BUFFALO 09102057-1 802.11 b/g USB adapter User Manual 830 115 WLI USB KB11 ManV2 indd

BUFFALO INC. 802.11 b/g USB adapter 830 115 WLI USB KB11 ManV2 indd

Manual

User Manual                  BUFFALO     802.11 b/g USB adapterWLI-U2-KG54Lwww.buffalo-technology.com
2Installation802.11 b/g USB adapterInstallation & Configuration1. Installing the 802.11b/g USB adapter:   Insert the USB Adapter into your Laptop or Desktop PC as shown. USB ports may be located on the rear, front or side of your PC depending on the design. If there are multiple ports, choose the port that is free of interference to maximize antenna reception.
32. Device Discovery: Once inserted, Windows will automatically discover the presence of new hardware. Various popup clouds will appear from the Windows taskbar.  During this time, allow Windows and the Wireless USB Adapter to communicate. The process should take about one minute.   Click Next if the Found New Hardware Wizard appears as shown above. Installation
4Installation3. Wireless Adapter Driver Installation: In Windows XP or 2000, the following dialog box may appear as drivers are installed. If so click Yes or Continue Anyway to finish installing the necessary drivers. Windows 98SE/ME/2000 users should skip to page 9.
5Completing Installation on Windows XP4. Completing Driver Installation for Windows XP:     When the driver has completed installing on a Windows XP PC click Finish.If you wish to use Windows Wireless Zero Configuration Service click No on the next dialog box and go on to page 6. Otherwise, click Yes on the dialog box to install Buffalo’s Client Manager and go on to page 10.
63. Configuring Wireless Zero Configuration Service:If the Wireless Zero Configuration Service is activated, Windows will scan for available wireless access points once the Wireless PCI Adapter is properly installed. If Windows detects one or more access points, a networking icon appears on the task bar.  One or more wireless networks are available appears as a caption accompanying the icon.Note: If the Wireless Zero Configuration Service is not functioning, select Start>Control Panel>Administrative Tools>Services. Select Automatic in the Startup Type field of Wireless Zero Configuration Service to enable the Wireless Zero Configuration Service. The default value of Wireless Zero Configuration Service is Automatic.Right click the networking icon in the taskbar and select View Available Wireless Networks to display a list of available wireless networks.  Select an access point network name and click the Connect button to establish a connection.  You may need to check the box indicating you are connecting to an unsecured network.  See Page 7 if you need to enter an SSID network name or WEP/WPA encryption key.Using Wireless Zero Configuration Service
7Click the Advanced button to enter an SSID network name or WEP/WPA encryption key, if either is necessary.  To add an SSID network name that is not available, click the Add button.Using Wireless Zero Configuration Service
8Using Wireless Zero Configuration ServiceTo configure a WEP/WPA encryption key, select the appropriate wireless network and click the Configure button.From the pull down menu, select the appropriate Network Authentication and Data Encryption for the wireless network.  Enter and confirm the Network Key and Key Index.  Click the OK button when finished.Note: Buffalo Technology recommends that users of the Wireless Zero Configuration Service upgrade to the latest version freely available at: http://www.microsoft.com.For advanced support in using Window’s XP’s Wireless Zero Configuration Service, refer to the Buffalo Support Web Site: http://www.buffalo-technology.comSkip to Page 12 if you are not using Windows XP or prefer not to use Windows XP's Wireless Zero Configuration Service.
9Completing  Installation on Windows 98SE/ME/20004. Completing Driver Installation for Windows 98SE/ME/2000:When the driver has completed installing on a Windows XP PC click Finish.Click Yes on the new dialog box that will appear to install Buffalo’s Client Manager.
10Client ManagerUse Client Manager to configure your wireless network. Use Client Manager to survey and connect to available access points, enable and use WEP/WPA encryption, and create connection profiles.Note: Client Manager does not function properly if the Windows XP Wireless Zero Configuration Service is enabled.Installing Client ManagerOnce the InstallShield Wizard launches, click the Next button to begin the software installation.Client Manager
11Client ManagerOnce the Installer Wizard launches, click the Next button to begin the software stallation.Press I Agree to accept the license agreement and continue the installation process.
12Client ManagerPress the OK button to finish and close the installation program.Press the Exit button to exit the Client Manager installation utility.◗  The Buffalo Client Manager is now installed and running, right clicking on its icon (the black notebook icon) will allow you to begin using it.
13Client Manager ConfigurationUse Client Manager to configure your wireless network. To assist in configuring your wireless network, Client Manager consists of the Status page, the Survey page, and the Profiles page. You can access each page by clicking the corresponding button on Client Manager. In addition to these pages, several dialog boxes are available to meet specialized configuration needs. You can access the Edit Profile dialog box, New Profile dialog box, IP Configuration dialog box, or WEP Configuration dialog box using the Client Manager pages. Status PageClick the Status button to open this page. By default, this page is displayed when you start Client Manager. This page displays the status of the connection between the wireless adapter and another wireless device. This page only displays connection information no changes to the connection can be made from this screen.This page includes the following components:• Network Type – Displays what mode the network device is in.  Ad-Hoc or Infrastructure are the available modes. Client Manager Configuration
14Client Manager Configuration•  Rate – The speed that the two wireless clients are communicating at.  If the Client Manager is not connected to a remote wireless device (access point or another client) then no rate will be displayed.•  Channel – The channel that the two wireless clients are communicating at.  If the Client Manager is not connected to a remote wireless device (access point of another client) then no channel will be displayed.  The available channels for use are 1-11(USA & Tawian).•  Security– The type of encryption that the two wireless clients are communicating with.  If the Client Manager is not connected to a remote wireless device (access point of another client) then ‘No Encryption’ will be displayed.•  IP Address – The IP address of the machine the Client Manager is installed on. If the Client Manager is not connected to a remote wireless device (access point of another client) or is not connected to a network with DHCP, then no IP address will be displayed.•  MAC Address – The MAC address of the wireless client device inside the computer Client Manager is installed on. If no wireless device is present in the computer, then no MAC Address will be displayed.•  Signal Strength – Displays the strength of the signal. Signal Strength is based on the peak signal level the wireless adapter receives from the wireless device to which it is connected.  Next to the signal level is the wireless hardware type that the computer has available.
15Client Manager ConfigurationSurvey PageClick the Survey button to open this page. Use this page to survey the area, display available access points, and connect to available access points.This page includes the following components:• Wireless SSID – Displays the SSID associated with each available access point. The SSID is the unique network name that functions as an identifier for your wireless devices. All wireless devices on a network must use identical SSIDs to successfully associate with other devices on the network. buffalo_test is an example of a valid SSID.• Mode – Displays the mode/rate set that the remote wireless device is offering.• Key – Displays whether the wireless network is using any sort of encryption.Press the ‘Connect’ button to connect to a listed SSID, or press the ‘Refresh’ button to perform another survey and update the survey list.
16Client Manager ConfigurationOnce the ‘Connect’ button is pressed, you will be prompted to enter any encryption related information.The ‘Acquire IP automatically’ checkbox tells the client device to obtain an IP automatically from a DHCP server.  This is the recommended setting.The ‘Encryption’ drop down list allows you to select the type of encryption for the network.  By default the proper encryption type should already be selected.  In the event that no encryption is used, leave the ‘No Encryption’ option selected.by the wireless network must be inputted.  Please consult your wireless access point or router’s documentation for proper input of the encryption keys.  Some wireless networks may require you to enter multiple keys, in this event, four separate fields are available for encryption keys.The ‘Save settings as a profile’ option will store this wireless network in your profiles.  This means you will automatically connect to this network when inside its range.  This settings is recommended if you plan on using this wireless network more than once.
17Profiles PageClick the Profiles button to open this page. Use this page to access your profiles. Profiles allow you to save the information associated with a specific wireless network so you can quickly and easily connect to that network when you are in that location. The Profiles page allows you to add, delete, and edit your profiles, as well as import and export data.• Connect – Click the Connect button to connect to the selected profile and return to the ‘Status’ page.• Edit – Click the Edit button to edit the selected profile’s settings.  The Edit button also allows you to delete a profile no longer used or required.• Add – Click the Add button to add a profile manually.  You will need important information such as SSID, encryption settings, and network type.Client Manager Configuration
18New Profile Dialog BoxUse this dialog box to create a new profile.Client Manager Configuration• Profile Name – Enter the name you want to associate with the new profile.• Network Type – Select the network mode you want to associate with the new profile. Select Infrastructure if your network consists of both wired and wireless devices that communicate through a central device, such as an access point. Select Ad-hoc if your network consists of only wireless devices that communicate with each other directly.• Network Name SSID – Enter the SSID of your     must use identical SSIDs to successfully associate with other devices on the network. myssid is an example of a valid SSID. • Channel – Displays the channel associated with the new profile. The channel indicates what range of frequencies the radio waves emitted by the wireless device are occupying. Devices that meet 802.11b and 802.11g standards can use channels 1-11 within the 2.4 GHz spectrum.• Encryption Type –  Displays the types of encryptions available.  Once selected, you will be required to enter the Encryption Key Number and the Encryption Key as well.  For the Encryption Key Number, it is recommended to use 1 unless specified to by an administrator.
19Client Manager ConfigurationAdvanced Profile Options• Network Tab –  Displays the network information tab.  A static IP can be specified for this wireless profile here.  It is not recommended to change any of these settings unless specified by an administrator.• Browser Tab –  Displays settings to change your browser preferences for this wireless profile.  A specific home page can be specified when connected to this wireless profile as can specific proxy server addresses.• Printers Tab –  Displays the printers tab.  A specific default printer can be associated to this profile.  Thus, when connected to this profile, a specific printer will be used as the default printer.• Network Tab –  Displays the network information tab.  A static IP can be specified for this wireless profile here.  It is not recommended to change any of these settings unless specified by an administrator.• OK – Click the OK button to save your specifications and return to the Profiles page.• AOSS Icon –  The AOSS icon is used to launch AOSS client requests for AOSS communication.  Inside your wireless client’s box, an AOSS supplement guide is present.  This guide leads to step-by-step instructions on using the AOSS icon.
20Wireless Zero ConfigurationWireless Zero Configuration Service (Windows XP)Windows XP offers the Wireless Zero Configuration Service to support 802.11b and 802.11g wireless networking. This service automatically polls the area for available wireless access points. If an available wireless access point is found, Windows attempts to connect to the access point. If no available wireless access points are found, you must manually add the access points.Note: The Wireless Zero Configuration Service and Client Manager do not function properly together. If you want to use Client Manager, you must disable the Wireless Zero Configuration Service. Enabling the Wireless Zero Configuration ServiceSelect Start»Control Panel»Administrative Tools»Services to open the Services window. Select Automatic in the Startup Type field of Wireless Zero Configuration Service to enable the Wireless Zero Configuration Service.Note: The default Startup Type value of Wireless Zero Configuration Service is Automatic. Disabling the Wireless Zero Configuration ServiceSelect Start»Control Panel»Administrative Tools»Services to open the Services window. Select Disabled in the Startup Type field of Wireless Zero Configuration Service to disable the Wireless Zero Configuration Service.
21SpecificationsCommunication RangeSpeed  Indoor  Outdoor54Mbps  165 ft. (50m)  525 ft. (160m)11Mbps  300 ft. (90m)  1310 ft. (400m)1Mbps  375 ft. (115m)  1750 ft. (550m)All distances are estimated.  Wireless connections may be affected as physical conditions and circumstances vary.
22Troubleshooting / FAQTroubleshooting / FAQUse this section to locate answers to frequently asked questions.What should I do if I already have a version of Client Manager on my PC? Update your Client Manager to the version on the CD.  If you do not update your Client Manager, there could be a loss of functionally, as some versions of Client Manager will not work properly with the G54 Wireless 54Mbps Desktop PCI Adapter.  Before updating Client Manager, you must uninstall all previous versions of Client Manager.  To update your Client Manager, load the Air Navigator CD and select Install Client Manager.Why won't all my network clients work? Some operating systems support only a limited number of network clients.Windows 98/Me: These operating systems support only four network clients. If you install more than four network clients, only the first four clients you install will work.Will Client Manager support all operating systems? Client Manager and the G54 Wireless 54Mbps Desktop PCI Adapter currently support only Windows 98/ME/2000/XP. They do not currently support Windows NT, Mac OS, or Linux. For more information, refer to the Mac OS and Linux page in the Troubleshooting section of this help file.
23Troubleshooting / FAQWhy won't Client Manager function properly? Windows XP – The Wireless Zero Configuration Service conflicts with Client Manager. Select Start»Control Panel»Administrative Tools»Services to open the Services window. Select Disabled in the Startup Type field of Wireless Zero Configuration Service to disable the Wireless Zero Configuration Service.I have more than one Air Navigator CD. Do I need more than one CD? No. You receive the same Air Navagator CD with each Buffalo Technology access point and wireless adapter. The CDs are identical and you only need one copy.
2410BaseT or 100BaseTx:  802.3 based Ethernet network that uses UTP (Unshielded twisted pair) cable and a star topology.  10 is 10 Mbps and 100 is 100 Mbps. 802.1x: The standard for wireless LAN authentication used between an AP and a client.  802.1x with EAP will initiate key handling. Ad-Hoc Network: The wireless network based on a peer-to-peer communications session.  Also referred to as AdHoc. Bandwidth:  The transmission capacity of a computer or a communication channel, stated in Megabits per second (Mbps). BSS (Basic Service Set):  An 802.11 networking framework that includes an Access Point. Bus Mastering:  A system in which the specified Input/Output device (e.g. NIC Card) can perform tasks without the intervention of the CPU. Client: A PC or workstation on a network. Cross-Over Wiring: A UTP cable that has its transmit and receive pair crossed to allow communications between two devices. DCE (Data Communications Equipment):  Hardware used for communication with a Data Terminal Equipment (DTE) device. Default Gateway: The IP Address of either the nearest router or server for the LAN. Default Parameter: Parameter set by the manufacturer. Destination Address: The address portion of a packet that identifies the intended recipient station. Glossary
25DHCP (Dynamic Host Configuration Protocol): Based on BOOTP, it uses a pool of IP addresses, which it assigns to each device connected to it, and retrieves the address when the device becomes dormant for a period of time. DNS (Domain Name System):  System used to map readable machine names into IP addresses Driver:  Software that interfaces a computer with a specific hardware device. DSSS (Direct Sequence Spread Spectrum): Method of spreading a wireless signal into wide frequency bandwidth. DTE (Data Terminal Equipment):  Device that con10BaseT or 100BaseTx:  802.3 based Ethernet network that uses UTP (Unshielded twisted pair) cable and a star topology.  10 is 10 Mbps and 100 is 100 Mbps. 802.1x: The standard for wireless LAN authentication used between an AP and a client.  802.1x with EAP will initiate key handling. Ad-Hoc Network: The wireless network based on a peer-to-peer communications session.  Also referred to as AdHoc. Bandwidth:  The transmission capacity of a computer or a communication channel, stated in Megabits per second (Mbps). BSS (Basic Service Set):  An 802.11 networking framework that includes an Access Point. Bus Mastering:  A system in which the specified Input/Output device (e.g. NIC Card) can perform tasks without the intervention of the CPU. Client: A PC or workstation on a network. Glossary
26Cross-Over Wiring: A UTP cable that has its transmit and receive pair crossed to allow communications between two devices. DCE (Data Communications Equipment):  Hardware used for communication with a Data Terminal Equipment (DTE) device. Default Gateway: The IP Address of either the nearest router or server for the LAN. Default Parameter: Parameter set by the manufacturer. Destination Address: The address portion of a packet that identifies the intended recipient station. DHCP (Dynamic Host Configuration Protocol): Based on BOOTP, it uses a pool of IP addresses, which it assigns to each device connected to it, and retrieves the address when the device becomes dormant for a period of time. DNS (Domain Name System):  System used to map readable machine names into IP addresses Driver:  Software that interfaces a computer with a specific hardware device. DSSS (Direct Sequence Spread Spectrum): Method of spreading a wireless signal into wide frequency bandwidth. DTE (Data Terminal Equipment):  Device that controls data flowing to and from a computer. Dynamic IP Address:  An IP address that is automatically assigned to a client station in a TCP/IP network, typically by a DHCP server. ESS (Extended Service Set):  A set of two or more BSSs that form a single sub-network.  ESS-ID is user identification Glossary
27simultaneously. Gbps (Giga Bits per second):  One billion bits per second. Half-duplex: To transmit on the same channel in both directions, one direction at a time. Hub:  A device which allows connection of computers and other devices to form a LAN.  IEEE (Institute of Electrical and Electronics Engineers):  The professional organization which promotes development of electronics technology.  IP (Internet Protocol) Address:  A unique 32-binary-digit number that identifies each sender or receiver of information sent in packets. Infrastructure:  A wireless network or other small network in which the used in the ESS LAN configuration. Ethernet: The most widely used architecture for Local Area Networks (LANs). It is a shared-media network architecture. The IEEE 802.3 standard details its functionality. Ethernet cable: A wire similar to telephone cable that carries signals between Ethernet devices. File and Print Sharing: A Microsoft application that allows computers on a network to share files and printers. Firmware: Programming  inserted into programmable read-only memory, thus becoming a permanent part of a computing device. Frame: A fixed block of data, transmitted as a single entity.  Also referred to as packet. Full-Duplex:  To transmit on the same channel in both directions Glossary
28wireless network devices are made a part of the network through the Access Point. ISP (Internet Service Provider):  A company that provides access to the Internet and other related services. IV (Initialization Vector):  The header section of a message packet. LAN (Local Area Network):  A group of computers and peripheral devices connected to share resources. LED (Light Emitting Diode):  The lights on a hardware device representing the activity through the ports. MAC (Medium Access Control) Address:  A unique number that distinguishes network cards. Mbps (Mega Bits Per Second):  A measurement of millions of bits per second. MDI/X (Media Dependent Interface/Cross-over):  Port on a network hub or switch that crosses the incoming transmit lines with the outgoing receive lines. MHz (MegaHertz):  One million cycles per second. MIB II:  A database containing performance information and statistics on each device in a network. MIPS (Million Instructions Per Second):  A measurement of processing speed. NAT (Network Address Translation):  An internet standard that enables a LAN to use one set of IP addresses for internal traffic and a second set for external traffic. NIC (Network Interface Card):  An expansion card connected to a computer so the computer can be connected to a network. Glossary
29Packet:  A block of data that is transferred as a single unit, also called a frame or a block. Packet Filtering:  Discarding unwanted network traffic based on its originating address or its type. PCI (Peripheral Component Interconnect):  A bus that is connected directly to the CPU. PCMCIA (Personal Computer Memory Card International Association) Card:  Removable module that adds features to a portable computer. Ping (Packet Internet Groper):  An Internet utility used to determine whether a particular IP address is online. Plug and Play:  Hardware that, once installed (“plugged in”), can immediately be used (“played”), as opposed to hardware that requires manual configuration. PoE (Power over Ethernet):  A mechanism to send DC power to a device using a CAT5 Ethernet cable. PPPoE (Point-to-Point Protocol over Ethernet):  A specification for connecting users on an Ethernet line to the Internet through a common broadband medium. Protocol:  A standard way of exchanging information between computers. RADIUS (Remote Authentication Dial In User Service):  A server that issues authentication key to clients. RAM (Random Access Memory):  Non-permanent memory. Repeater Hub:  A device that collects, strengthens and transmits information to all connected devices, allowing the network to be extended to Glossary
30accommodate additional workstations. RC4:  The encryption algorithm that is used in WEP.  RJ-45 connector:  An 8-pin connector used between a twisted pair cable and a data transmission device. ROM (Read Only Memory):  Permanent memory. Router:  Device that can connect individual LANs and remote sites to a server. Roaming:  The ability to use a wireless device while moving from one access point to another without losing the connection. Script:  A macro or batch file containing instructions and used by a computer to perform a task. Server:  Any computer that makes files or peripheral devices available to users of the network and has a resident Network OS. SMTP (Simple Mail Transfer Protocol):  The protocol used to define and deliver electronic mail (E-mail) from one location to another. SNMP (Simple Network Management Protocol:  An application layer protocol that outlines the formal structure for communication among network devices. Static IP Address:  A permanent IP address is assigned to a node in a TCP/IP network.  Also known as global IP.  STP (Shielded Twisted Pair):  Twisted Pair cable wrapped in a metal sheath to provide extra protection from external interfering signals. Subnet Mask:  An eight-byte address divided into 4 parts separated by Glossary
31periods. TCP/IP (Transmission Control Protocol/Internet Protocol:  Protocol used by computers when communicating across the Internet or Intranet. TFTP (Trivial File Transfer Protocol):  Simple form of FTP (File Transfer Protocol), which Uses UDP (User Datagram Protocol), rather than TCP/IP for data transport and provides no security features. TKIP (Temporal Key Integrity Protocol):  An encryption method replacing WEP.  TKIP uses random IV and frequent key exchanges. Topology:  The shape of a LAN (Local Area Network) or other communications system. Twisted Pair:  Cable that comprises 2 or more pair of insulated wires twisted together. UDP (User Datagram Protocol):  A communication method (protocol) that offers a limited amount of service when messages are exchanged between computers in a network.  UDP is used as an alternative to TCP/IP. Uplink:  Link to the next level up in a communication hierarchy. UTP (Unshielded Twisted Pair) cable:  Two or more unshielded wires twisted together to form a cable. WAN (Wide Area Network):  A networking system covering a wide geographical area. Glossary
32FCC / CE InformationFederal Communication Commission Interference StatementThis equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to  provide  reasonable  protection  against  harmful  interference  in  a  residential installation.  This  equipment  generates,  uses  and  can  radiate  radio  frequency energy and, if not installed and used in accordance with the instructions, may cause  harmful  interference  to  radio  communications.  However,  there  is  no guarantee  that  interference  will  not  occur  in  a  particular  installation.  If  this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:• Reorient or relocate the receiving antenna.• Increase the separation between the equipment and receiver.• Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.• Consult the dealer or an experienced radio/TV technician for help.FCC  Caution:  To  assure  continued  compliance,  (example  -  use  only  shielded interface cables when connecting to computer or peripheral devices). Any changes or modifications not expressly approved by the party responsible for compliance could void the user’s authority to operate this equipment.This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and
33(2) this device must accept any interference received, including interference that may cause undesired operation.IMPORTANT NOTE:FCC RF Radiation Exposure Statement:This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with a minimum distance of 20 centimeters between the radiator and your body.This  transmitter  must  not  be co-located  or  operating  in  conjunction  with  any other antenna or transmitter.Europe – EU Declaration of ConformityThis device complies with the essential requirements of the R&TTE Directive 1999/5/EC. The following test methods have been applied in order to prove presumption of compliance with the R&TTE Directive 1999/5/EC:- EN 60950-1: 2001+A11: 2004, First Edition Safety of Information Technology Equipment- EN 300 328 V1.6.1 (2004-11)Technical requirements for spread-spectrum radio equipmentFCC / CE InformationThis equipment complies with FCC radiation exposure limits set forth for an uncontrolledenvironment. End users must follow the specific operating instructions for satisfying RFexposure  compliance.  To  maintain  compliance  with  FCC  RF  exposure  compliancerequirements, please follow operation instruction as documented in this manual.This  transmitter  must  not  be  co-located  or  operating  in  conjunction  with  any  otherantenna or transmitter.SAR  compliance  has  been  established  in  typical  laptop  computer(s)  with  USB  slot,  andproduct  could  be  used  in  typical  laptop  computer  with  USB  slot.  Other  application  likehandheld PC or similar device has not been verified and may not compliance with related RFexposure rule and such use shall be prohibited.
38Warranty InformationBuffalo Technology products comes with a two-year limited warranty from the date of purchase. Buffalo Technology  warrants to the original purchaser the product; good operating condition for the warranty period. This warranty does not include non-Buffalo Technology installed components. If the Buffalo product malfunctions during the warranty period, Buffalo Technology will, replace the unit, provided the unit has not been subjected to misuse, abuse, or non-Buffalo Technology authorized alteration, modifications or repair. All  expressed  and  implied  warranties  for  the  Buffalo  Technology  product  line including, but not limited to, the warranties of merchantability and fitness of a particular purpose are limited in duration to the above period. Under  no  circumstances  shall  Buffalo  Technology    be  liable  in  any  way  to  the user for damages,  including any lost profits,  lost savings or other incidental or consequential damages arising out of the use of, or inability to use the Buffalo products. In no event shall Buffalo Technology  liability exceed the price paid for the product from direct, indirect, special, incidental, or consequential damages resulting from the use of the product, its accompanying software, or its documentation. Buffalo Technology does not offer refunds for any product.
39

Navigation menu