EnGenius Technologies 1.2 инструкция обслуживания

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47

Идти на страницу of

Хорошее руководство по эксплуатации

Законодательство обязывает продавца передать покупателю, вместе с товаром, руководство по эксплуатации EnGenius Technologies 1.2. Отсутствие инструкции либо неправильная информация, переданная потребителю, составляют основание для рекламации в связи с несоответствием устройства с договором. В законодательстве допускается предоставлении руководства в другой, чем бумажная форме, что, в последнее время, часто используется, предоставляя графическую или электронную форму инструкции EnGenius Technologies 1.2 или обучающее видео для пользователей. Условием остается четкая и понятная форма.

Что такое руководство?

Слово происходит от латинского "instructio", тоесть привести в порядок. Следовательно в инструкции EnGenius Technologies 1.2 можно найти описание этапов поведения. Цель инструкции заключается в облегчении запуска, использования оборудования либо выполнения определенной деятельности. Инструкция является набором информации о предмете/услуге, подсказкой.

К сожалению немного пользователей находит время для чтения инструкций EnGenius Technologies 1.2, и хорошая инструкция позволяет не только узнать ряд дополнительных функций приобретенного устройства, но и позволяет избежать возникновения большинства поломок.

Из чего должно состоять идеальное руководство по эксплуатации?

Прежде всего в инструкции EnGenius Technologies 1.2 должна находится:
- информация относительно технических данных устройства EnGenius Technologies 1.2
- название производителя и год производства оборудования EnGenius Technologies 1.2
- правила обслуживания, настройки и ухода за оборудованием EnGenius Technologies 1.2
- знаки безопасности и сертификаты, подтверждающие соответствие стандартам

Почему мы не читаем инструкций?

Как правило из-за нехватки времени и уверенности в отдельных функциональностях приобретенных устройств. К сожалению само подсоединение и запуск EnGenius Technologies 1.2 это слишком мало. Инструкция заключает ряд отдельных указаний, касающихся функциональности, принципов безопасности, способов ухода (даже то, какие средства стоит использовать), возможных поломок EnGenius Technologies 1.2 и способов решения проблем, возникающих во время использования. И наконец то, в инструкции можно найти адресные данные сайта EnGenius Technologies, в случае отсутствия эффективности предлагаемых решений. Сейчас очень большой популярностью пользуются инструкции в форме интересных анимаций или видео материалов, которое лучше, чем брошюра воспринимаются пользователем. Такой вид инструкции позволяет пользователю просмотреть весь фильм, не пропуская спецификацию и сложные технические описания EnGenius Technologies 1.2, как это часто бывает в случае бумажной версии.

Почему стоит читать инструкции?

Прежде всего здесь мы найдем ответы касательно конструкции, возможностей устройства EnGenius Technologies 1.2, использования отдельных аксессуаров и ряд информации, позволяющей вполне использовать все функции и упрощения.

После удачной покупки оборудования/устройства стоит посвятить несколько минут для ознакомления с каждой частью инструкции EnGenius Technologies 1.2. Сейчас их старательно готовят или переводят, чтобы они были не только понятными для пользователя, но и чтобы выполняли свою основную информационно-поддерживающую функцию.

Содержание руководства

  • Страница 1

    1 1 1b/g W i reless SOHO Router User ’ s Manual V ersion: 1.2[...]

  • Страница 2

    2 T able of Content s 1 INTRODUCTIO N.. ......... ......... ........... .......... ......... ......... ......... ......... ......... ......... ........... ......... .......... ...5 1.1 F EATURES & B ENEFITS ........ ......... ......... ......... ............ ......... ......... ......... ......... ......... ......... ......5 1.2 P AC KAGE C ONT[...]

  • Страница 3

    3 3.5.6 DMZ ......... ......... ........... ......... ......... .......... ......... ......... ......... ......... ........... ......... ......... .......... .44 APPENDIX A – SP ECIFI CA TIONS..... ......... ......... ......... ........... ......... ......... .......... ......... ......... ......... ........45 APPENDIX B – FCC INTE RFERENCE ST [...]

  • Страница 4

    4 Revision History V ersi on Date Notes 1.0 Jul 10, 2008 Initial V ersion 1.1 Aug 6, 2008 1.2 Aug 1 1, 2008[...]

  • Страница 5

    5 1 Introduction The Wireless SOHO Router operates sea m lessly in t he 2.4 GHz fr equency spectru m supporting the 802.1 1b (2.4GHz, 1 1Mbp s) and the newer , faster 802.1 1g (2.4GHz, 54Mbpsw ireless stan dard. High output powe r and high sensitivity can ex te nd range and coverage to reduce the roaming between APs to get m ore stabi lity wir eles[...]

  • Страница 6

    6 Package Contents Open the package carefully , and make sure th at none of t he items listed below are missing. Do not discard the pac king materials, in case of return; the unit m ust be shipped in its o riginal pac kage. h One W ireless SO HO Router h One Power Ada pter h One CAT5 UTP Cable h One CD-ROM w ith User’s Manual a nd Install W izar [...]

  • Страница 7

    7 socket on the wall, and t he DC inlet into t he DC c onnector . Connection / A ctiv ity LED This LED will light up once an Ethernet cable is c onnected to one of the LAN ports or the WAN port. WAN LED This LED will light up once an Ethernet cable is c onnected to WAN (Internet) port. WLAN LED This LED will light up once the RF (wireless LAN) f ea[...]

  • Страница 8

    8 Network Configurati on To be tter understand how the wireless L AN p roducts work toge ther to create a wireless network, it mi ght be helpful to dep ict a few of the possible wireless LAN PC card network con fig uration s. The wireless LAN products can be configured as: a) Ad-hoc (or peer-to-peer ) for department al or SOHO L ANs. b) Infrastruct[...]

  • Страница 9

    9 2 Understanding t he Hardw are Hardware Installat ion 1. Place the unit in an appropr iate location afte r conducting a site su rvey. 2. Plug o ne end o f the Ethernet cable into the LAN port o f the dev ice and another e nd into y our PC/Notebook. 3. Plug one e nd of another Ethernet cable to WAN port of the d evice and the other end into y ou c[...]

  • Страница 10

    10 2. Select Internet Protocol ( TCP/IP) a nd then click o n th e Properties b utton. This will allow you to con figure the T CP/IP settings of y our PC/Notebook . 3. Select Use the following IP Address radio button and then enter the I P address and s ubnet m ask. Ensure that t he IP a ddress and subnet m as k are on the same subnet as th e device[...]

  • Страница 11

    1 1  After logging in you will graphical user interface (GUI) of the device. The navigation drop-down menu on left is divided into four main sections: 1. Managemen t : This menu includes the administrato r settings, advanced wireless settings such as wireless MAC clone and RTS/frag m entation threshol d. Also included are other sy stem rela ted [...]

  • Страница 12

    12 Status  Click on t he Status link under the M anageme nt menu. The device status page is also displayed o nce you have logged in. This includ es details about the system uptime and firmware, LAN IP address and MAC address and the wireless settings such as the radio status, MAC address, SSID, R F channel, as we ll as WAN setti ngs.[...]

  • Страница 13

    13 Statistics  Click on the Statistics link on the navigation drop-down menu. This page displays the trans m itted and r eceived packet s tatistics of the wired and wireless interface. Click on the R efresh button to refresh the statis tics. Dynamic DNS  Click on the D DNS link on the navigation drop-down menu. This feature allows y o u to ma[...]

  • Страница 14

    14 Time Zone Setting  Click on the T ime Zone Setting link i n the n avigation m enu. This feature allows you to configure, update, and m aintain the correct time on t he device’s internal syste m clock as well as configure the time zone. The date a nd t ime of the device can be configured m anua lly or by sy nchr onizing with a time serve r. [...]

  • Страница 15

    15 Denial of Service (DoS)  Click on the Denial of Service li nk in the navigation me nu . T his is a s ecurity f eatu re that blocks in trusions from th e Internet that may disrupt the n etwork service .  Enable DoS protection : Place a check in this b ox to en able the D oS fe atures. You may also enable the othe r DoS protection features l[...]

  • Страница 16

    16 Log  Click on the Log link on the navigation drop-do wn menu. Logs display a list of events that are triggered on the Ethernet and W ireless interface. This log can be referred when an unknown error o ccurs on the sy s tem or w hen a report nee ds to be se nt to the technica l support depart ment for debugging purposes.  Enable L og : Pla [...]

  • Страница 17

    17 Upgrade Firmware  Click on the Upgra de Firmware link on the navigation d rop-down menu. Thi s page allows yo u t o upgrad e the f irmware of the device in order to improve the functionality and perfor mance.  Ensure t hat y ou have downloaded the app r opriate firmware fro m the vendor’s website. C onnect the device to your PC u sing an[...]

  • Страница 18

    18 Restore the Confi guration from a File  Click o n the Sa ve / Reload Settings l ink on t he navigation drop-down m enu. This option a llows you to restore a backup configuratio n from a file to t he device. C lick on the Browse bu tton to select the file and then clic k on Upload butt on.  A page indicating the r eloading process will be d[...]

  • Страница 19

    19 A dmini strator Settings  Click on the Password link on the navigation drop-down menu. This page allows you to configure th e password to acc ess this device from the web-br owser. Note : The de fault user name a nd password of t he device is adm in  User Name : Spe cify a user na me that will be used to connect to the device.  New Pass[...]

  • Страница 20

    20 L A N Settin gs – Static IP  Click on the LAN Interface link on the navigation drop-down m enu. This f eature allows y ou to co nfigu re the LAN interface using a static IP address or as a DHCP server/client . This IP addres s is also used to ac cess the web-base d interface.  IP Address: Enter an IP ad dress for this device .  Subnet[...]

  • Страница 21

    21 L A N Settin gs – DHC P Client  Click o n the LAN l ink on the navigation drop-down m enu . This feature a llows y ou to configure t he LAN interface using a static IP address or as a DHCP server/client. This IP addr ess is also used to access the web-ba sed interface.  DHCP: If you select DHCP , you are not required to enter the rest of[...]

  • Страница 22

    22 L A N Settin gs – DHC P Server  Click o n the LAN l ink on the navigation drop-down m enu . This feature a llows y ou to configure t he LAN interface using a static IP address or as a DHCP server/client. DHCP s tands for Dyna m ic Host Configu ration Prot ocol. The DHCP sec tion is w here you confi gure the built-in DHCP Server to assign IP[...]

  • Страница 23

    23 W A N Setti ngs – Static IP  Click on the WA N lin k on the navigation drop -down menu. This fe ature allows you to configure the W AN interface usi ng a static IP add ress, DHCP Client , PPoE, or PPTP.  WAN A ccess T ype: Sele ct Static IP fro m the d rop-down list. T his type of connec tio n is used when your ISP has provided you a d e[...]

  • Страница 24

    24  Enable I Psec pass through on VPN connection : Place a check in this box to enable the pass through of P PTP packets on a VPN connection.  Enable I Psec pass through on VPN connection : Place a check in this box to enable the pass through of L2TP packets on a V PN connection.  Click on the A pply Change s to save the cha nges. W A N Se[...]

  • Страница 25

    25  Enable uPNP : Place a check in this box to enable UPnP. It is reco m mended to enable this feat ure as it’s used by several applica tions.  Enable PING Access on WAN : Place a check in this box if y ou would like the devi ce to be pinged fr om the W AN side (ISP).  Enable Web Sever A cces s on W AN : Place a check in this box if the [...]

  • Страница 26

    26  Connection Type: Select Continuous (alway s online), Connect on D emand (connect to the ISP only when you click on a website), or Manual (conn ect to the ISP only when y ou click on a ‘ Co nnect ’ button) fro m the drop-down list.  Idle T ime: The PPPoE service can auto m atically d isconnect if the connection is idle. Specify the num[...]

  • Страница 27

    27  WAN A c cess Ty pe: Sele ct PPTP from th e drop-down list. This type of connection is used when y our ISP has provided you a dedicated IP address.  IP Address: Enter an IP ad dress for this device , which is assigned by y our ISP.  Subnet Mask: Enter t he subnet mask for this I P a ddress, which is a ssigne d by y our ISP.  Default [...]

  • Страница 28

    28 Wireless  Click on the TCP/IP Settings link on t he navigation d rop-down m enu. You w ill then see five options. Basic Settings, Advanced Settings, Security , Access Control, a nd WDS Settings. Each o ption is described below. Wireless Basic Se tting s  Click on the Basic Se ttings link on the navigation drop-dow n menu. These options all[...]

  • Страница 29

    29  Show A ctive Cli ents : Click on this button to view a list of clients that are associated with this device .  Click on the A pply Change s to save the cha nges. Wireless A dvanced Settings  Click on the Advanced S ettings link on the navigation drop-down m enu. These options allow you to con figure the authen tication ty pe, fragment [...]

  • Страница 30

    30  Beacon Interval : Beacons are packets sent b y a wireless A ccess Point t o synchronize wireless d evices. Specify a Beacon Period value between 20 and 1 024. The default v alu e is set to 100 m illiseconds.  Data Rate : Select a trans mission rate fro m t he drop-down list. It is re co mmended to use the auto option.  Preamble Type: S[...]

  • Страница 31

    31 Wireless Security  To protect your privacy this mode supports several types of wireless security : W EP WPA, W PA2, and W PA-Mixed. WEP is t he original wireless encry ption standard. WPA provides a high er level of security. The following section describes the security configuration i n detail. Wireless Security - Disabled .  Encryption :[...]

  • Страница 32

    32  Encryption : Select W EP f rom the drop-down list in order to enable W EP s ecurity and then clic k on the Set W EP key button. .  Key Length : Select a 64-bit o r 128-bit W EP key length from the dro p-down list.  Key Forma t: Select a key fo rmat such as HEX or ASCII from th e drop-down lis t.  Encryption Key: You may use up t o f[...]

  • Страница 33

    33 Wireless Security – WP A / WP A 2-Mixed  Select WPA o r WPA2-Mixed fro m the drop-down list if your wireless network uses WPA encry ption. WPA (Wi-Fi Protected Acce ss) was designed to improve upon t he security f eatures of W E P ( W ired Eq uivalent Privacy ). The techn ology is des igned to work with existing Wi-Fi produc ts that have b [...]

  • Страница 34

    34  Click on the A pply Change s to save the chan ges. Wireless A ccess Control  Click on the Access Control link on t he navigation drop-down me nu. The MAC address filter section can be used t o filter network access by m achines b ased on t he unique M AC add resses of thei r netwo rk adapter (s). It is m ost u seful t o prevent unauthoriz[...]

  • Страница 35

    35 WDS (Wireless Di stribution Sys tem) Click on the WD S link on the navigation d rop-down m enu. The W ireless D istributio n System feature configures this device as a repeate r and therefore extends the range/cove r age a rea of the wireless network.  Enable WDS : W hen WD S is en abled, this access point functions as a w ireless repeater an[...]

  • Страница 36

    36 WDS Security  Click on the Set Security button to configure one of the security o ptions for the W DS. Options available are W EP, W P A and W PA2, and you must c on fig ure the same security setting on each Access Point linked w ith this one. WDS Security - None  Encryption : Select None from the drop-down list in orde r to disable wirele[...]

  • Страница 37

    37  Encryption : Se lect a 64-bit o r 128-bit WEP encry ption fro m the drop -down list.  Key Forma t: Select a key fo rmat such as HEX or ASCII from th e drop-down lis t.  WEP Key: Specif y the WEP key  Click on the Apply Changes to save the changes and then click on the Close button. WDS Security – WP A (TKIP), WP A 2 (A ES )  Se[...]

  • Страница 38

    38  Encryption : Select a W PA or WPA 2 encry ption fro m the drop-down li st. The encry pti on algorithm used to secure th e data comm unic ation. TKIP ( Te mporal Key Integrity Protocol) provides p er-pac ket k ey generation and is based o n WEP. AES (Advanced Encryption Standard) is a very secure block b ased en cryp tion. No te tha t, if the[...]

  • Страница 39

    39 Firewall  Click on the F irewall lin k on the navigation drop-down menu. You will then see six options. Port filtering, IP filtering, MAC filtering, Port filtering, URL f iltering, DMZ. Each option is described below. Port Filtering  Select Port Filtering from the drop-down list This feature is used to r estrict certain types of da ta p ac[...]

  • Страница 40

    40  You m ay place a check in the b ox on under t he Select column and then click on Delete Selected to re m ove t he selected entry . You may also click on Delete All to delete all the fil tering entries. IP Filtering  Select IP Filtering from the drop-down list. This feature is used to restric t certain IP address from using ce rtain protoc[...]

  • Страница 41

    41 MAC Filtering  Select MAC Filtering fr om the drop -down list. This feature is used to r estrict certain MAC address from accessing the Internet. These filters can be used for securing and restricting y our network.  Enable MA C Filtering: Place a check in this box to enable this feature.  MAC A ddress: Enter the MAC address of the dev [...]

  • Страница 42

    42 Port Forwarding  Select Port For w arding from the drop-down lis t. This fe ature is used to automatically r edirect common network services to a specific m achine behind the NAT f irewa ll. These settings are only necessary if you wish t o host some sort of server like a web server or email server on the private local network b ehind the NAT[...]

  • Страница 43

    43 URL Filtering  Select URL Filtering from the drop-down l ist. T his is a type of pa rental control feature used to restrict certain websites for m being accessed through y our network. These filters ca n be used fo r securing and restr icting your ne twork.  Enable URL Filtering: Place a check in this box to enable this featu re.  URL A[...]

  • Страница 44

    44 DMZ  Select DMZ fro m the drop-do wn lis t. A demilitarized zone i s u sed to provide Internet services without sacrificing unauthorized access to its local private network. Typically, the DMZ host contai ns devices accessib le to Internet t raffic, such as web, FTP, email an d DNS servers.  Enable DMZ: Place a che ck in this box to ena bl[...]

  • Страница 45

    45 Appendix A – Sp ecific ations St andards IEEE802.1 1b/g, IEEE802.1x , IEEE8 02.3, IEEE802.3u Wi-Fi data speed IEEE 802.1 1b: 1 1 /5.5/2/1Mbps IEEE 802.1 1g: 54/48 /36/24/18/12/9/6Mbps Compatibility IEEE 802.1 1g/ IEEE 802.1 1b Power Requirements Power Supply: 90 to 240 VDC 10 (depends on different countries) Device: 12 V/ 1.3A St atus LEDs 4*L[...]

  • Страница 46

    46 Appendix B – FCC Interference Statement Federal Communication Commission Inter ference St atement This equipment has been test ed and f ound to c omply w ith the limits for a Class B digital device, purs uant t o Part 15 of t he FCC R ules. These limits are designed to prov ide reasonable protection against harmful int erference i n a res iden[...]

  • Страница 47

    47 Industr y Ca nada statement: This de vice c omplies with RSS- 210 of the I ndustry Ca nada R ules. Operatio n is subject to the following t wo conditions : (1) This d evice may no t cause harmful i nterf erence, and ( 2) this d evice must accept any interferenc e received, including interf erence that ma y cause undesire d operation. IMPORT ANT [...]