Leviton Internet Gateway manual

1
2
3
4
5
6
7
8
9
10

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Leviton Internet Gateway, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Leviton Internet Gateway one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Leviton Internet Gateway. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Leviton Internet Gateway should contain:
- informations concerning technical data of Leviton Internet Gateway
- name of the manufacturer and a year of construction of the Leviton Internet Gateway item
- rules of operation, control and maintenance of the Leviton Internet Gateway item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Leviton Internet Gateway alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Leviton Internet Gateway, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Leviton service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Leviton Internet Gateway.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Leviton Internet Gateway item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    10/100Mbps 4-P or t Inter net Gatew a y DESCRIPTION Leviton’s 1 0/1 00Mbps 4-Port Internet Gateway allows multiple users to utilize a single, secure, high-speed broadband (DSL and cable) Internet connection and creates a private network for home, small office or school environments. Chapters 1: Introduction 2: Hardw are Installation 3: Configurat[...]

  • Page 2

    Environmental Specifications Dimensions: 2.5˝H x 6.5W˝ x 3.27˝D Po we r: 12VDC@1000mA Emissions: FCC ClassB Operating T emperature: 0°C to 50°C (32°F to 122°F) Storage T emperature: -40°C to 70°C (-40°F to 158°F) Operating Humidity: 20% to 95% relative humidity , non-condensing Storage Humidity: 20% to 95% relative humidity , non-condens[...]

  • Page 3

    4. In the Configuration window , select the TCP/IP protocol line that has been associated with your network card or adapter . (Figure 33) 5. Click Proper ties button, then choose IP Address tab. Select Obtain an IP address automatically . Press OK. Y ou have completed the client settings. (Figure 34) NOTE: Windows may ask you for original Windows i[...]

  • Page 4

    3. Click the “ Apply” button. W AN MA C Clone (F igure 31) Enter the MAC Address if your ISP allows access of one specific PC’ s Ethernet MAC address. Click Restore MAC Address to return to the default setting. DDNS Setting Setting the Dynamic DNS allows others to access your FTP or Web service on your computer using DNS- like address. DDNS S[...]

  • Page 5

    THE SETUP WIZARD The Gatew ay's Setup Wizard will guide you step by step to configure network. Please follow the instructions as the wizard's pages request and change the settings in accordance to the infor mation provided b y your ISP . If you use a DSL modem for broadband access, please go to the sectioned titled "PPPoE Connection [...]

  • Page 6

    Name: Enter the desired name in the column. Status: Choose Enabled to enable it or Disabled to ignore. IP Address: Set IP addresses to be detected by users. W AN Address: If more than one Alias Address is set in section 3.2.5 the Alias IP Setup, you can get multiple W AN IP addresses to choose. The following screen will appear with a pull-down colu[...]

  • Page 7

    PPTP For W AN (F igure 9) 1. Choose “YES” and "PPTP" when prompted with this screen: 2. Click “Next”. On the next screen, enter the infor mation for PPTP Account, PPTP Password, and Host Name. Using the information provided by your ISP , enter the information for “My IP Address” and ”My Subnet Mask”. (Figure 10) Dynamic IP[...]

  • Page 8

    F irew all Setting (F igure 27) NA T allows all of the computers on your network to use one IP address. Hacker Attack Protect k eeps your network awa y from hacker attacking. Block Hacker Scan is used to hide the Gate way so that the hack ers won’t find it on the network. Remote Management makes you able to manage the Gate way from Internet. DMZ [...]

  • Page 9

    Backup (Figure 24) Y ou can save and restore the current configuration file to your computer . Setup the Advanced Features Once you’ ve configured the basic settings discussed in section 3.2, you may move to the settings of Advanced Features. In this section, we’ ll explain the setting of LAN IP ,D H C P ,F irew all, Privilege, V ir tual Ser ve[...]

  • Page 10

    3.4 VIEWING THE TOOLS Sy stem Log (F igure 20) Y ou can acquire the information of the system in this screen, including the time, the type and the message. Hacker Log (Figure 21) Y ou can detect the intrusion from this screen. This screen shows the infor mation of the unauthorized access request to your network. Reset (Figure 22) Yo u have two opti[...]