LevelOne FBR-1409TX Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung LevelOne FBR-1409TX an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von LevelOne FBR-1409TX, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung LevelOne FBR-1409TX die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung LevelOne FBR-1409TX. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung LevelOne FBR-1409TX sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts LevelOne FBR-1409TX
- Den Namen des Produzenten und das Produktionsjahr des Geräts LevelOne FBR-1409TX
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts LevelOne FBR-1409TX
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von LevelOne FBR-1409TX zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von LevelOne FBR-1409TX und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service LevelOne finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von LevelOne FBR-1409TX zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts LevelOne FBR-1409TX, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von LevelOne FBR-1409TX widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    1 LevelOne FBR -1409TX Broadband R outer w/VPN/Printer Server User`s Manual[...]

  • Seite 2

    2 Copyright The contents of this publi cation ma y not be rep roduced in any pa rt or as a whole, stored , transcribed i n an information retrieval system, translated into an y language, or tran smitted in any form or by any means, mechanical , magnetic , electronic, optical, phot ocopying, manual, or otherwi se, without t he prior written permissi[...]

  • Seite 3

    3 T able of Contents Chapter 1 Introduction .............................................................................. 1 Functions and Features ........................................................................ 1 Packing List ......................................................................................... 3 Chapter 2 Hardware Ins[...]

  • Seite 4

    4 4.7.6 Schedule Rule ........................................................................... 56 4.8 T oolbox ........................................................................................ 60 4.8.1 System Log ............................................................................... 61 4.8.2 Firmware Upgrade .....................[...]

  • Seite 5

    1 Chapter 1 Introduction Congratulations on your purchase of this outstanding Lev elOne FBR-1409TX Broadband Rou ter . Th is product is s pecifically desi gned for Sm all Of fice and Hom e Office nee ds. It provi des a com plete SOHO solution for Internet surfi ng and of fice resources shar ing, and it is easy to co nfigure and operate for even non[...]

  • Seite 6

    2 product can sen se the application typ e and open multi-port tunn el fo r it. z DMZ Host suppor ted Lets a networked computer be fully ex posed to the In ternet; this function is u sed when special application sen sing tunnel feature is insufficient to allow an application to function correctly . z Domain Filter Supported let you pre vent users u[...]

  • Seite 7

    3 Packing List z Broadband router unit z Installation CD-ROM z Power adapter[...]

  • Seite 8

    4 Chapter 2 Hardware Inst allation 2.1 Panel Layout 2.1.1. Fr ont Panel Figure 2-1 Front Panel LED: LED Function Color S tatus Description POWER Power indicati on Green On Power is being applied to this product. ST A TUS System status indicators Orange Bli nking ST A TUS is flashe d once per second to indicate system is alive. On The W AN port is l[...]

  • Seite 9

    5 Port: RESET T o reset system settings to factor y defaults, please follow the steps: 1. Power off the device, 2. Press the reset butto n an d hol d, 3. Power on the device, 4. Keep the button pressed about 5 seconds, 5. Release the button, 6. W atch the ST A TUS LED, it will flash 2 times and then flash once per sec ond.[...]

  • Seite 10

    6 2.1.2. Rear Panel Figure 2-2 Re ar Panel Ports: Port Description 5VDC Power inlet: DC 5V , 1.5A (minimum) W AN the port where you will co nnect your cable (or DSL) modem or Ethernet router . Port 1-4 the ports where you will connect network ed computers and other devices. USB USB port for USB printer . 2.2 Installation Requirements FBR-1409TX can[...]

  • Seite 11

    7 Chapter 3 Network Settings and Sof t ware Installation T o use Leve lOne FBR-1409TX correctly , you h ave to properl y configure th e network settin gs of your computers and i nstall the attach ed setup program into your MS W indows platform (Windows 95/98/NT/2000). 3.1 Make Corr ect Network Settings of Y our Computer The default IP addr ess of L[...]

  • Seite 12

    8 3.2 Install the Softwar e into Y our Computers Skip this sectio n if you do not want to use the print server f unction of FBR-1409TX . S tep 1: Insert the installation CD-ROM into the CD-ROM drive. The following window will be shown automatically . If it isn’t, please run “install.exe” on the CD-ROM.[...]

  • Seite 13

    9 Step 2: Click on the INST ALL button . W ait until th e following We l c o m e dialog to appear , an d click on the Next butto n. Step 3: Select the destination folder and click on the Next button. Then, the setup program will begin to install the programs into the destination folder .[...]

  • Seite 14

    10 Step 4: When the following wind ow is di spl a yed, click on t he Finish button. Step 5: Select the item to restart the com puter and then click the OK butto n to reb oot your com puter . Step 6: A fter rebooting your computer , the software installatio n procedure is f in ished. Now , you can configure the NA T Route r (refer t o Chapter 4) and[...]

  • Seite 15

    11 Chapter 4 Configuring NA T Router LevelOne FBR-1409TX prov ides W eb based configuration sche me, that is, configuring by your W eb browser , such as Netscape Comm unicator or Int ernet Explorer . This approac h can be adopted in a ny MS W indows, Macintosh or UNIX based platforms. 4.1 S tart-up and Log in Activate your browser, and disable the [...]

  • Seite 16

    12 4.2 S tatus This option p r ovi des the funct i on fo r ob ser v i ng t hi s pr od uc t’ s working sta t us: A. W AN Port Status. If the W AN port is assigned a dynam ic IP , there may appear a “ Renew ” or “ Release ” button on the Side note column. Y ou can click th is butto n to renew or release IP manually . B. Printer S tatus. The[...]

  • Seite 17

    13 4.3 Wiz ard Setup W izard will guide you through a basic configuration procedure step by step. Press ”Next >”[...]

  • Seite 18

    14 Setup W izard - Select W AN T ype : For detail settings, please refer to 4.4.1 primary setup.[...]

  • Seite 19

    15 4.4 Basic Setting[...]

  • Seite 20

    16 4.4.1 Primary Setup – W AN T ype, V i rtual Computers Press “Change”[...]

  • Seite 21

    17 This option is primary to enab le this product to work prop erly . The setting items and the web appearance de pend on the W AN type. Choose correct W AN type be fore you sta rt. 1. LAN IP Addr ess : the local IP address of this device. The computers on your network must use the LAN IP address of your product as th eir Defa ult Gateway . Y o u c[...]

  • Seite 22

    18 the lease time is expiring-- even when the system is idle. 4.4.1.3 Dynam ic IP Address wi th Road Ru nner Session Management.(e.g. T elstra BigPond) LAN IP Ad dr ess is the IP address of this prod uct. It must be t he defaul t gateway of y our computers. WAN Type is Dynamic IP Address . If the WAN type is not correct, change it! Host Name : opti[...]

  • Seite 23

    19[...]

  • Seite 24

    20 4.4.1.7 V irtual Computers V irtual Computer enab les you to use the original NA T feature, and allows you to setup the one-to-o n e mapping of multiple global IP address and local IP add ress. • Global IP : E nter the gl obal IP address assigned by your ISP . • Local IP : Enter the local IP address of your LAN PC corresponding to the global[...]

  • Seite 25

    21 4.4.2 DHCP Server Press “More>>”[...]

  • Seite 26

    22 The settings of a TCP/IP environment include host IP , Subnet Mask, Gateway , and DNS configurations. It is not easy to manually configure all th e computers and devices in your network. Fortunately , DHCP Server provide s a rather simple appr oach to handle al l these settings. T his product su pports the functio n of DHCP server . If you en ab[...]

  • Seite 27

    23 4.4.3 Change Password Y ou can change Password here. W e strong ly recommend you to change the system password for security reason.[...]

  • Seite 28

    24 4.5 Forwarding Rules[...]

  • Seite 29

    25 4.5.1 V irtual Server This product’ s NA T firewall filters out unrecognized packets to protect your Intranet, so all h osts behind this pr oduct are invi sible to the outsi de world. If y ou wish, you ca n make som e of them accessible by enabling the V irtual Server Mappi ng . A virtual se rver is defi ned as a Service Port , and all request[...]

  • Seite 30

    26 4.5.2 Special AP Some applications require multiple connectio ns, like Internet ga mes, V ideo conferencing, Internet telephony , etc. Because of the firewall function, thes e applications cannot work with a pure NA T router . The Special Applications feature allows some of these ap plications to work with this product. If the mechanism of Speci[...]

  • Seite 31

    27 4.5.3 Miscellaneous Items IP Address of DMZ Host DMZ (DeMilitarized Zone) Host is a host without the pr otection of firewall. It a llows a computer to be exposed to unre st ri cted 2- way com m unication for Int e r net g am es, V ideo conferencing , Int ernet telephony a nd othe r special appl ications. NOTE: This feature shou ld be used only w[...]

  • Seite 32

    28 4.6 Security Settings[...]

  • Seite 33

    29 4.6.1 Packet Filter Packet Filter enables you to con trol what packets are allowed to pass the router . Outbound filter applies on all outbound packets. However, Inbound filter applies on packets that destin ed to V irtual Serv ers or DMZ host only . Y ou can select one of the two filtering policies: 1. Allow all to pass except those match th e [...]

  • Seite 34

    30 For source or destination port, you can define a single port (8 0) or a range of ports (1000 -1999). Add prefix "T" or "U" to spe cify TCP or UDP prot ocol. For e xample, T8 0, U53, U20 00-2999. No prefix indicates bot h TCP and UDP are defined. An empty im plies all port addresses. Each rule can be enabled or di sabl ed i nd[...]

  • Seite 35

    31 Example 2: (1.2.3.100-1.2.3.1 19) They can do everything exce pt read net news (port 1 19) and transfer files via FTP (port 21) Others are all allowed. After Inbound Packet Filter setting is configured, click the save button. Outbound Filter: To enable Outbound Packet Filter click the check box next to Enable in the Outbound Packet Filter field.[...]

  • Seite 36

    32 Example 1: (192.168.123.100-192.168.123.149) They are allowed to send mail (port 25), receive mail (port 1 10), and browse Internet (port 80 ); port 53 (DNS) is necessary to resolve the domain name. (192.168.123.10-192.168.123.20) They can do everything (block nothing) Others are all blocked. Example 2:[...]

  • Seite 37

    33 (192.168.123.100-192.168.123.1 19) They can do ever ything except read net news (port 1 19) and transfer files via FTP (port 21) Others are allowed After Outbound Packet Filter setting is configured, click the save button.[...]

  • Seite 38

    34 4.6.2 Domain Filter Domain Filter let you prevent users under this device from accessing specific URLs. Domain Filter Enable Checke if you want to enable Domain Filter . Log DNS Query Checke if you want to log t he action when someone access es the specific URLs. Privilege IP Addresses Range Setting a group of hosts and privilege these ho sts to[...]

  • Seite 39

    35 In this example: 1. URL include “sex.co m” will be blocked, an d the action will be record in log-file. 2. URL include “g irl.co m” will not be blocked, but th e action will be record in log-file. 3. URL include “erotica.co m” will be blocked, but the action will not be record in log-file. 4. IP addres s X.X.X.1~ X. X.X.10 can access[...]

  • Seite 40

    36 4.6.3 URL Blocking URL Blocking will block LAN computers to connect to pre-defined W ebsites. The major difference between “Domain filter” and “URL Block ing ” is Domain filter require user to input suf fix (like .com or .or g, etc), while URL Blocking re quire user to i nput a keyw ord only . In other words, Domain filter can block spec[...]

  • Seite 41

    37 In this example: 1.URL include “sex” will be blocked, and the action will be record in log-file. 2.URL include “erotica” will be blocked, but the action will be record in log-file 3.URL include “girl” will not be blocked, but the action will be record in log-file. 4. URL in clude “game” will be blocked, but the action will be rec[...]

  • Seite 42

    38 4.6.4 MAC Address Contr ol MAC Address Cont rol allows y ou to assign dif feren t access right for different users and to assign a specific IP address to a certain MAC address. MAC Address Co ntrol Check “Enable” to enable the “M AC Address Control”. All of t he settings in this page will take effect only when “Enable” is checked. Co[...]

  • Seite 43

    39 Control table "Control table" is the table at the botto m of the "MAC Address C ontrol" page. Each r ow of this table indicat es the MAC address and the expected IP address mapping of a client. There are four columns in this table: MAC Address MAC address indicates a spec ific client. IP Address Expected IP address of the cor[...]

  • Seite 44

    40 4.6.5 VPN s etting VPN Settings are settings that are used to create vi rtual private tunnels to remote VPN gateways. The tunnel technology sup ports data confidentiality , data origin authen ticatio n and data integrity of network information by utilizing en cap sulation protocols, encryption algorith ms, and hashing algorithms. • VPN enable [...]

  • Seite 45

    41 Function of Buttons More : T o setup detailer confi guration fo r manual key or IKE approaches by clicking t he "More" button. • VPN Settings - IKE There are three pa rts that are necessary to se tup the configuration of IKE for the dedi cated tunnel: basic setup, IKE proposal setup , and IPSec proposal setup. Basic setup includes th[...]

  • Seite 46

    42 Local netmask combined with local subnet to form a subnet dom ain.  Remote subnet The subnet of LAN site of remote VPN gateway , it can be a host, a partial subnet , and the w hole subnet of LAN site of remote gateway .  Remote netm ask Remote netmask combined with remote subnet to form a subnet domain of remote end.  Remote gatew ay Th[...]

  • Seite 47

    43 • VPN Settings - Set IKE Proposal  IKE Pro pos al index A list of selected proposal indexes from the IKE proposal pool listed below . The selecting activity is performed by selecting a proposal ID a nd clicking "a dd to" butto n in the b ottom of the page. There are only four i ndexes can be chosen from the pr oposal pool for the [...]

  • Seite 48

    44 • VPN Settings -Set IPSec Pr oposal  IPSec Proposal index A list of select ed proposal i ndexes fr om the IPSec proposal po ol listed be low. The select ing activity i s performed by selecting a proposal ID a nd clicking "a dd to" butto n in the b ottom of the page. There a re only four i ndexes can be chosen fo r the dedicat ed t[...]

  • Seite 49

    45 IPSec proposal.  Life time The unit of life time is based on the value of Life T ime Unit. If the value of unit is second, the value of life time represents the life time of dedicated VPN tunnel between bot h end gateway s. Its value ran ges from 300 seconds to 172,8 00 seconds. If the value of unit is KB, the value of life time represen ts t[...]

  • Seite 50

    46 4.6.6 Miscellaneous Items Remote Administrator Host/Port In general, only Intranet user can browse the built-in web pages to perform admin istration task. This feature enables you to pe rform admini stration task f rom rem ote host. If this feature is enabled, only the specified IP address can perform rem ote administrat ion. If the s pecified I[...]

  • Seite 51

    47 4.7 Advanced Setting[...]

  • Seite 52

    48 4.7.1 System T ime Get Date and T ime by NTP Protocol Selected if you want to Get Date and T ime by NTP Protocol. Time Server Select a NTP time server to consult UTC time Time Z one Select a time zone where this device locates. Set Date and T ime manually Selected if you want to Set Date and T ime manually . Function of Buttons Sync Now: Synchro[...]

  • Seite 53

    49 4.7.2 System Log This page support two methods to export syst em logs to specific destination by means of syslog(UDP) and SMTP(TCP). The ite ms you have to setup including: IP Address for Syslog Host IP of destination where syslogs will be sent to. Check Enable to enable this function. E-mail Alert Enable Check if you want to enable Email alert([...]

  • Seite 54

    50 E-mail Subject The subject of email aler t. This settin g is optional. 4.7.3 Dynamic DNS To host your s erver on a c hanging IP a ddress, you have to use dynamic dom ain name service (DDNS). So that anyone wishing to reach your host only needs to know the name of it. Dynamic DNS will map the name of your host to your curr ent IP address, which c[...]

  • Seite 55

    51 Host Name Username/E-mail Password/Key You will get this information whe n you regi ster an account on a Dynamic DNS serve r. Example: After Dynamic DNS setting is configured, click the save button.[...]

  • Seite 56

    52 4.7.4 SNMP Setting In brief, S NMP, the Sim p le Network Managem ent Protoc ol, is a p rotocol desig ned to gi ve a user the capability to remotely manage a co mputer network by polling and setting terminal values and monitori ng network e vents. Enable SNMP Y ou must check either Local or Remote or both to enab le SNMP function. If Local is che[...]

  • Seite 57

    53 1. This device will response to SNMP client which’ s get commun ity is set as “public” 2. This device will response to SNMP client which’ s set community is set as “private” 3. This devi ce will resp onse request fr om both LAN and W AN[...]

  • Seite 58

    54 4.7.5 Routing T able Routing T ables allow you to determine which physical int e rface address to use for outgoing IP data grams. If you have more than one routers and subnets, you will need to enable routing table to allow packets to fin d proper r outing path a nd allow di ffere nt subnet s to comm unicate with each other . Routing T able sett[...]

  • Seite 59

    55 So if, for example, the ho st wanted to send an IP data gram to 192.168.3.88 , it would use the above table to determin e that it had to go via 19 2.168.1.33 (a gateway), And if it sends Packets to 192.168.5.77 will go via 192 .168.1.55 Each rule can be enabled or di sabl ed i ndi vidually . After ro utin g table setting is configured, click the[...]

  • Seite 60

    56 4.7.6 Schedule Rule Y ou can set the schedule time to decide which service will be turned on or off. Select the “enable” item. Press “Add New Rule” Y ou can write a rule name and set which day and what time to schedule from “Start T ime” to “End T i me”. The following e xample configure “ftp tim e” as everyday 14:10 to 16:20[...]

  • Seite 61

    57 After c onfigur e Rule 1 Æ[...]

  • Seite 62

    58 Schedule Enable Selected if you want to Enable the Schedu ler . Edit T o edit the schedule rule. Delete T o delete the schedule rule, an d the rule# o f th e rules behind the d e leted one will decrease one automatically . Schedule Rule can be apply to V irtual se rver and Packet Filter , for example: Exanple1: V irtual Server – Apply Rule#1 ([...]

  • Seite 63

    59 Exanple2: Packet Filter – Apply Rule#1 (ftp time: everyday 14:10 to 16:20).[...]

  • Seite 64

    60 4.8 T oolbox[...]

  • Seite 65

    61 4.8.1 System Log Y ou can V iew system log by clicking the Vi e w L o g button[...]

  • Seite 66

    62 4.8.2 Firmwar e Upgrade Y ou can upgrade fi rmware by cl icking Firmwar e Upgrade butto n.[...]

  • Seite 67

    63 4.8.3 Backup Setting Y ou can backup your settings by clicking the Backup Setting button and save it as a bin file. Once you want to rest ore these settings, please click Firmwar e Upgrade button and use the bin file you saved. 4.8.4 Reset to default Y ou can also reset this product to factory default by click ing the Reset to default button. 4.[...]

  • Seite 68

    64 4.8.6 Miscellaneous Items MAC Address for W ake-on-LAN W ake-on - LAN is a technology that enables you to pow er up a networ ked device remotely . In order to enjoy this feat ure, the t arget device must be W ake-on-LAN enable d and y ou have to k now the MAC address of this device, say 00-11- 22-33-44-55. Clicking "W ake up" button wi[...]

  • Seite 69

    65 Chapter 5 Print Server LevelOne FBR-1409 TX provides th e function of network print server for MS Windows 95/98/NT/2000 and Unix base d platforms. (I f the product you purcha sed doesn’ t have printer port , please skip this chapter .) 5.1 Configuring on W indows 95/98 Platforms After you finished the software installation procedure described [...]

  • Seite 70

    66 1. Find out the corresp onding icon of your s erver printer , for example, t he HP LaserJet 6L . Click the mouse’ s right button on that icon, an d then select the Properties item: 2. Click the Detai ls item:[...]

  • Seite 71

    67 3. Choose the “PR Tmate: (All-in-1)” from the list attached at th e Print T o item. Be sure that the Printer Driver item is configured to th e correct driver of your server printer . 4. Cli ck on the b utton of Port Settings : T yp e in the IP address of this product and then click the OK button. 5. Make sure that all settings me ntione d a [...]

  • Seite 72

    68 5.2 Configuring on Window s NT Platforms The configurati on p roce d ure f or a W indows NT pl at fo rm is similar to that of W indows 95/98 except the screen of printer Pr operties : Compared to the pro cedure in last section, the selection of Det ails is equivalent t o the selection of Ports , and Port Settings is equi valent to Configure Port[...]

  • Seite 73

    69 5.3 Configuring on W indows 2000 and XP Platforms W indows 2000 and XP have built-in LPR client, users could utilize this featu re to Print. Y ou have to insta ll your Printer Driver on LPT1 or other ports befor e you pr oceed the following sequence. 1. Open Printers and Faxs.[...]

  • Seite 74

    70 2. Select “Ports” page, Click “Add Port…”[...]

  • Seite 75

    71 3. Select “Standa rd TCP/IP Port”, and then click “New Port…” 4. Click Ne xt and then provide t he followi ng inform ation: T ype address of server providing LPD that is our NA T device:19 2.168.12 3.254[...]

  • Seite 76

    72 5. Select Custom, then click “Settings…”[...]

  • Seite 77

    73 6. Select “LPR”, type ” lp “ lowercase letter in “Queue Nam e:” And enable “LPR Byte Counting Enabled”. 7. Apply your settings[...]

  • Seite 78

    74[...]

  • Seite 79

    75 5.4 Configuring on Unix based Platforms Please follow the traditional configur ation procedure on Unix platforms to setup the print server of this product. The printer name is “l p.”[...]

  • Seite 80

    76 Appendix A TCP/IP Configuration for Windows 95/98 This section introduces you ho w to install TCP/IP protocol into your per sonal computer . And suppose you have been success fully installed one network ca rd on your personal com puter . If not, please refer to your network card manual. Moreov er , the Sectio n B.2 tells you how to set TCP/IP va[...]

  • Seite 81

    77 5. Select Microsoft item in the manufactures list. And choose TCP/IP in the Network Pr otocols . Click OK button to return to Network window . 6. The TCP/IP pro tocol shall be listed in the Netwo rk window . Click OK to complete the install procedure and restart your PC to enable t he TCP/IP protocol.[...]

  • Seite 82

    78 A.2 Set TCP/IP Protocol for W orking with NA T Router 1. Click Sta r t but ton and c hoose Settings , then click Control Panel . 2. Double click Network icon. Select the TCP/IP line that has been associated to your network card in the Configuration tab of the Netwo rk window . 3. Click Properties button to set the TCP/IP protocol fo r th is NA T[...]

  • Seite 83

    79 a. Select Obtain an IP addr ess automatically in the IP Addr ess tab.[...]

  • Seite 84

    80 b. Don’ t input a ny value i n the Gateway tab.[...]

  • Seite 85

    81 c. Choose Disable DNS in the DNS Configuration tab .[...]

  • Seite 86

    82 B. Configure I P manually a. Select Specify an IP address in the IP Addr ess tab. The default IP address of this product is 192.168 .123.254. So please use 192.168.123 .xxx (xxx is between 1 and 253) for IP Ad dr ess field and 255.25 5.255.0 for Su bn et Mask field.[...]

  • Seite 87

    83 b. In the Gateway tab, add the IP address of this product (default IP is 192.168.123.254) in the New gateway field an d click Add button.[...]

  • Seite 88

    84 c. In the DNS Configuration tab, add the DNS values which are provided by the ISP into DNS Server Sear ch Or der field and cl ick Add button.[...]