be blocked on what computers. You can define multiple policies and assign computers to them so that different computers can have different types of content blocked. To make changes to your policies, login to the EtherShield administrator interface and click Usage Policies. The Default Policy The Default policy is a special policy on your EtherShield. This policy is used for all computers that are not assigned to other policies. When your EtherShield is first installed this is the policy that every computer protected by the EtherShield will be using. In addition, when you register a computer with the EtherShield (a process covered later) it will initially be assigned to the Default policy. For this reason, we recommend that the default policy be configured to be used by the largest number of computers and use other policies to define exceptions to your default policy. As new computers join your network they will have the Default policy applied unless you choose to move them to a different policy. When you receive your EtherShield your default policy is the only one configured and it is configured to block websites categorized as Pornography, Nudity, Sex and Tasteless or Gross. However, you can adjust this default setting at any time. The Default policy cannot be deleted. DEFINING USAGE POLICIES 15
15 Creating a New Policy To create a new policy you need to first login to the administrator interface and click Usage Policies. You should see a screen similar to this: From the bar on the left hand side of the screen click Create New Policy. The Create New Policy screen will appear as shown below: 16 DEFINING USAGE POLICIES
16 Enter a policy name for the new policy. If you wish to copy settings from another policy as a starting point for this new policy choose the policy you wish to copy the settings from in the Copy Settings From box. When you are finished click Create and the new policy will be created. Changing an Existing Policy To change a policy you need to first login to the administrator interface and click Usage Policies. You should see a screen similar to this: From the bar on the left hand side of the screen click the policy that you want to edit. There are three different areas of a policy that you can edit. 1. General Settings These include the name of the policy and the computers that are members of that policy. 2. Web Filter This are allows you to set the types of websites filtered, create your own list of allowed or banned websites and setup banned keywords. 3. Program Control With program control you can block non-browser based applications such as peer-to-peer file sharing, instant messaging and others. DEFINING USAGE POLICIES 17
17 Registering Computers With Your EtherShield If you want a computer to be assigned to any policy other than the Default policy then it is necessary to register that computer with your EtherShield. The EtherShield uses a number of different methods to identify a computer on your network and will pick the best fit for you network. Currently all users of that computer will be assigned to the policy for the computer; policies cannot be assigned based on Microsoft Windows usernames. To register a computer with your EtherShield visit from the computer you wish to register. You will see the following Registration screen: 18 DEFINING USAGE POLICIES
18 Simply enter a Computer Name that can be used to later identify this computer. This computer name does not need to match the computer name setting in your operating system. Once you have entered a name, click Register. You will receive a message saying that your computer was successfully registered. Since all newly registered computers are automatically assigned to the Default policy you can find this newly registered computer in the Policy Members box of the Default policy as shown here: Once a computer is registered you can move it from policy to policy at anytime, or completely remove the registration. 1 You can only register the number of computers that you are currently licensed for. You can view the number of licenses currently available on the Home page in the Product Information. To purchase more licenses contact the EtherShield sales team. 1 If you need to find out what name a computer is registered under you can return to the registration URL at anytime and the name will be displayed. DEFINING USAGE POLICIES 19
19 Changing the Policy Assigned to a Computer After a computer is registered it is automatically assigned to the Default policy. You may want to change this. You can transfer computers from policy to policy as needed. Once you have entered the administrator interface, and clicked on Usage Policies, click on the policy that the computer is currently assigned to. You will see the computer listed in the Policy Members box as shown below: 20 DEFINING USAGE POLICIES
20 Click on the computer name you wish to transfer to another policy then click Transfer. You will then be asked to pick the policy you want to transfer the computer to: Once you have selected the appropriate policy, click Transfer. The policy transfer will take effect immediately. DEFINING USAGE POLICIES 21
21 Removing A Computer s Registration To free up licenses you may want to remove the registration for an old computer. Once you have entered the administrator interface, and clicked on Usage Policies, click on the policy that the computer is currently assigned to. You will see the computer listed in the Policy Members box as shown below: Click on the Computer Name you wish to remove then click Remove. The registration will be removed immediately. 22 DEFINING USAGE POLICIES
22 Usage Logs 5 Your EtherShield can be configured to keep logs of all policy violations. By default, logs will be kept of the last 30 days; however, this number can be changed as outlined in Chapter 3. To access the logs you must first log into the administrator interface and then click Usage Logs. The usage logs will be divided by policy and will show which computers have violations. If a computer is registered, the registered computer name will be shown. If the computer has not been registered with the EtherShield, then the EtherShield will display the Windows computer name or IP address of the system. To view details on the violations click the computer name. USAGE LOGS 23
23 Clearing the Usage Logs The logs will automatically purge themselves as the records move past the time you have set to keep logs. However, you may wish to clear the logs early. You can do this from the Usage Logs screen by clicking Clear Violation Logs. You will be asked to confirm that you really wish to clear the logs by clicking Clear. Once you have confirmed that you wish to clear the logs, the logs will be purged. 24 USAGE LOGS
24 Ethershield Remote 6 Ethershield Remote is a feature that will allow you to administer your filtering policies to computers outside your network. This feature is particularly useful for users with laptops that take them home, or employees that travel. Typically, when a computer is protected by the Ethershield on your network, the Internet traffic is inspected and categorized, and action is taken to either block or allow that traffic. Essentially, Ethershield Remote works in a similar way. The traffic is inspected on the actual client computer, but your Ethershield is queried for filtering rules and policies over the Internet. In order to use Ethershield Remote, you must configure your Ethershield to act as a remote server, and you must install and configure the Ethershield Remote client on the client s computer to connect to the Ethershield. You will need at least Ethershield firmware version to use Ethershield Remote. Configuring Your Ethershield Although configuring an Ethershield for Ethershield Remote is slightly more complicated than configuring an Ethershield for local filtering, it only requires a few simple steps. The configuration of the Ethershield Remote functionality is intended for network administrators. If you have any questions or need assistance, please refer to the section Reporting Bugs and Technical Support for contact information. 1. Configure Remote Network Interface Before the Ethershield can act as a remote server, port 4 of the Ethershield must be configured to handle the remote server traffic. Basically, this can be done with one of two different configuration styles: Port Forwarding and Public IP Address. vv Port Forwarding (Recommended) With Port Forwarding, port 4 on the Ethershield is wired into your local network just like any other client. You will need to configure your router to forward incoming ports 80 and 443 TCP traffic to the IP address you will choose for port 4. This IP address is different than the one you have selected for the bridge over ports 1 and 2. Once you have configured your router in this manner, you will need to access the Ethershield administration interface at and click on System Configuration. At the System Configuration page, select Enable Ethershield Remote functionality and select Port Forwarding as your Remote Connection Type. Enter your IP Address, Netmask, and default gateway for port 4. Finally, click Apply and verify that your settings have been saved successfully. ETHERSHIELD REMOTE 25
25 v v Public IP Address Another possible way to configure your Ethershield remote server connection is by Public IP Address. Port 4 will be wired as a publicly available IP address. The only caveat of using this configuration is that since the Ethershield can only have one default gateway, all your local and remote traffic will go back out over the Internet. In most cases this is acceptable and does not cause noticeable latency. You will need to access the Ethershield administration interface at and click on System Configuration. At the System Configuration page, select Enable Ethershield Remote functionality and select Public IP Address as your Remote Connection Type. Enter your IP Address, Netmask, and default gateway for port 4. Make sure this default gateway is accurate, since it will be the one your Ethershield will use. Finally, click Apply and verify that your settings have been saved successfully. Once you have configured your Remote Network configuration, you will need to restart your Ethershield for these settings to take effect. If after 10 minutes since restarting, your Ethershield is not responding, please verify your settings and attempt to reactivate your Ethershield at 26 ETHERSHIELD REMOTE
26 2. Configure Remote Users Before a client can connect to your Ethershield remotely, you must add them to a policy. In the Ethershield s administration interface, click on Usage Policies. Under the General Settings tab of each policy, you will be able to view, add, transfer, and delete remote users. To add a user, click Add and enter the real name, username, and password on the following page. To transfer a user, select that user, click Transfer, and select the policy you would like to transfer that user to on the following page. To remove a user, select that user and click Remove. Upon configuring the remote network interface, and adding all the remote users you would like to add, you are now ready to deploy the Ethershield Remote client application on the clients computers. ETHERSHIELD REMOTE 27
27 Configuring Your Client Configuring the client computers with the Ethershield Remote Client is a simple matter of installing the application. From the Ethershield administration interface s main page, you can download the Ethershield Remote client. It is an executable self-extracting installer. The installer operates like most windows install packages and will require you to accept a license agreement. The first step that will require input is when you enter your IP address or domain name of your Ethershield s remote interface. If you are using a domain name, ensure the domain name is public on the Internet and not just on your internal domain since your remote clients will most likely be using whatever DNS was assigned to them. Using a domain name is recommended, as this will allow you to change the IP address without having to reconfigure each client. 28 ETHERSHIELD REMOTE
28 The next step will require you to select how you would like the clients to operate if your Ethershield is not reachable over the Internet. You can choose to deny or allow all traffic in this instance. This operates just like the failsafe mode configuration for your local Ethershield clients. ETHERSHIELD REMOTE 29
29 Finally, you will need to provide an uninstall password for each installation of the Ethershield Remote client. This prevents unauthorized uninstallation of the client. Please make sure you document this uninstall password to retrieve later, and that you keep it in a secure location. Reporting Bugs and Technical Support While the Ethershield Remote functionality is in beta, we highly value any input you may have. Please use the following addresses to contact us, depending on the topic. Bug reports: [email protected] Please include a detailed description of the problem, the firmware version you are running, and any specific details necessary to reproducing it. Technical Support: [email protected] Please include a detailed description of the problem, and the best possible way and time to contact you. Feedback: [email protected] Please let us know how we can improve our product even more! 30 ETHERSHIELD REMOTE
30 Software Updates 7 As part of your EtherShield subscription we will from time to time update the firmware of the EtherShield. These updates are not used to keep your filtering list up-to-date, but instead to update the software running on the EtherShield. It is important that you do your best to ensure your EtherShield is always kept up to date. Checking for Updates To check for updates log in to the administrator interface and click Software Updates. The EtherShield Maintenance screen will appear. Click the Check for Updates button and the EtherShield will see if there are any new updates available. If updates are available follow the on-screen instructions for downloading and installing the update. SOFTWARE UPDATES 31
31 Appendix Advanced Configurations The Ethershield is designed to work with almost all networks right out of the box with only a minimal amount of configuration. However, some exceptions will exist. Please refer to this section to configure more specific network issues. Routing Tables The Ethershield includes an interface to view and edit its own routing tables. Just point your browser to You should see the following screen. If you need to add a custom route, all you need to do is fill in the appropriate fields and click Add. The network route will be added and used instantly, and will persist after a reboot. The network route will remain in use until you remove it. You can remove it by selecting it from the list of custom routes and clicking Delete. 1 The network routes interface is only for advanced users. Do not attempt to add or edit network routes unless you are sure it is necessary. 32 ADVANCE CONFIGURATIONS
32 3979 South Main Street Suite 230 Acworth, GA Phone Fax
Network Monitoring User Guide Pulse Appliance
Network Monitoring User Guide Pulse Appliance 2007 Belkin Corporation. All rights reserved. F1DUXXX All trade names are registered trademarks of respective manufacturers listed. Table of Contents Pulse
Barracuda Link Balancer Administrator s Guide
Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks
If you are unable to set up your Linksys Router by using one of the above options, use the steps below to manually configure your router.
This article describes how to manually configure a Linksys Router for broadband DSL that uses PPPoE (Point-to-Point Protocol over Ethernet) for authentication. For automatic configuration options, please
SSL-VPN 200 Getting Started Guide
Secure Remote Access Solutions APPLIANCES SonicWALL SSL-VPN Series SSL-VPN 200 Getting Started Guide SonicWALL SSL-VPN 200 Appliance Getting Started Guide Thank you for your purchase of the SonicWALL SSL-VPN
StarMOBILE Network Configuration Guide. A guide to configuring your StarMOBILE system for networking
StarMOBILE Network Configuration Guide A guide to configuring your StarMOBILE system for networking INTRODUCTION... 3 BEFORE YOU BEGIN... 3 1) CONFIRM YOU HAVE THE LATEST SOFTWARE... 3 2) INSTALL THE STARMOBILE
Best Practices: Pass-Through w/bypass (Bridge Mode)
Best Practices: Pass-Through w/bypass (Bridge Mode) EdgeXOS Deployment Scenario: Bridge Pass-Through This document is designed to provide an example as to how the EdgeXOS appliance is configured based
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
P-660HW-Tx v3. Quick Start Guide. 802.11g Wireless ADSL 2+ 4-port Gateway. Version 3.40 10/2008 Edition 1
P-660HW-Tx v3 802.11g Wireless ADSL 2+ 4-port Gateway Quick Start Guide Version 3.40 10/2008 Edition 1 P-660HW-Tx v3 Quick Start Guide Overview The P-660HW-Tx v3 is an ADSL router with a four-port built-in
TE100-P21/TEW-P21G Windows 7 Installation Instruction
Hardware Installation TE100-P21/TEW-P21G Windows 7 Installation Instruction 1. Go to http://www.trendnet.com/downloads/ to download the Windows 7 Utility. Save the file to your desktop. 2. Right click
Chapter 1 Configuring Basic Connectivity
Chapter 1 Configuring Basic Connectivity This chapter describes the settings for your Internet connection and your wireless local area network (LAN) connection. When you perform the initial configuration
Configuring a customer owned router to function as a switch with Ultra TV
Configuring a customer owned router to function as a switch with Ultra TV This method will turn the customer router into a wireless switch and allow the Ultra Gateway to perform routing functions and allow
Barracuda Link Balancer
Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503
Wireless Router Setup Manual
Wireless Router Setup Manual NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA 208-10082-02 2006-04 2006 by NETGEAR, Inc. All rights reserved. Trademarks NETGEAR is a trademark of Netgear,
ON HOLD ANNOUNCER. Once you receive your audio announcer, check the packaging to ensure that all of the following items are enclosed:
ON HOLD ANNOUNCER The is a high quality digital on-hold announcer. It is designed to be attached to a 100BASE-T Ethernet network to receive audio production updates via the Internet. These instructions
Installation Guide (No Router)
Installation Guide (No Router) This installation guide will show you how to get your voip phone service working. This installation guide should be used if you have a standard DSL or cable modem and no
Connecting to the Internet. LAN Hardware Requirements. Computer Requirements. LAN Configuration Requirements
Connecting to the Internet LAN Hardware Requirements Computer Requirements LAN Configuration Requirements Installation Performed by Time Warner Cable Technician Connecting via Ethernet Connecting via USB
eprism Email Security Suite
Guide eprism 2505 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered
Network Setup Guide. 1 Glossary. 2 Operation. 1.1 Static IP. 1.2 Point-to-Point Protocol over Ethernet (PPPoE)
Network Setup Guide 1 Glossary 1.1 Static IP Computers are communicated and recognized by their own unique IP addresses over the Internet. Static IP provided by your ISP (Internet Service Provider) means
CPEi 800/825 Series. User Manual. * Please see the Introduction Section
CPEi 800/825 Series User Manual * Please see the Introduction Section Contents Introduction...iii Chapter 1: CPEi 800/825 User Guide Overview... 1-1 Powerful Features in a Single Unit... 1-2 Front of the
Chapter 1 Configuring Internet Connectivity
Chapter 1 Configuring Internet Connectivity This chapter describes the settings for your Internet connection and your wireless local area network (LAN) connection. When you perform the initial configuration
1 You will need the following items to get started:
QUICKSTART GUIDE 1 Getting Started You will need the following items to get started: A desktop or laptop computer Two ethernet cables (one ethernet cable is shipped with the _ Blocker, and you must provide
Dynamic DNS How-To Guide
Configuration Guide Dynamic DNS How-To Guide Overview This guide will show you how to set up a Dynamic DNS host name under the D-Link DDNS service with your D-Link ShareCenter TM. Dynamic DNS is a protocol
Deployment Guide: Transparent Mode
Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This
Deploying Windows Streaming Media Servers NLB Cluster and metasan
Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................
P-660R-T1/T3 v2 Quick Start Guide
P-660R-T1/T3 v2 ADSL2+ Access Router Quick Start Guide Version 3.40 Edition 1 12/2006 0 Overview P-660R-T1/T3 v2 Quick Start Guide This Quick Start Guide shows you how to: 1 Connect the Hardware 2 Set
Kerio Operator. Getting Started Guide
Kerio Operator Getting Started Guide 2011 Kerio Technologies. All rights reserved. 1 About Kerio Operator Kerio Operator is a PBX software for small and medium business customers. Kerio Operator is based
Hardware Overview. Ooma Linx devices These are installed around the office and are used to connect phones and other devices to your Ooma Office system
Quick Start Guide Introduction Installation Overview Setting up the Ooma Office system in your business is easy. You should have your first extensions up and running in about 20 minutes. Ooma Office blends
Keri USB-A Connection and Configuration
Step 1 - Connect the KPC-1 cable to the K-USB. NOTE: The form of the USB converter may vary, so the unit you receive may not be identical to the one displayed here. Step 2 Plug the USB Connector of the
If you need additional assistance please contact our Technical Support Center at 24 hours a day, 7 days a week.
Cisco SPA 2100 Phone Adapter Installation Manual Index Installation of the Cisco SPA 2100 Phone Adapter to NationPhone P. 1 Index, before you begin, and what is included P.2 Installing the NationPhone
Quick Installation Guide DAP-1360. Wireless N 300 Access Point & Router
DAP-1360 Wireless N 300 Access Point & Router BEFORE YOU BEGIN Delivery Package Access point DAP-1360 Power adapter DC 12V Ethernet cable (CAT 5E) (brochure). If any of the items are missing, please contact
Barracuda IM Firewall Administrator s Guide
Barracuda IM Firewall Administrator s Guide Version 3.0 Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2007, Barracuda Networks www.barracuda.com
Comtrend 1 Port Router Installation Guide CT-5072T
Comtrend 1 Port Router Installation Guide CT-5072T 1 Installing Access Point s DSL Service with a Comtrend Router Thank you for selecting Access Point, Inc. to be your Internet service provider. This guide
V310 Support Note Version 1.0 November, 2011
1 V310 Support Note Version 1.0 November, 2011 2 Index How to Register V310 to Your SIP server... 3 Register Your V310 through Auto-Provision... 4 Phone Book and Firmware Upgrade... 5 Auto Upgrade... 6
Virtual Appliance Setup Guide
The Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda Web Application Firewall hardware appliance. It is designed for easy deployment on
OfficeConnect Internet Firewall 25 Internet Firewall DMZ. QuickStart Guide (3C16770, 3C16771)
OfficeConnect Internet Firewall 25 Internet Firewall DMZ QuickStart Guide (3C16770, 3C16771) Checking Package Contents Getting Started Thank you for purchasing the OfficeConnect Internet Firewall. The
TCC INTERNET. Setup and Configuration. Comtrend DSL Modem with built-in Wireless Router
TCC INTERNET Setup and Configuration Comtrend DSL Modem with built-in Wireless Router Guide Contents The Basics: Lights & Plug-ins Security: WEP Setup USB Driver Installation Troubleshooting & Support
How To - Deploy Cyberoam in Gateway Mode
How To - Deploy Cyberoam in Gateway Mode Cyberoam appliance can be deployed in a network in two modes: Gateway mode. Popularly known as Route mode Bridge mode. Popularly known as Transparent mode Article
Ethernet Radio Configuration Guide
Ethernet Radio Configuration Guide for Gateway, Endpoint, and Repeater Radio Units April 20, 2015 Customer Service 1-866-294-5847 Baseline Inc. www.baselinesystems.com Phone 208-323-1634 FAX 208-323-1834
Acellus Lab Cart. User s Manual. Version 4B. Acellus Corporation www.acellus.com. Copyright 2010 Acellus Corporation. All Rights Reserved.
Acellus Lab Cart User s Manual Version 4B Acellus Corporation www.acellus.com 1 Table of Contents Using Acellus... 3 Acellus Lab Cart and Server... 3 Acellus Laptops... 3 Acellus Updates... 4 Accessing
Chapter 3 Connecting the Router to the Internet
Chapter 3 Connecting the Router to the Internet This chapter describes how to set up the router on your Local Area Network (LAN) and connect to the Internet. It describes how to configure your DG834GT
Configuring SSL VPN on the Cisco ISA500 Security Appliance
Application Note Configuring SSL VPN on the Cisco ISA500 Security Appliance This application note describes how to configure SSL VPN on the Cisco ISA500 security appliance. This document includes these
NXT Controller Manual IP Assignment in WAN Environments Application Note
It is difficult to perform NXT controller IP address assignment and auto-configuration when controllers are on different subnets from the local PC (the PC from which the Doors.NET client is run). This
Thirtyseven4 Endpoint Security (EPS) Upgrading Instructions
Thirtyseven4 Endpoint Security (EPS) Upgrading Instructions Disclaimer: As with any software upgrade or new release, it is strongly encouraged to fully test the new build within your environment prior
P-791R v2. Quick Start Guide. G.SHDSL.bis Router DEFAULT LOGIN. Administrator Password 1234. User Password. Version 1.00 4/2007 Edition 1
P-791R v2 G.SHDSL.bis Router Quick Start Guide Version 1.00 4/2007 Edition 1 DEFAULT LOGIN IP Address http://192.168.1.1 Administrator Password 1234 User Password user Copyright 2007. All rights reserved.
Fasthosts Internet Parallels Plesk 10 Manual
Fasthosts Internet Parallels Plesk 10 Manual Introduction... 2 Before you begin... 2 Logging in to the Plesk control panel... 2 Securing access to the Plesk 10 control panel... 3 Configuring your new server...
DSL-G604T Install Guides
Internet connection with NAT...2 Internet connection with No NAT, IP Un-number...6 Port Forwarding...12 Filtering & Firewall Setup...20 Access Control... 21 DMZ Setup... 26 Allow Incoming Ping... 27 How
Turn on all of your network devices and then check to see if the LEDs on the Access Point display normally as the diagram below describes.
Connect to the Access Point with the Ethernet cable or via wireless. The default SSID of the Access Point is TP-LINK_ XXXXXX. The XXXXXX is the last 6 characters of the Access Point s MAC address. Plug
(606) 785-3450 Knott County (606) 439-3167 Perry County (606) 633-0778 Letcher County. [email protected]
TVS CableNet Technical Support Guide Effective August 15, 2006 All materials 2006 TV Service, Inc. This material may not be reproduced in any form except for personal private use by TV Service Cable Internet
Savvius Insight Initial Configuration
The configuration utility on Savvius Insight lets you configure device, network, and time settings. Additionally, if you are forwarding your data from Savvius Insight to a Splunk server, You can configure
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
Overview of WebMux Load Balancer and Live Communications Server 2005
AVANU Load Balancing for Microsoft Office Live Communications Server 2005 WebMux Delivers Improved Reliability, Availability and Scalability Overview of WebMux Load Balancer and Live Communications Server
6.0. Getting Started Guide
6.0 Getting Started Guide Netmon Getting Started Guide 2 Contents Contents... 2 Appliance Installation... 3 IP Address Assignment (Optional)... 3 Logging In For the First Time... 5 Initial Setup... 6 License
P-660HW-Tx v3. 802.11g Wireless ADSL2+ 4-port Gateway DEFAULT LOGIN DETAILS. Firmware v3.70 Edition 1, 2/2009
P-660HW-Tx v3 802.11g Wireless ADSL2+ 4-port Gateway Firmware v3.70 Edition 1, 2/2009 DEFAULT LOGIN DETAILS IP Address: http://192.168.1.1 Admin Password: 1234 User Password: user www.zyxel.com Copyright
Chapter 7 Troubleshooting
Chapter 7 Troubleshooting This chapter provides troubleshooting tips and information for your ProSafe VPN Firewall 200. After each problem description, instructions are provided to help you diagnose and
How to setup EW-7438RPn with a Windows computer to extend an existing Wi-Fi network
2 How to setup EW-7438RPn with a Windows computer to extend an existing Wi-Fi network Note: 1. This instruction use pictures from EW-7438RPn firmware v1.13. 2. If you need to restore to the default settings,
3.5 EXTERNAL NETWORK HDD. User s Manual
3.5 EXTERNAL NETWORK HDD User s Manual Table of Content Before You Use Key Features H/W Installation Illustration of Product LED Definition NETWORK HDD Assembly Setup the Network HDD Home Disk Utility
2 Setting Up the Hardware for a Wired Ethernet Network... 13. 3 Setting Up the Software for an Ethernet Network... 21
Contents 1 Networking Basics............................................... 1 Selecting a network connection........................................ 2 Wired Ethernet network...........................................
Multi-Homing Security Gateway
Multi-Homing Security Gateway MH-5000 Quick Installation Guide 1 Before You Begin It s best to use a computer with an Ethernet adapter for configuring the MH-5000. The default IP address for the MH-5000
OUTDOOR IR NETWORK CAMERA Series
OUTDOOR IR NETWORK CAMERA Series INSTALLATION GUIDE Please read instructions thoroughly before operation and retain it for future reference. 1. OVERVIEW 1.1 Package Content Network camera Installation
Volume. Instruction Manual
Volume 1 Instruction Manual Networking EVERFOCUS ELECTRONICS CORPORATION Networking Instruction Guide 2004 Everfocus Electronics Corp 2445 Huntington Drive Phone 626.844.8888 Fax 626.844.8838 All rights
What is Bitdefender BOX?
Quick Setup Guide What is Bitdefender BOX? Think about Bitdefender BOX like an antivirus for your network. It s a hardware device that sits next to your Wi-Fi router and protects all Internet connected
Configuring PA Firewalls for a Layer 3 Deployment
Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step
Shield Pro. Quick Start Guide
Shield Pro In the box: Power Adapter Shield Network Cables Let s get started! Before installing Shield you will first need to determine which operating mode best fits your needs. To help with this process,
Infinity C Reference Guide
1 2! Infinity C Reference Guide Table of Contents Components... 1 Hardware Setup... 5 SmartDrive Configuration... 12 Startup... 15 Login... 16 System Configuration... 19 DICOM Setup... 20 Monitoring Status...
Virtual Appliance Setup Guide
Virtual Appliance Setup Guide 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective
801.11n Wireless Broadband Router
801.11n Wireless Broadband Router WNRT-626 Quick Installation Guide Table of Contents Hardware Installation... 4 Web Configuration... 6 Further Configuration... 8 Thank you for purchasing PLANET 801.11n
Technical Note. Monitoring Ethernet Traffic with Tolomatic ACS & Managed Switch. Contents
Monitoring Ethernet Traffic with Tolomatic ACS & Managed Switch Contents 1. Introduction...2 2. Equipment...2 3. Software...3 4. Definitions...3 5. Procedure...3 6. Change PC IP Address...3 7. Network
Using SonicWALL NetExtender to Access FTP Servers
SSL-VPN Using SonicWALL NetExtender to Access FTP Servers Problem: Using NetExtender to access an FTP Server on the LAN segment of a SonicWALL PRO 4060. Solution: Perform the following setup steps. Step
Firewall VPN Router. Quick Installation Guide M73-APO09-380
Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,
Prestige 623R-T. Quick Start Guide. ADSL Dual-link Router. Version 3.40
Prestige 623R-T ADSL Dual-link Router Quick Start Guide Version 3.40 February 2004 Introducing the Prestige The Prestige 623R-T ADSL Dual-link Router is the ideal all-in-one device for small networks connecting
Quick Installation Guide
V48.01 Model: FI8919W Quick Installation Guide Outdoor Pan/Tilt Wireless IP Camera For Windows OS ------- Page 1 For MAC OS ------- Page 15 ShenZhen Foscam Intelligent Technology Co., Ltd Quick Installation
Actiontec GT784WN Router
Table of Contents General Information...1 Verify Computer Settings...1 Router Installation...3 Configuring Your Router...3 Configuring Your Computer...7 Configuring Your Email...9 General Information Router
Thinspace deskcloud. Quick Start Guide
Thinspace deskcloud Quick Start Guide Version 1.2 Published: SEP-2014 Updated: 16-SEP-2014 2014 Thinspace Technology Ltd. All rights reserved. The information contained in this document represents the
Chapter 2 Preparing Your Network
Chapter 2 Preparing Your Network This document describes how to prepare your network to connect to the Internet through a router and how to verify the readiness of your broadband Internet service from
HP MediaSmart Server Software Upgrade from v.2 to v.3
HP MediaSmart Server Software Upgrade from v.2 to v.3 Table of Contents Table of Contents Upgrade Your Server Software to HP MediaSmart Server v.3 2 Before You Begin 3 What's New 3 Features That Will
P-660HWP-Dx. Quick Start Guide. 802.11g HomePlug AV ADSL2+ Gateway. Version 3.40 7/2007 Edition 1. Copyright 2007. All rights reserved.
P-660HWP-Dx 802.11g HomePlug AV ADSL2+ Gateway Quick Start Guide Version 3.40 7/2007 Edition 1 Copyright 2007. All rights reserved. Overview The P-660HWP-Dx is a gateway which combines high-speed ADSL
How To Connect To A Wireless Network On Your Computer (Wired) Or Ipv) On A Computer (Wireless) On Your Ipv Or Ipa (Wired Or Wireless) On An Ipv (Wired/Wired) On Pc Or Mac
HI-SPEED INTERNET USER GUIDE Wireless Modem Router - 2704R 2013-11 VERSION 1-800-360-8555 TABLE OF CONTENTS 1. Installing Your Wireless Modem Router...4 1.1 Hardware Provided...4 1.2 Connecting Your Modem
How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The
1-bay NAS User Guide INDEX Index... 1 Log in... 2 Basic - Quick Setup... 3 Wizard... 3 Add User... 6 Add Group... 7 Add Share... 9 Control Panel... 11 Control Panel - User and groups... 12 Group Management...
Multi-Homing Dual WAN Firewall Router
Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet
emerge 50P emerge 5000P
emerge 50P emerge 5000P Initial Software Setup Guide May 2013 Linear LLC 1950 Camino Vida Roble Suite 150 Carlsbad, CA 92008 www.linearcorp.com Copyright Linear LLC. All rights reserved. This guide is
Chapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under
DVG-2101SP VoIP Telephone Adapter
This product can be set up using any current web browser, i.e., Internet Explorer 6 or Netscape Navigator 6.2.3. DVG-2101SP VoIP Telephone Adapter Before You Begin 1. If you purchased this VoIP Telephone
NETWORK SET UP GUIDE FOR
NETWORK SET UP GUIDE FOR USZ11ZS USX21ZS USX31ZAND DVRX16D DVRX32D HDDX13D SUPPORTING ROUTER D-Link Linksys NETGEAR BELKI IP Addresses on the Internet When you connect to the Internet, through dialup connection,
Please use only wired network connections to configure the Router.
Note Please use only wired network connections to configure the Router. Power down all of your network devices, including your computer(s) and the Modem Router. If you currently use a modem, disconnect
10/2011 - English Edition 1. Quick Start Guide. NWA1100N-CE CloudEnabled Business N Wireless Access Point
10/2011 - English Edition 1 Quick Start Guide NWA1100N-CE CloudEnabled Business N Wireless Access Point Package Contents - 1 x ZyXEL NWA1100N-CE Access Point - 2 x Detachable Antennas - 1 x Power Adapter
Networking Guide Redwood Manager 3.0 August 2013
Networking Guide Redwood Manager 3.0 August 2013 Table of Contents 1 Introduction... 3 1.1 IP Addresses... 3 1.1.1 Static vs. DHCP... 3 1.2 Required Ports... 4 2 Adding the Redwood Engine to the Network...
Networking. General networking. Networking overview. Common home network configurations. Wired network example. Wireless network examples
Networking General networking Networking overview A network is a collection of devices such as computers, printers, Ethernet hubs, wireless access points, and routers connected together for communication
To get started, you will need the following items Product Key Router with firewall capability Network cables
Quick Start Guide Windows Small Business Server 2011 Standard Installing Your New Server Depending on how your server came from the manufacturer, your set up steps are slightly different. Follow the instructions
Welcome. Unleash Your Phone
User Manual Welcome Unleash Your Phone For assistance with installation or troubleshooting common problems, please refer to this User Manual or Quick Installation Guide. Please visit www.vonage.com/vta
Configuring a Trimble Sps 461 using the Ethernet Connection GETTING THE GPS ON THE NETWORK HTTP PORT. By Bob Glover
Configuring a Trimble Sps 461 using the Ethernet Connection By Bob Glover With most computers today, finding a serial port on board is a thing of the past. Increasingly, fewer and fewer computers even
Assign a static IP address 192.168.1.100 for your computer. Please refer to the T3 in Troubleshooting guide if you need assistance.
Assign a static IP address 192.168.1.100 for your computer. Please refer to the T3 in Troubleshooting guide if you need assistance. Connect to the Access Point with the Ethernet cable or via wireless.the
If no telephone is needed, please connect the LINE port of the Modem Router to the wall jack using the telephone line directly.
Note Please use only wired network connections to configure the Router. Power down all of your network devices, including your computer(s) and the Modem Router. If you currently use a modem, disconnect
Prestige 202H Plus. Quick Start Guide. ISDN Internet Access Router. Version 3.40 12/2004
Prestige 202H Plus ISDN Internet Access Router Quick Start Guide Version 3.40 12/2004 Table of Contents 1 Introducing the Prestige...3 2 Hardware Installation...4 2.1 Rear Panel...4 2.2 The Front Panel
AC750 WiFi Range Extender
Model EX6100 User Manual April 2014 202-11307-03 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the serial number
Assign a static IP address 192.168.1.100 for your computer. Please refer to the T3 in Troubleshooting guide if you need assistance.
Note The product model shown in this QIG is TL-WA701ND, as an example. Assign a static IP address 192.168.1.100 for your computer. Please refer to the T3 in Troubleshooting guide if you need assistance.
Legal Disclaimers. For C-UL Listed applications, the unit shall be installed in accordance with Part 1 of the Canadian Electrical Code.
ACS5000 Networking Admin Interface Guide 1/21/2015 Legal Disclaimers Federal Communications Commission (FCC) Compliancy This equipment has been tested and found to comply with the limits for a Class B
Quick Installation Guide
V46.01 Model: FI8918W Quick Installation Guide Indoor Pan/Tilt Wireless IP Camera Black White For Windows OS ------- Page 1 For MAC OS ------- Page 11 ShenZhen Foscam Intelligent Technology Co., Ltd Quick
Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual
Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual www.hillstonenet.com Preface Conventions Content This document follows the conventions below: CLI Tip: provides
your Gateway Windows network installationguide 802.11b wireless series Router model WBR-100 Configuring Installing
your Gateway Windows network installationguide 802.11b wireless series Router model WBR-100 Installing Configuring Contents 1 Introduction...................................................... 1 Features...........................................................
Chapter 1 Installing the Gateway
Chapter 1 Installing the Gateway This chapter describes how to set up the wireless voice gateway on your Local Area Network (LAN), connect to the Internet, and perform basic configuration. For information
