Vai alla pagina of
Un buon manuale d’uso
Le regole impongono al rivenditore l'obbligo di fornire all'acquirente, insieme alle merci, il manuale d’uso AlphaShield 8350. La mancanza del manuale d’uso o le informazioni errate fornite al consumatore sono la base di una denuncia in caso di inosservanza del dispositivo con il contratto. Secondo la legge, l’inclusione del manuale d’uso in una forma diversa da quella cartacea è permessa, che viene spesso utilizzato recentemente, includendo una forma grafica o elettronica AlphaShield 8350 o video didattici per gli utenti. La condizione è il suo carattere leggibile e comprensibile.
Che cosa è il manuale d’uso?
La parola deriva dal latino "instructio", cioè organizzare. Così, il manuale d’uso AlphaShield 8350 descrive le fasi del procedimento. Lo scopo del manuale d’uso è istruire, facilitare lo avviamento, l'uso di attrezzature o l’esecuzione di determinate azioni. Il manuale è una raccolta di informazioni sull'oggetto/servizio, un suggerimento.
Purtroppo, pochi utenti prendono il tempo di leggere il manuale d’uso, e un buono manuale non solo permette di conoscere una serie di funzionalità aggiuntive del dispositivo acquistato, ma anche evitare la maggioranza dei guasti.
Quindi cosa dovrebbe contenere il manuale perfetto?
Innanzitutto, il manuale d’uso AlphaShield 8350 dovrebbe contenere:
- informazioni sui dati tecnici del dispositivo AlphaShield 8350
- nome del fabbricante e anno di fabbricazione AlphaShield 8350
- istruzioni per l'uso, la regolazione e la manutenzione delle attrezzature AlphaShield 8350
- segnaletica di sicurezza e certificati che confermano la conformità con le norme pertinenti
Perché non leggiamo i manuali d’uso?
Generalmente questo è dovuto alla mancanza di tempo e certezza per quanto riguarda la funzionalità specifica delle attrezzature acquistate. Purtroppo, la connessione e l’avvio AlphaShield 8350 non sono sufficienti. Questo manuale contiene una serie di linee guida per funzionalità specifiche, la sicurezza, metodi di manutenzione (anche i mezzi che dovrebbero essere usati), eventuali difetti AlphaShield 8350 e modi per risolvere i problemi più comuni durante l'uso. Infine, il manuale contiene le coordinate del servizio AlphaShield in assenza dell'efficacia delle soluzioni proposte. Attualmente, i manuali d’uso sotto forma di animazioni interessanti e video didattici che sono migliori che la brochure suscitano un interesse considerevole. Questo tipo di manuale permette all'utente di visualizzare tutto il video didattico senza saltare le specifiche e complicate descrizioni tecniche AlphaShield 8350, come nel caso della versione cartacea.
Perché leggere il manuale d’uso?
Prima di tutto, contiene la risposta sulla struttura, le possibilità del dispositivo AlphaShield 8350, l'uso di vari accessori ed una serie di informazioni per sfruttare totalmente tutte le caratteristiche e servizi.
Dopo l'acquisto di successo di attrezzature/dispositivo, prendere un momento per familiarizzare con tutte le parti del manuale d'uso AlphaShield 8350. Attualmente, sono preparati con cura e tradotti per essere comprensibili non solo per gli utenti, ma per svolgere la loro funzione di base di informazioni e di aiuto.
Sommario del manuale d’uso
-
Pagina 1
U ser Ma nu a l[...]
-
Pagina 2
Version 1.0 T able of Contents 1. INTRODUCTION 5 2. CONTENTS 6 3. SYSTEM REQUIREMENTS 7 4. FEATURES 8 5. HARDWARE GUIDELINES 10 5.1 Connections 10 5.2 LEDs 11 6. LOGIN 12 7. SETUP 13 7.1 Quick Start 13 7.2 WAN 19 7.3 LAN 24 7.4 DHCP 25 8. ADVANCED 27 8.1 Virtual Server 27 8.2 Special Applications 28 8.3 Gaming 30 ® 8.4 StreamEngine Networking Opti[...]
-
Pagina 3
T able of Contents 8.12 Schedules 40 9. TOOLS 41 9.1 Admin 41 9.2 Time 43 9.3 Print Server Setup 44 9.4 Syslog 44 9.5 E-mail 45 9.6 System 46 9.7 Firmware 47 9.8 Dynamic DNS 48 10. STA TUS 49 10.1 Device Info 49 10.2 Routing 50 10.3 Print Serve Status 51 10.4 Logs 51 10.5 Statistics 52 10.6 LAN Port Status 53 10.7 Active Sessions 53 10.8 Switch For[...]
-
Pagina 4
T able of Contents 13.5 Copyright 66 13.6 Trademark 66 13.7 Patents 66 13.8 Restrictions 66 13.9 Liability Limitations 66 13.10 Customer Remedies 67 13.11 Notice of Change of Terms and Conditions 67 13.12 Replacement Components and Specifications 67 14. IMPORTANT NOTICES 68 14.1 FCC Statement 68 14.2 FCC Caution 68 14.3 FCC Radiation Exposure State[...]
-
Pagina 5
1. INTRODUCTION: Congratulations on your purchase of the Alpha Secure Wireless Router 8350, and thank you for choosing AlphaShield for your networking and security needs. Y our new router allows you to share files and printers on your network, and surf the Internet with ® the performance benefits of network optimization using StreamEngine T echnol[...]
-
Pagina 6
2. CONTENTS: 1. Alpha Secure Wireless Router 8350 2. Cat5 Ethernet Cable 3. Power Adapter (6.8V , 2.5A) 4. Quick Installation Guide 5. CD-ROM with Manual 6. Vertical S tands Note : Please contact your reseller if any of the above items are missing. Important: Using a power supply other than that included with your router will result in the warranty[...]
-
Pagina 7
3. SYSTEM REQUIREMENTS: 1. External xDSL or Cable Modem with Ethernet Ports. 2. PC or MAC with following minimum requirements: ? 1.25 Ghz processor ? 256MB Memory ? CD-ROM Drive ? Ethernet Adapter 10/100/1000 with TCP/IP Protocol Inst alled ® ? Windows XP/2000/Vista/ME or Mac® OS X v10.3/v10.2/v10.1or Linux ? Internet Explorer v6, Netscape® Navi[...]
-
Pagina 8
4.FEA TURES: Hardware Interface Features: Router/Switch Hardware: ? Dedicated 250 MIPS High Speed core Network Processor ? Dedicated High Speed Multi-port Gigabit Switch & Co-Processor ? 5 x 10/100/1000 Auto-Sensing Gigabit Ethernet LAN Ports with MDI /MDI-X ? 1 x 10/100 Auto-Sensing Fast Ethernet W AN Port with MDI/MDI-X ? 4 Universal Serial B[...]
-
Pagina 9
? User Selectable Logging support ? LAN and WAN T raffic Statistics Additional Features: ? Network Time Protocol ? WAN Mode: St atic, DHCP , PPPoE, PPTP , L2TP and Bigpond ? Other Protocols Support: RIP , IGMP , and DNS Relay ? Application Level Gateway Configuration for: MSN, FTP , NetMeeting, IPSec VPN, MMS, SIP , Wake On LAN, PPTP ? Pre-selectab[...]
-
Pagina 10
5. 5.1 Connections: 1. All Ethernet Ports (WAN and LAN) are auto MDI/MDIX, meaning you can either use a straight-through or a crossover Ethernet cable. 2. 5 Auto MDI/MDIX LAN ports automatically sense the cable type when connecting to Ethernet-enabled computers for both WAN and LAN. 3. The Auto MDI/MDIX WAN port is the connection for the Ethernet c[...]
-
Pagina 11
5.2 LEDs: 5 LOCAL NETWORK LEDs: The connection to an Ethernet-enabled computer on ports 1-5 is indicated by a solid light. When data is being transmitted, this LED will flash. 1 POWER LED: A solid light indicates a proper connection to the power supply . 1 WAN LED: A solid light indicates connection on the W AN port. When data is being transmitted,[...]
-
Pagina 12
6. LOGIN: The Configuration Interface can be accessed from your Web browser. Type http://192.168.0.1 in the address window and press Enter . The Login screen will appear. ? Select a User Name . ? By default, there is no password. Simply leave this window blank ? Click Log In to proceed. Version 1.0 Page 12 Alpha Secure Wireless Router 8350 GIGABIT[...]
-
Pagina 13
7. SETUP: 7.1 Quick Start: The Wizard screen contains two wizards: ? Internet Connection Setup Version 1.0 Page 13 Alpha Secure Wireless Router 8350 GIGABIT[...]
-
Pagina 14
a) Launch Internet Connection Setup Wizard: The following Web-based Setup Wizard will help you connect your new Alpha Router to the Internet. This Setup Wizard will guide you in a step-by-step manner to get your Internet connection up and running. Before launching the Wizard, please make sure you have correctly followed all of the steps outlined in[...]
-
Pagina 15
Step 2: Select Y our Time Zone Select your local time zone from the pull-down menu. ? T o continue click Next Step 3: Configure Y our Internet Connection From the pulldown menu, choose your Internet Service Provider (ISP). If your ISP is not listed in the menu, or you do not know who your ISP is, simply select Not Listed or Don't Know from the[...]
-
Pagina 16
Step 3: Configure Y our Internet Connection DHCP CONNECTION (Dynamic IP Address) A MAC Address is a unique hardware address for devices on a Local Area Network. Enter the MAC Address of the computer that was originally connected to your broadband modem. If the computer you are using was the initial system connected to your broadband modem, simply s[...]
-
Pagina 17
Step 3: Configure Y our Internet Connection At the Set Username and Password Connection (PPTP) Enter: ? PPTP IP Address ? PPTP Subnet Mask ? PPTP Gateway IP Address ? PPTP Server IP Address ? Your Username ? Your Password . ? T o verify your Password , Re-enter it below ? T o continue click Next At the Set Username and Password Connection (L2TP) sc[...]
-
Pagina 18
At the Set Static IP Address Connection Enter: ? IP address ? Subnet Mask ? Gateway Address ? Primary and Secondary DNS Address es ? T o continue click Next Setup Complete ? Click Connect . This will save your settings and reboot the router Version 1.0 Page 18 Alpha Secure Wireless Router 8350 GIGABIT[...]
-
Pagina 19
7.2 WAN: The WAN section will help you choose one of 6 connection types: St atic IP , DHCP , PPPoE, PPTP , L2TP , and BigPond. If you are using the PPPoE option, you will need to remove or disable any PPPoE client software on your computers. If you have any questions about your connection, please contact your Internet Service Provider (ISP). a) Mod[...]
-
Pagina 20
DHCP WAN Mode: ? Enter a Host Name to identify your system to the ISP's server PPPoE WAN Mode: ? Enter the Username and Password you use to gain access to the Internet. ? T o verify your Password , re-enter it below. ? Enter a Service Name (If your ISP requires it). Reconnect Mode ? Always on : The Internet connection is always maintained. ? O[...]
-
Pagina 21
PPTP WAN Mode: ? Enter the PPTP IP Address provided by your ISP . ? Enter the PPTP Subnet Mask provided by your ISP . ? Enter the PPTP Gateway IP Address provided by your ISP . ? Enter the PPTP Server IP Address you are connecting to, also provided by your ISP . ? Enter the Username and Password you use to gain access to the Internet. ? T o verify [...]
-
Pagina 22
L2TP WAN Mode: Enter: ? The L2TP IP Address provided by your ISP . ? The L2TP Subnet Mask provided by your ISP . ? The L2TP Gateway IP Address provided by your ISP . ? The L2TP Server IP Address provided by your ISP . ? Enter the Username and Password you use to gain access to the Internet. ? T o verify your Password , re-enter it below . ? Select [...]
-
Pagina 23
DNS And Advanced Settings: These Options may be used on all WAN Modes: ? If you have the DNS servers provided to you by the ISP , please select the Use these DNS Servers. ? Please enter the Primary DNS Server provided by your ISP . ? Please enter the Secondary DNS Server provided by your IS.P ? Use the Default MTU is enabled by default. ? MTU (Maxi[...]
-
Pagina 24
7.3 LAN Settings: ? IP Address: Enter of the router on the local area network. The local network settings are based on the address assigned here. ? Subnet Mask: Use the of your router on the local area network. ? RIP Announcement is u sed with multiple routers to broadcast routing information. ? Gateway Metric is only used if you have multiple rout[...]
-
Pagina 25
7.4 DHCP: Use this section to configure the built-in DHCP Server to assign IP addresses to the computers on your network. DHCP Settings: T o connect to the LAN and Internet the DHCP Server function will assign your network devices the necessary information and you do not have to manually configure each device on your network with IP settings. The d[...]
-
Pagina 26
Number of Dynamic DHCP Clients: ? This is used to automatically assign IP addresses from a predetermined pool of addresses to computers or devices that requests them shows the number of clients that are receiving an IP address from the router and LAN devices those are leasing IP addresses. ? The Computer Name, MAC Address , and IP Address assigned [...]
-
Pagina 27
8. ADV ANCED: Advanced Options allows you to configure a number of advanced features including ports, application priority , Internet access, filters, and advanced wireless settings. 8.1 Virtual Server: The Virtual Server option allows you to define a single public port on your router for redirection to an internal LAN IP Address and Private LAN po[...]
-
Pagina 28
8.2 Special Applications: The Special Application section is used to open single or multiple ports on your router when the router senses data sent to the Internet on a 'trigger' port or port range. Special ApplicationsRrules apply to all computers on your internal network. Application Level Gateway (ALG) Configurations: Application Level [...]
-
Pagina 29
Add/Edit Special Applications Rule: The Special Application section is used to open single or multiple ports on your router when the router senses data sent to the Internet on a "trigger" port or port range. Special Applications Rules apply to all computers on your internal network. ? Rule Name: Enter to identify the Special Application R[...]
-
Pagina 30
8.3 Gaming: The Gaming option is used to open multiple ports or a range of ports in your router and redirect data through those ports to a single PC on your network. This feature allows you to enter ports in various formats including, Port Ranges (100-50), Individual Ports (80, 68, 888), or Mixed (1020-5000, 689). Add/Edit Game Rule: ? Rule Name: C[...]
-
Pagina 31
® 8.4 StreamEngine Network Optimization: ® This next section will help you configure the StreamEngine Network Optimization. ® StreamEngine T echnology improves your online gaming experience by ensuring that your game traffic is prioritized over other network traffic, such as FTP or Web. For best performance, use the Automatic Classification opti[...]
-
Pagina 32
8.5 Routing: Add/Edit Route: The Routing option allows you to define fixed routes to defined destinations: ? Destination IP: Enter the Destination IP Address that the p ackets will be attempting to access. ? Netmask : Specify which portion of the Destination IP signifies the network trying to be accessed, and which part signifies the packets to whi[...]
-
Pagina 33
8.6 Access Control: The Access Control option allows you to control access in and out of your network. Use this feature to grant access only to approved sites, limit web access based on time or dates, and/or block Internet access for applications like P2P utilities or games. Enabled: By default, the Access Control feature is disabled. When Access C[...]
-
Pagina 34
Step 1: Choose Policy Name: ? Policy Name. Typically , this would be a system name or user name such as "John's Computer." ? Click Next to continue. Step 2: Select Schedule: ? Select the Schedule of times when you want the policy to apply. If you do not see the schedule you need in the list of schedules, Go to the T ools > Schedul[...]
-
Pagina 35
Step 4: Select Filtering Method: ? Apply Web Filter: With this option is enabled, the specified system will only have access to the Web sites listed in the Web filter section. ? Log Internet Access: When this option is enabled, all of the Web sites visited by the specified machine will be logged. ? Filter Ports: When this option is enabled , you ca[...]
-
Pagina 36
8.7 Web Filter: The Web Filter options allows you to set-up a list of allowed Web sites that can be used by multiple users. When Web Filter is enabled, all other Web sites not listed on this page will be blocked. T o use this feature, you must also select the "Apply Web Filter" checkbox in the Access Control section. The Web Filter sectio[...]
-
Pagina 37
8.8 MAC Address Filters: The MAC (Media Access Controller) Address filter option is used to control network access based on the MAC Address of the network adapter . A MAC address is a unique ID assigned by the manufacturer of the network adapter. This feature can be configured to ALLOW or DENY network/Internet access. Filter Settings: When the MAC [...]
-
Pagina 38
8.9 Firewall: The DMZ (Demilitarized Zone) option provides you with an option to set a single computer on your network outside of the router. If you have a computer that cannot run Internet applications successfully from behind the router, then you can place the computer into the DMZ for unrestricted Internet access. Note: Putting a computer in the[...]
-
Pagina 39
8.11 Inbound Filters: The Inbound Filter option is an advanced method of controlling data received from the Internet. With this feature you can configure inbound data filtering rules that control data based on an IP address range. Inbound Filters may be used for limiting access to a server on your network to a system or group of systems. Filter rul[...]
-
Pagina 40
8.12 Schedules: The Schedule configuration option is used to manage schedule rules for various firewall and parental control features. Add/Edit Schedule Rule: ? Enter the Schedule Name. ? T o select the Day(s) Place a checkmark in the boxes for the desired days or select the All Week radio button to select all seven days of the week. ? Select All D[...]
-
Pagina 41
9 TOOLS: 9.1 Admin: The Admin option is used to set a password for access to the W eb-based management. By default there is no password configured. It is highly recommended that you create a password to keep your new router secure. Admin Password To Set Admin Password ? Enter a Password of your choice ? To Verify your Password, re-enter it below Us[...]
-
Pagina 42
USB File Sharing: ? Select Enable Remote Access to USB files to allow the Remote User to access the USB files. ? Select the port that you want the Remote User e.g. 8081 ? Select the USB Access Inbound Filer to allow the Remote user to access files. UPnP: ? Select the Enable UPnP Note: Y ou need to have the UPnP selected for the Router to be able to[...]
-
Pagina 43
9.2 Time: The Time Configuration option allows you to configure, update, and maintain the correct time on the internal system clock. From this section you can set your local time zone and set the Time Server . Daylight Saving Settings can also be configured to automatically adjust the time when needed. Time Configuration: ? Select your local time z[...]
-
Pagina 44
9.3 Print Server Setup: Y our AlphaShield Router includes an integrated print server that allows a printer to be shared between multiple computers on your network. From this page you can select which printing protocols to enable. T o use the shared printer from this computer, follow the setup instructions found at the AlphaShield website . ? Please[...]
-
Pagina 45
9.5 Email: The Email feature can be used to send the system log files, router alert messages, and firmware update notifications to your email address. Email Settings: ? From Email address: Enter the address that will appear as the sender when you receive a log file or firmware upgrade notification via email. ? To Email address: Enter the address wh[...]
-
Pagina 46
9.6 System: The System Settings section allows you to reboot the device or restore the router to the factory default settings. Restoring the unit to the factory default settings will erase all settings including any rules that you've created. System Commands: ? T o restart the router click on Reboot the Device . ? T o restore all configuration[...]
-
Pagina 47
9.7 Firmware: The Firmware Upgrade section can be used to update to the latest firmware code to improve functionality and performance. T o check for the latest firmware, click the Check Online Now for Latest Firmware Version button. If you would like to be notified when new firmware is released, place a checkmark in the box next to Email Notificati[...]
-
Pagina 48
9.8 Dynamic DNS: Dynamic DNS allows you to host a server (Web, FTP , Game Server, etc…) using a domain name that you have purchased (www.whateveryournameis.com) with your dynamically assigned IP address. Most broadband Internet Service Providers assign dynamic (changing) IP addresses. Using a DDNS service provider, your friends can enter in your [...]
-
Pagina 49
10. ST A TUS: The Status items are mainly informational. 10.1 Device Info: General: ? Time option displays the time and date that the router is set to. ? Firmware Version option displays the currently loaded firmware version. WAN: ? Connection Type shows t he Internet connection type that is being used. ? MAC Address is seen over the Internet. ? IP[...]
-
Pagina 50
LAN: ? MAC Address displayed for your local area network. ? IP Address displays the router on your local area network. ? Subnet Mask displays the router on your local area network. ? DHCP Server i ndicates if the router is acting as a DHCP server on the local area network. 10.2 Routing T able: ? A Gateway value of 0.0.0.0 means there is no next hop[...]
-
Pagina 51
10.3 Print Server Status: Y our AlphaShield Router includes an integrated print server that allows a printer to be shared between multiple computers on your network. This page displays status information about the print server and any attached printer. 10.4 Logs: Events are automatically logged (recorded) on your router’s internal memory. When th[...]
-
Pagina 52
10.5 Statistics: Network Traffic St ats: Traffic St atistics: Displays packets passing through your router. Refresh Statistics: Updates the screen with the latest router statistics. Clear Statistics: Clears all of the values on the screen. LAN Statistics: ? Sent shows the number of packets transmitted to the local area network. ? Received shows the[...]
-
Pagina 53
10.6 LAN Port Status: Traffic S tatistics simply displays Receive and Transmit packet s passing through your router. 10.7 Active Sessions: The Active Session page displays the full details of active sessions to your router. Version 1.0 Page 53 Alpha Secure Wireless Router 8350 GIGABIT[...]
-
Pagina 54
10.8 Switch Forwarding: This page displays the full details of Ethernet switching in your router. Version 1.0 Page 54 Alpha Secure Wireless Router 8350 GIGABIT[...]
-
Pagina 55
1 1. GLOSSARY : ® Access Control List - ACL. Database of network devices that are allowed to access resources on the network. Access Point - AP . Device that allows wireless clients to connect to it and access the network Ad-hoc network - Peer-to-Peer network between wireless clients Address Resolution Protocol - ARP . Used to map MAC addresses to[...]
-
Pagina 56
Broadcast – Transmitting data in all directions at once Browser – A program that allows you to access resources on the web and provides them to you graphically Cable modem – A device that allows you to connect a computer up to a coaxial cable and receive Internet access from your Cable provider Card Bus – A newer version of the PC Card or P[...]
-
Pagina 57
DNS – Domain Name System. Translates Domain Names to IP addresses DOCSIS – Data Over Cable Service Interface Specifications . The standard interface for cable modems Domain name – A name that is associated with an IP address Download – T o send a request from one computer to another and have the ?le transmitted back to the requesting comput[...]
-
Pagina 58
Graphical user interface – GUI H.323 – A standard that provides consistency of voice and video transmissions and compatibility for videoconferencing devices Half-duplex – Data cannot be transmitted and received at the same time Hashing – Transforming a string of characters into a shorter string with a prede?ned length Hexadecimal – Charac[...]
-
Pagina 59
IP – Internet Protocol IP address – A 32-bit number, when talking about Internet Protocol V ersion 4, that identifies each computer that transmits data on the Internet or on an Intranet IPsec – Internet Protocol Security IPv6 – Internet Protocol Version 6 uses 128-bit addresses and was developed to solve the problem that we face of running [...]
-
Pagina 60
NAT – Network Address T ranslation allows many private IP addresses to connect to the Internet, or another network, through one IP address NetBEUI – NetBIOS Extended User Interface is a Local Area Network communication protocol. This is an updated version of NetBIOS NetBIOS – Network Basic Input/Output System Netmask – Determines what porti[...]
-
Pagina 61
Repeater – Retransmits the signal of an Access Point in order to extend it’s coverage RIP – Routing Information Protocol is used to synchronize the routing table of all the routers on a network RJ-11 – The most commonly used connection method for telephones RJ-45 – The most commonly used connection method for Ethernet RS-232C – The inte[...]
-
Pagina 62
Unicast – Communication between a single sender and receiver Universal Plug and Play – A standard that allows network devices to discover each other and configure themselves to be a part of the network UPnP – Universal Plug and Play URL – Uniform Resource Locator is a unique address for files accessible on the Internet UTP – Unshielded Tw[...]
-
Pagina 63
12. TECHNICAL SPECIFICA TIONS: Internal Dual Processing Dedicated 250 MHz High Speed Network Processor Ip3023 Dedicated High Speed Multi-Port Gigabit Switch & Co-Processor Sp arX-5 Hardware Interfaces 5 x 10/100/1000 Auto-Sensing Gigabit Ethernet LAN Ports MDI/MDI-X 1 x 10/100 Auto-Sensing Fast Ethernet WAN Port MDI/MDI-X 4 x Universal Serial B[...]
-
Pagina 64
13. SUPPORT : 13.1 100% Unhackable or Money Back Guarantee: If the original purchaser can prove that he or she was hacked while using a properly installed Alpha Router, with AlphaGAP T echnology enabled, AlphaShield Inc. will accept the return of the product and provide a full refund (with proof of purchase) or replace the product at AlphaShield&ap[...]
-
Pagina 65
13.3 Service and Repairs: In case the Alpha Router device is found to be defective, the Manufacturer will be obligated only to replace or repair the defective product provided that the following is determined: ? The product has not been altered or repaired without the written consent of the Manufacturer. ? The product has not failed due to misuse, [...]
-
Pagina 66
13.5 Copyright: Information in this User Manual and all AlphaShield Inc.'s literature, including URLs and other Internet Website references, is subject to change without notice. The entire risk of the use or the results of the use of this document, with its terms and conditions, remains with the user . Complying with all applicable copyright l[...]
-
Pagina 67
13.10 Customer Remedies: Any liability of AlphaShield Inc., with respect to software or hardware or the performance thereof or defects therein, under any warranty , negligence, strict liability or other theory, will be limited exclusively to product replacement or , if replacement is inadequate as a remedy or, in AlphaShield Inc.'s opinion, im[...]
-
Pagina 68
14. IMPORT ANT NOTICES: 14.1 FCC Statement: ? Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. ? Consult the dealer or an experienced radio/TV technician for help. 14.2 FCC Caution: This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) T[...]
-
Pagina 69
14.4 IC Statement: Operation is subject to the following two conditions: 1) This device may not cause interference and; 2) This device must accept any interference, including interference that may cause undesired operation of the device. This device has been designed to operate with an antenna having a maximum gain of 7dBi. An antenna having a high[...]