Befw11s4 ver 2 manual
Belkin is not obligated to provide any maintenance or support for the Open Source Software or any Product Software that has been modified by you pursuant to an Open Source Software license. Open source licenses are generally licenses that make source code available for free modification and distribution, but can also apply to technology received and distributed solely in object code form.
All title and intellectual property rights including without limitation all copyrights, patents, trade secret rights and trademark rights in and to the Software including but not limited to any content incorporated into the Software , the accompanying printed materials, and any copies of the Software, are owned by Belkin or its suppliers.
Therefore, you must treat the Software like any other material protected by laws and treaties relating to international property rights and in accordance with this Agreement. These features are provided solely as a convenience to you. You will need to make your own independent judgment regarding your interaction with any Linked Sites. You hereby waive and release any legal claim you might have against Belkin with respect to these sites or third-party products or services, and your use of these sites, third-party products or services.
We encourage you to read the terms and conditions and privacy policy of each third party website that you choose to visit. If Belkin is the subject of a claim, becomes involved in a legal proceeding, or suffers any economic loss or damage as a result of your violation of this Agreement, to the extent permitted by law, you will be responsible for compensating Belkin for the full amount of its loss, as well as any reasonable amounts Belkin incurs in lawyers' fees, expenses and court costs, except to the extent that Belkin contributed to the loss or damage.
Once accepted, this Agreement remains in effect until terminated. The limited license in this Agreement will automatically terminate if you fail to comply with any of the terms and conditions in this Agreement. You agree that upon such termination, you will immediately destroy all programs and documentation that relate to the Software, including all copies made or obtained by you, and otherwise cease use of the Software.
If the Software has been installed on a personal computer or mobile device, you must uninstall the Software immediately. If the Software is software or firmware embedded in a Product, you must stop using the Product. All provisions of this Agreement except for Section 1 and the limited warranty in Section 12 the first paragraph will survive termination.
If you are located in Australia or New Zealand, the following four paragraphs apply to you:. In Australia, our Software and the media on which it is provided, as well as any related services, come with guarantees that cannot be excluded under the Australian Consumer Law.
For major failures with the service, you are entitled:. You are also entitled to be compensated for any other reasonably foreseeable loss or damage. If the failure does not amount to a major failure, you are entitled to have problems with the Service rectified in a reasonable time and, if this is not done, to cancel your contract and obtain a refund for the unused portion of the contract.
This Agreement is not intended to and does not: i change or exclude any statutory consumer rights that cannot be lawfully changed or excluded; or ii limit or exclude any right you have against the person who sold the Product to you if that person has breached any sales contract with you. You agree to use the Software in compliance with all applicable laws, including local laws of the country or region in which you live or in which you download or use the Software.
To make a claim under this Limited Warranty, return the defective media along with the sales receipt directly to Belkin at the address indicated below, or you can contact the Belkin Support Team in your area as indicated below. This Limited Warranty is void if failure of the media has resulted from accident, abuse, or misapplication. Any replacement media will be warranted for the remainder of the original Warranty Period or thirty 30 days, whichever is longer. In relation to consumers who are entitled to the benefit of the CGA, the media on which Software is provided comes with guarantees that cannot be excluded under New Zealand law, and this Limited Warranty is in addition to any statutory rights such consumers may have under New Zealand law.
This Limited Warranty does not apply in Australia. Consumers in Australia have statutory rights in relation to the Software and media on which the Software is provided under the Australian Consumer Law. To the extent warranties cannot be disclaimed or excluded, they are limited to the duration of the Warranty Period indicated above. It is your responsibility to back up your system, including without limitation, any material, information or data that you may use or possess in connection with the Product or Software, and Belkin shall have no liability for your failure to back up your system or any material, information or data.
Some Belkin Products and Software may monitor energy consumption in the home. Belkin does not guarantee or promise any specific level of energy savings or other monetary benefit from the use of the Products or Software or any other feature.
From time to time, Belkin may use the Software to provide you with information that is unique to you and your energy usage and suggests an opportunity to save money on energy bills if you adopt suggestions or features of the Product or Software. You acknowledge that this information is not a guarantee of actual savings, and you agree not to seek monetary or other remedies from Belkin if your savings differs. We cannot guarantee that it is correct or up to date.
In cases where it is critical, accessing information through the Software is not a substitute for direct access of the information in the home. The warranties and remedies set out in this Agreement are exclusive, and, to the extent permitted by law, in lieu of all others oral or written, express or implied.
You agree to strictly comply with all export control laws and regulations and agree not to export, re-export, divert, transfer or disclose any portion of the Software or any related technical information or materials, directly or indirectly, in violation of any applicable export law or regulation. All U. Government users acquire the Software and user documentation with only those rights herein that apply to non-governmental customers.
Use of either the Software or user documentation or both constitutes agreement by the U. If any portion of this Agreement or any of its terms is found to be void or unenforceable by law in a particular jurisdiction, such portion or terms shall be interpreted and enforced to the maximum extent allowed in such jurisdiction, and the remaining provisions or any part thereof will remain in full force and effect.
This Agreement constitutes the entire agreement between Belkin and you with respect to the Software and your use thereof and supersedes any conflicting or additional terms contained in any purchase order or elsewhere.
Enter any name you want to use for the Application Name. Enter the Triggered Port Range. Try removing F. Enter the Incoming Port Range. Check with your Internet Application other PCs or network devices to see if the problem persists. Eliminate provider for more information on which incoming port services are each network device one at a time to determine the cause.
The wall or proxy. Then set the firewall time-out to 80 seconds in the firewall set- Router will support up to IP addresses. The Internet user can then send a file to a user behind the Router. What do the Router automatically enables. I need to do? If you have a dedicated Unreal Tournament server running, you need to create a static IP for each of the LAN computers and forward ports Where is the Router installed on the network?
In a typical environment, the , , , , , and to the IP address of the server. UT Server Admin, forward another port usually works well but is used for remote admin. You may have to disable this. WebServer] section of the server. It depends on which network game or what kind of game server you are using. Because of multi-login with one public IP. This lets multiple computers connect to the same server.
What is Network Address Translation and what is it used for? Network Address One problem: Version 1. This adds a level of security 1. Just forward port to the local IP address of the server comput- on the Internet.
Furthermore, NAT allows the Router to be used with low cost er. If you are experiencing corrupted behind this single address provided by the ISP. Yes, but Linksys does not, at The web page hangs; downloads are corrupt, or nothing but junk characters are this time, provide technical support for setup, configuration or troubleshoot- being displayed on the screen. What do I need to do? Force your Ethernet ing of any non-Windows operating systems.
Make sure that your proxy setting is disabled in the browser. Check our web- site at www. If all else fails in the installation, what can I do? Reset your allows PPTP packets to pass through. Obtain and flash the latest firmware release that is readily available on the Linksys website, Is the Router cross-platform compatible?
Any platform that supports Ethernet www. How will I be notified of new Router firmware upgrades? All Linksys firmware How many ports can be simultaneously forwarded? Theoretically, the Router can upgrades are posted on the Linksys website at www.
TFTP programs. Is there a cable or DSL modem in the Router? Downloading a more current version No, this version of the Router must work in conjunction with a cable or DSL of Router firmware will not enhance the quality or speed of your Internet con- modem. Which modems are compatible with the Router? The Router is compatible with Will the Router function in a Macintosh environment? What are the advanced features of the Router? What can I do? You may have to remove the proxy settings on your Internet browser, e.
Check with your browser documentation, and make sure that The maximum number depends on many factors. At least one IPSec session your browser is set to connect directly and that any dial-up is disabled.
Make will work through the Router; however, simultaneous IPSec sessions may be sure that your browser is set to connect directly and that any dial-up is dis- possible, depending on the specifics of your VPNs.
Make sure that Internet Explorer is set to Never dial a con- How big is the memory buffer on the Router? Consult your ISP Internet. What is DMZ Hosting? Under the Port Range Forwarding puter to be exposed to the Internet. Some applications require multiple tab, set port forwarding to for the PC on which you are using mIRC. What is the IEEE The IEEE What is FHSS? And what are their differences? Frequency subcommittee formulates the standard for the industry.
Properly synchronized, the net effect is to maintain a single logical channel. The product supports the following unintended receiver, FHSS appears to be short-duration impulse noise.
Direct IEEE This bit pattern is called a chip or chipping code. Would the information be intercepted while transmitting on air? WLAN features two-fold protection in security. An Infrastructure configuration could also support roaming Sequence Spread Spectrum technology, it has the inherent security feature of capability for mobile workers.
More than one BSS can be configured as an scrambling. Users can set it up BSSs while maintaining a continuous connection to the wireless network sta- depending upon their needs. What is WEP? The FCC and their counterparts outside of the U.
Medical band. This presents a truly revolutionary opportunity to place con- venient high speed wireless capabilities in the hands of users around the What is a MAC Address?
Spread Spectrum technology is a wideband radio ware level. For all practical purposes, this number is usually permanent. It is designed to trade off bandwidth network, the MAC address of a device stays the same, making it a valuable efficiency for reliability, integrity, and security. In other words, more band- identifier for the network.
If a receiver is not tuned to the right frequency, a spread- spectrum signal looks like background noise. Press Enter. In actuality, however, these Internet addresses are assigned to IP addresses, which are the true addresses on the Reply from For example, www.
Entering Reply from Reply from Because of this, certain ISPs will shorten their server addresses to single words Ping statistics for This happens because the Router has not been config- ured by your ISP to accept their abbreviated server addresses.
Write down the IP address returned by the ping command. This IP address is the actual IP address of the words. While the IP address returned above would work as your e-mail server address, it may not be permanent.
IP addresses change all the time. Power on the computer and the cable or DSL modem, and restore the 1. Information such as the fol- lowing data will be displayed. Pinging mail. Ping statistics for WEP uses a combination of loss , bit or bit keys to provide access control to your network and encryption Approximate round trip times in milli-seconds: security for every data transmission.
Higher encryption lev- els mean higher levels of security, but due to the complexity of the encryption, they may mean decreased network performance. Write down the web address returned by the ping command in the example above: mail. While the IP address of encryption. This is simply another term for bit WEP encryption. Wireless vendors may 3. Make sure your wireless network is functioning before attempting to configure Once you have replaced the brief server address with the true server address, WEP encryption.
Therefore, make sure that all of your wireless devices are using the same encryption level. All wireless devices com- plying with the Select Enable under the Wireless section before proceeding. Note: In order to utilize WEP encryption, all points in your wireless 2. The WEP Encryption key is generated in one of two ways: 3. The screen dis- played in Figure 1. You may create an encryption key by using a Passphrase. C-1 may appear, verifying that you a. Enter a Passphrase, a user-defined password, into the Passphrase field.
Press No spaces can be used. Figure C-1 b. Click the Generate button to create a key. The key will be 10 digits if you chose bit encryption, or 26 digits if you chose bit encryption. This will display the screen shown in Figure C From this screen, you will This key will be used to encrypt and decrypt the data being sent between choose your WEP Encryption settings. The Key field may not display all digits. Using the mouse, click any- where within the Key field.
Move the cursor to the right to view the rest of the Key. You may enter the encryption key manually. Make a note of the Passphrase or Manual Key.
You will need it for the other wireless devices on the network, as the same WEP encryption key must be entered in all wireless devices on the network. Once you have chosen your key encryption method and entered either the Passphrase or manual key, click the Apply button, and the encryption portion of the setup is complete.
As Windows XP does not allow for the use of the Linksys Passphrase feature with the wireless PC adapters, you will need to manually enter the key gener- ated in the previous section.
The following steps will help you enable WEP and enter the encryption key manually for your wireless PC cards, in order to enable your Windows XP sys- tem to communicate with the Router wirelessly. Figure C-4 1. Click the Network Connections icon, shown in Figure C Figure C Double-click the Wireless Network Connection icon associated with your wireless adapter.
Then, double-click the Wireless Network Connection icon. Figure C-6 5. If this is not displayed, you have entered the key incorrectly. For Windows 95, 98, and ME:. Click on Start and Run. In the Open field, enter winipcfg, as shown in Figure D Then press the Enter key or the OK button. Figure D-1 2. Figure C Click the OK button to save the settings.
Close any open windows to get back to the Windows XP desktop. Close any applications and reboot your PC. After reboot, WEP configuration is complete and you should be able to connect wirelessly to the Router. Figure D Write down the Adapter Address as shown on your computer screen see 2. Then press the Enter key. This is the MAC address for your Ethernet adapter and will be shown as a series of numbers and letters.
Your computer may show something different. Cloning or MAC Filtering. In the Open field, enter cmd, as shown in Figure Address. See Figure D Ad-hoc Network - An ad-hoc network is a group of computers, each with a wireless adapter, connected as an independent Ad-hoc wireless computers operate on a peer-to-peer basis, communicating directly with each other without the use of an access point.
Auto-negotiate - To automatically determine the correct settings. The term is often used with communications and networking. Backbone - The part of a network that connects most of the systems and net- works together and handles the most data. Bandwidth - The transmission capacity of a given facility, in terms of how much data the facility can transmit in a fixed amount of time; expressed in bits per second bps.
Bit - A binary digit. The value - 0 or 1-used in the binary numbering system. Boot - To cause the computer to start executing instructions. Personal comput- ers contain built-in instructions in a ROM chip that are automatically executed CAT 5e - The additional cabling performance parameters of return loss and far- on startup.
In contrast, Gigabit bandwidth of a medium. This allows the transmission of voice, data and video Ethernet is bi-directional-signals are transmitted simultaneously in both direc- signals over a single medium. Cable television uses broadband techniques to tions on the same wire pair; that is, both the transmit and receive pair occupy deliver dozens of channels over one cable. This works best if the time allocated is short compared to packet length and if the number of sit- BSS Basic Service Set - An infrastructure network connecting wireless uations is small.
Data Packet - One frame in a packet-switched message. Most data communi- Buffer - A buffer is a shared or assigned memory area used by hardware cations is based on dividing the transmitted message into packets. For example, devices or program processes that operate at different speeds or with different an Ethernet packet can be from 64 to bytes in length. The buffer allows each device or process to operate without being held up by the other. In order for a buffer to be effective, the size of the Default Gateway - The routing device used to forward all traffic that is not buffer and the algorithms for moving data into and out of the buffer need to be addressed to a station within the local subnet.
Like a cache, a buffer is a "midpoint holding place" but exists not so much to accelerate the speed of an activity as to sup- DHCP Dynamic Host Configuration Protocol - A protocol that lets network port the coordination of separate activities. Once connected, cable modem unique IP address. When an organization sets up its computer users with a con- users have a continuous connection to the Internet.
Cable modems feature nection to the Internet, an IP address must be assigned to each machine. Industries Association Standard is one of several standards that specify "categories" the singular is commonly referred to as "CAT" of twisted pair DHCP uses the concept of a "lease" or amount of time that a given IP address will be valid for a computer. The lease time can vary depending on how long a user is likely to require the Internet connection at a particular location.
It's espe-. AP quently. Using very short leases, DHCP can dynamically reconfigure networks Clients hear the beacons and awaken to receive the broadcast and multicast in which there are more computers than there are available IP addresses. It is recommended that you set your computer with a static IP address if Dynamic Routing - The ability for a router to forward data via a different route you want to use DMZ Hosting. For example, it can adjust for overloaded traffic or failing lines and is much more flexible DNS - The domain name system DNS is the way that Internet domain name than static routing, which uses a fixed forwarding path.
A domain name is a meaningful and easy-to-remember "handle" for an Internet address. Encryption - A security method that applies a specific algorithm to data in order to alter the data's appearance and prevent other devices from reading the Domain - A subnetwork comprised of a group of clients and servers under the information. Dividing LANs into domains improves per- formance and security. Download - To receive a file transmitted over a network.
In a communications session, download means receive, upload means transmit. Ethernet - IEEE standard network protocol that specifies how data is placed on and retrieved from a common transmission medium. DSL pro- vides "always-on" operation, eliminating the need to dial in to the service. Even if one or more bits in the chip are damaged during transmission, hops the carrier frequency of a conventional carrier several times per second statistical techniques embedded in the receiver can recover the original data according to a pseudo-random set of channels.
Because a fixed frequency is not without the need for retransmission. To an unintended receiver, DSSS appears used, and only the transmitter and receiver know the hop patterns, interception as low power wideband noise and is rejected ignored by most narrowband of FHSS is extremely difficult. However, to an intended receiver i.
Fingering requires entering the full field informing clients of the next window for listening to broadcast and mul- user domain address. When the AP has buffered broadcast or multicast messages for. The term arose as a way to dis- The term also implies the security policy that is used with the programs.
An tinguish the "box" and the electronic circuitry and components of a computer enterprise with an intranet that allows its workers access to the wider Internet from the program you put in it to make it do things. The program came to be installs a firewall to prevent outsiders from accessing its own private data known as the software.
Hop - The link between two network nodes. Basically, a firewall, working closely with a router, examines each network HTTP HyperText Transport Protocol - The communications protocol used packet to determine whether to forward it toward its destination.
Its primary function is to estab- lish a connection with a Web server and transmit HTML pages to the client Firmware - Code that is written onto read-only memory ROM or program- browser. Hub - The device that serves as the central location for attaching wires from workstations.
Can be passive, where there is no amplification of the signals; or Fragmentation - Breaking a packet into smaller units when transmitting over active, where the hubs are used like repeaters to provide an extension of the a network medium that cannot support the original size of the packet.
For example, after developing the HTML pages e-mail and file transfer and can alert you when someone on your predefined list for a Web site on a local machine, they are typically uploaded to the Web serv- has also come online.
FTP oper- the development and application of electrotechnology and allied sciences for ations can be performed by typing commands at a command prompt or via an the benefit of humanity, the advancement of the profession, and the well-being FTP utility running under a graphical interface such as Windows.
FTP transfers of our members. The IEEE fosters the development of standards that often become national and international standards. The organization publishes a number of journals, has Unlike e-mail programs in which graphics and program files have to be many local chapters, and several large societies in special areas, such as the "attached," FTP is designed to handle binary files directly and does not add the IEEE Computer Society.
Infrastructure Network - An infrastructure network is a group of computers Full Duplex - The ability of a device or line to transmit data simultaneously in or other devices, each with a wireless adapter, connected as an In infrastructure mode, the wireless devices communicate with each other and to a wired network by first going through an access point. An infra- Gateway - A device that interconnects networks with different, incompatible structure wireless network connected to a wired network is referred to as a communications protocols.
Infrastructure mode is useful at Half Duplex - Data transmission that can occur in two directions over a single a corporation scale, or when it is necessary to connect the wired and wireless line, but only one direction at a time. This set con- other end, the recipient can see the IP address of the Web page requestor or the tains information about a specific device for utilizing SNMP.
A commonly used utility for Multicasting - Sending data to a group of nodes instead of a single destination. IPSec supports two basic modes: within another network. One network is designated the inside network and the Transport and Tunnel. Transport encrypts the payload of each packet, leaving other is the outside. Tunnel mode is widely deployed between users.
Usenet newsreaders support the NNTP protocol. IPX packets include network addresses and can be routed from one network to another. Node - A network junction or connection point, typically a computer or work station.
Spectrum in the vicinity of 2. This presents a truly revolutionary opportunity to place con- Passphrase - Used much like a password, a passphrase simplifies the WEP venient high-speed wireless capabilities in the hands of users around the globe. It is used to test and debug a network by send- resources of a single processor or server within a small geographic area for ing out a packet and waiting for a response.
Plug-and-Play - The ability of a computer system to configure expansion Router - Protocol-dependent device that connects subnetworks together. Port - A pathway into and out of the computer or a network device such as a switch or router. For example, the serial and parallel ports on a personal com- RTS Request To Send - An RS signal sent from the transmitting station puter are external sockets for plugging in communications lines, modems and to the receiving station requesting permission to transmit.
Effectively, a corporation uses a hub, router, bridge, etc. A company no longer work. The agents return information contained in a MIB Management needs to lease its own lines for wide-area communication but can securely use Information Base , which is a data structure that defines what is obtainable the public networks.
This kind of interconnection is known as a virtual private from the device and what can be controlled turned off, on, etc. Software - Instructions for the computer. A series of instructions that performs RIP Routing Information Protocol - A simple routing protocol that is part of a particular task is called a "program.
It determines a route based on the smallest hop count "system software" and "application software. RIP is a distance vector protocol that routine- control programs such as the operating system and database management sys- ly broadcasts routing information to its neighboring routers. Application software is any program that processes data for the user. RJ Registered Jack - A connector similar to a telephone connector that holds up to eight wires, used for connecting Ethernet devices.
A common misconception is that software is data. It is not. Software tells the hardware how to process the data. Roaming - In an infrastructure mode wireless network, this refers to the abili- ty to move out of one access point's range and into another and transparently Spread Spectrum - Spread Spectrum technology is a wideband radio frequen- reassociate and reauthenticate to the new access point.
This reassociation and cy technique developed by the military for use in reliable, secure, mission-crit- reauthentication should occur without user intervention and ideally without ical communications systems. It is designed to trade off bandwidth efficiency interruption to network connectivity. A typical scenario would be a location for reliability, integrity, and security. In other words, more bandwidth is con- with multiple access points, where users can physically relocate from one area sumed than in the case of narrowband transmission, but the trade off produces to another and easily maintain connectivity.
TCP is known as a "connection oriented" pro- like background noise. It examines not just the developed specifically for the Internet. It is called "stateful" because verifies that the stated destination computer has previously requested the cur- Telnet - A terminal emulation protocol commonly used on the Internet and rent communication. It allows a user at a terminal or computer to log onto ed by the recipient computer and are taking place only with sources that are a remote device and run a program.
This allows an added layer of protection from the that has no directory or password capability. The SSID must be identical for each point in the wireless net- work and is case-sensitive.
TX Rate - Transmission Rate. Static routing the actual delivery of the data routing , UDP takes care of keeping track of the cannot adjust to changing line conditions as can dynamic routing. UDP is known as a "connection-less" protocol Subnet Mask - The method used for splitting IP networks into a series of sub- due to NOT requiring the receiver of a packet to return an acknowledgment of groups, or subnets. The mask is a binary pattern that is matched up with the IP receipt to the sender of the packet as opposed to TCP.
Upgrade - To replace existing software or firmware with a newer version. Switch - 1. A data switch connects computing devices to host computers, allowing a large number of devices to share a limited number of ports.
A Upload - To transmit a file over a network. In a communications session, device for making, breaking, or changing the connections in an electrical cir- upload means transmit, download means receive. While IP takes care of handling vide the hypertext links to other pages. Twisted pair is the ordinary copper wire that connects home and many business computers to the telephone company. To reduce crosstalk or electro- Appendix F: Specifications magnetic induction between pairs of wires, two insulated copper wires are Standards IEEE Each signal on twisted pair requires both wires.
Broadband communication over the WAN is often through public networks such as the Operating Range: Wireless telephone DSL or cable systems, or through leased lines or satellites. In its Indoors: Up to 30m ft. Up to 50m ft. Outdoors: Up to m ft.
A commonly used util- Up to m ft. Up to m ft. Topology Star Ethernet. Connectors 2 Antenna Connectors. Environmental Appendix G: Warranty Dimensions 7. Unit Weight Please make sure you are comfortable with the feature changes before migrating over. Linksys will continue to operate the LCM1 platform for the duration of the 5 year term offered, then end of life the service. The migration to LCM2 brings new improvements over LCM1 which are listed here Link to marketing document , but also changes and eliminates some functionality currently available in LCM The AP will not provide the capability to be configured and managed as a stand-alone device with exception of configuring connection parameters, i.
All management features will now be cloud based. Once configured, the AP can continue operating without a cloud connection, but a cloud connection will be required to make configuration changes.
Data usage statistics of clients and APs will be real-time only — i. No historical statistics will be available, e. For any technical issues, please consult our online Linksys Cloud Manager 1.
0コメント