Tecom Co C1030 Wi-Fi Chime. User Manual

Tecom Co Ltd Wi-Fi Chime.

User Manual

‐1‐
WiFi Chime
C-1030
User Manual
Version: 2.0
TECOM CO., LTD.

‐2‐
Ver.2.0
Safety Precautions
Please follow these safety precautions to prevent injury or damage to property that
may be caused by fire or electrical damage.
DOs:
1.) Use the type of power recommended as seen on the label of your device.
2.) Use the power adapter in the product package.
3.) Pay attention to the power load of the outlet or prolonged lines. An overburdened
power outlet, damaged lines or plugs may cause electric shock or even fire.
Check your power cords regularly to ensure their safe functioning. If you find any
damage line or parts, please repair or replace them immediately.
4.) Leave space around your device to allow heat dissipation. This is necessary to
avoid damage caused by the overheating of the device. The long and thin holes
on the device are designed for heat dissipation to ensure that the device
continues normal functioning. Do not cover these heat dissipation holes.
DON’Ts:
1.) Do not keep this device close to a heat source or in a high temperature
environment. Keep the device away from direct sunlight.
2.) Do not keep this device in a damp or moist place. Do not spill any fluids on this
device.
3.) Do not connect this device to a PC or other electronic product unless instructed
by our customer service engineers or your internet service provider. Bad
connections may cause a power surge or fire risk.
4.)
Do not place this device on an unstable surface or support.

‐3‐
Ver.2.0
 
2Northern America FCC Statement
This equipment generates uses and can radiate radio frequency energy and, if not installed
and used in accordance with the instructions in this manual, may cause interference to radio
communications.
This equipment as been tested and found to comply with the limits for a Class B computing
device pursuant to Subpart J of Part 15 of FCC rules, which are designed to provide
reasonable protection against radio interference when operated in a commercial
environment. Operation of this equipment in a residential area is likely to cause interference,
in which case the user, at his or her own expense, will be required to take whatever
measures are necessary to correct the interface.
Europe CE Declaration of Conformity
This equipment complies with the requirements relating to electromagnetic compatibility,
EN55032 Class B for ITE and EN 500821. This meets the essential protection requirements
of the European Council Directive 2014/53/EEC on the approximation of the laws of the
Member States relating to electromagnetic compatibility.
Japan VCCI Declaration of Conformity
This equipment complies with the Class B standard of the Voluntary Control Council for
Interference from Information Technology Equipment (VCCI). This meets the essential
protection requirements of Japan laws relating to electromagnetic compatibility.
Copyright Notice
©Copyright, 2010. All rights reserved. No part of this publication may be reproduced,
transmitted, transcribed, stored in retrieval system or translated in to any language or
computer language, in any from or by any means, electronic, mechanical, magnetic, optical,
chemical, manual or otherwise, without the prior written permission of Owner (The Company).
The Company reserves the right to revise the publication and make changes from time to time
in the contents hereof without obligation of this company to notify person of such revision or
changes. The material contained herein is supplied without representation or warranty of any
kind. The Company therefore assumes no responsibility and shall have no liability of any kind
arising from the supply or use of this document or the material contained herein.
Trademarks
Windows 98/2000/XP/NT™, NetMeeting™, Internet Explorer™ are registered trademarks of
Microsoft Corporation. All company, brand and product names are trademarks or registered
trademarks of their respective owners.

‐4‐
Ver.2.0
Revision History
Version Date Update Log Author
2.0 20150204 2nd version for C-1030 User
Manual.
Sony

‐5‐
Ver.2.0
C-1030, networking standard compliant Wireless adapter, provides the best
quality data transmission for the truly highspeed ‘connected home’
experience. It allows users to extend a local area network via existing
Wireless. Installation at home (or in a small office) is quick and easy as the
C1030 comes with plugandplay technology.
C-1030 supports (802.11n 1x1) operation based on WSC-N101 module and
can be used with two fully programmable reception and transmission paths to
attain up to 1Gbps PHY rates coexistence with UPA technology networks.
Key Features:
Performance
Support ITUT G.hn baseband plans 25, 50, 100 and 150 MHz and
MIMO techniques for powerline (based on G.9963) boosting to prevent noise
interference from other home appliances.
1 . PRODUCT OVERVIEW
‐6‐
Ver.2.0
3. C-1030 Web Configuration
3.1. Login Page
Figure3.11 shows the login window. Here, the login information should be
filled in as shown below:
Figure 3.11
The default IP address of the C-1030 Wireless is 10.10.10.254
Username: admin
Password: admin
After login we can see Quick Setup page
‐7‐
Ver.2.0
3.2. Quick Setup
Figure3.21 displays the Quick setup page of the device.
Figure 3.21
Using quick setup we can configure below list.
NTP settings
Operation Mode
Network Settings
Wireless Settings
‐8‐
Ver.2.0
3.3. Basic Setup
Figure3.31 shows basic setup of the device
Figure 3.31
‐9‐
Ver.2.0
3.3.1. Operation Mode
Figure3.3.11 displays operation mode settings
Figure 3.3.11
In this page we can set bridge mode or gateway mode
3.3.2. WAN
Figure3.3.31, Figure3.3.32, Figure3.3.33 and Figure3.3.34 displays WAN
settings information
WAN has static, DHCP, PPPoE and 3G connection types.
Configure static connection type as below
‐10‐
Ver.2.0
Figure3.3.31
Configure DHCP connection type as below
‐11‐
Ver.2.0
Figure3.3.32
‐12‐
Ver.2.0
Figure3.3.33
PPPoE
Select this option if your ISP requires you to use a PPPoE connection. This
option is typically used for DSL services. Select Dynamic PPPoE to obtain an
IP address automatically for your PPPoE connection. Select Static PPPoE to
use a static IP address for your PPPoE connection. Please enter the
information accordingly.
Username: Enter your username for your PPPoE
connection. Password: Enter your password for your
PPPoE connection
Operation Mode: For PPPoE connection, you can select Always on or
Connect ondemand. Connect on demand is dependent on the traffic. If there
is no traffic (or Idle) for a prespecified period of time), the connection will tear
‐13‐
Ver.2.0
down automatically. And once there is traffic send or receive, the connection
will be automatically on.
3.3.3. Wireless
Figure3.3.41 and Figure3.3.42 displays basic wireless information
The following page is Wireless LAN settings. Please select and input the
correct information in the following item to set Wireless function.
Figure 3.3.41
‐14‐
Ver.2.0
Figure 3.3.42
We can configure below settings using basic wireless settings page
SSID:
The SSID is a unique name to identify the DSL Router in the wireless LAN.
Wireless clients associating to the DSL Router must have the same SSID.
Broadcast SSID:
Select No to hide the SSID such that a station can not obtain the SSID through
passive scanning. Select yes to make the SSID visible so a station can obtain
the SSID through passive scanning.
Channel ID the range of radio frequencies used by IEEE 802.11b/g wireless
devices is called a channel
‐15‐
Ver.2.0
3.4. Advanced Setup
Figure3.41 shows Advanced Setup menu list
Figure 3.41
3.4.1. Advanced Wireless
Figure3.4.11, Figure3.4.12, Figure3.4.13 shows Advanced Wireless
settings and WiFi multimedia
‐16‐
Ver.2.0
The following page is Advanced Wireless settings. Please select and input the
correct information in the following item to set Wireless functions.
Figure 3.4.11
‐17‐
Ver.2.0
Figure 3.4.12
Figure 3.4.13
‐18‐
Ver.2.0
Beacon Interval
The Beacon Interval value indicates the frequency interval of the beacon.
Enter a value between 20 and 1000. A beacon is a packet broadcast by the
Router to synchronize the wireless network.
DTIM
This value, between 1 and 255, indicates the interval of the Delivery Traffic
Indication Message (DTIM).
RTS Threshold
The RTS (Request to Send) threshold (number of bytes) for enabling RTS
handshake Data with its frame size larger than this value will perform the RTS
handshake, setting this attribute to be larger than the maximum MSDU (MAC
service data unit) size turns off the RTS handshake, setting this attribute to
zero turns on the RTS handshake. Enter a value between 0 and 2432.
Fragmentation Threshold
The threshold (number of bytes) for the fragmentation boundary for directed
messages. It is the maximum data fragment size that can be sent. Enter a
value between 256 and 2432.
‐19‐
Ver.2.0
3.4.2. Security
Figure3.4.21, Figure3.4.22, Figure3.4.23, and Figure3.4.24 shows wireless
Security information
Figure 3.4.21
‐20‐
Ver.2.0
Figure 3.4.22
Figure 3.4.23
Figure 3.4.24
Using this page we can set SSID choice, Security mode, Access Policy and
WPA.
‐21‐
Ver.2.0
Security Mode
OPEN WEP
WEP (Wired Equivalent Privacy) encrypts data frames before transmitting
over the wireless network. Select Disable to allow all wireless computers to
communicate with the access points without any data encryption. Select 64
bit
WEP or 128bit WEP to use data encryption.
Key#1~Key#4 The WEP keys are used to encrypt data. Both the DSL Router
and the wireless clients must use the same WEP key for data transmission. If
you chose 64bit WEP, then enter any 10 hexadecimal digits ("09", "AF")
preceded by 0x for each key (14). If you chose 128bit WEP, then enter 26
hexadecimal digits ("09", "AF") preceded by 0x for each key (14).The values
must be set up exactly the same on the Access Points as they are on the
wireless client stations. The same value must be assigned to Key 1 on both
the access point (your DSL Router) and the client adapters, the same value
must be assigned to Key 2 on both the access point and the client stations
and so on, for all four WEP keys.
WPAPSK
WiFi Protected Access, preshared key. Encrypts data frames before
transmitting over the wireless network.
Preshared Key: the Preshared Key is used to encrypt data. Both the DSL
Router and the wireless clients must use the same WPAPSK key for data
transmission.
WPA2PSK
Short for WiFi Protected Access 2 PreShared Key, and also called WPA
or WPA2 Personal, it is a method of securing your network using WPA2
‐22‐
Ver.2.0
with the use of the optional PreShared Key (PSK) authentication, which
was designed for home users without an enterprise authentication server.
To encrypt a network with WPA2PSK you provide your router not with an
encryption key, but rather with a plainEnglish passphrase between 8 and 63
characters long.
Using a technology called TKIP (for Temporal Key Integrity Protocol), that
passphrase, along with the network SSID, is used to generate unique
encryption keys for each wireless client. And those encryption keys are
constantly changed. Although WEP
also supports passphrases, it does so only as a way to more easily create
static keys, which are usually comprised of the hex characters 09 and AF.
WPA Algorithms
TKIP
TKIP stands for “Temporal Key Integrity Protocol.” It was a stopgap encryption
protocol introduced with WPA to replace the veryinsecure WEP encryption at
the time. TKIP is actually quite similar to WEP encryption.
AES
AES stands for “Advanced Encryption Standard.” This was a more secure
encryption protocol introduced with WPA2, which replaced the interim WPA
standard.
TKIPAES
When you set your router to use WPA2, you usually have the option to use
AES, or TKIP+AES. When your device is set to "WPA2 with TKIP+AES" it
means that network devices that can use WPA2 will connect with WPA2, and
network devices that can only use WPA will connect with WPA.
‐23‐
Ver.2.0
3.4.3. WPS
Figure3.4.31, Figure3.4.32 shows WPS settings
WiFi Protected Setup (WPS; originally WiFi Simple Configuration) is a
network security standard that attempts to allow users to easily secure a
wireless home network but could fall to bruteforce attacks if one or more of
the network's access points do not guard against the attack.
Figure 3.4.31
‐24‐
Ver.2.0
Figure 3.4.32
WPS Settings
There two WPS mode, one is PIN code and other one is PBC.
PIN method in which a personal identification number (PIN) has to be
read from
either a sticker or display on the new wireless device. This PIN must then be
entered at the "representant" of the network, usually the network's access
point. Alternately, a PIN provided by the access point may be entered into the
new device. This method is the mandatory baseline mode and every
WPScertified product must support it.
Push button method
in which the user has to push a button, either an actual or virtual one, on
both the access point and the new wireless client device. Support of this
mode is mandatory for access points and optional for connecting devices.
‐25‐
Ver.2.0
Example of configuration
1. Make sure WPS is enabled on system wise.
2. For Pin method
1). Select radio button PIN method.
2). Enable your WiFi client (Notebook, Mobile, PAD…etc). And check
WPS. 3). Take PIN at client and specify same one in your AP device.
4). Click “Apply“below “WPS Progress” table to trigger WPS
session. 5). Once connected, “WPS current status” will be put
“Connected”.
‐26‐
Ver.2.0
3. For PBC at Web
1). Select the following radio button, and click “Apply” Button to trigger WPS
session.
2). at WiFi client side, select PBC method. Within 2 minutes, they are
automatically connected.
3). Once connected, “WPS current status” will be put “Connected”.
4. For physical PBC on the housing:
1). Special Note: WPS is enabled on system wise.
‐27‐
Ver.2.0
2). At wifi client side, select PBC method.
3). Within 2 minutes, please push physical PBC button at housing.
3.4.4. Station List
Figure3.4.41 display the wireless network station list
Figure 3.4.41
3.4.5. Routing
Figure3.4.51, Figure3.4.52 displays Static Routing Settings
‐28‐
Ver.2.0
Figure 3.4.51
Figure 3.4.52
3.4.6. Port Forwarding
Figure3.4.61, Figure3.4.62 displays Port Forwarding setup and information
‐29‐
Ver.2.0
Figure 3.4.61
‐30‐
Ver.2.0
Figure 3.4.62
3.4.7. DMZ Settings
Figure3.4.71 displays DMZ settings page
The DeMilitarized Zone (DMZ) is a network which, when compared to the LAN,
has fewer firewall restrictions, by default. This zone can be used to host servers
(such as a web server, ftp server, or email server, for example) and give public
access to them.
The eighth LAN port on the router can be dedicated as a hardware DMZ port
for safely providing services to the Internet, without compromising security on
your LAN.
‐31‐
Ver.2.0
FCC+IC USER WARNING
1.§ P15.21 Information to user.
Notice:
Anychangesormodificationsnotexpresslyapprovedbythepartyresponsiblefor
compliancecouldvoidyourauthoritytooperatetheequipment.
法文:
Aucunemodificationapportéeàl’appareilparl’utilisateur,quellequ’ensoitlanature.
Toutchangementoumodificationpeuventannulerledroitd’utilisationdel’appareil
parl’utilisateur.
2.§ P15.105 Information to the user.
‐32‐
Ver.2.0
Note:ThisequipmenthasbeentestedandfoundtocomplywiththelimitsforaClassB
digitaldevice,pursuanttopart15oftheFCCRules.Theselimitsaredesignedto
providereasonableprotectionagainstharmfulinterferenceinaresidentialinstallation.
Thisequipmentgenerates,usesandcanradiateradiofrequencyenergyand,ifnot
installedandusedinaccordancewiththeinstructions,maycauseharmfulinterference
toradiocommunications.However,thereisnoguaranteethatinterferencewillnot
occurinaparticularinstallation.Ifthisequipmentdoescauseharmfulinterferenceto
radioortelevisionreception,whichcanbedeterminedbyturningtheequipmentoff
andon,theuserisencouragedtotrytocorrecttheinterferencebyoneormoreofthe
followingmeasures:
Reorientorrelocatethereceivingantenna.
Increasetheseparationbetweentheequipmentandreceiver.
Connecttheequipmentintoanoutletonacircuitdifferentfromthattowhichthe
receiverisconnected.
Consultthedealeroranexperiencedradio/TVtechnicianforhelp.
法文:
ThisClassBdigitalapparatuscomplieswithCanadianICES‐003.
Toreducepotentialradiointerferencetootherusers,theantennatype
anditsgainshouldbesochosenthattheequivalentisotropicallyradiated
power(e.i.r.p.)isnotmorethanthatpermittedforsuccessful
communication.
ThisdevicecomplieswithIndustryCanadalicence‐exemptRSSstandard(s).
Operationissubjecttothefollowingtwoconditions:
1. Thisdevicemaynotcauseinterference,and
2. Thisdevicemustacceptanyinterference,includinginterferencethatmay
causeundesiredoperationofthedevice.
CetappareilnumériquedelaclasseBestconformeàlanormeNMB‐003
Canada.
Pourréduirelerisqued’interférenceauxautresutilisateurs,letype
d’antenneetsongaindoiventêtrechoisiesdefaçonquelapuissance
isotroperayonnéeéquivalente(PIRE)nedépassepascequiest
nécessairepourunecommunicationréussie.
CetappareilestconformeàlanormeRSSIndustrieCanadaexemptsdelicence
norme(s).Sonfonctionnementestsoumisauxdeuxconditionssuivantes:
1. Cetappareilnepeutpasprovoquerd’interférenceset
2. Cetappareildoitacceptertouteinterférence,ycomprislesinterférences
quipeuventcauserunmauvaisfonctionnementdudispositif.
‐33‐
Ver.2.0
3.§ P15.19 FCC Labelling requirement
Notice:
ThisdevicecomplieswithPart15oftheFCCRulesandIndustryCanadalicense‐exemptRSS
standard(s).Operationissubjecttothefollowingtwoconditions:(1)thisdevicemaynot
causeinterference,and(2)thisdevicemustacceptanyinterference,includinginterference
thatmaycauseundesiredoperationofthedevice.
法文:
LeprésentappareilestconformeauxCNRd'IndustrieCanadaapplicablesauxappareils
radioexemptsdelicence.L'exploitationestautoriséeauxdeuxconditionssuivantes:(1)
l'appareilnedoitpasproduiredebrouillage,et(2)l'utilisateurdel'appareildoitaccepter
toutbrouillageradioélectriquesubi,mêmesilebrouillageestsusceptibled'en
compromettrelefonctionnement.
4.FCC/IC RF Radiation Exposure Statement:
FCC
1. ThisTransmittermustnotbecolocatedoroperatinginconjunctionwithanyother
antennaortransmitter.
2. ThisequipmentcomplieswithFCCRFradiationexposurelimitssetforthforan
uncontrolledenvironment.This
equipmentshouldbeinstalledandoperatedwithaminimumdistanceof20centimeters
betweentheradiatorandyour
body.
法文:
1.L'émetteurnedoitpasêtrecolocalisénifonctionnerconjointementavecàautre
antenneouautreémetteur.2.Cetappareilestconformeauxlimitesd'expositionaux
rayonnementsdelaICpourunenvironnementnoncontrôlé.L'antennedoitêtreinstallé
defaçonàgarderunedistanceminimalede20centimètresentrelasourcede
rayonnementsetvotrecorps.
IC

Navigation menu