AlphaShield 8800 инструкция обслуживания

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81

Идти на страницу of

Хорошее руководство по эксплуатации

Законодательство обязывает продавца передать покупателю, вместе с товаром, руководство по эксплуатации AlphaShield 8800. Отсутствие инструкции либо неправильная информация, переданная потребителю, составляют основание для рекламации в связи с несоответствием устройства с договором. В законодательстве допускается предоставлении руководства в другой, чем бумажная форме, что, в последнее время, часто используется, предоставляя графическую или электронную форму инструкции AlphaShield 8800 или обучающее видео для пользователей. Условием остается четкая и понятная форма.

Что такое руководство?

Слово происходит от латинского "instructio", тоесть привести в порядок. Следовательно в инструкции AlphaShield 8800 можно найти описание этапов поведения. Цель инструкции заключается в облегчении запуска, использования оборудования либо выполнения определенной деятельности. Инструкция является набором информации о предмете/услуге, подсказкой.

К сожалению немного пользователей находит время для чтения инструкций AlphaShield 8800, и хорошая инструкция позволяет не только узнать ряд дополнительных функций приобретенного устройства, но и позволяет избежать возникновения большинства поломок.

Из чего должно состоять идеальное руководство по эксплуатации?

Прежде всего в инструкции AlphaShield 8800 должна находится:
- информация относительно технических данных устройства AlphaShield 8800
- название производителя и год производства оборудования AlphaShield 8800
- правила обслуживания, настройки и ухода за оборудованием AlphaShield 8800
- знаки безопасности и сертификаты, подтверждающие соответствие стандартам

Почему мы не читаем инструкций?

Как правило из-за нехватки времени и уверенности в отдельных функциональностях приобретенных устройств. К сожалению само подсоединение и запуск AlphaShield 8800 это слишком мало. Инструкция заключает ряд отдельных указаний, касающихся функциональности, принципов безопасности, способов ухода (даже то, какие средства стоит использовать), возможных поломок AlphaShield 8800 и способов решения проблем, возникающих во время использования. И наконец то, в инструкции можно найти адресные данные сайта AlphaShield, в случае отсутствия эффективности предлагаемых решений. Сейчас очень большой популярностью пользуются инструкции в форме интересных анимаций или видео материалов, которое лучше, чем брошюра воспринимаются пользователем. Такой вид инструкции позволяет пользователю просмотреть весь фильм, не пропуская спецификацию и сложные технические описания AlphaShield 8800, как это часто бывает в случае бумажной версии.

Почему стоит читать инструкции?

Прежде всего здесь мы найдем ответы касательно конструкции, возможностей устройства AlphaShield 8800, использования отдельных аксессуаров и ряд информации, позволяющей вполне использовать все функции и упрощения.

После удачной покупки оборудования/устройства стоит посвятить несколько минут для ознакомления с каждой частью инструкции AlphaShield 8800. Сейчас их старательно готовят или переводят, чтобы они были не только понятными для пользователя, но и чтобы выполняли свою основную информационно-поддерживающую функцию.

Содержание руководства

  • Страница 1

    U ser Ma nu a l[...]

  • Страница 2

    Version 1.0 T able of Contents 1. INTRODUCTION 5 2. CONTENTS 6 3. SYSTEM REQUIREMENTS 7 4. FEATURES 8 5. HARDWARE GUIDELINES 10 5.1 Connections 10 5.2 LEDs 11 6. LOGIN 12 7. SETUP 13 7.1 Quick Start 13 7.2 WAN 23 7.3 LAN 28 31 7.4 DHCP 29 7.5 Wireless 8. ADVANCED 36 8.1 Virtual Server 36 8.2 Special Applications 37 8.3 Gaming 39 ® 8.4 StreamEngine[...]

  • Страница 3

    T able of Contents 8.13 Schedules 50 9. TOOLS 51 9.1 Admin 51 9.2 Time 53 9.3 Print Server Setup 54 9.4 Syslog 54 9.5 E-mail 55 9.6 System 56 9.7 Firmware 57 9.8 Dynamic DNS 58 10. STA TUS 59 10.1 Device Info 59 10.2 Wireless 61 10.3 Routing 61 10.4 Print Serve Status 62 10.5 Logs 62 10.6 Statistics 63 10.7 LAN Port Status 64 10.8 Active Sessions 6[...]

  • Страница 4

    T able of Contents 13.5 Copyright 78 13.6 Trademark 78 13.7 Patents 78 13.8 Restrictions 78 13.9 Liability Limitations 78 13.10 Customer Remedies 79 13.11 Notice of Change of Terms and Conditions 79 13.12 Replacement Components and Specifications 79 14. IMPORTANT NOTICES 80 14.1 FCC Statement 80 14.2 FCC Caution 80 14.3 FCC Radiation Exposure State[...]

  • Страница 5

    1. INTRODUCTION: Congratulations on your purchase of the Alpha Secure Wireless Router 8800, and thank you for choosing AlphaShield for your networking and security needs. Y our new router allows you to share files and printers on your network, and surf the Internet with ® the performance benefits of network optimization using StreamEngine T echnol[...]

  • Страница 6

    2. CONTENTS: 1. Alpha Secure Wireless Router 8800 2. Cat5 Ethernet Cable 3. Power Adapter (6.8V , 2.5A) 4. Quick Installation Guide 5. CD-ROM with Manual 6. Vertical S tands Note : Please contact your reseller if any of the above items are missing. Important: Using a power supply other than that included with your router will result in the warranty[...]

  • Страница 7

    3. SYSTEM REQUIREMENTS: 1. External xDSL or Cable Modem with Ethernet Ports. 2. PC or MAC with following minimum requirements: ? 1.25 Ghz processor ? 256MB Memory ? CD-ROM Drive ? Ethernet Adapter 10/100/1000 with TCP/IP Protocol Inst alled ® ? Windows XP/2000/Vista/ME or Mac® OS X v10.3/v10.2/v10.1or Linux ? Internet Explorer v6, Netscape® Navi[...]

  • Страница 8

    4.FEA TURES: Hardware Interface Features: Router/Switch Hardware: ? Dedicated 250 MIPS High Speed core Network Processor ? Dedicated High Speed Multi-port Gigabit Switch & Co-Processor ? 5 x 10/100/1000 Auto-Sensing Gigabit Ethernet LAN Ports with MDI /MDI-X ? 1 x 10/100 Auto-Sensing Fast Ethernet W AN Port with MDI/MDI-X ? 4 Universal Serial B[...]

  • Страница 9

    AlphaShield Firewall: ? AlphaGAP Logical Disconnection and Re-connection ? Full Stateful Packet Inspection (SPI) ? AlphaGAP Scheduler ? IP-Stealth technology ? Configurable DMZ Option ? Inclusion, Exclusion MAC and IP filtering ? Parental Web Access Control ? User Selectable Logging support ? LAN, WAN and Wireless Network T raffic Statistics Additi[...]

  • Страница 10

    5. 5.1 Connections: 1. All Ethernet Ports (WAN and LAN) are auto MDI/MDIX, meaning you can either use a straight-through or a crossover Ethernet cable. 2. 5 Auto MDI/MDIX LAN ports automatically sense the cable type when connecting to Ethernet-enabled computers for both WAN and LAN. 3. The Auto MDI/MDIX WAN port is the connection for the Ethernet c[...]

  • Страница 11

    5.2 LEDs: 5 LOCAL NETWORK LEDs: The connection to an Ethernet-enabled computer on ports 1-5 is indicated by a solid light. When data is being transmitted, this LED will flash. 1 POWER LED: A solid light indicates a proper connection to the power supply . 1 WAN LED: A solid light indicates connection on the W AN port. When data is being transmitted,[...]

  • Страница 12

    6. LOGIN: The Configuration Interface can be accessed from your Web browser. Type http://192.168.0.1 in the address window and press Enter . The Login screen will appear. ? Select a User Name . ? By default, there is no password. Simply leave this window blank ? Click Log In to proceed. Version 1.0 Page 12 Alpha Secure Wireless Router 8800 GIGABIT[...]

  • Страница 13

    7. SETUP: 7.1 Quick Start: The Wizard screen contains two wizards: ? Internet Connection Setup ? Wireless Setup Version 1.0 Page 13 Alpha Secure Wireless Router 8800 GIGABIT[...]

  • Страница 14

    a) Launch Internet Connection Setup Wizard: The following Web-based Setup Wizard will help you connect your new Alpha Router to the Internet. This Setup Wizard will guide you in a step-by-step manner to get your Internet connection up and running. Before launching the Wizard, please make sure you have correctly followed all of the steps outlined in[...]

  • Страница 15

    Step 2: Select Y our Time Zone Select your local time zone from the pull-down menu. ? T o continue click Next Step 3: Configure Y our Internet Connection From the pulldown menu, choose your Internet Service Provider (ISP). If your ISP is not listed in the menu, or you do not know who your ISP is, simply select Not Listed or Don't Know from the[...]

  • Страница 16

    Step 3: Configure Y our Internet Connection DHCP CONNECTION (Dynamic IP Address) A MAC Address is a unique hardware address for devices on a Local Area Network. Enter the MAC Address of the computer that was originally connected to your broadband modem. If the computer you are using was the initial system connected to your broadband modem, simply s[...]

  • Страница 17

    Step 3: Configure Y our Internet Connection At the Set Username and Password Connection (PPTP) Enter: ? PPTP IP Address ? PPTP Subnet Mask ? PPTP Gateway IP Address ? PPTP Server IP Address ? Your Username ? Your Password . ? T o verify your Password , Re-enter it below ? T o continue click Next At the Set Username and Password Connection (L2TP) sc[...]

  • Страница 18

    At the Set Static IP Address Connection Enter: ? IP address ? Subnet Mask ? Gateway Address ? Primary and Secondary DNS Address es ? T o continue click Next Setup Complete ? Click Connect . This will save your settings and reboot the router Version 1.0 Page 18 Alpha Secure Wireless Router 8800 GIGABIT[...]

  • Страница 19

    b) Launch Wireless Security Setup Wizard: The next step is to set up your wireless network. This Wizard will help you set it up and make it secure. Some changes made using this Setup Wizard may require you to change some settings on your wireless client adapters so they can still connect to the Alpha Route: Wireless Setup: ? Click Launch Wireless S[...]

  • Страница 20

    Step 1: Name Y our Wireless Network ? Choose a Name for your Wireless Network ? Do not choose the default name for security reasons ? T o continue click Next . Step 2: Secure Y our Wireless Network ? Choose a security option to protect your network from unauthorized users. ? T o continue click Next Version 1.0 Page 20 Alpha Secure Wireless Router 8[...]

  • Страница 21

    Step 3: Set you Wireless Security Password ? Select a Security Password between 2 and 20 characters ? T o continue click Next Setup Complete! The setup Page will give you a detailed summary of the settings, based on what you have selected in the previous steps. ? Click Save to continue This screen will only appear if you selected BEST security Vers[...]

  • Страница 22

    Version 1.0 Page 22 Alpha Secure Wireless Router 8800 GIGABIT This screen will only appear if you selected BETTER security This screen will only appear if you selected GOOD security This screen will only appear if you selected security NONE[...]

  • Страница 23

    7.2 WAN: The WAN section will help you choose one of 6 connection types: St atic IP , DHCP , PPPoE, PPTP , L2TP , and BigPond. If you are using the PPPoE option, you will need to remove or disable any PPPoE client software on your computers. If you have any questions about your connection, please contact your Internet Service Provider (ISP). a) Mod[...]

  • Страница 24

    DHCP WAN Mode: ? Enter a Host Name to identify your system to the ISP's server PPPoE WAN Mode: ? Enter the Username and Password you use to gain access to the Internet. ? T o verify your Password , re-enter it below ? Enter a Service Name (If your ISP requires it). Reconnect Mode ? Always on : The Internet connection is always maintained. ? On[...]

  • Страница 25

    PPTP WAN Mode: ? Enter the PPTP IP Address provided by your ISP . ? Enter the PPTP Subnet Mask provided by your ISP . ? Enter the PPTP Gateway IP Address provided by your ISP . ? Enter the PPTP Server IP Address you are connecting to, also provided by your ISP . ? Enter the Username and Password you use to gain access to the Internet. ? T o verify [...]

  • Страница 26

    L2TP WAN Mode: Enter: ? The L2TP IP Address provided by your ISP . ? The L2TP Subnet Mask provided by your ISP . ? The L2TP Gateway IP Address provided by your ISP . ? The L2TP Server IP Address provided by your ISP . ? Enter the Username and Password you use to gain access to the Internet. ? T o verify your Password , re-enter it below . ? Select [...]

  • Страница 27

    DNS And Advanced Settings: These Options may be used on all WAN Modes: ? If you have the DNS servers provided to you by the ISP , please select the Use these DNS Servers ? Please enter the Primary DNS Server provided by your ISP ? Please enter the Secondary DNS Server provided by your ISP ? Use the Default MTU is enabled by default ? MTU (Maximum T[...]

  • Страница 28

    7.3 LAN Settings: ? IP Address: Enter the IP address of the router on the local area network. The local network settings are based on the address assigned here. ? Subnet Mask: Use the of your router on the local area network. ? RIP Announcement is u sed with multiple routers to broadcast routing information. ? Gateway Metric is only used if you hav[...]

  • Страница 29

    7.4 DHCP: Use this section to configure the built-in DHCP Server to assign IP addresses to the computers on your network. DHCP Settings: T o connect to the LAN and Internet the DHCP Server function will assign your network devices the necessary information and you do not have to manually configure each device on your network with IP settings. The d[...]

  • Страница 30

    Number of Dynamic DHCP Clients: ? This is used to automatically assign IP addresses from a predetermined pool of addresses to computers or devices that request them. It shows the number of clients that are receiving an IP address from the router and LAN devices those are leasing IP addresses. ? The Computer Name, MAC Address , and IP Address assign[...]

  • Страница 31

    7.5 Wireless: Use this section to configure your wireless settings . Y our Alpha Router supports three wireless security modes including: WEP , WPA-Personal, and WPA-Enterprise. WEP is the original wireless encryption standard; WP A provides a higher level of security; and WPA-Personal does not require an authentication server. The WP A-Enterprise [...]

  • Страница 32

    ? Super G Mode : Super G Turbo Modes must use channel 6 for transmission and 802.1 1 Mode must be set to 802.11g. ? Super G without Turbo: Performance enhancing features such as Packet Bursting, Fast Frames, and Compression. ? Super G with Static T urbo: Mode is not backwards compatible with non-Turbo (legacy) devices. S tatic turbo enabled mode is[...]

  • Страница 33

    Wireless Security Mode: WEP ? WEP is the Wireless Encryption Standard. T o use it you must enter the same key(s) into the router and the wireless stations. For 64 bit keys you must enter 10 hex digits into each key box. For 128 bit keys you must enter 26 hex digits into each key box. A hex digit is either a number from 0 to 9 or a letter from A to [...]

  • Страница 34

    WPA-Personal: ? WPA requires stations to use high-grade encryption and authentication. WDS will not function with WPA security. Select the WPA Mode from drop-down list: ? Cipher Type is entered as a pass-phrase and used to generate session keys that are unique for each wireless client. It cannot be less than 8 characters and no more than 63 charact[...]

  • Страница 35

    WPA-Enterprise: The RADIUS server works with WPA-Enterprise to authenticate wireless clients. The Server may need to be configured in order to do so. The necessary credentials should have been established by wireless clients before attempting to authenticate to the Server through the Gateway ? Select the pre-shared key Cipher Type . ? Group Key Upd[...]

  • Страница 36

    8. ADV ANCED: Advanced Options allows you to configure a number of advanced features including ports, application priority , Internet access, filters, and advanced wireless settings. 8.1 Virtual Server: The Virtual Server option allows you to define a single public port on your router for redirection to an internal LAN IP Address and Private LAN po[...]

  • Страница 37

    8.2 Special Applications: The Special Application section is used to open single or multiple ports on your router when the router senses data sent to the Internet on a 'trigger' port or port range. Special Applications rules apply to all computers on your internal network. Application Level Gateway (ALG) Configurations: Application Level [...]

  • Страница 38

    Add/Edit Special Applications Rule: The Special Application section is used to open single or multiple ports on your router when the router senses data sent to the Internet on a "trigger" port or port range. Special Applications Rules apply to all computers on your internal network. ? Rule Name: Enter to identify the Special Application R[...]

  • Страница 39

    8.3 Gaming: The Gaming option is used to open multiple ports or a range of ports in your router and redirect data through those ports to a single PC on your network. This feature allows you to enter ports in various formats including, Port Ranges (100-50), Individual Ports (80, 68, 888), or Mixed (1020-5000, 689). Add/Edit Game Rule: ? Rule Name: C[...]

  • Страница 40

    ® 8.4 StreamEngine Network Optimization: ® This next section will help you configure the StreamEngine Network Optimization. ® StreamEngine T echnology improves your online gaming experience by ensuring that your game traffic is prioritized over other network traffic, such as FTP or Web. For best performance, use the Automatic Classification opti[...]

  • Страница 41

    8.5 Routing: Add/Edit Route: The Routing option allows you to define fixed routes to defined destinations: ? Destination IP: Enter the Destination IP Address that the p ackets will be attempting to access. ? Netmask : Specify which portion of the Destination IP signifies the network trying to be accessed, and which part signifies the packets to whi[...]

  • Страница 42

    8.6 Access Control: The Access Control option allows you to control access in and out of your network. Use this feature to grant access only to approved sites, limit web access based on time or dates, and/or block Internet access for applications like P2P utilities or games. Enabled: By default, the Access Control feature is disabled. When Access C[...]

  • Страница 43

    Step 1: Choose Policy Name: ? Policy Name. Typically , this would be a system name or user name such as "John's Computer." ? Click Next to continue. Step 2: Select Schedule: ? Select the Schedule of times when you want the policy to apply. If you do not see the schedule you need in the list of schedules, Go to the T ools > Schedul[...]

  • Страница 44

    Step 4: Select Filtering Method: ? Apply Web Filter: With this option is enabled, the specified system will only have access to the Web sites listed in the Web filter section. ? Log Internet Access: When this option is enabled, all of the Web sites visited by the specified machine will be logged. ? Filter Ports: When this option is enabled , you ca[...]

  • Страница 45

    8.7 Web Filter: The Web Filter options allows you to set-up a list of allowed Web sites that can be used by multiple users. When Web Filter is enabled, all other Web sites not listed on this page will be blocked. T o use this feature, you must also select the "Apply Web Filter" checkbox in the Access Control section. The Web Filter sectio[...]

  • Страница 46

    8.8 MAC Address Filters: The MAC (Media Access Controller) Address filter option is used to control network access based on the MAC Address of the network adapter . A MAC address is a unique ID assigned by the manufacturer of the network adapter. This feature can be configured to ALLOW or DENY network/Internet access. Filter Settings: When the MAC [...]

  • Страница 47

    8.9 Firewall: The DMZ (Demilitarized Zone) option provides you with an option to set a single computer on your network outside of the router. If you have a computer that cannot run Internet applications successfully from behind the router, then you may place the computer into the DMZ for unrestricted Internet access. Note: Putting a computer in the[...]

  • Страница 48

    8.11 Inbound Filters: The Inbound Filter option is an advanced method of controlling data received from the Internet. With this feature you can configure inbound data filtering rules that control data based on an IP address range. Inbound Filters may be used for limiting access to a server on your network to a system or group of systems. Filter rul[...]

  • Страница 49

    8.12 Advanced Wireless: Advanced Wireless Settings: ? The default setting of the Fragmentation Threshold should remain 3200. Setting the Fragmentation value too low may result in poor performance. If you may slightly adjust your Fragmentation value somewhere in the between the recommended range of 256 to 3200. ? The default setting of the RTS Thres[...]

  • Страница 50

    8.13 Schedules: The Schedule configuration option is used to manage schedule rules for various firewall and parental control features. Add/Edit Schedule Rule: ? Enter the Schedule Name. ? T o select the Day(s) Place a checkmark in the boxes for the desired days or select the All Week radio button to select all seven days of the week. ? Select All D[...]

  • Страница 51

    9 TOOLS: 9.1 Admin: The Admin option is used to set a password for access to the W eb-based management. By default there is no password configured. It is highly recommended that you create a password to keep your new router secure. Admin Password To Set Admin Password ? Enter a Password of your choice ? To Verify your Password, re-enter it below Us[...]

  • Страница 52

    USB File Sharing: ? Select Enable Remote Access to USB files to allow the Remote User to access the USB files. ? Select the port that you want the Remote User e.g. 8081 ? Select the USB Access Inbound Filer to allow the Remote user to access files. UPnP: ? Select the Enable UPnP Note: Y ou need to have the UPnP selected for the Router to be able to[...]

  • Страница 53

    9.2 Time: The Time Configuration option allows you to configure, update, and maintain the correct time on the internal system clock. From this section you can set your local time zone and set the Time Server . Daylight Saving Settings can also be configured to automatically adjust the time when needed. Time Configuration: ? Select your local time z[...]

  • Страница 54

    9.3 Print Server Setup: Y our AlphaShield Router includes an integrated print server that allows a printer to be shared between multiple computers on your network. From this page you can select which printing protocols to enable. T o use the shared printer from this computer, follow the setup instructions found at the AlphaShield website . ? Please[...]

  • Страница 55

    9.5 Email: The Email feature can be used to send the system log files, router alert messages, and firmware update notification to your email address. Email Settings: ? From Email address: Enter the address that will appear as the sender when you receive a log file or firmware upgrade notification via email. ? To Email address: Enter the address whe[...]

  • Страница 56

    9.6 System: The System Settings section allows you to reboot the device or restore the router to the factory default settings. Restoring the unit to the factory default settings will erase all settings including any rules that you've created. System Commands: ? T o restart the router click on Reboot the Device . ? T o restore all configuration[...]

  • Страница 57

    9.7 Firmware: The Firmware Upgrade section can be used to update to the latest firmware code to improve functionality and performance. T o check for the latest firmware, click the Check Online Now for Latest Firmware Version button. If you would like to be notified when new firmware is released, place a checkmark in the box next to Email Notificati[...]

  • Страница 58

    9.8 Dynamic DNS: Dynamic DNS allows you to host a server (Web, FTP , Game Server, etc…) using a domain name that you have purchased (www.whateveryournameis.com) with your dynamically assigned IP address. Most broadband Internet Service Providers assign dynamic (changing) IP addresses. Using a DDNS service provider, your friends can enter in your [...]

  • Страница 59

    10. ST A TUS: The Status items are mainly informational. 10.1 Device Info: General: ? Time option displays the time and date that the router is set to. ? Firmware Version option displays the currently loaded firmware version. WAN: ? Connection Type shows t he Internet connection type that is being used. ? MAC Address is seen over the Internet. ? IP[...]

  • Страница 60

    LAN: ? MAC Address displayed for your local area network. ? IP Address displays the router on your local area network. ? Subnet Mask displays the router on your local area network. ? DHCP Server i ndicates if the router is acting as a DHCP server on the local area network. Wireless LAN: ? Wireless Radio In dicates whether wireless networking is on [...]

  • Страница 61

    10.2 Wireless: Use this option to view the wireless clients that are connected to your wireless router. Number Of Wireless Clients This display includes the number of clients that are connected to the router, the MAC address of each system connecting wirelessly, and the IP address of Each system connecting wirelessly. 10.3 Routing T able: ? A Gatew[...]

  • Страница 62

    10.4 Print Server Status: Y our AlphaShield Router includes an integrated print server that allows a printer to be shared between multiple computers on your network. This page displays status information about the print server and any attached printer. 10.5 Logs: Events are automatically logged (recorded) on your router’s internal memory. When th[...]

  • Страница 63

    10.6 Statistics: Network Traffic St ats: Traffic St atistics: Displays packets passing through your router. Refresh Statistics: Updates the screen with the latest router statistics. Clear Statistics: Clears all of the values on the screen. LAN Statistics: ? Sent shows the number of packets transmitted to the local area network. ? Received shows the[...]

  • Страница 64

    Wireless Statistics: ? Sent shows the number of packets sent to the wireless network. ? Received shows the number of packets received from the Wireless Network. ? TX Packets Dropped shows the amount of transmit packets dropped. ? Errors shows the number of errors relating to packets to/ from the Wireless Network. 10.7 LAN Port Status: Traffic S tat[...]

  • Страница 65

    10.9 Switch Forwarding: This page displays the full details of Ethernet switching in your router. Version 1.0 Page 65 Alpha Secure Wireless Router 8800 GIGABIT[...]

  • Страница 66

    1 1. GLOSSARY : ® Access Control List - ACL. Database of network devices that are allowed to access resources on the network. Access Point - AP . Device that allows wireless clients to connect to it and access the network Ad-hoc network - Peer-to-Peer network between wireless clients Address Resolution Protocol - ARP . Used to map MAC addresses to[...]

  • Страница 67

    Broadcast – Transmitting data in all directions at once Browser – A program that allows you to access resources on the web and provides them to you graphically Cable modem – A device that allows you to connect a computer up to a coaxial cable and receive Internet access from your Cable provider Card Bus – A newer version of the PC Card or P[...]

  • Страница 68

    DNS – Domain Name System. Translates Domain Names to IP addresses DOCSIS – Data Over Cable Service Interface Specifications . The standard interface for cable modems Domain name – A name that is associated with an IP address Download – T o send a request from one computer to another and have the ?le transmitted back to the requesting comput[...]

  • Страница 69

    Graphical user interface – GUI H.323 – A standard that provides consistency of voice and video transmissions and compatibility for videoconferencing devices Half-duplex – Data cannot be transmitted and received at the same time Hashing – Transforming a string of characters into a shorter string with a prede?ned length Hexadecimal – Charac[...]

  • Страница 70

    IP – Internet Protocol IP address – A 32-bit number, when talking about Internet Protocol V ersion 4, that identifies each computer that transmits data on the Internet or on an Intranet IPsec – Internet Protocol Security IPv6 – Internet Protocol Version 6 uses 128-bit addresses and was developed to solve the problem that we face of running [...]

  • Страница 71

    NAT – Network Address T ranslation allows many private IP addresses to connect to the Internet, or another network, through one IP address NetBEUI – NetBIOS Extended User Interface is a Local Area Network communication protocol. This is an updated version of NetBIOS NetBIOS – Network Basic Input/Output System Netmask – Determines what porti[...]

  • Страница 72

    Rendezvous – Apple’s version of UPnP , which allows for devices on a network to discover each other and be connected without the need to configure any settings Repeater – Retransmits the signal of an Access Point in order to extend it’s coverage RIP – Routing Information Protocol is used to synchronize the routing table of all the routers[...]

  • Страница 73

    UDP – User Datagram Protocol UNC – Universal Naming Convention allows for shares on computers to be identified without having to know what storage device it’s on Unicast – Communication between a single sender and receiver Universal Plug and Play – A standard that allows network devices to discover each other and configure themselves to b[...]

  • Страница 74

    12. TECHNICAL SPECIFICA TIONS: Internal Dual Processing Dedicated 250 MHz High Speed Network Processor Ip3023 Dedicated High Speed Multi-Port Gigabit Switch & Co-Processor Sp arX-5 Hardware Interfaces 5 x 10/100/1000 Auto-Sensing Gigabit Ethernet LAN Ports MDI/MDI-X 1 x 10/100 Auto-Sensing Fast Ethernet WAN Port MDI/MDI-X 4 x Universal Serial B[...]

  • Страница 75

    Advanced Firewall Features Network Address T ranslation (NAT) Up to 254 Addresses Stateful Packet Inspection (SPI) AlphaGAP Logical Disconnect (Automatic and Manual) MAC Filtering (Exclusion and Inclusion) Website Filtering Scheduling AlphaGAP Connection Scheduler (ACS) Gaming and Port Control Feature Special Applications and Port Trigger Configura[...]

  • Страница 76

    13. SUPPORT : 13.1 100% Unhackable or Money Back Guarantee: If the original purchaser can prove that he or she was hacked while using a properly installed Alpha Router, with AlphaGAP T echnology enabled, AlphaShield Inc. will accept the return of the product and provide a full refund (with proof of purchase) or replace the product at AlphaShield&ap[...]

  • Страница 77

    13.3 Service and Repairs: In case the Alpha Router device is found to be defective, the Manufacturer will be obligated only to replace or repair the defective product provided that the following is determined: ? The product has not been altered or repaired without the written consent of the Manufacturer. ? The product has not failed due to misuse, [...]

  • Страница 78

    13.5 Copyright: Information in this User Manual and all AlphaShield Inc.'s literature, including URLs and other Internet Website references, is subject to change without notice. The entire risk of the use or the results of the use of this document, with its terms and conditions, remains with the user . Complying with all applicable copyright l[...]

  • Страница 79

    13.10 Customer Remedies: Any liability of AlphaShield Inc., with respect to software or hardware or the performance thereof or defects therein, under any warranty , negligence, strict liability or other theory, will be limited exclusively to product replacement or , if replacement is inadequate as a remedy or, in AlphaShield Inc.'s opinion, im[...]

  • Страница 80

    14. IMPORT ANT NOTICES: 14.1 FCC Statement: ? Reorient or relocate the receiving antenna. ? Increase the separation between the equipment and receiver. ? Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. ? Consult the dealer or an experienced radio/TV technician for help. 14.2 FCC Caution: Thi[...]

  • Страница 81

    14.4 IC Statement: Operation is subject to the following two conditions: 1) This device may not cause interference and; 2) This device must accept any interference, including interference that may cause undesired operation of the device. This device has been designed to operate with an antenna having a maximum gain of 7dBi. An antenna having a high[...]