Accton Technology ACC7004WFW 2.4 GHz Wireless Router User Manual scan 1 XDW

Accton Technology Corp 2.4 GHz Wireless Router scan 1 XDW

User manual 3

Download: Accton Technology ACC7004WFW 2.4 GHz Wireless Router User Manual scan 1 XDW
Mirror Download [FCC.gov]Accton Technology ACC7004WFW 2.4 GHz Wireless Router User Manual scan 1 XDW
Document ID234491
Application IDZr/x+y5fQFFJHYsOk4kb3g==
Document DescriptionUser manual 3
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize107.6kB (1344965 bits)
Date Submitted2002-04-01 00:00:00
Date Available2002-04-01 00:00:00
Creation Date2002-03-29 15:19:15
Producing SoftwareAcrobat Distiller 5.0 (Windows)
Document Lastmod2002-03-29 15:19:30
Document Titlescan-1.XDW
Document CreatorPScript5.dll Version 5.2
Document Author: brian

CONFIGURING THE BARRICADE PLUS
You can automatically generate encryption keys or you can manually
enter the keys. For automatic 64-bit security, you enter a passphrase
that is used to create four keys (as shown below). The automatic
128-bir. security generates a single key by entering a passphmse.
Encrypflnn
any]... mm mm lea-x11 mm. fivlhuznmrk min... unctypfm m. mun
.. an. M 1-14. mum-hm Gmfl and «am... duh-(mun my"... Dv m
m .. nu "mums“?
-1§,.. $3
Em... pinyin-n mflclul m. Bendablmun; .. numll'y cal-F1 m mom-uni;
Efliwon
{Emma}. mm. yuu- mag-may wuln- uni-gm; Mikhmanryplim My: mm
-.. m, m yum mmmi... enemy and whip“ mm umu m (as Mama. 0. y...
ml (gt... gummy v ~
resume”
and gamma. ..pmmwwwmlwnm”(my "mm mm. 5.5",
Pa-w-s;
, W
4—19
NETWORKING AND CLIENT SERVICES
4—20
If you use encryption, configure the same keys used for the Barricade
Plus on each of your wireless clients. Note that the Wired Equivalent
Privacy (WEP) protects data transmitted between wireless nodes, but
does not protect any transmissions over your wired network or over
the Internet.
CONFIGURING m5 BARRIC‘ADE PLUS
Configuring Client Services
The Barricade Plus includes a broad range of client services, including
firewall protection, one VPN tunnel, network address translation,
virtual server, address mapping, DMZ, and restricted Internet access
for specified clients. You can configure these functions by selecting
specific items from the menu on the left of the screen.
NAT - Network Address Translation
ZZNAT samngs
MAddress mm“ (m, avlhmmuhfl! am .i m. lard m1.- tun m. Mkmll min a my.
mum w mm arm-mu- was; i: mums "Arum am mm Mnrnnznk'br mm; heal
mum-z m: mmsscsinflmy mm. mmm. w.» um. ,
Network Address Translation (NAT) provtdes multiple Internet
connections using single IP address If you need multiple connections,
use the following screen to specify the public IP addresses to be
opened for your client users. NAT can also prevent hacker attacks by
mapping local addresses to public addresses for key services such as
the Web or FTP.
4—21
NEWORKTNG AND CHEM SERVICE?
4-22
Address Mapping
Adams; Mmplng , ‘
Newncwressflmemn at“ aim I" adore
7 m. mmnfl mm maz—
'4 chum!" [3 1n'_, 5 1.5“ nilqnflwanimultrileulHPl
7 (mm mm: ,,,,,, K “921882 E
"asthmr.fi.fi”” vb “mm“.smuntwmmp‘
, 1 ,, em
56 the “Address Mapping” option to limit the number of public IP
w a pnvsia luminelmlk m be (named m one
um— imits A» number a pubic p addresm ,
t 12301st new an sun U of llm Mi hum.» k ilualiurlvh. ‘ 1." "mm
man one yuL r 35d acs m pa mapped w a peg cam» addresses
\ um pi i E u 1! Il-ll'nrmndzvlmlflphvllld l:-
, man when unsusz F
7. GlnhIIPE E .E E lsmmrmmnd n mm mm w:
a. em: w E ,E E inmflnmda: mum-mm P:
mm mmle mu mumz
s mun-HP F'- E'— rm 5 Iansi-wudlsmunilsvinuuwl
film- was; rm mum"—
rm mum rlntmtml r“
a Globalle lli— F...__ If:— ffl— mar-mama usnullinllwllud m
m. «mm; r—WVW “£le—
yemmfi F i E , mmu‘wmvn-mwphmmum
mmmazfi immmzfi
mm msz—xnm walli-
g mm r— r h—"Z 5— mmhmmw w.
m wuss: h—mfi; ia— "
m mm»: In— F {5'_, r“, mmmmwm
addresses required from the ISP and maintain the privacy and
security of the local network.
CONFIGURING 7715 BARRIGADE PLUS
Virtual Server
mas-swamp V 7 ' — ,*1
Ynu cm (In-sigma ham-mas mm; s vimnir ssmngm yams mu mum suvitss-sugh “iv-s
_ Wsh u FTP «you Iota] sibsvllpubhc IP caresses am mmcmwmmmm local saws,
munmm puma wP addmssss n mfm'nords, den mgnn me rammed service (TCPMDPI
when, we samcsde F'ms rauwensme mum service rsquesmme Appfopume sewer (mm a
wtngrnnygmay morass). —, , ,
NETWORKING AND CLIENT SERVICES
4-24
If you configure the Barricade Plus as a virtual server, remote users
accessing services such as Web or HP at your local site via public
IP addresses can be automatically redirected to local servers
configured with private IP addresses. In other words, depending
on the requested service (TCP/UDP port number), the Barricade
Plus redirects the external service request to the appropriate server
(located at another internal IP address).
The WAN interface must have a fixed IP address to utilize this
function. For example, if you set Type/Public Port to TCP/SO
(HTTP or Web) and the Private IP/Port to 192,168.2.2/80, then all
HTTP request from outside users will be transferred to 192.168.22.
Therefore, by just entering the IP Address provided by the ISP,
Internet users can access the service they need at the local address
to which you redirect them.
Some of the more common TCP service ports include:
HTTP: 80, FTP: 21, Telnet: 23 and POP3: 110.
CONFIGURING THE BARRJGADE PLUS
Firewall Protection
, secmuy Seuingfll’hemfll
Inn Bumnfll Plusymmui "mun-u mm" mum uy mummy mmtflnn nlmmllnm l'mil
m risk fihnbkénlflt m1 Menu-mg agrlvm a m. amyvlcnmmnn mm Hm! far i '
appllcmlun mum-a arm 1mm Imam! M an mmfigwsa spakiflc mum/5m: ;
‘ w a mi m , ,
Enlilhnvdmnhln Fumllmnfilhmnnmt' c Ennhlv a: mau-
lhe Barricade Plus’ firewall can provide the access control of
connected client PCs, block common hacker attacks, including IP
Spoofing, Land Attack, Ping of Death, IP with zero length, Smurf
Attack, UDP port loopback, Snork Attack, TCP null scan, and TCP
SYN flooding. The firewall does not significantly affect system
performance, so we advise setting it enabled to protect your
network users by selecting “Enable” on the screen.
Note: When you select the "Enable” radio button of the “Enable
or disable Firewall module function” field, he sure [0 press
the “APPLY” button.
4—25
NETWORKING AND CLIENT SERVICES
Access Control
Access cumin): T
Mast mm nIhws Lam u. dalm Ihe wk (yr. win-n. “a. ..mm m WAN m’ flew“ m: pigl Imus-s IP sea-s}
Mnr’lmmdMAD-dm-ufiunng , , ,
' . Wm,"magnum“ m“ rm 7 ,
' . “WWW“summwnmpm, ' ' ,
“In; ' , , '
g '. mammary-qnun-mammalian“ 7 ,
“m
I z : : I— : ‘f
2 : , ;
a : ,
F A :
5 :
a 1 5
7 :
a ,, f, 5 F7 7
s : -
m T“ : I—
117 If: 7: : z
12 l_‘ , 4 . : I—
13 1, : f : z] ,
m 1 1 = : z ,
<5 1_: I : : : ‘M,
15 I— : : : , - - r",
17 I“: I : ; : :
Is I : 1 1 : I : |
19 I ,: I, : l :
20 I : : I ,
21 [w : 1 ,: | :
22 | : I I :
2; 1_: l— :
”2,4, I : : : I .: 7 7
25 If: : |_: Ff : l—
25 | ,: : : I : I ,
27, l,— : F‘: I— : F’”
29 : : : _
29 I“ - : I- : “‘: I"
30 F 1 : l_ : r: l—
:u ‘ : . : | : I : |
32 F5: : | : : I : I
4—26
CONFIGURING THE BARRICADE PLUS
Using this option allows you to specify different privileges for the
client PCs.
The following items are included in the “Access Control” screen:
Field Description
Normal Filtering Table Displays the IP address and filtering status of
the connected client PC
MAC Filtering Table Displays the MAC address of the client PC
W“
Note: Click on “Add PC” and define the appropriate settings for
client PC sewices (as shown in the following screen).
Access Control
(‘lmmcfimgcvimtonz' Th'
CiaanCFAddmss' r“.{_r‘f_,_[r‘
CLLnI Dc
vf mm H- AlmummmM-mnn.)
Sclumm'mtr saunter”) "am,” ' 77
m age: ~
4—27
NETWORKING AND CLIENT SERVICES
4-28
URL Blocking
um. Blucflng
“mama m» 5mm] Kuwmd‘.
We can Muck mm: m umh Wen ms m . unimrPC Mm“; my... 2 nu an “an“ m 3.4 mm.- 110"! w"
m , , ,
2mm m. mac-mm an m u: m; “was; Dmmr pm mflghznkihahnx rummnummnwmh. mm
W; m.- , —
Using the above screen to block access to the Web sites specified in
the table.

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.3
Linearized                      : No
Encryption                      : Standard V1.2 (40-bit)
User Access                     : Print, Copy, Fill forms, Extract, Assemble, Print high-res
Modify Date                     : 2002:03:29 15:19:30+08:00
Create Date                     : 2002:03:29 15:19:15+08:00
Title                           : scan-1.XDW
Author                          : brian
Creator                         : PScript5.dll Version 5.2
Producer                        : Acrobat Distiller 5.0 (Windows)
Page Count                      : 10
EXIF Metadata provided by EXIF.tools
FCC ID Filing: HEDACC7004WFW

Navigation menu