D Link IR627A1 Wireless N 300 Open Source Router User Manual
D Link Corporation Wireless N 300 Open Source Router
D Link >
User Manual
Wireless N 300 Open Source Router Wireless N 300 OPEN SOURCE çĄçˇĺŻŹé ťď¤ˇçąĺ¨ Table of Contents Table of Contents Package Contents.......................................................................1 System Requirements............................................................1 Features................................................................................. 2 Hardware Overview................................................................3 Rear Panel Connections.................................................. 3 Front Panel LEDs............................................................ 4 Right Side Panel LED...................................................... 5 Installation....................................................................................6 Before you Begin....................................................................6 Wireless Installation Considerations....................................... 7 Wall Mounting Your Device....................................................8 Connect to Cable/DSL/Satellite Modem............................... 10 Connect to Another Router...................................................11 Configuration.............................................................................13 Web-based Configuration Utility........................................... 13 Basic..............................................................................14 LAN................................................................................15 WAN .............................................................................16 Status ............................................................................18 Filters ............................................................................19 Routing .........................................................................20 Radio ............................................................................21 SSID .............................................................................23 Security .........................................................................24 Firmware .......................................................................27 Wireless Security......................................................................28 What is WEP?......................................................................28 Configure WEP.....................................................................29 What is WPA?......................................................................30 D-Link DIR-627 User Manual Configure WPA-PSK............................................................31 Configure WPA2-PSK..........................................................32 Configure WPA.....................................................................33 Configure WPA2...................................................................34 Configure WPA (RADIUS).................................................... 35 Configure and WPA2 (RADIUS)........................................... 36 Connect to a Wireless Network................................................37 Using WindowsÂŽ XP..............................................................37 Configure WEP.....................................................................38 Configure WPA-PSK............................................................40 Setting Up Wi-Fi Protection (WCN 2.0 in Windows Vista).....................................................42 Initial Router Configuration for Wi-Fi Protection................... 42 Setting Up a Configured Router........................................... 43 Changing the Computer Name and Joining a Workgroup.... 44 Configuring the IP Address in Vista........................................46 Setting Up a Connection or Network Wirelessly.................... 49 Connecting to a Secured Wireless Network (WEP, WPA-PSK & WPA2-PSK).............................................................................54 Connecting to an Unsecured Wireless Network.................... 58 Configuring the Network in MAC OS X Snow Leopard (10.6)... 62 Configuring the Wireless Network in MAC OS X Snow Table of Contents Leopard (10.6)............................................................................64 Troubleshooting........................................................................68 Wireless Basics.........................................................................72 Tips....................................................................................... 75 Wireless Modes....................................................................76 Networking Basics....................................................................77 Check your IP address.........................................................77 Statically assign an IP address............................................. 78 Technical Specifications..........................................................79 D-Link DIR-627 User Manual ii Section 1 - Product Overview Package Contents ⢠D-Link DIR-627 Wireless Router ⢠Power Adapter ⢠Ethernet Cable ⢠Wall Mount Kit ⢠User Manual on CD ⢠Open Source Manual on CD ⢠Warranty Card Note: Using a power supply with a different voltage than the one included with the DIR-627 will cause damage and void the warranty for this product. Note: Always attach the power cord plug to the power supply, before inserting the power cord and connected power supply to the wall outlet. System Requirements ⢠Ethernet-based Cable or DSL Modem ⢠Computers with WindowsÂŽ, MacintoshÂŽ, or Linux-based operating systems with an installed Ethernet adapter ⢠Internet Explorer 6 or later or Mozilla Firefox 2.0 or later (for configuration) D-Link DIR-627 User Manual Section 1 - Product Overview Features ⢠Faster Wireless Networking - The DIR-627 provides up to 300Mbps* wireless connection with other 802.11n wireless clients. This capability allows users to participate in real-time activities online, such as video streaming, online gaming, and real-time audio. ⢠Compatible with 802.11b and 802.11g Devices - The DIR-627 is still fully compatible with the IEEE 802.11b and IEEE 802.11g standard, so it can connect with existing 802.11b and IEEE 802.11g PCI, USB and Cardbus adapters. ⢠Supports four 10/100M Ethernet ports - The DIR-627 has four LAN ports. ⢠Advanced Firewall Feature - The Web-based user interface displays a number of advanced network management features including: ⢠Filter Scheduling - These filters can be scheduled to be active on certain days or for a duration of hours or minutes. * Maximum wireless signal rate derived from IEEE Standard 802.11g and Draft 802.11n specifications. Actual data throughput will vary. Network conditions and environmental factors, including volume of network traffic, building materials and construction, and network overhead, lower actual data throughput rate. Environmental conditions will adversely affect wireless signal range. D-Link DIR-627 User Manual Section 1 - Product Overview Hardware Overview Rear Panel Connections Internet Port The Auto MDI/MDIX WAN port is the connection for the Ethernet cable to the Cable or DSL modem. Reset Button Pressing the Reset Button restores the Router to its original factory default settings. Alarm Connector The connector for the alarm. This is used to set up alarms. LAN Ports Connect Ethernet devices such as computers, switches, and hubs. D-Link DIR-627 User Manual USB Port This USB port supports the D-Link SharePort function. Connect a multifunction printer, scanner, or USB storage device to the port and share the device through the network. Power Receptor The receptor for the supplied Power Adapter. Section 1 - Product Overview Hardware Overview Front Panel LEDs Internet LED A solid green light indicates the connection on the WAN port. An amber light indicates that the Internet connection has failed. This LED blinks during data transmission. WLAN LED A solid light indicates that the wireless segment is ready. This LED blinks during wireless data transmission. Power LED A solid green light indicates a proper connection to the power supply. A blinking amber light indicates the device is booting up. D-Link DIR-627 User Manual USB LED A solid green light indicates a device is connected to the USB port via a USB cable. Ethernet LEDs A solid light indicates a connection to an Ethernet-enabled device on ports 1 to 4. This LED blinks during data transmission. Section 1 - Product Overview Hardware Overview Right Side Panel LED WPS Button LED Use the WPS button on the right side panel of the Router to establish a secure connection to wireless clients that support WPS (Wi-Fi Protected Setup). D-Link DIR-627 User Manual Section 2 - Installation Installation This section will walk you through the installation process. Placement of the Router is very important. Do not place the Router in an enclosed area such as a closet, cabinet, or in the attic or garage. Before you Begin Please configure the Router with the computer that was last connected directly to your modem. Also, you can only use the Ethernet port on your modem. If you were using the USB connection before using the Router, then you must turn off your modem, disconnect the USB cable and connect an Ethernet cable to the WAN port on the Router, and then turn the modem back on. In some cases, you may need to call your ISP to change connection types (USB to Ethernet). If you have DSL and are connecting via PPPoE, make sure you disable or uninstall any PPPoE software such as WinPoet, Broadjump, or Ethernet 300 from your computer or you will not be able to connect to the Internet. D-Link DIR-627 User Manual Section 2 - Installation Wireless Installation Considerations The D-Link wireless Router lets you access your network using a wireless connection from virtually anywhere within the operating range of your wireless network. Keep in mind, however, that the number, thickness and location of walls, ceilings, or other objects that the wireless signals must pass through, may limit the range. Typical ranges vary depending on the types of materials and background RF (radio frequency) noise in your home or business. The key to maximizing wireless range is to follow these basic guidelines: 1. Keep the number of walls and ceilings between the D-Link Router and other network devices to a minimum - each wall or ceiling can reduce your adapterâs range from 3-90 feet (1-30 meters.) Position your devices so that the number of walls or ceilings is minimized. 2. Be aware of the direct line between network devices. A wall that is 1.5 feet thick (.5 meters), at a 45-degree angle appears to be almost 3 feet (1 meter) thick. At a 2-degree angle it looks over 42 feet (14 meters) thick! Position devices so that the signal will travel straight through a wall or ceiling (instead of at an angle) for better reception. 3. Building Materials make a difference. A solid metal door or aluminum studs may have a negative effect on range. Try to position access points, wireless routers, and computers so that the signal passes through drywall or open doorways. Materials and objects such as glass, steel, metal, walls with insulation, water (fish tanks), mirrors, file cabinets, brick, and concrete will degrade your wireless signal. 4. Keep your Router away (at least 3-6 feet or 1-2 meters) from electrical devices or appliances that generate RF noise. 5. If you are using 2.4GHz cordless phones or X-10 (wireless products such as ceiling fans, lights, and home security systems), your wireless connection may degrade dramatically or drop completely. Make sure your 2.4GHz phone base is as far away from your wireless devices as possible. The base transmits a signal even if the phone in not in use. D-Link DIR-627 User Manual Section 2 - Installation Wall Mounting Your Device You can mount the Router to a wall or a partition for easy and convenient placement of your device. To wall mount your device, A. Place the two provided screw anchors about 15 centimeters (~6 inches) apart in the wall or partition where the device is to be placed. D-Link DIR-627 User Manual B. Drive the two provided screws into the screw anchors in the wall or partition where the device is to be placed. Section 2 - Installation C. Place the mounting holes on the bottom of the device over the screws to mount it to the wall or partition. D-Link DIR-627 User Manual D. Connect your cables to the device. Section 2 - Installation Connect to Cable/DSL/Satellite Modem If you are connecting the Router to a cable/DSL/satellite modem, please follow the steps below: 1. Place the Router in an open and central location. Do not plug the power adapter into the Router. 2. Turn the power off on your modem. If there is no on/off switch, then unplug the modemâs power adapter. Shut down your computer. 3. Unplug the Ethernet cable (that connects your computer to your modem) from your computer and place it into the WAN port on the Router. 4. Plug an Ethernet cable into one of the four LAN ports on the Router. Plug the other end into the Ethernet port on your computer. 5. Turn on or plug in your modem. Wait for the modem to boot (about 30 seconds). 6. Plug the power adapter to the Router and connect to an outlet or power strip. Wait about 30 seconds for the Router to boot. 7. Turn on your computer. 8. Verify the link lights on the Router. The power light, WAN light, and the LAN light (the port that your computer is plugged into) should be lit. If not, make sure your computer, modem, and Router are powered on and verify the cable connections are correct. 9. Skip to page page 13 to configure your Router. D-Link DIR-627 User Manual 10 Section 2 - Installation Connect to Another Router If you are connecting the Router to another router to use as a wireless access point and/or switch, you will have to do the following before connecting the router to your network: ⢠Disable UPnP⢠⢠Disable DHCP ⢠Change the LAN IP address to an available address on your network. The LAN ports on the Router cannot accept a DHCP address from your other router. To connect to another router, please follow the steps below: 1. Plug the power into the router. Connect one of your computers to the router (LAN port) using an Ethernet cable. Make sure your IP address on the computer is 192.168.0.xxx (where xxx is between 2 and 254). Please see the Networking Basics section for more information. If you need to change the settings, write down your existing settings before making any changes. In most cases, your computer should be set to receive an IP address automatically in which case you will not have to do anything to your computer. 2. Open a Web browser and enter http://192.168.0.1 and press Enter. When the login window appears, set the user name to admin and leave the password box empty. Click OK to continue. 3. Click on Advanced and then click Advanced Network. Uncheck the Enable UPnP check box. Click Save Settings to continue. 4. Click Setup and then click Network Settings. Untick the Enable DHCP Server server check box. Click Save Settings to continue. 5. Under Router Settings, enter an available IP address and the subnet mask of your network. Click Save Settings to save your settings. Use this new IP address to access the configuration utility of the router in the future. Close the browser and change your computerâs IP settings back to the original values as in Step 1. D-Link DIR-627 User Manual 11 Section 2 - Installation 6. Disconnect the Ethernet cable from the router and reconnect your computer to your network. 7. Connect an Ethernet cable in one of the LAN ports of the Router and connect it to your other router. Do not plug anything into the WAN port of the Router. 8. You may now use the other three LAN ports to connect other Ethernet devices and computers. To configure your wireless network, open a Web browser and enter the IP address you assigned to the router. Refer to the Configuration and Wireless Security sections for more information on setting up your wireless network. D-Link DIR-627 User Manual 12 Section 3 - Configuration Configuration This section will show you how to configure your new D-Link wireless Router using the Web-based configuration utility. Web-based Configuration Utility To access the configuration utility, open a Web-browser such as Mozilla Firefox or Internet Explorer and enter the IP address of the Router (192.168.0.1). The opening Router page appears. D-Link DIR-627 User Manual 13 Section 3 - Configuration Basic The Basic page allows users to configure the basic operations of the Router. Local Time: Displays the Local TIme maintained by the Router. Router Set the router user name for access to the Routerâs User Name: Web interface. The initial router user name is admin. Once this is set up, users can leave this field and the router password field blank to disable the authentication login process. Router Set the router password for access to the Routerâs Password: Web interface. Once this is set up, users can leave this field and the router user name field blank to disable the authentication login process. Router Choose either Router or Access Point. When the Mode: mode is Access Point, the LAN DHCP server, LAN Spanning Tree Protocol, and WAN protocol are disabled. Firewall: Choose either Enabled or Disabled. The firewall default state is Enabled. Connections from the WAN are still allowed when the firewall is Disabled. Time Zone: Select the correct time zone for the Routerâs location: Pacific Time, Mountain Time, Central Time, or Eastern Time. NTP Enter the NTP server IP addresses to use for time Servers: synchronization. Syslog IP Ent e r t h e s y s t e m l o g I P a d d r e s s w h e r e Address: system log messages will be sent. D-Link DIR-627 User Manual Telnet: Choose either Enabled or Disabled. Telnet is Disabled by default. UPnP: Choose either Enabled or Disabled. Universal Plug and Play is Enabled by default. Connection Choose Disabled, Denied, Accepted, or Both to set Logging: which connections the Router should log. Denied enables logging of denied connections, Accepted enables logging of accepted connections, and Both enables logging of both denied and accepted connections. The default setting is Both. 14 Section 3 - Configuration LAN The LAN page allows users to configure the LAN of the Router. MAC Displays the MAC address of the LAN interface. Address: This is also referred to as the Ethernet address. IP Address: Set the IP address of the LAN interface. Subnet Mask: Set the IP netmask of the LAN interface. DHCP Choose either Enabled or Disabled. This controls Server: DHCP server functionality on the LAN. DHCP Starting Set the start of the IP address range that the DHCP IP Address: server will use. DHCP Ending Set the end of the IP address range that the DHCP IP Address: server will use. DHCP Lease Set the number of seconds a DHCP lease should Time: be valid for. DHCP Client This displays active DHCP leases since the last List: reboot. D-Link DIR-627 User Manual 15 Section 3 - Configuration WAN The WAN page allows users to configure the WAN connections of the Router. Protocol: Set the method to obtain an IP address for the connection: DHCP, Static, or PPPoE. Host Name: Set a host name. Some ISPs require a host name be provided when requesting an IP address using DHCP. The default host name is DIR-627. Domain Set the domain name provided to LAN clients who Name: request an IP address through DHCP. MAC Some ISPs require users to enter a specific MAC Address: address. This MAC cloning feature allows users to set the MAC address of the WAN interface. The MAC address format is: XX:XX:XX:XX:XX:XX. IP Address: Set the IP address of the connection. Subnet Mask: Set the IP netmask of the connection. Default Set the IP address of the default gateway of the Gateway: connection. DNS Set the primary and secondary IP addresses of the Servers: DNS servers used for resolving host names. PPPoE User Set the user name for authentication with a PPPoE Name: server. PPPoE Set the password for authentication with a PPPoE Password: server. D-Link DIR-627 User Manual 16 Section 3 - Configuration PPPoE Set the PPPoE service name. This is required by some ISPs. Service Name: PPPoE Set the PPPoE access concentrator. This is required by some ISPs. Access Concentrator: PPPoE Choose either Enabled or Disabled. This determines whether the PPPoE link should be automatically disconnected if no Connect On traffic has been observed for the period specifies by the PPPoE Max Idle Time. Demand: PPPoE Max Set the number of seconds to wait before disconnecting the PPPoE link if PPPoE Connect on Demand is Enabled. The Idle Time: default is 300 seconds. PPPoE Keep Choose either Enabled or Disabled. This determines whether the PPPoE link should be automatically restored if it is lost. Alive: This setting has no effect if PPPoE Connect on Demand is Enabled. PPPoE MTU: Set the maximum number of bytes that the PPPoE interface will transmit in a single Ethernet frame. Connection This displays the connection state. Status: IP Address This displays IP address lease information. Expires In: Static Set up static routes in this section. Routes: D-Link DIR-627 User Manual 17 Section 3 - Configuration Status The Status page displays miscellaneous status information. System Up Displays the system up time since the Router was Time: last booted up. Connection Displays a log of recent connection attempts. Log: D-Link DIR-627 User Manual 18 Section 3 - Configuration Filters The Filters page allows users to configure LAN filters for the Router. The LAN machines affected by the filters will not be able to communicate through the WAN but will be able to communicate with each other and with the Router itself. LAN MAC Set whether clients with the specified MAC address Filter are denied or allowed access to the Router and the Mode: WAN. The options are: Disabled, Allow, or Deny. LAN MAC The Router filters packets from LAN machines Filters: with specified MAC addresses. The MAC address format is: XX:XX:XX:XX:XX:XX. LAN Client The Router filters packets from IP addresses Filters destined to certain port ranges during the specified times. D-Link DIR-627 User Manual 19 Section 3 - Configuration Routing The Routing page allows users to configure port forwarding for the Router. Requests to the specified WAN port range will be forwarded to the port range of the LAN machine. Users may also configure static routes here. Port The Router allows users to forward packets Forwarding: destined in the first range to the LAN machine with the specified IP address. In addition, users may specify a second range (please note that the ranges must not overlap and they must be the same size). Application Enter the appropriate information to automatically Rule: forward connections. DMZ This allows users to forward all other incoming WAN IP Address packets to the LAN machine with the specified IP address. D-Link DIR-627 User Manual 20 Section 3 - Configuration Radio The Radio page allows users to configure the physical wireless interfaces. Interface: Choose either Enabled or Disabled. This enables or disables the wireless interface. Control Set the channel on which to operate on: Auto, 1, Channel: 2, 3, 4, 5, 6, 7, 8, 9, 10, or 11. 802.11n Choose either Auto or Off to enable or disable Mode: 802.11n support. Bandwidth: Choose the channel bandwith, either 20 MHz in Both Bands or 40 MHz in Both Bands. NPHY Rate: Set the NPHY Rate (MCS Index): Auto, Use Legacy Rate, 0: 6.5 Mbps, 1: 13 Mbps, 2: 19.5 Mbps, 3: 26 Mbps, 4: 39 Mbps, 5: 52 Mbps, 6: 58.5 Mbps, 7: 65 Mbps, 8: 13 Mbps, 9: 26 Mbps, 10: 39 Mbps, 11: 52 Mbps, 12: 78 Mbps, 13: 104 Mbps, 14: 117 Mbps, or 15: 130 Mbps. Fragmentation Set the fragmentation threshold. The default is Threshold: 2346. RTS Set the Request to Send (RTS) threshold. The Threshold: default is 2346. DTIM Set the Delivery Traffic Indication Message (DTIM) Interval: value. This is the wakeup interval for clients in power save mode. The default is 1. Beacon Set the beacon interval for the access point. The Interval: default is 100. D-Link DIR-627 User Manual 21 Section 3 - Configuration Beacon Choose either Enabled or Disabled. This enables or disables the rotation of the beacon order when running in Rotation: Multi BSS mode. Preamble Choose either Short or Long. This sets whether short or long preambles are used. Short preambles improve Type: throughput but all clients in the wireless network must support this capability if selected. RIFS Mode Choose either Auto or Off. Reduced Interframe Spacing (RIFS) mode is used to advertise in beacons and probe responses. Advertisement: WMM Choose Auto, Off, or On to set Wi-Fi Multimedia (WMM) support. Support: No Choose either Off or On to enable or disable Wi-Fi Multimedia (WMM) non-acknowledgement. Acknowledgement: D-Link DIR-627 User Manual 22 Section 3 - Configuration SSID The SSID page allows users to configure virtual interfaces for each physical interface. Enable Choose either Enabled or Disabled. This enables Wireless: or disables the wireless interface. Wireless Set the service set identifier (SSID), otherwise Network known as the network name, of this network. Name: Visibility Choose either Open or Closed. Open reveals the Status network to active scans while Closed hides the (SSID network from active scans. Broadcast): BSS Max Set the maximum associations for this basic service Associations set (BSS). The default is 128. Limit: MAC Choose Enabled, Allow, or Deny to determine Restrict whether clients with the specified MAC address Mode: are allowed or denied wireless access: MAC Enter the MAC address(es) of clients that are Addresses: either allowed or denied wireless acess. The MAC address format is XX:XX:XX:XX:XX:XX. D-Link DIR-627 User Manual 23 Section 3 - Configuration Security The Security page allows users to configure security for the wireless interfaces. WPS Choose either Enabled or Disabled to enable Configur- or disable Wi-Fi Protected Setup (WPS) simple ation: configuration mode. Device Enter a mnemonic name that can be used to identify Name: the Router. Device WPS This displays the Wi-Fi Protected Setup (WPS) UUID: UUID number of the Router. Device PIN: Click the Generate button to create a PIN number for the Router. WPS Built-in Choose either Enabled or Disabled to enable or Registrar: disable the Routerâs built-in registrar feature. WPS Set the Wi-Fi Protected Setup (WPS) configuration Config state to Config(ur)ed or Unconfig(ur)ed. State: WPS Displays the current Wi-Fi Protected Setup (WPS) Current mode. Mode: WPS Displays the Wi-Fi Protected Setup (WPS) Current processing status. Status: WPS Choose the desired Wi-Fi Protected Setup (WPS) Action: action, Add Enrollee or Config AP. D-Link DIR-627 User Manual 24 Section 3 - Configuration WPS Click the Start button to use the Push Button Configuration (PBC) Wi-Fi Protected Setup (WPS) method. Method: 802.11 Choose the 802.11 authentication method, either Open or Shared. Authentication: 802.1X Once the user has decided on the network authentication type, choose either Enabled or Disabled to enable or disable Authen- network authentication. tication: WPA: Choose either Enabled or Disabled to enable or disable Wi-Fi Protected Access (WPA). WPA-PSK: Choose either Enabled or Disabled to enable or disable Wi-Fi Protected Access Pre-Shared Key (WPA-PSK). WPA2: Choose either Enabled or Disabled to enable or disable Wi-Fi Protected Access 2 (WPA2). WPA2-PSK: Choose either Enabled or Disabled to enable or disable Wi-Fi Protected Access 2 Pre-Shared Key (WPA2-PSK). WEP Choose either Enabled or Disabled to enable or disable Wired Equivalent Privacy (WEP) encryption. Encryption: WPA First enable WPA above and then choose the WPA data encryption algorithm, AES or TKIP+AES. Encryption: RADIUS Set the IP address of the RADIUS server used for authentication and dynamic key derivation. Server: RADIUS Set the UDP port number of the RADIUS server. The port number is usually 1812 or 1645, depending on the server. The Port: default RADIUS port number is 1812. RADIUS Set the shared secret for the RADIUS connection. Key: WPA Set the WPA passphrase. Use the Click here to display button to display the WPA passphrase. Passphrase: D-Link DIR-627 User Manual 25 Section 3 - Configuration Network Enter five ASCII characters or ten hexadecimal digits for a 64-bit key. Enter 13 ASCII characters or 26 hexadecimal digits Key 1-4: for a 128-bit key. Current Select which network key is used for encrypting outbound data and/or authenticating clients. Network Key: Network Set the network key rotation interval, in seconds. Leave blank or set to zero to disable the rotation. Key Rotation Interval: Network Set the network re-authentication interval, in seconds. Leave blank or set to zero to disable periodic network authentication. Re-auth Interval: D-Link DIR-627 User Manual 26 Section 3 - Configuration Firmware The Firmware page allows users to upgrade the Router firmware. Firmware Enter the new firmware to upload to the Router or Upgrade: click Browse to locate the firmware on the userâs computer. Click Upload new Firmware to initiate the firmware upgrade. Save Click Save configuration to file to save NV-RAM Settings To variables to file. Local Hard Drive: Load Settings From Local Hard Drive: Enter the filename of the saved NV-RAM file here or click Browse to locate the file on the userâs computer. Click Upload configuration file to initiate the configuration file upload. D-Link DIR-627 User Manual 27 Section 4 - Security Wireless Security This section will show you the different levels of security you can use to protect your data from intruders. The DIR-627 offers the following types of security: ⢠WPA2 (Wi-Fi Protected Access 2) ⢠WPA (Wi-Fi Protected Access) ⢠WEP (Wired Equivalent Privacy) ⢠WPA2-PSK (Pre-Shared Key) ⢠WPA-PSK (Pre-Shared Key) What is WEP? WEP stands for Wired Equivalent Privacy. It is based on the IEEE 802.11 standard and uses the RC4 encryption algorithm. WEP provides security by encrypting data over your wireless network so that it is protected as it is transmitted from one wireless device to another. To gain access to a WEP network, you must know the key. The key is a string of characters that you create. When using WEP, you must determine the level of encryption. The type of encryption determines the key length. 128-bit encryption requires a longer key than 64-bit encryption. Keys are defined by entering in a string in HEX (hexadecimal using characters 0-9, A-F) or ASCII (American Standard Code for Information Interchange â alphanumeric characters) format. ASCII format is provided so you can enter a string that is easier to remember. The ASCII string is converted to HEX for use over the network. Four keys can be defined so that you can change keys easily. D-Link DIR-627 User Manual 28 Section 4 - Security Configure WEP It is recommended to enable encryption on your wireless router before your wireless network adapters. Please establish wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to the added overhead. 1. Log into the Web-based configuration by opening a Web browser and entering the IP address of the Router (192.168.0.1). Click Security at the top of the window. 2. Go to WEP Encryption and toggle Disabled to Enabled. 3. Go to 802.11 Authentication and select either Shared or Open. Shared is recommended as it provides greater security when WEP is enabled. 4. Go to Network Key 1 and enter a WEP key (passphrase) that you create. The key is an alpha-numeric password between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces. Make sure you enter this key exactly on all your wireless devices. You may enter up to four different keys either using hexadecimal or ASCII. Hexadecimal is recommended (letters A-F and numbers 0-9 are valid). In ASCII all numbers and letters are valid. 5. Go to Current Network Key and select which network key to use for encrypting outbound data and/or authenticating clients. 6. Click Apply to save your settings. If you are configuring the Router with a wireless adapter, you will lose connectivity until you enable WEP on your adapter and enter the same WEP key as you did on the Router. D-Link DIR-627 User Manual 29 Section 4 - Security What is WPA? WPA, or Wi-Fi Protected Access, is a Wi-Fi standard that was designed to improve the security features of WEP (Wired Equivalent Privacy). The two major improvements over WEP: ⢠Improved data encryption through the Temporal Key Integrity Protocol (TKIP). TKIP scrambles the keys using a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys havenât been tampered with. WPA2 is based on 802.11i and uses Advanced Encryption Standard (AES) instead of TKIP. ⢠User authentication, which is generally missing in WEP, through the extensible authentication protocol (EAP). WEP regulates access to a wireless network based on a computerâs hardware-specific MAC address, which is relatively simple to be sniffed out and stolen. EAP is built on a more secure public-key encryption system to ensure that only authorized network users can access the network. WPA-PSK/WPA2-PSK uses a passphrase or key to authenticate your wireless connection. The key is an alpha-numeric password between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces. This key must be the exact same key entered on your wireless router or access point. WPA/WPA2 incorporates user authentication through the Extensible Authentication Protocol (EAP). EAP is built on a more secure public key encryption system to ensure that only authorized network users can access the network. D-Link DIR-627 User Manual 30 Section 4 - Security Configure WPA-PSK It is recommended to enable encryption on your wireless Router before your wireless network adapters. Please establish wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to the added overhead. 1. Log into the Web-based configuration by opening a Web browser and entering the IP address of the router (192.168.0.1). Click Security at the top of the window. 2. Go to 802.11 Authentication and select Open. 3. Go to WPA-PSK and toggle Disabled to Enabled. 4. Go to WPA Encryption and select AES or TKIP+AES. 5. Go to WPA Passphrase and enter the WPA Passphrase that is being used on your wireless network. 6. Click Apply to save your settings. If you are configuring the Router with a wireless adapter, you will lose connectivity until you enable WPA-PSK on your adapter and enter the same passphrase as you did on the Router. D-Link DIR-627 User Manual 31 Section 4 - Security Configure WPA2-PSK It is recommended to enable encryption on your wireless Router before your wireless network adapters. Please establish wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to the added overhead. 1. Log into the Web-based configuration by opening a Web browser and entering the IP address of the router (192.168.0.1). Click Security at the top of the window. 2. Go to 802.11 Authentication and select Open. 3. Go to WPA2-PSK and toggle Disabled to Enabled. 4. Go to WPA Encryption and select AES or TKIP+AES. 5. Go to WPA Passphrase and enter the WPA Passphrase that is being used on your wireless network. 6. Click Apply to save your settings. If you are configuring the Router with a wireless adapter, you will lose connectivity until you enable WPA-PSK on your adapter and enter the same passphrase as you did on the Router. D-Link DIR-627 User Manual 32 Section 4 - Security Configure WPA It is recommended to enable encryption on your wireless Router before your wireless network adapters. Please establish wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to the added overhead. If you are using a RADIUS server for wireless authentication that is using WPA encryption, carry out the following: 1. Log into the Web-based configuration by opening a Web browser and entering the IP address of the Router (192.168.0.1). Click Security at the top of the window. 2. Go to 802.11 Authentication and select Open. 3. Go to WPA and toggle Disabled to Enabled. 4. Go to WPA Encryption and select AES or TKIP+AE. 5. Go to RADIUS Server and enter the IP address of your RADIUS server. 6. Go to RADIUS Port and enter the port number that is being used by your RADIUS server. 1812 is the default port. 7. Go to RADIUS Key and enter the security key that is being used by your RADIUS server. 8. Go to Network Key Rotation Interval and enter a value, in seconds, for the interval for cycling through the network keys entered above. If this field is left blank, this feature is disabled. 9. Go to Network Re-auth Interval and enter a value, in seconds, for the interval for periodic network re-authentication. If this field is left blank, this feature is disabled. 10. Click Apply to save your settings. If you are configuring the Router with a wireless adapter, you will lose connectivity until you enable WPA on your adapter and enter the same passphrase as you did on the Router. D-Link DIR-627 User Manual 33 Section 4 - Security Configure WPA2 It is recommended to enable encryption on your wireless Router before your wireless network adapters. Please establish wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to the added overhead. If you are using a RADIUS server for wireless authentication that is using WPA2 encryption, carry out the following: 1. Log into the Web-based configuration by opening a Web browser and entering the IP address of the Router (192.168.0.1). Click Security at the top of the window. 2. Go to 802.11 Authentication and select Open. 3. Go to WPA2 and toggle Disabled to Enabled. 4. Go to RADIUS Server and enter the IP address of your RADIUS server. 5. Go to RADIUS Port and enter the port number that is being used by your RADIUS server. 1812 is the default port. 6. Go to RADIUS Key and enter the security key that is being used by your RADIUS server. 7. Go to WPA Encryption and select AES or TKIP+AE. 8. Go to Network Key Rotation Interval and enter a value, in seconds, for the interval for cycling through the network keys entered above. If this field is left blank, this feature is disabled. 9. Go to Network Re-auth Interval and enter a value, in seconds, for the interval for periodic network re-authentication. If this field is left blank, this feature is disabled. 10. Click Apply to save your settings. If you are configuring the Router with a wireless adapter, you will lose connectivity until you enable WPA2 on your adapter and enter the same passphrase as you did on the Router. D-Link DIR-627 User Manual 34 Section 4 - Security Configure WPA (RADIUS) It is recommended to enable encryption on your wireless Router before your wireless network adapters. Please establish wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to the added overhead. 1. Log into the Web-based configuration by opening a Web browser and entering the IP address of the Router (192.168.0.1). Click Security at the top of the window. 2. Go to 802.11 Authentication and select Open. 3. Go to WPA and toggle Disabled to Enabled. 4. Go to WPA Encryption and select AES or TKIP+AE. 5. Go to RADIUS Server and enter the IP Address of your RADIUS server. 6. Go to RADIUS Port and enter the port you are using with your RADIUS server. 1812 is the default port. 7. Go to RADIUS Key and enter the security key. 8. Click Apply to save your settings. D-Link DIR-627 User Manual 35 Section 4 - Security Configure and WPA2 (RADIUS) It is recommended to enable encryption on your wireless Router before your wireless network adapters. Please establish wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to the added overhead. 1. Log into the Web-based configuration by opening a Web browser and entering the IP address of the Router (192.168.0.1). Click Security at the top of the window. 2. Go to 802.11 Authentication and select Open. 3. Go to WPA2 and toggle Disabled to Enabled. 4. Go to WPA Encryption and select AES or TKIP+AE. 5. Go to RADIUS Server and enter the IP Address of your RADIUS server. 6. Go to RADIUS Port and enter the port you are using with your RADIUS server. 1812 is the default port. 7. Go to RADIUS Key and enter the security key. 8. Click Apply to save your settings. D-Link DIR-627 User Manual 36 Section 5 - Connecting to a Wireless Network Connect to a Wireless Network Using WindowsÂŽ XP WindowsÂŽ XP users may use the built-in wireless utility (Zero Configuration Utility). The following instructions are for Service Pack 2 users. If you are using another companyâs utility or WindowsÂŽ 2000, please refer to the user manual of your wireless adapter for help with connecting to a wireless network. Most utilities will have a âsite surveyâ option similar to the WindowsÂŽ XP utility as seen below. If you receive the Wireless Networks Detected bubble, click on the center of the bubble to access the utility. or Right-click on the wireless computer icon in your system tray (lower-right corner next to the time). Select View Available Wireless Networks. The utility will display any available wireless networks in your area. Click on a network (displayed using the SSID) and click the Connect button. If you get a good signal but cannot access the Internet, check you TCP/IP settings for your wireless adapter. Refer to the Networking Basics section in this manual for more information. D-Link DIR-627 User Manual 37 Section 5 - Connecting to a Wireless Network Configure WEP It is recommended to enable WEP on your wireless Router or access point before configuring your wireless adapter. If you are joining an existing network, you will need to know the WEP key being used. 1. Open the WindowsÂŽ XP Wireless Utility by right-clicking on the wireless computer icon in your system tray (lower-right corner of screen). Select View Available Wireless Networks. 2. Highlight the wireless network (SSID) you would like to connect to and click Connect. D-Link DIR-627 User Manual 38 Section 5 - Connecting to a Wireless Network 3. The Wireless Network Connection box will appear. Enter the same WEP key that is on your Router and click Connect. It may take 20-30 seconds to connect to the wireless network. If the connection fails, please verify that the WEP settings are correct. The WEP key must be exactly the same as on the wireless router. D-Link DIR-627 User Manual 39 Section 5 - Connecting to a Wireless Network Configure WPA-PSK It is recommended to enable WEP on your wireless Router or access point before configuring your wireless adapter. If you are joining an existing network, you will need to know the WEP key being used. 1. Open the WindowsÂŽ XP Wireless Utility by right-clicking on the wireless computer icon in your system tray (lower-right corner of screen). Select View Available Wireless Networks. 2. Highlight the wireless network (SSID) you would like to connect to and click Connect. D-Link DIR-627 User Manual 40 Section 5 - Connecting to a Wireless Network 3. The Wireless Network Connection box will appear. Enter the WPA-PSK passphrase and click Connect. It may take 20-30 seconds to connect to the wireless network. If the connection fails, please verify that the WPA-PSK settings are correct. The WPA-PSK passphrase must be exactly the same as on the wireless router. D-Link DIR-627 User Manual 41 Section 6 - Setting Up Wi-Fi Protection (WCN 2.0 in Windows Vista) Setting Up Wi-Fi Protection (WCN 2.0 in Windows Vista) The Router supports Wi-Fi protection, referred to as WCN 2.0 in Windows Vista. The instructions for setting this up depend on whether you are using Windows Vista to configure the Router or third party software. Initial Router Configuration for Wi-Fi Protection When you first set up the Router, Wi-Fi protection is disabled and unconfigured. To enjoy the benefits of Wi-Fi protection, the Router must be both enabled and configured. There are three basic methods to accomplish this: use Windows Vistaâs built-in support for WCN 2.0, use software provided by a third party, or use the traditional Ethernet approach. If you are running Windows Vista, use the WPS Configuration drop-down menu on the Security window to select Enabled. Use the Current PIN that is displayed on the Security window or choose to click the Device PIN Generate button. If you are using third party software to set up Wi-Fi Protection, carefully follow the directions. When you are finished, proceed to the next section to set up the newly-configured Router. D-Link DIR-627 User Manual 42 Section 6 - Setting Up Wi-Fi Protection (WCN 2.0 in Windows Vista) Setting Up a Configured Router Once the Router has been configured, you can use the push button on the Router or third party software to invite a newcomer to join your Wi-Fi protected network. For maximum security, the software method is recommended. However, the push button method is ideal if there is no access to a GUI. If you are using the Routerâs Wi-Fi Security push button option, simultaneously depress the push button located on the side of the Router and the button on the client (or virtual button on the clientâs GUI). Next click Finish. The Clientâs software will then allow a newcomer to join your secure, Wi-Fi protected network. If you are using third party software, run the appropriate Wi-Fi Protected System utility. You will be asked to either use the push button method or to manually enter the PIN. Follow the on-screen instructions. D-Link DIR-627 User Manual 43 Section 7 - Changing the Computer Name and Joining a Workgroup Changing the Computer Name and Joining a Workgroup The following are step-by-step directions to change the computer name and join a workgroup. 1. Click on Properties. 2. Click on the Advanced system settings link. D-Link DIR-627 User Manual 44 Section 7 - Changing the Computer Name and Joining a Workgroup 3. Click the Computer Name tab in the System Properties window and enter a description of your computer in the textbox. When you are finished, click the Change button. 4. Go to the Computer Name/Domain Changes window and click the radio button next to the Workgroup you want to join. When you are finished, click the OK button. D-Link DIR-627 User Manual 45 Section 8 - Configuring the IP Address in Vista Configuring the IP Address in Vista The following are step-by-step directions to configure the IP address in Windows Vista. 1. Click on Properties. 2. Go to the Network and Internet window and click the appropriate Local Area Connection icon. 3. Right-click the Local Area Connection icon and then select Properties from the drop-down menu. D-Link DIR-627 User Manual 46 Section 8 - Configuring the IP Address in Vista 4. Tick the Internet Protocol Version 4 (TCP/IPv4) check box in the Networking tab in the Local Area Connection Properties window. 5. Click the âUse the following IP addressâ option in the General tab in the Local Area Connections Properties window and enter the desired IP address in the space offered. Then click the âUse the following DNS server adressesâ option on the same tab and enter the desired DNS server information. D-Link DIR-627 User Manual 47 Section 8 - Configuring the IP Address in Vista 6. Right-click the Local Area Connection icon and then select Status from the drop-down menu. 7. Go to the Local Area Connection Status window and click the Details button. 8. Confirm your new settings on the Network Connection Status window. When you are finished, click the Done button. D-Link DIR-627 User Manual 48 Section 9 - Setting Up a Connection Wirelessly Setting Up a Connection or Network Wirelessly The following are step-by-step directions to set up a wireless connection. 1. Click on Set up a connection or network in the Network and Sharing Center section. 2. Go to the Set up a connection or network window and choose the Set up a wireless router or access point Set up a new wireless network for your home or business option. Click the Next button. D-Link DIR-627 User Manual 49 Section 9 - Setting Up a Connection Wirelessly 3. Click the Next button on the Set up a wireless router or access point window. 4. The following window displays the system progress. 5. This window confirms that you want to create wireless network settings that are savable to a USB flash drive. D-Link DIR-627 User Manual 50 Section 9 - Setting Up a Connection Wirelessly 6. Enter a network name on the Give your network a name window in the Set up a wireless router or access point wizard. Click the Next button. 7. Enter a passphrase on the Help make your network more secure with a passphrase window in the Set up a wireless router or access point wizard. Click the Show advanced network security options link. 8. Select security method on the Choose advanced network security options window in the Set up a wireless router or access point wizard. Click the Next button. D-Link DIR-627 User Manual 51 Section 9 - Setting Up a Connection Wirelessly 9. Once you have selected the desired security method on the Choose advanced network security options window in the Set up a wireless router or access point wizard, click the Next button. 10.Select the desired file and printer sharing option on the Choose file and printer sharing options window in the Set up a wireless router or access point wizard. Click the Next button. 11.Once you have saved your network settings to USB, use the pulldown menu on the Insert the USB flash drive into this computer window in the Set up a wireless router or access point wizard to select a destination for your network settings. Click the Next button. D-Link DIR-627 User Manual 52 Section 9 - Setting Up a Connection Wirelessly 12.Once you have saved your network settings to USB, the Copying settings to the USB drive window in the Set up a wireless router or access point wizard opens to indicate the system progress. 13.Once you are finished, the To add a device or computer, follow these instructions window in the Set up a wireless router or access point wizard opens. When you are finished, click the Close button. D-Link DIR-627 User Manual 53 Section 10 - Connecting to a Secured Wireless Network (WEP, WPA-PSK & WPA2-PSK) Connecting to a Secured Wireless Network (WEP, WPA-PSK & WPA2-PSK) The following are step-by-step directions to set up a wireless connection. 1. Click on Properties. 2. Click the Manage network connections link in the Network and Sharing Center window. D-Link DIR-627 User Manual 54 Section 10 - Connecting to a Secured Wireless Network (WEP, WPA-PSK & WPA2-PSK) 3. Right-click the Wireless Network Connection entry and then select Connect/Disconnect from the drop-down menu. 4. Select a network to connect to in the Select a network to connect to window in the Connect to a network wizard and then click the Connect button. 5. The following Connect to a network wizard window displays the system progress. D-Link DIR-627 User Manual 55 Section 10 - Connecting to a Secured Wireless Network (WEP, WPA-PSK & WPA2-PSK) 6. Enter the network security key or passphrase for the Router in the textbox provided in the Type the network security key or passphrase for dlink300 window in the Connect a network wizard. When you are finished, click the Connect button. 7. The following Successfully connected to dlink300 window in the Connect to a network wizard is displayed. Choose to save to the network and/or start the new connection automatically. When you are finished, click the Close button. 8. The successful connection is displayed at the bottom of the Windows start up menu. D-Link DIR-627 User Manual 56 Section 10 - Connecting to a Secured Wireless Network (WEP, WPA-PSK & WPA2-PSK) 9. Confirm your new settings by calling up the command prompt and then entering the ipconfig command. 10.To test the new IP address, use the Ping feature of the command prompt. D-Link DIR-627 User Manual 57 Section 11 - Connecting to an Unsecured Wireless Network Connecting to an Unsecured Wireless Network The following are step-by-step directions to set up an unsecured wireless connection. 1. Click on Properties. 2. Go to the Network and Sharing Center window and click the Manage Network Connections link. D-Link DIR-627 User Manual 58 Section 11 - Connecting to an Unsecured Wireless Network 3. Right-click the Wireless Network Connection entry and then select Connect/Disconnect from the drop-down menu. 4. Select a network to connect to in the Select a network to connect to window in the Connect to a network wizard and then click the Connect button. 5. Confirm your desire to connect anyway on the following Network Connection Status window. D-Link DIR-627 User Manual 59 Section 11 - Connecting to an Unsecured Wireless Network 6. The following Connect to a network wizard window displays the system progress. 7. The following Successfully connected to dlink300 window in the Connect to a network wizard is displayed. Choose to save to the network and/or start the new connection automatically. When you are finished, click the Close button. 8. The successful connection is displayed at the bottom of the Windows start up menu. D-Link DIR-627 User Manual 60 Section 11 - Connecting to an Unsecured Wireless Network 9. Confirm your new settings by calling up the command prompt and then entering the ipconfig command. 10.To test the new IP address, use the Ping feature of the command prompt. D-Link DIR-627 User Manual 61 Section 11 - Connecting to an Unsecured Wireless Network Configuring the Network in MAC OS X Snow Leopard (10.6) The following are step-by-step directions to configure the network in MAC OS X Snow Leopard (10.6). 1. Click the icon in your Dock to open your System Preferences window. 2. Click the Network icon in System Preferences menu to view the Network menu. D-Link DIR-627 User Manual 62 Section 11 - Connecting to an Unsecured Wireless Network 3. Click Ethernet on the left to see the local network settings. TCP/IP settings should be set to obtain an IP address from a DHCP server (i.e. wireless router) automatically. The IP address, its subnet mask and the routerâs IP address displays when selecting Using DHCP from the Configure IPv4 drop-down menu. If you are not using a DHCP capable gateway/router, or you need to assign a static IP address, select Manually from the Configure IPv4 drop-down menu to manually enter the IP address and itâs subnet mask. 4. Click the Apply button to save the settings. D-Link DIR-627 User Manual 63 Section 11 - Connecting to an Unsecured Wireless Network Configuring the Wireless Network in MAC OS X Snow Leopard (10.6) The following are step-by-step directions to configure the Wireless in MAC OS X Snow Leopard (10.6). 1. Click the icon in your Dock to open your System Preferences window. 2. Click the Network icon in System Preferences menu to view the Network menu. D-Link DIR-627 User Manual 64 Section 11 - Connecting to an Unsecured Wireless Network 3. Click AirPort on the left to configure the wireless network. 4. Make sure the Status is On. If the Status is Off, click the Turn AirPort On button to enable AirPort. 5. Click the Advanced button to see the window. 6. Click the + button to see the window in the next page. D-Link DIR-627 User Manual 65 Section 11 - Connecting to an Unsecured Wireless Network 7. Enter the Network Name (SSID) of the Router. 8. Select the Security type of the network from the drop-down list, and security related information below. Click the Add button to add the wireless network in the Preferred Network list. D-Link DIR-627 User Manual 66 Section 11 - Connecting to an Unsecured Wireless Network 9. Click OK to proceed. 10. 11. Select the Network Name from the drop-down menu. Click the Apply button to save the settings. D-Link DIR-627 User Manual 67 Section 12 - Troubleshooting Troubleshooting This chapter provides solutions to problems that can occur during the installation and operation of the DIR-627. Read the following descriptions if you are having problems. (The examples below are illustrated in WindowsÂŽ XP. If you have a different operating system, the screenshots on your computer will look similar to the following examples.) 1. Why canât I access the web-based configuration utility? When entering the IP address of the D-Link router (192.168.0.1 for example), you are not connecting to a Website on the Internet or have to be connected to the Internet. The device has the utility built-in to a ROM chip in the device itself. Your computer must be on the same IP subnet to connect to the Web-based utility. ⢠Make sure you have an updated Java-enabled Web browser. We recommend the following: ⢠Internet Explorer 6.0 or higher ⢠Netscape 8 or higher ⢠Mozilla 1.7.12 (5.0) or higher ⢠Opera 8.5 or higher ⢠Safari 1.2 or higher (with Java 1.3.1 or higher) ⢠Camino 0.8.4 or higher ⢠Firefox 1.5 or higher ⢠Verify physical connectivity by checking for solid link lights on the device. If you do not get a solid link light, try using a different cable or connect to a different port on the device if possible. If the computer is turned off, the link light may not be on. ⢠Disable any internet security software running on the computer. Software firewalls such as Zone Alarm, Black Ice, Sygate, Norton Personal Firewall, and WindowsÂŽ XP firewall may block access to the configuration pages. Check the help files included with your firewall software for more information on disabling or configuring it. D-Link DIR-627 User Manual 68 Section 12 - Troubleshooting ⢠Configure your Internet settings: ⢠Go to Start > Settings > Control Panel. Double-click the Internet Options icon. From the Security tab, click the button to restore the settings to their defaults. ⢠Click the Connection tab and set the dial-up option to Never Dial a Connection. Click the LAN Settings button. Make sure nothing is checked. Click OK. ⢠Go to the Advanced tab and click the button to restore these settings to their defaults. Click OK three times. ⢠Close your Web browser (if open) and open it. ⢠Access the Web management. Open your Web browser and enter the IP address of your D-Link router in the address bar. This should open the login page for your the Web management. ⢠If you still cannot access the configuration, unplug the power to the router for 10 seconds and plug back in. Wait about 30 seconds and try accessing the configuration. If you have multiple computers, try connecting using a different computer. 2. What can I do if I forgot my password? If you forgot your password, you must reset your router. Unfortunately this process will change all your settings back to the factory defaults. To reset the router, locate the reset button (hole) on the rear panel of the unit. With the router powered on, use a paperclip to hold the button down for 10 seconds. Release the button and the router will go through its reboot process. Wait about 30 seconds to access the router. The default IP address is 192.168.0.1. When logging in, the username is admin and leave the password box empty. D-Link DIR-627 User Manual 69 Section 12 - Troubleshooting 3. Why canât I connect to certain sites or send and receive emails when connecting through my router? If you are having a problem sending or receiving email, or connecting to secure sites such as eBay, banking sites, and Hotmail, we suggest lowering the MTU in increments of ten (Ex. 1492, 1482, 1472, etc). Note: AOL DSL+ users must use MTU of 1400. To find the proper MTU Size, youâll have to do a special ping of the destination youâre trying to go to. A destination could be another computer, or a URL. ⢠Click on Start and then click Run. ⢠WindowsÂŽ 95, 98, and Me users type in command (WindowsÂŽ NT, 2000, and XP users type in cmd) and press Enter (or click OK). ⢠Once the window opens, youâll need to do a special ping. Use the following syntax: ping [url] [-f] [-l] [MTU value] Example: ping yahoo.com -f -l 1472 D-Link DIR-627 User Manual 70 Section 12 - Troubleshooting You should start at 1472 and work your way down by 10 each time. Once you get a reply, go up by 2 until you get a fragmented packet. Take that value and add 28 to the value to account for the various TCP/IP headers. For example, lets say that 1452 was the proper value, the actual MTU size would be 1480, which is the optimum for the network weâre working with (1452+28=1480). Once you find your MTU, you can now configure your router with the proper MTU size. To change the MTU rate on your router follow the steps below: ⢠Open your browser, enter the IP address of your router (192.168.0.1) and click OK. ⢠Enter your username (admin) and password (blank by default). Click OK to enter the web configuration page for the device. ⢠Click on Setup and then click Manual Configure. ⢠To change the MTU enter the number in the MTU field and click the Save Settings button to save your settings. ⢠Test your email. If changing the MTU does not resolve the problem, continue changing the MTU in increments of ten. D-Link DIR-627 User Manual 71 Appendix A - Wireless Basics Wireless Basics D-Link wireless products are based on industry standards to provide easy-to-use and compatible high-speed wireless connectivity within your home, business or public access wireless networks. Strictly adhering to the IEEE standard, the D-Link wireless family of products will allow you to securely access the data you want, when and where you want it. You will be able to enjoy the freedom that wireless networking delivers. A wireless local area network (WLAN) is a cellular computer network that transmits and receives data with radio signals instead of wires. Wireless LANs are used increasingly in both home and office environments, and public areas such as airports, coffee shops and universities. Innovative ways to utilize WLAN technology are helping people to work and communicate more efficiently. Increased mobility and the absence of cabling and other fixed infrastructure have proven to be beneficial for many users. Wireless users can use the same applications they use on a wired network. Wireless adapter cards used on laptop and desktop systems support the same protocols as Ethernet adapter cards. Under many circumstances, it may be desirable for mobile network devices to link to a conventional Ethernet LAN in order to use servers, printers or an Internet connection supplied through the wired LAN. A Wireless Router is a device used to provide this link. D-Link DIR-627 User Manual 72 Appendix A - Wireless Basics What is Wireless? Wireless or Wi-Fi technology is another way of connecting your computer to the network without using wires. Wi-Fi uses radio frequency to connect wirelessly, so you have the freedom to connect computers anywhere in your home or office network. Why D-Link Wireless? D-Link is the worldwide leader and award winning designer, developer, and manufacturer of networking products. D-Link delivers the performance you need at a price you can afford. D-Link has all the products you need to build your network. How does wireless work? Wireless works similar to how cordless phone work, through radio signals to transmit data from one point A to point B. But wireless technology has restrictions as to how you can access the network. You must be within the wireless network range area to be able to connect your computer. There are two different types of wireless networks Wireless Local Area Network (WLAN), and Wireless Personal Area Network (WPAN). Why is the speed of my Wireless N device limited to 54mbps? This is likely to be the result of the wireless settings. Go to Advanced -> Advanced Wireless to see if the Wireless Mode is configured as 802.11n only. As the Wi-Fi Alliance restricts the maximum speed to 54Mbps when WPA or WPA2 wireless security is configured with TKIP Cipher Type, go to Setup -> Wireless Setup to make sure the Cipher Type is configured as AES. Wireless Local Area Network (WLAN) In a wireless local area network, a device called an Access Point (AP) connects computers to the network. The access point has a small antenna attached to it, which allows it to transmit data back and forth over radio signals. With an indoor access point as seen in the picture, the signal can travel up to 300 feet. With an outdoor access point the signal can reach out up to 30 miles to serve places like manufacturing plants, industrial locations, college and high school campuses, airports, golf courses, and many other outdoor venues. Wireless Personal Area Network (WPAN) D-Link DIR-627 User Manual 73 Appendix A - Wireless Basics Bluetooth is the industry standard wireless technology used for WPAN. Bluetooth devices in WPAN operate in a range up to 30 feet away. Compared to WLAN the speed and wireless operation range are both less than WLAN, but in return it doesnât use nearly as much power which makes it ideal for personal devices, such as mobile phones, PDAs, headphones, laptops, speakers, and other devices that operate on batteries. Who uses wireless? Wireless technology as become so popular in recent years that almost everyone is using it, whether itâs for home, office, business, D-Link has a wireless solution for it. Home ⢠Gives everyone at home broadband access ⢠Surf the Web, check e-mail, instant message, etc. ⢠Gets rid of the cables around the house ⢠Simple and easy to use Small Office and Home Office ⢠Stay on top of everything at home as you would at office ⢠Remotely access your office network from home ⢠Share Internet connection and printer with multiple computers ⢠No need to dedicate office space D-Link DIR-627 User Manual 74 Appendix A - Wireless Basics Where is wireless used? Wireless technology is expanding everywhere not just at home or office. People like the freedom of mobility and itâs becoming so popular that more and more public facilities now provide wireless access to attract people. The wireless connection in public places is usually called âhotspotsâ. Using a D-Link Cardbus Adapter with your laptop, you can access the hotspot to connect to Internet from remote locations like airports, hotels, coffee shops, libraries, restaurants, and convention centers. Wireless network is easy to setup, but if youâre installing it for the first time it could be quite a task not knowing where to start. Thatâs why weâve put together a few setup steps and tips to help you through the process of setting up a wireless network. Tips Here are a few things to keep in mind, when you install a wireless network. Centralize your router or access point Make sure you place the router/access point in a centralized location within your network for the best performance. Try to place the router/access point as high as possible in the room, so the signal gets dispersed throughout your home. If you have a two-story home, you may need a repeater to boost the signal to extend the range. For the wireless repeater, there are two types of repeater in D-Link for user to select: ⢠Universal repeater: It acts as an AP and a wireless STA at the same time. It can support all AP and wireless STA if they work in the same wireless channel. ⢠AP-repeater (AP with WDS): only repeat same model or limited models which base on the same proprietary protocol. Please choose a universal repeater to boost the signal to extend the range. D-Link DIR-627 User Manual 75 Appendix A - Wireless Basics Eliminate Interference Wireless Modes Place home appliances such as cordless telephones, microwaves, and televisions as far away as possible from the router/access point. This would significantly reduce any interference that the appliances might cause since they operate on same frequency. Security Donât let you next-door neighbors or intruders connect to your wireless network. Secure your wireless network by turning on the WPA or WEP security feature on the router. Refer to product manual for detail information on how to set it up. There are basically two modes of networking: ⢠Infrastructure â All wireless clients will connect to an access point or wireless router. ⢠Ad-Hoc â Directly connecting to another computer, for peer-to-peer communication, using wireless network adapters on each computer, such as two or more WNA-2330 wireless network Cardbus adapters. An Infrastructure network contains an access point or wireless router. All the wireless devices, or clients, will connect to the wireless router or access point. An Ad-Hoc network contains only clients, such as laptops with wireless cardbus adapters. All the adapters must be in Ad-Hoc mode to communicate. D-Link DIR-627 User Manual 76 Appendix B - Networking Basics Networking Basics Check your IP address After you install your new D-Link adapter, by default, the TCP/IP settings should be set to obtain an IP address from a DHCP server (i.e. wireless router) automatically. To verify your IP address, please follow the steps below. Click on Start > Run. In the run box type cmd and click OK. At the prompt, type ipconfig and press Enter. This will display the IP address, subnet mask, and the default gateway of your adapter. If the address is 0.0.0.0, check your adapter installation, security settings, and the settings on your router. Some firewall software programs may block a DHCP request on newly installed adapters. If you are connecting to a wireless network at a hotspot (e.g. hotel, coffee shop, airport), please contact an employee or administrator to verify their wireless network settings. D-Link DIR-627 User Manual 77 Appendix B - Networking Basics Statically assign an IP address If you are not using a DHCP capable gateway/router, or you need to assign a static IP address, please follow the steps below: Step 1 WindowsÂŽ XP - Click on Start > Control Panel > Network Connections. WindowsÂŽ 2000 - From the desktop, right-click My Network Places > Properties. Step 2 Right-click on the Local Area Connection which represents your D-Link network adapter and select Properties. Step 3 Highlight Internet Protocol (TCP/IP) and click Properties. Step 4 Click Use the following IP address and enter an IP address that is on the same subnet as your network or the LAN IP address on your router. Example: If the router´s LAN IP address is 192.168.0.1, make your IP address 192.168.0.X where X is a number between 2 and 99. Make sure that the number you choose is not in use on the network. Set Default Gateway the same as the LAN IP address of your router (192.168.0.1). Set Primary DNS the same as the LAN IP address of your router (192.168.0.1). The Secondary DNS is not needed or you may enter a DNS server from your ISP. Step 5 Click OK twice to save your settings. D-Link DIR-627 User Manual 78 ! " #$ % %& %'" ()'" )'" %*'" )'" '" '" '" '" *'" (('" '" '" Security +, + . ,# /0,1 ' 1 3 1 # 04 & 5 *)8 " +, ,98,: +, "; < 8 <:,0 8 <=,0 8 !; *=' 8 *)=' 8 :,0 8 =,0 > ?.<' ; *=' 8 *)=' 8 :,0 8 =,0 > ?.<' D-Link DIR-627 User Manual @ %'" ?.<'1 A ,B1 C*:E @) %'" ?.<'1 A ,B1 C*):E " ! ()'" ?.<'1 A ,B1 :E )'" ?.<'1 A ,B1 :E %*'" ?.<'1 A ,B1 *:E )'" ?.<'1 A ,B1 :E '" ?.<'1 A ,B1 :E '" ?.<'1 A ,B1 %:E '" 01 A ,B1 (:E '" ?.<'1 A ,B1 (:E *'" ?.<'1 A ,B1 :E (('" 01 A ,B1 :E '" <=,01 A ,B1 :E '" <:,01 A ,B1 :E +" " # ## F* # #G 9 9F !# F* # #G # # HF " "#># <@ , #F# )J@K )J@K{!/"5 3/5HI{!up!3/5946HI )J@K )%(J@N /! 5 Appendix C - Technical Specifications Wireless Operating Range2 ⢠Indoors - up to 328 ft. (100 meters) ⢠Outdoors- up to 1312 ft. (400 meters) Wireless Transmit Power (AVG Power) 11b:17dBm(Max) 11g:16dBm(Max) 11n:13dBm(Max) External Antenna Type Two fixed reverse SMA external antennas LEDs ⢠Power ⢠Internet ⢠WLAN (Wireless Connection) ⢠Ethernet ⢠USB ⢠WPS Operating Temperature 32°F to 129 °F (0°C to 40°C) Dimensions ⢠L = 197.82mm ⢠W = 133.18mm ⢠H = 28.91mm Humidity 95% maximum (non-condensing) Weight 0.273kg Safety and Emissions FCC Part 15B/ 15C/ MPE IC RSS-210 NCC LP0002 * Maximum wireless signal rate derived from IEEE Standard 802.11b, 802.11g and 802.11n specifications. Actual data throughput will vary. Network conditions and environmental factors, including volume of network traffic, building materials and construction, and network overhead, lower actual data throughput rate. Environmental factors will adversely affect wireless signal range. D-Link DIR-627 User Manual 80 Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures: Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. IEEE 802.11b or 802.11g operation of this product in the U.S.A. is firmware-limited to channels 1 through 11. IMPORTANT NOTE: FCC Radiation Exposure Statement: This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. The availability of some specific channels and/or operational frequency bands are country dependent and are firmware programmed at the factory to match the intended destination. The firmware setting is not accessible by the end user. 䝼ä¸čŚčŞéŠç¨ĺ°çŁĺ°ĺ çśĺĺźčŞčĺć źäšä˝ĺçĺ°é ťéťćŠďźéçśč¨ąĺŻďźĺ Źĺ¸ăĺčć使ç¨č ĺä¸ĺžć čŞčŽć´é ťçăĺ 大ĺçćčŽć´ĺ č¨č¨äšçšć§ĺĺč˝ă ä˝ĺçĺ°é ťéťćŠäšä˝żç¨ä¸ĺžĺ˝ąéżéŁčŞĺŽĺ ¨ĺ嚲ćžĺćłé俥ďźçśçźçžć嚲ćžçžčąĄćďźćçŤĺłĺç¨ďźä¸ŚćšĺčłçĄĺš˛ ćžććšĺžçšźçşä˝żç¨ăĺé ĺćłé俥ďźćäžéťäżĄćłčŚĺŽä˝ćĽäšçĄçˇéťé俥ăä˝ĺçĺ°é ťéťćŠé ĺżĺĺćłé俥ć塼 ćĽăç§ĺ¸ĺéŤçç¨éťćł˘čźťĺ°ć§éťćŠč¨ĺäšĺš˛ćžă
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.6 Linearized : Yes Encryption : Standard V2.3 (128-bit) User Access : Print, Extract, Print high-res Tagged PDF : No XMP Toolkit : 3.1-701 Create Date : 2010:08:30 15:58:39+08:00 Metadata Date : 2010:11:17 15:37:06+08:00 Modify Date : 2010:11:17 15:37:06+08:00 Creator Tool : Adobe InDesign CS5 (7.0.2) Page Image Page Number : 1, 2 Page Image Format : JPEG, JPEG Page Image Width : 256, 256 Page Image Height : 256, 256 Page Image : (Binary data 6017 bytes, use -b option to extract), (Binary data 11151 bytes, use -b option to extract) Instance ID : uuid:8e3eb7d6-e905-42ac-b917-75d241983ebc Document ID : xmp.did:FA7F1174072068118DBBE82247670CDE Original Document ID : adobe:docid:indd:4319b8e7-938a-11dd-a940-f305ccb04aa5 Rendition Class : proof:pdf Derived From Instance ID : xmp.iid:F97F1174072068118DBBE82247670CDE Derived From Document ID : xmp.did:F87F1174072068118DBBE82247670CDE Derived From Original Document ID: adobe:docid:indd:4319b8e7-938a-11dd-a940-f305ccb04aa5 Derived From Rendition Class : default History Action : saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved History Instance ID : xmp.iid:151D92DA2B8DDE118EAE945AACBB4C90, xmp.iid:161D92DA2B8DDE118EAE945AACBB4C90, xmp.iid:171D92DA2B8DDE118EAE945AACBB4C90, xmp.iid:E781C7615390DE11BED1B94DC58EF9CF, xmp.iid:2505ED669490DE11BE4FDB482714E060, xmp.iid:4BC6F28A1E91DE11AC01A530618085CD, xmp.iid:594B1B6C5E91DE11B95ECBE5EFB41F8C, xmp.iid:B51334E7E191DE11B8ECFDA38F5E2595, xmp.iid:B61334E7E191DE11B8ECFDA38F5E2595, xmp.iid:B71334E7E191DE11B8ECFDA38F5E2595, xmp.iid:B81334E7E191DE11B8ECFDA38F5E2595, xmp.iid:B91334E7E191DE11B8ECFDA38F5E2595, xmp.iid:BA1334E7E191DE11B8ECFDA38F5E2595, xmp.iid:BB1334E7E191DE11B8ECFDA38F5E2595, xmp.iid:BC1334E7E191DE11B8ECFDA38F5E2595, xmp.iid:BD1334E7E191DE11B8ECFDA38F5E2595, xmp.iid:1B226FF11892DE11A8EE8C7C5657085E, xmp.iid:1C226FF11892DE11A8EE8C7C5657085E, xmp.iid:1D226FF11892DE11A8EE8C7C5657085E, xmp.iid:1E226FF11892DE11A8EE8C7C5657085E, xmp.iid:1F226FF11892DE11A8EE8C7C5657085E, xmp.iid:20226FF11892DE11A8EE8C7C5657085E, xmp.iid:21226FF11892DE11A8EE8C7C5657085E, xmp.iid:22226FF11892DE11A8EE8C7C5657085E, xmp.iid:23226FF11892DE11A8EE8C7C5657085E, xmp.iid:24226FF11892DE11A8EE8C7C5657085E, xmp.iid:C629A1C13092DE11A8EE8C7C5657085E, xmp.iid:C729A1C13092DE11A8EE8C7C5657085E, xmp.iid:C829A1C13092DE11A8EE8C7C5657085E, xmp.iid:C929A1C13092DE11A8EE8C7C5657085E, xmp.iid:15B4494BAD92DE119448FA44C8F8FD9B, xmp.iid:16B4494BAD92DE119448FA44C8F8FD9B, xmp.iid:17B4494BAD92DE119448FA44C8F8FD9B, xmp.iid:18B4494BAD92DE119448FA44C8F8FD9B, xmp.iid:19B4494BAD92DE119448FA44C8F8FD9B, xmp.iid:9FBA9A31B392DE1183BAF072818707AF, xmp.iid:A0BA9A31B392DE1183BAF072818707AF, xmp.iid:A1BA9A31B392DE1183BAF072818707AF, xmp.iid:A2BA9A31B392DE1183BAF072818707AF, xmp.iid:A3BA9A31B392DE1183BAF072818707AF, xmp.iid:A4BA9A31B392DE1183BAF072818707AF, xmp.iid:A5BA9A31B392DE1183BAF072818707AF, xmp.iid:A6BA9A31B392DE1183BAF072818707AF, xmp.iid:A7BA9A31B392DE1183BAF072818707AF, xmp.iid:A8BA9A31B392DE1183BAF072818707AF, xmp.iid:E205D1A9BB92DE1183BAF072818707AF, xmp.iid:FF144622BC92DE11AC0CDD5D1111A273, xmp.iid:00154622BC92DE11AC0CDD5D1111A273, xmp.iid:01154622BC92DE11AC0CDD5D1111A273, xmp.iid:02154622BC92DE11AC0CDD5D1111A273, xmp.iid:03154622BC92DE11AC0CDD5D1111A273, xmp.iid:04154622BC92DE11AC0CDD5D1111A273, xmp.iid:05154622BC92DE11AC0CDD5D1111A273, xmp.iid:06154622BC92DE11AC0CDD5D1111A273, xmp.iid:07154622BC92DE11AC0CDD5D1111A273, xmp.iid:08154622BC92DE11AC0CDD5D1111A273, xmp.iid:E2A63A93DB92DE11AC0CDD5D1111A273, xmp.iid:E3A63A93DB92DE11AC0CDD5D1111A273, xmp.iid:E5A63A93DB92DE11AC0CDD5D1111A273, xmp.iid:13278C3BE192DE11B5438D3D5694F2E0, xmp.iid:14278C3BE192DE11B5438D3D5694F2E0, xmp.iid:15278C3BE192DE11B5438D3D5694F2E0, xmp.iid:16278C3BE192DE11B5438D3D5694F2E0, xmp.iid:17278C3BE192DE11B5438D3D5694F2E0, xmp.iid:18278C3BE192DE11B5438D3D5694F2E0, xmp.iid:19278C3BE192DE11B5438D3D5694F2E0, xmp.iid:1A278C3BE192DE11B5438D3D5694F2E0, xmp.iid:1B278C3BE192DE11B5438D3D5694F2E0, xmp.iid:1C278C3BE192DE11B5438D3D5694F2E0, xmp.iid:E69D1D79E592DE11B5438D3D5694F2E0, xmp.iid:E79D1D79E592DE11B5438D3D5694F2E0, xmp.iid:E89D1D79E592DE11B5438D3D5694F2E0, xmp.iid:C732ADCD0696DE11B4ACF512AC08EF05, xmp.iid:C832ADCD0696DE11B4ACF512AC08EF05, xmp.iid:C932ADCD0696DE11B4ACF512AC08EF05, xmp.iid:4B4859589F96DE11B837C9C7DE74BB66, xmp.iid:51E75B1E6298DE11A5A1B5B2DE809F3A, xmp.iid:52E75B1E6298DE11A5A1B5B2DE809F3A, xmp.iid:53E75B1E6298DE11A5A1B5B2DE809F3A, xmp.iid:FFE166C5ED98DE1188ADD717CCBA8C1B, xmp.iid:3F7C7A19639BDE11995EEC2451ACDF52, xmp.iid:407C7A19639BDE11995EEC2451ACDF52, xmp.iid:417C7A19639BDE11995EEC2451ACDF52, xmp.iid:427C7A19639BDE11995EEC2451ACDF52, xmp.iid:437C7A19639BDE11995EEC2451ACDF52, xmp.iid:A7032C6C71BCDE11B284E0407D81574F, xmp.iid:A8032C6C71BCDE11B284E0407D81574F, xmp.iid:A9032C6C71BCDE11B284E0407D81574F, xmp.iid:65B5439510BDDE11BE0CD0CF4E8CCCF9, xmp.iid:A39CB7B5BBDFDE11AE78C452445026CE, xmp.iid:A49CB7B5BBDFDE11AE78C452445026CE, xmp.iid:6C550F19C0DFDE11AE78C452445026CE, xmp.iid:6D550F19C0DFDE11AE78C452445026CE, xmp.iid:07D0B6C6D9E2DE118FECA0F5C60E687E, xmp.iid:08D0B6C6D9E2DE118FECA0F5C60E687E, xmp.iid:09D0B6C6D9E2DE118FECA0F5C60E687E, xmp.iid:0AD0B6C6D9E2DE118FECA0F5C60E687E, xmp.iid:0BD0B6C6D9E2DE118FECA0F5C60E687E, xmp.iid:0CD0B6C6D9E2DE118FECA0F5C60E687E, xmp.iid:0DD0B6C6D9E2DE118FECA0F5C60E687E, xmp.iid:0ED0B6C6D9E2DE118FECA0F5C60E687E, xmp.iid:0FD0B6C6D9E2DE118FECA0F5C60E687E, xmp.iid:10D0B6C6D9E2DE118FECA0F5C60E687E, xmp.iid:9583E28F60E9DE11B961CF8CFF3D4B7C, xmp.iid:9683E28F60E9DE11B961CF8CFF3D4B7C, xmp.iid:2F53D42AE7E9DE11AA119A8FC4C14100, xmp.iid:3053D42AE7E9DE11AA119A8FC4C14100, xmp.iid:3153D42AE7E9DE11AA119A8FC4C14100, xmp.iid:3253D42AE7E9DE11AA119A8FC4C14100, xmp.iid:3353D42AE7E9DE11AA119A8FC4C14100, xmp.iid:3453D42AE7E9DE11AA119A8FC4C14100, xmp.iid:3553D42AE7E9DE11AA119A8FC4C14100, xmp.iid:8F6297BCDBEADE1188E89DC9DA0E91C9, xmp.iid:906297BCDBEADE1188E89DC9DA0E91C9, xmp.iid:F1BE7C68F0EADE119333EE94BB78BB2D, xmp.iid:F2BE7C68F0EADE119333EE94BB78BB2D, xmp.iid:812DF87EA2EEDE11A697F92BB8A1C63E, xmp.iid:822DF87EA2EEDE11A697F92BB8A1C63E, xmp.iid:832DF87EA2EEDE11A697F92BB8A1C63E, xmp.iid:842DF87EA2EEDE11A697F92BB8A1C63E, xmp.iid:852DF87EA2EEDE11A697F92BB8A1C63E, xmp.iid:862DF87EA2EEDE11A697F92BB8A1C63E, xmp.iid:872DF87EA2EEDE11A697F92BB8A1C63E, xmp.iid:882DF87EA2EEDE11A697F92BB8A1C63E, xmp.iid:FD1EBC805FEFDE1181019705FBAF8153, xmp.iid:99DCFD418AEFDE11B9F9C69C89A779B0, xmp.iid:9ADCFD418AEFDE11B9F9C69C89A779B0, xmp.iid:5582E4442AF0DE11B4C191452A9DFA30, xmp.iid:5682E4442AF0DE11B4C191452A9DFA30, xmp.iid:0180117407206811B6998B5056C3DA38, xmp.iid:0280117407206811B6998B5056C3DA38, xmp.iid:0380117407206811B6998B5056C3DA38, xmp.iid:0480117407206811B6998B5056C3DA38, xmp.iid:0580117407206811B6998B5056C3DA38, xmp.iid:0680117407206811B6998B5056C3DA38, xmp.iid:F77F11740720681195FEB205735E7880, xmp.iid:F87F11740720681195FEB205735E7880, xmp.iid:F97F11740720681195FEB205735E7880, xmp.iid:FA7F11740720681195FEB205735E7880, xmp.iid:FB7F11740720681195FEB205735E7880, xmp.iid:FC7F11740720681195FEB205735E7880, xmp.iid:F77F117407206811994CB17C640C4899, xmp.iid:F87F117407206811994CB17C640C4899, xmp.iid:F97F117407206811994CB17C640C4899, xmp.iid:FA7F117407206811994CB17C640C4899, xmp.iid:FB7F117407206811994CB17C640C4899, xmp.iid:FC7F117407206811994CB17C640C4899, xmp.iid:FD7F117407206811994CB17C640C4899, xmp.iid:FE7F117407206811994CB17C640C4899, xmp.iid:FF7F117407206811994CB17C640C4899, xmp.iid:0080117407206811994CB17C640C4899, xmp.iid:F77F117407206811A7BAA6FFDAEEC5A1, xmp.iid:F87F117407206811A7BAA6FFDAEEC5A1, xmp.iid:F97F117407206811A7BAA6FFDAEEC5A1, xmp.iid:FB7F117407206811A7BAA6FFDAEEC5A1, xmp.iid:FC7F117407206811A7BAA6FFDAEEC5A1, xmp.iid:FD7F117407206811A7BAA6FFDAEEC5A1, xmp.iid:FE7F117407206811A7BAA6FFDAEEC5A1, xmp.iid:FF7F117407206811A7BAA6FFDAEEC5A1, xmp.iid:0080117407206811A7BAA6FFDAEEC5A1, xmp.iid:F0CE3EB013206811A7BAA6FFDAEEC5A1, xmp.iid:F1CE3EB013206811A7BAA6FFDAEEC5A1, xmp.iid:F2CE3EB013206811A7BAA6FFDAEEC5A1, xmp.iid:F3CE3EB013206811A7BAA6FFDAEEC5A1, xmp.iid:F4CE3EB013206811A7BAA6FFDAEEC5A1, xmp.iid:F5CE3EB013206811A7BAA6FFDAEEC5A1, xmp.iid:F6CE3EB013206811A7BAA6FFDAEEC5A1, xmp.iid:F77F1174072068118DBBE82247670CDE, xmp.iid:F87F1174072068118DBBE82247670CDE, xmp.iid:F97F1174072068118DBBE82247670CDE, xmp.iid:FA7F1174072068118DBBE82247670CDE, xmp.iid:B1E0D4409BAADF119853F3BFE6DDA938, xmp.iid:B2E0D4409BAADF119853F3BFE6DDA938, xmp.iid:36315681AFAADF119853F3BFE6DDA938, xmp.iid:B0EDC4D8AFAADF119853F3BFE6DDA938, xmp.iid:712A0F81B0AADF119853F3BFE6DDA938, xmp.iid:13730B6BB1AADF119853F3BFE6DDA938, xmp.iid:9996FD0644ABDF11916DE4704AA7AAE8, xmp.iid:C863FDE063ABDF11916DE4704AA7AAE8, xmp.iid:7FE0BF0666ABDF11916DE4704AA7AAE8, xmp.iid:4C32A7E66DABDF11916DE4704AA7AAE8, xmp.iid:AFA5447B70ABDF11916DE4704AA7AAE8, xmp.iid:51A0C1B270ABDF11916DE4704AA7AAE8, xmp.iid:52A0C1B270ABDF11916DE4704AA7AAE8, xmp.iid:731F7CC371ABDF11916DE4704AA7AAE8, xmp.iid:561633E775ABDF11916DE4704AA7AAE8, xmp.iid:1BAD37B27FABDF11916DE4704AA7AAE8, xmp.iid:30C336320DACDF118F0096A0D5BC6353, xmp.iid:23ABE44E0FACDF118F0096A0D5BC6353, xmp.iid:546AF44E25ACDF118F0096A0D5BC6353, xmp.iid:971853E42CACDF118F0096A0D5BC6353, xmp.iid:44A9767B2FACDF118F0096A0D5BC6353, xmp.iid:29356A9832ACDF118F0096A0D5BC6353, xmp.iid:33AADF0E35ACDF118F0096A0D5BC6353, xmp.iid:82FF30FA3AACDF118F0096A0D5BC6353, xmp.iid:C1CBDE423FACDF118F0096A0D5BC6353, xmp.iid:FFCADB0141ACDF118F0096A0D5BC6353, xmp.iid:DBD50BBA41ACDF118F0096A0D5BC6353, xmp.iid:AE803F859FAEDF119840E6E8810EF631, xmp.iid:AB507FB333AFDF11AC0FD9970748030B, xmp.iid:CD6A7C0F35AFDF11AC0FD9970748030B, xmp.iid:CCF57DC335AFDF11AC0FD9970748030B, xmp.iid:986B4BDF53AFDF11AC0FD9970748030B, xmp.iid:BE47CF2057AFDF11AC0FD9970748030B, xmp.iid:F013678858AFDF11AC0FD9970748030B, xmp.iid:A66BE4765CAFDF11AC0FD9970748030B, xmp.iid:783AA53B5EAFDF11AC0FD9970748030B, xmp.iid:69815EA55EAFDF11AC0FD9970748030B, xmp.iid:07AE218F64AFDF11AC0FD9970748030B, xmp.iid:B242597465AFDF11AC0FD9970748030B, xmp.iid:E859D85166AFDF11AC0FD9970748030B, xmp.iid:7868F08A68AFDF11AC0FD9970748030B, xmp.iid:B03D06AF6BAFDF11AC0FD9970748030B, xmp.iid:1362A3DA6BAFDF11AC0FD9970748030B, xmp.iid:909753986FAFDF11AC0FD9970748030B, xmp.iid:32D10ACBF4AFDF11A706D642770FEDD3, xmp.iid:58C4577FF8AFDF11919196509ED894C5, xmp.iid:32997353F9AFDF11919196509ED894C5, xmp.iid:41BDE0D4FEAFDF11919196509ED894C5, xmp.iid:7B69906D10B0DF11919196509ED894C5, xmp.iid:37A89CDE12B0DF11919196509ED894C5, xmp.iid:8CBE423E14B0DF11919196509ED894C5, xmp.iid:5803974B15B0DF11919196509ED894C5, xmp.iid:B4523E8915B0DF11919196509ED894C5, xmp.iid:B5523E8915B0DF11919196509ED894C5, xmp.iid:2F3909B232B0DF11919196509ED894C5, xmp.iid:DFBA431434B0DF11919196509ED894C5, xmp.iid:FC8D5845B4B0DF11B9D2DE708C26C4E5, xmp.iid:285A0E8BFCB0DF11B9D2DE708C26C4E5, xmp.iid:C4488E507BB1DF11975091A3B727A499, xmp.iid:B84F19367CB1DF11975091A3B727A499, xmp.iid:1223380A83B1DF11975091A3B727A499, xmp.iid:5D2C146A87B1DF11975091A3B727A499, xmp.iid:E406D6AA8DB1DF11975091A3B727A499, xmp.iid:EAC26EAF9EB1DF11975091A3B727A499, xmp.iid:2B98746AA1B1DF11975091A3B727A499, xmp.iid:62FC2FA6A9B1DF11975091A3B727A499, xmp.iid:E2165860ACB1DF11975091A3B727A499, xmp.iid:31D9540CADB1DF11975091A3B727A499, xmp.iid:3407E314B0B1DF11975091A3B727A499, xmp.iid:3507E314B0B1DF11975091A3B727A499, xmp.iid:293CC8EAB4B1DF11975091A3B727A499, xmp.iid:169836A4C1B1DF11975091A3B727A499, xmp.iid:649762E20BB4DF1188C9A58CAA4BA087, xmp.iid:1479574C0CB4DF1188C9A58CAA4BA087 History When : 2009:08:20 09:50:35+08:00, 2009:08:20 09:50:35+08:00, 2009:08:20 17:40:10+08:00, 2009:08:24 10:11:06+08:00, 2009:08:24 17:56:32+08:00, 2009:08:25 10:25:23+08:00, 2009:08:25 18:02:39+08:00, 2009:08:26 09:43:50+08:00, 2009:08:26 10:30:59+08:00, 2009:08:26 11:11:18+08:00, 2009:08:26 11:29:55+08:00, 2009:08:26 11:33:29+08:00, 2009:08:26 11:55:52+08:00, 2009:08:26 14:49:33+08:00, 2009:08:26 15:12:32+08:00, 2009:08:26 15:14:57+08:00, 2009:08:26 16:17:49+08:00, 2009:08:26 16:27:14+08:00, 2009:08:26 16:28:03+08:00, 2009:08:26 17:02:18+08:00, 2009:08:26 17:48:22+08:00, 2009:08:26 18:27:29+08:00, 2009:08:26 18:33:09+08:00, 2009:08:26 18:50:23+08:00, 2009:08:26 18:57:57+08:00, 2009:08:26 19:02:14+08:00, 2009:08:26 19:08:17+08:00, 2009:08:26 19:21:46+08:00, 2009:08:26 19:22:47+08:00, 2009:08:26 19:43:54+08:00, 2009:08:27 09:59:45+08:00, 2009:08:27 10:03:10+08:00, 2009:08:27 10:12:08+08:00, 2009:08:27 10:14:19+08:00, 2009:08:27 10:18:47+08:00, 2009:08:27 10:41:59+08:00, 2009:08:27 10:42:15+08:00, 2009:08:27 10:45:32+08:00, 2009:08:27 10:47:47+08:00, 2009:08:27 10:52:09+08:00, 2009:08:27 10:54:58+08:00, 2009:08:27 10:55:26+08:00, 2009:08:27 10:56:41+08:00, 2009:08:27 11:22:37+08:00, 2009:08:27 11:36:52+08:00, 2009:08:27 11:42:37+08:00, 2009:08:27 11:45:59+08:00, 2009:08:27 11:47:36+08:00, 2009:08:27 11:51:02+08:00, 2009:08:27 11:52:04+08:00, 2009:08:27 12:00:47+08:00, 2009:08:27 12:09:09+08:00, 2009:08:27 14:11:36+08:00, 2009:08:27 14:13:11+08:00, 2009:08:27 15:24:33+08:00, 2009:08:27 15:24:52+08:00, 2009:08:27 15:31:03+08:00, 2009:08:27 15:33:55+08:00, 2009:08:27 15:40:17+08:00, 2009:08:27 16:11:33+08:00, 2009:08:27 16:16:46+08:00, 2009:08:27 16:33:05+08:00, 2009:08:27 16:33:55+08:00, 2009:08:27 16:34:30+08:00, 2009:08:27 16:35:37+08:00, 2009:08:27 16:37:06+08:00, 2009:08:27 16:37:28+08:00, 2009:08:27 16:38:18+08:00, 2009:08:27 16:40:14+08:00, 2009:08:27 16:41:54+08:00, 2009:08:27 16:49:50+08:00, 2009:08:27 16:52:06+08:00, 2009:08:31 16:18:03+08:00, 2009:08:31 16:18:03+08:00, 2009:08:31 17:57:08+08:00, 2009:09:01 10:29:59+08:00, 2009:09:03 16:16:45+08:00, 2009:09:03 16:16:45+08:00, 2009:09:03 16:32:40+08:00, 2009:09:04 08:56:25+08:00, 2009:09:07 12:01:19+08:00, 2009:09:07 12:01:20+08:00, 2009:09:07 13:45:50+08:00, 2009:09:07 13:56:05+08:00, 2009:09:07 14:32:03+08:00, 2009:10:19 13:36:59+08:00, 2009:10:19 13:37+08:00, 2009:10:19 16:59:54+08:00, 2009:10:20 08:36:18+08:00, 2009:12:03 11:26:56+08:00, 2009:12:03 11:26:57+08:00, 2009:12:03 11:59:03+08:00, 2009:12:03 17:57:18+08:00, 2009:12:07 10:39:43+08:00, 2009:12:07 11:55:48+08:00, 2009:12:07 12:04:41+08:00, 2009:12:07 12:05:25+08:00, 2009:12:07 12:12:37+08:00, 2009:12:07 14:46:56+08:00, 2009:12:07 14:54:30+08:00, 2009:12:07 15:06:58+08:00, 2009:12:07 15:27:58+08:00, 2009:12:07 15:29:10+08:00, 2009:12:15 17:59:40+08:00, 2009:12:15 17:59:40+08:00, 2009:12:16 10:03:13+08:00, 2009:12:16 14:25+08:00, 2009:12:16 15:16:39+08:00, 2009:12:16 15:55:02+08:00, 2009:12:16 16:27:23+08:00, 2009:12:16 16:27:49+08:00, 2009:12:16 16:37:45+08:00, 2009:12:17 15:13:54+08:00, 2009:12:17 15:13:56+08:00, 2009:12:17 17:41:53+08:00, 2009:12:17 17:41:53+08:00, 2009:12:22 10:34:15+08:00, 2009:12:22 10:34:15+08:00, 2009:12:22 10:53:30+08:00, 2009:12:22 17:05:07+08:00, 2009:12:22 17:24:32+08:00, 2009:12:22 17:51:34+08:00, 2009:12:22 17:51:56+08:00, 2009:12:22 17:52:50+08:00, 2009:12:23 09:07:12+08:00, 2009:12:23 14:13:15+08:00, 2009:12:23 14:13:16+08:00, 2009:12:24 09:18:40+08:00, 2009:12:24 09:18:40+08:00, 2010:08:11 14:25:37+08:00, 2010:08:11 14:25:37+08:00, 2010:08:11 14:54:36+08:00, 2010:08:11 14:54:36+08:00, 2010:08:11 17:21:14+08:00, 2010:08:11 18:28:20+08:00, 2010:08:13 14:45:36+08:00, 2010:08:13 14:48:13+08:00, 2010:08:13 16:36:30+08:00, 2010:08:13 16:39:38+08:00, 2010:08:13 16:56:03+08:00, 2010:08:13 17:50:45+08:00, 2010:08:16 11:09:45+08:00, 2010:08:16 11:10:42+08:00, 2010:08:16 11:13:45+08:00, 2010:08:16 11:51:08+08:00, 2010:08:16 12:10:02+08:00, 2010:08:16 17:54:10+08:00, 2010:08:16 17:59:21+08:00, 2010:08:16 17:59:55+08:00, 2010:08:16 18:01:16+08:00, 2010:08:16 18:06:35+08:00, 2010:08:17 14:12:20+08:00, 2010:08:17 14:13:08+08:00, 2010:08:17 14:14:46+08:00, 2010:08:17 14:51:19+08:00, 2010:08:17 14:52:12+08:00, 2010:08:17 15:03:20+08:00, 2010:08:17 15:08:30+08:00, 2010:08:17 15:20+08:00, 2010:08:17 15:22:25+08:00, 2010:08:17 15:39:55+08:00, 2010:08:17 15:44:05+08:00, 2010:08:17 15:47:04+08:00, 2010:08:17 17:18:05+08:00, 2010:08:17 17:24:42+08:00, 2010:08:17 17:34:21+08:00, 2010:08:17 18:35:48+08:00, 2010:08:18 14:41:07+08:00, 2010:08:18 14:41:07+08:00, 2010:08:18 14:41:41+08:00, 2010:08:18 14:41:42+08:00, 2010:08:18 15:36:02+08:00, 2010:08:18 15:36:02+08:00, 2010:08:18 18:01:01+08:00, 2010:08:18 18:03:27+08:00, 2010:08:18 18:08:10+08:00, 2010:08:18 18:14:42+08:00, 2010:08:19 11:44:10+08:00, 2010:08:19 15:32:10+08:00, 2010:08:19 15:47:33+08:00, 2010:08:19 16:43:55+08:00, 2010:08:19 17:02:23+08:00, 2010:08:19 17:03:56+08:00, 2010:08:19 17:07:53+08:00, 2010:08:19 17:11:34+08:00, 2010:08:19 17:41:12+08:00, 2010:08:19 18:51:18+08:00, 2010:08:20 11:44:12+08:00, 2010:08:20 11:59:19+08:00, 2010:08:20 14:36:48+08:00, 2010:08:20 15:31:05+08:00, 2010:08:20 15:49:37+08:00, 2010:08:20 16:11:55+08:00, 2010:08:20 16:29:32+08:00, 2010:08:20 17:11:55+08:00, 2010:08:20 17:42:34+08:00, 2010:08:20 17:55:04+08:00, 2010:08:20 18:00:13+08:00, 2010:08:23 18:16:40+08:00, 2010:08:24 11:57:23+08:00, 2010:08:24 12:07:07+08:00, 2010:08:24 12:12:09+08:00, 2010:08:24 15:47:40+08:00, 2010:08:24 16:10:59+08:00, 2010:08:24 16:21:02+08:00, 2010:08:24 16:49:11+08:00, 2010:08:24 17:01:50+08:00, 2010:08:24 17:04:48+08:00, 2010:08:24 17:47:07+08:00, 2010:08:24 17:53:32+08:00, 2010:08:24 17:59:43+08:00, 2010:08:24 18:15:38+08:00, 2010:08:24 18:38:07+08:00, 2010:08:24 18:39:20+08:00, 2010:08:24 19:06:07+08:00, 2010:08:25 10:59:35+08:00, 2010:08:25 11:26:06+08:00, 2010:08:25 11:32:02+08:00, 2010:08:25 12:11:27+08:00, 2010:08:25 14:17:24+08:00, 2010:08:25 14:34:53+08:00, 2010:08:25 14:44:43+08:00, 2010:08:25 14:52:15+08:00, 2010:08:25 14:53:58+08:00, 2010:08:25 15:07:19+08:00, 2010:08:25 18:22:42+08:00, 2010:08:25 18:32:36+08:00, 2010:08:26 09:50:14+08:00, 2010:08:26 18:27:35+08:00, 2010:08:27 09:35:03+08:00, 2010:08:27 09:41:28+08:00, 2010:08:27 10:30:21+08:00, 2010:08:27 11:01:40+08:00, 2010:08:27 11:46:25+08:00, 2010:08:27 13:48:15+08:00, 2010:08:27 14:07:47+08:00, 2010:08:27 15:06:44+08:00, 2010:08:27 15:26:15+08:00, 2010:08:27 15:31:03+08:00, 2010:08:27 15:52:46+08:00, 2010:08:27 16:25:17+08:00, 2010:08:27 16:27:23+08:00, 2010:08:27 17:58:28+08:00, 2010:08:30 15:54:58+08:00, 2010:08:30 15:57:55+08:00 History Software Agent : Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0 History Changed : /, /metadata, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /metadata, /;/metadata, /, /, /metadata, /;/metadata, /, /, /metadata, /;/metadata, /, /, /, /metadata, /;/metadata, /, /, /metadata, /;/metadata, /, /, /, /, /, /, /, /, /, /, /, /, /metadata, /;/metadata, /, /, /, /, /, /, /, /metadata, /;/metadata, /metadata, /;/metadata, /metadata, /;/metadata, /, /, /, /, /, /, /, /metadata, /;/metadata, /metadata, /, /metadata, /;/metadata, /metadata, /;/metadata, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata Doc Change Count : 34847 Format : application/pdf Producer : Adobe PDF Library 9.9 Trapped : False Has XFA : No Page Count : 84 Creator : Adobe InDesign CS5 (7.0.2)EXIF Metadata provided by EXIF.tools