Buffalo HighPower N300 Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Buffalo HighPower N300 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Buffalo HighPower N300, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Buffalo HighPower N300 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Buffalo HighPower N300. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung Buffalo HighPower N300 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Buffalo HighPower N300
- Den Namen des Produzenten und das Produktionsjahr des Geräts Buffalo HighPower N300
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Buffalo HighPower N300
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Buffalo HighPower N300 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Buffalo HighPower N300 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Buffalo finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Buffalo HighPower N300 zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Buffalo HighPower N300, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Buffalo HighPower N300 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    User Manual for Professional Firmware AirStation NFINITI HighPower Router and AccessPoint WHR-300HP AirStation NFINITI HighPower Router and AccessPoint WZR-300HP AirStation NFINITI HighPower Router and AccessPoint WZR-600DHP www.buffalotech.com[...]

  • Seite 2

    - 1 - 1. Introduction 3 1.1. Welcome 3 1.2. Device Configuration 3 1.2.1. Factory Settings 3 1.2.2. Initial Operation 3 2. Configuration via the Web Interface 4 2.1. Preparation 4 2.2. Web Interface Access 4 2.3. Web Interface Structure 5 2.3.1. Setup 6 2.3.1.1. Basic Configuration 6 2.3.1.2. Dynamic DNS (DynDNS or DDNS) 7 2.3.1.3. MAC Address Clon[...]

  • Seite 3

    - 2 - 2.3.8.5. Bandwidth 18 2.3.8.6. SysInfo 18 3. Use Cases 19 3.1. Access Point 19 3.1.1. Access Point with NAT / DHCP 19 3.1.1. Access Point attached to a network / Internet gateway 20 3.2. Wireless Client 21 3.3. Wireless Client Bridge 22 3.4. FTP Server 23 3.4.1. Examples 23 3.4.2. Logging into the FTP server 25 3.4.3. Common FTP commands 25 3[...]

  • Seite 4

    - 3 - 1. Introduction 1.1. Welcome This AirStation wireless router comes with two different firmware packages. You may use either the dd-wrt-based Professional firmware or the simple User-friendly firmware. By default, the Professional firmware is preinstalled for US/EU products, and the User-friendly firmware is preinstalled for Asia-Pacific produ[...]

  • Seite 5

    - 4 - 2. Configuration via the Web Interface The router contains an integrated web server that provides an easy to use web interface. It allows configuration, administration, and status checking in a simple but effective way. The web interface was successfully tested on the following browsers: - Internet Explorer 7.x and newer versions - Firefox 2.[...]

  • Seite 6

    - 5 - 2.3. Web Interface Structure[...]

  • Seite 7

    - 6 - 2.3.1. Setup 2.3.1.1. Basic Configuration Setup Information The SSID, wireless passphrase, IP address, username, and password that were set for the AirStation are displayed. Clicking [Run Initial Setup Wizard] opens the "Setup Assistant" screen. Follow the on-screen instructions to make the initial settings for the AirStation. Click[...]

  • Seite 8

    - 7 - Network Setup Network Setup configures the router’s basic settings to match the local network. By default these settings are valid for all network ports except the WAN because they are all attached to the default bridge. If ports are disassociated from the bridge they will have different settings. 2.3.1.2. Dynamic DNS (DynDNS or DDNS) Dynam[...]

  • Seite 9

    - 8 - Static Routing The Static Routing section lets you add static routes. The input parameters are equivalent to the parameters of the Linux command “route”. 2.3.1.5. Networking The Networking section allows detailed network configuration. VLAN Tagging Use this option to configure VLAN tagging. Bridging By default, one bridge (br0) is defined[...]

  • Seite 10

    - 9 - Modus Description AP WLAN Access Point mode (default) Client WLAN Client mode Client-Bridge Client-Bridge mode allows connecting to another Wireless LAN access point and establishing a network bridge with that access point Adhoc Adhoc operating mode, required for building mesh networks WDS Station WDS Station is the client in a WDS-AP <-&g[...]

  • Seite 11

    - 10 - Wireless Channel (AP only) Set the desired wireless channel, or let the router choose a free channel automatically. If the router is in classic WDS (MAC address based) mode, then the wireless channel must be selected manually. Wireless Network Name (SSID) The name of the wireless network the radio transmits or connects to (depending on the w[...]

  • Seite 12

    - 11 - Key length Description 64 Bit (10 Hexadecimal characters) Standard 128 Bit (26 Hexadecimal characters) With WPA or WPA2 encryption, there are several encryption algorithms to choose from. AES is more secure but TKIP is more widely supported. There is also a TKIP + AES setting, but that does not offer more security than TKIP. Algorithm Descri[...]

  • Seite 13

    - 12 - Start AOSS Negotiation To initiate AOSS, either click the AOSS button in the GUI or hold down the AOSS button on the front of the router for 3 seconds. Security Modes You may choose which security modes are offered in the AOSS negotiation process. The use of WEP in general is not recommended due to security concerns. WPS Button Enables the W[...]

  • Seite 14

    - 13 - 2.3.3. Services 2.3.3.1. Services The services section allows the configuration of basic service settings. Telnet and SSH can be configured this way. Remote access options are configured in the Administration section. Available DHCP Server Domains Description WAN Standard LAN / WLAN Rflow / MACupd Interface Options Description LAN & WLAN[...]

  • Seite 15

    - 14 - PPTP When defining the PPTP server’s IP range, avoid overlap with the range of IP addresses handed out by DHCP if DHCP is enabled. The IP range is defined using the following syntax: xxx.xxx.xxx.<start-ip>-<end-ip> for example 192.168.1.20-30 Enter client login data follows: <username> * <password> * for example tes[...]

  • Seite 16

    - 15 - Be careful enabling anonymous login. If anonymous login is enabled, everyone accessing your network has permission to read and write data. 2.3.3.7. Hotspot Most hotspot software requires a server to store user settings and login information. Please note that Sputnik is a commercial hotspot service that requires an agreement with Sputnik for [...]

  • Seite 17

    - 16 - 2.3.6.2. Port Range Forwarding Port range forwarding works similarly to port forwarding. Unlike port forwarding, instead of a single port, a range of ports is forwarded to the same range of ports at the internal target IP address. 2.3.6.3. Port Triggering Port triggering is a kind of port range forwarding where outgoing traffic on specific p[...]

  • Seite 18

    - 17 - 2.3.7.2. Keep Alive Keep-Alive lets you configure monitoring options that automatically reboot the router if a service malfunction causes it to fail to respond. 2.3.7.3. Commands Entering Linux commands is one of the most powerful ways to access the router’s functionality. This enables you to access services and configure options that are [...]

  • Seite 19

    - 18 - 2.3.8.3. LAN Here you can find LAN-related information like active clients and DHCP clients. 2.3.8.4. Wireless The wireless LAN status screen displays the current wireless LAN interface configuration, wireless LAN clients (in AP modes), and access points (in client modes). If there’s more than one wireless LAN interface, you can switch bet[...]

  • Seite 20

    - 19 - 3. Use Cases The following use cases relate to the most commonly used router configurations. The related router configuration is explained step by step. 3.1. Access Point Access Point (AP, sometimes also called “Infrastructure Mode”) is the mode where the router is also the central wireless hub that connects to the LAN and provides acces[...]

  • Seite 21

    - 20 -  Configure “Wireless Mode“ to “AP“  Set your desired wireless mode in “Wireless Network Mode“. Please note that mixed modes will lead to reduced performance because of maintaining compatibility.  Enter a name for your wireless network into “Wireless Network Name (SSID)”  Click “Save“ Wireless -> Wireless Se[...]

  • Seite 22

    - 21 - 3.2. Wireless Client The router can be also used as a wireless LAN client. This can be useful if you want to connect devices to your wireless LAN that do not have a wireless LAN interface. In this configuration, the wireless LAN interface acts as a wireless client. Attached wired Ethernet devices can also access the WAN through the wireless [...]

  • Seite 23

    - 22 - Wireless -> Wireless Security  Configure the security mode to match the security settings of the access point you want to connect to.  Click “Apply Settings“. After the router reboots, please confirm that it has connected to the access point. If there is a DHCP server available on the access point side, and the router is configu[...]

  • Seite 24

    - 23 - Wireless -> Basic Settings  Configure “Wireless Mode” to “Client Bridge”.  Set “Wireless Network Mode” to match the access point you want to connect to.  Enter the network name (SSID) of the AP you want to connect to.  Click “Save”. Wireless -> Wireless Security  Configure security to match the security s[...]

  • Seite 25

    - 24 - ・ Connect a USB disk to the router. After a short wait, the disk information is displayed in the Disk Info section. Services -> NAS ・ Make the settings in the ProFTPD section, and click [Apply Settings]. Setting example: ProFTPD Enable Server Port 21 Files Directory /mnt Allow Write Enable User Password List buffalo 12345678 Anonymous[...]

  • Seite 26

    - 25 - 3.4.2. Logging into the FTP server ・ Open a command prompt window. ・ Enter “ftp 192.168.11.1” to access the FTP server. ・ Enter the user name, and press the Enter key. ・ Enter the password, and press the Enter key. ・ When the login is successful, “ftp>” appears on the screen. ・ To logout, enter the “bye” command. 3[...]

  • Seite 27

    - 26 - delete Deletes a file on the remote computer delete test1.jpg mdelete Deletes multiple files on the remote computer mdelete test1.jpg test2.jpg test3.jpg rename Renames a file on the remote computer rename test1.jpg new1.jpg help Displays the Help for FTP commands help bye Exits FTP bye 3.5. Changing Firmware To change between the profession[...]

  • Seite 28

    - 27 - User-friendly firmware update screen:[...]

  • Seite 29

    - 28 - 4. GPL Statement The firmware that is used in this product includes software that is subject to the GNU Public Licence (GPL)/the GNU Lesser Public Licence (LGPL). To the extent that it is applicable within the context of the GPL and the LGPL, the conditions of the GPL and the LGPL, as well as the relevant source codes, are available from the[...]

  • Seite 30

    - 29 - software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations. Finally, any free program is threatened constantly by software patents. We wish to avoid the danger [...]

  • Seite 31

    - 30 - thereof, to be licensed as a whole at no charge to all third parties under the terms of this License. c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright noti[...]

  • Seite 32

    - 31 - The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a spec[...]

  • Seite 33

    - 32 - apply and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is im[...]

  • Seite 34

    - 33 - PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRI[...]