Tecom Co C1030 Wi-Fi Chime. User Manual

Tecom Co Ltd Wi-Fi Chime.

User Manual

Download: Tecom Co C1030 Wi-Fi Chime. User Manual
Mirror Download [FCC.gov]Tecom Co C1030 Wi-Fi Chime. User Manual
Document ID3367988
Application IDioBJIrmOOB/RsZoMSCic8w==
Document DescriptionUser Manual
Short Term ConfidentialYes
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize149.15kB (1864350 bits)
Date Submitted2017-04-24 00:00:00
Date Available2017-10-22 00:00:00
Creation Date2017-04-21 16:50:36
Producing SoftwareAcrobat Distiller 11.0 (Windows)
Document Lastmod2017-04-21 17:17:38
Document TitleMicrosoft Word - C-1030_WiFi Chime_User Manual_20170418.docx
Document CreatorPScript5.dll Version 5.2.2
Document Author: Connie Fang

WiFi Chime
C-1030
User Manual
Version: 2.0
TECOM CO., LTD.
‐1‐
Ver.2.0
Safety Precautions
Please follow these safety precautions to prevent injury or damage to property that
may be caused by fire or electrical damage.
DOs:
1.) Use the type of power recommended as seen on the label of your device.
2.) Use the power adapter in the product package.
3.) Pay attention to the power load of the outlet or prolonged lines. An overburdened
power outlet, damaged lines or plugs may cause electric shock or even fire.
Check your power cords regularly to ensure their safe functioning. If you find any
damage line or parts, please repair or replace them immediately.
4.) Leave space around your device to allow heat dissipation. This is necessary to
avoid damage caused by the overheating of the device. The long and thin holes
on the device are designed for heat dissipation to ensure that the device
continues normal functioning. Do not cover these heat dissipation holes.
DON’Ts:
1.) Do not keep this device close to a heat source or in a high temperature
environment. Keep the device away from direct sunlight.
2.) Do not keep this device in a damp or moist place. Do not spill any fluids on this
device.
3.) Do not connect this device to a PC or other electronic product unless instructed
by our customer service engineers or your internet service provider. Bad
connections may cause a power surge or fire risk.
4.) Do not place this device on an unstable surface or support.
‐2‐
Ver.2.0
2 Northern America FCC Statement
This equipment generates uses and can radiate radio frequency energy and, if not installed
and used in accordance with the instructions in this manual, may cause interference to radio
communications.
This equipment as been tested and found to comply with the limits for a Class B computing
device pursuant to Subpart J of Part 15 of FCC rules, which are designed to provide
reasonable protection against radio interference when operated in a commercial
environment. Operation of this equipment in a residential area is likely to cause interference,
in which case the user, at his or her own expense, will be required to take whatever
measures are necessary to correct the interface.
Europe CE Declaration of Conformity
This equipment complies with the requirements relating to electromagnetic compatibility,
EN55032 Class B for ITE and EN 50082‐1. This meets the essential protection requirements
of the European Council Directive 2014/53/EEC on the approximation of the laws of the
Member States relating to electromagnetic compatibility.
Japan VCCI Declaration of Conformity
This equipment complies with the Class B standard of the Voluntary Control Council for
Interference from Information Technology Equipment (VCCI). This meets the essential
protection requirements of Japan laws relating to electromagnetic compatibility.
Copyright Notice
©Copyright, 2010. All rights reserved. No part of this publication may be reproduced,
transmitted, transcribed, stored in retrieval system or translated in to any language or
computer language, in any from or by any means, electronic, mechanical, magnetic, optical,
chemical, manual or otherwise, without the prior written permission of Owner (The Company).
The Company reserves the right to revise the publication and make changes from time to time
in the contents hereof without obligation of this company to notify person of such revision or
changes. The material contained herein is supplied without representation or warranty of any
kind. The Company therefore assumes no responsibility and shall have no liability of any kind
arising from the supply or use of this document or the material contained herein.
Trademarks
Windows 98/2000/XP/NT™, NetMeeting™, Internet Explorer™ are registered trademarks of
Microsoft Corporation. All company, brand and product names are trademarks or registered
trademarks of their respective owners.
‐3‐
Ver.2.0
Revision History
Version Date
Update Log
Author
2.0
2nd version for C-1030 User
Manual.
Sony
2015‐02‐04
‐4‐
Ver.2.0
1 . PRODUCT OVERVIEW
C-1030, networking standard compliant Wireless adapter, provides the best
quality data transmission for the truly high‐speed ‘connected home’
experience. It allows users to extend a local area network via existing
Wireless. Installation at home (or in a small office) is quick and easy as the
C1030 comes with plug‐and‐play technology.
C-1030 supports (802.11n 1x1) operation based on WSC-N101 module and
can be used with two fully programmable reception and transmission paths to
attain up to 1Gbps PHY rates co‐existence with UPA technology networks.
Key Features:
 Performance
Support ITU‐T G.hn baseband plans 25, 50, 100 and 150 MHz and
MIMO techniques for powerline (based on G.9963) boosting to prevent noise
interference from other home appliances.
‐5‐
Ver.2.0
3. C-1030 Web Configuration
3.1. Login Page
Figure3.1‐1 shows the login window. Here, the login information should be
filled in as shown below:
Figure 3.1‐1
The default IP address of the C-1030 Wireless is 10.10.10.254
Username: admin
Password: admin
After login we can see Quick Setup page
‐6‐
Ver.2.0
3.2. Quick Setup
Figure3.2‐1 displays the Quick setup page of the device.
Figure 3.2‐1
Using quick setup we can configure below list.
•
NTP settings
•
Operation Mode
•
Network Settings
•
Wireless Settings
‐7‐
Ver.2.0
3.3. Basic Setup
Figure3.3‐1 shows basic setup of the device
Figure 3.3‐1
‐8‐
Ver.2.0
3.3.1. Operation Mode
Figure3.3.1‐1 displays operation mode settings
Figure 3.3.1‐1
In this page we can set bridge mode or gateway mode
3.3.2. WAN
Figure3.3.3‐1, Figure3.3.3‐2, Figure3.3.3‐3 and Figure3.3.3‐4 displays WAN
settings information
WAN has static, DHCP, PPPoE and 3G connection types.
Configure static connection type as below
‐9‐
Ver.2.0
Figure3.3.3‐1
Configure DHCP connection type as below
‐ 10 ‐
Ver.2.0
Figure3.3.3‐2
‐ 11 ‐
Ver.2.0
Figure3.3.3‐3
PPPoE
Select this option if your ISP requires you to use a PPPoE connection. This
option is typically used for DSL services. Select Dynamic PPPoE to obtain an
IP address automatically for your PPPoE connection. Select Static PPPoE to
use a static IP address for your PPPoE connection. Please enter the
information accordingly.
Username: Enter your username for your PPPoE
connection. Password: Enter your password for your
PPPoE connection
Operation Mode: For PPPoE connection, you can select Always on or
Connect on‐demand. Connect on demand is dependent on the traffic. If there
is no traffic (or Idle) for a pre‐specified period of time), the connection will tear
‐ 12 ‐
Ver.2.0
down automatically. And once there is traffic send or receive, the connection
will be automatically on.
3.3.3. Wireless
Figure3.3.4‐1 and Figure3.3.4‐2 displays basic wireless information
The following page is Wireless LAN settings. Please select and input the
correct information in the following item to set Wireless function.
Figure 3.3.4‐1
‐ 13 ‐
Ver.2.0
Figure 3.3.4‐2
We can configure below settings using basic wireless settings page
SSID:
The SSID is a unique name to identify the DSL Router in the wireless LAN.
Wireless clients associating to the DSL Router must have the same SSID.
Broadcast SSID:
Select No to hide the SSID such that a station can not obtain the SSID through
passive scanning. Select yes to make the SSID visible so a station can obtain
the SSID through passive scanning.
Channel ID the range of radio frequencies used by IEEE 802.11b/g wireless
devices is called a channel
‐ 14 ‐
Ver.2.0
3.4. Advanced Setup
Figure3.4‐1 shows Advanced Setup menu list
Figure 3.4‐1
3.4.1. Advanced Wireless
Figure3.4.1‐1, Figure3.4.1‐2, Figure3.4.1‐3 shows Advanced Wireless
settings and Wi‐Fi multimedia
‐ 15 ‐
Ver.2.0
The following page is Advanced Wireless settings. Please select and input the
correct information in the following item to set Wireless functions.
Figure 3.4.1‐1
‐ 16 ‐
Ver.2.0
Figure 3.4.1‐2
Figure 3.4.1‐3
‐ 17 ‐
Ver.2.0
Beacon Interval
The Beacon Interval value indicates the frequency interval of the beacon.
Enter a value between 20 and 1000. A beacon is a packet broadcast by the
Router to synchronize the wireless network.
DTIM
This value, between 1 and 255, indicates the interval of the Delivery Traffic
Indication Message (DTIM).
RTS Threshold
The RTS (Request to Send) threshold (number of bytes) for enabling RTS
handshake Data with its frame size larger than this value will perform the RTS
handshake, setting this attribute to be larger than the maximum MSDU (MAC
service data unit) size turns off the RTS handshake, setting this attribute to
zero turns on the RTS handshake. Enter a value between 0 and 2432.
Fragmentation Threshold
The threshold (number of bytes) for the fragmentation boundary for directed
messages. It is the maximum data fragment size that can be sent. Enter a
value between 256 and 2432.
‐ 18 ‐
Ver.2.0
3.4.2. Security
Figure3.4.2‐1, Figure3.4.2‐2, Figure3.4.2‐3, and Figure3.4.2‐4 shows wireless
Security information
Figure 3.4.2‐1
‐ 19 ‐
Ver.2.0
Figure 3.4.2‐2
Figure 3.4.2‐3
Figure 3.4.2‐4
Using this page we can set SSID choice, Security mode, Access Policy and
WPA.
‐ 20 ‐
Ver.2.0
Security Mode
OPEN WEP
WEP (Wired Equivalent Privacy) encrypts data frames before transmitting
over the wireless network. Select Disable to allow all wireless computers to
communicate with the access points without any data encryption. Select 64‐
bit
WEP or 128‐bit WEP to use data encryption.
Key#1~Key#4 The WEP keys are used to encrypt data. Both the DSL Router
and the wireless clients must use the same WEP key for data transmission. If
you chose 64‐bit WEP, then enter any 10 hexadecimal digits ("0‐9", "A‐F")
preceded by 0x for each key (1‐4). If you chose 128‐bit WEP, then enter 26
hexadecimal digits ("0‐9", "AF") preceded by 0x for each key (1‐4).The values
must be set up exactly the same on the Access Points as they are on the
wireless client stations. The same value must be assigned to Key 1 on both
the access point (your DSL Router) and the client adapters, the same value
must be assigned to Key 2 on both the access point and the client stations
and so on, for all four WEP keys.
WPA‐PSK
Wi‐Fi Protected Access, pre‐shared key. Encrypts data frames before
transmitting over the wireless network.
Pre‐shared Key: the Pre‐shared Key is used to encrypt data. Both the DSL
Router and the wireless clients must use the same WPA‐PSK key for data
transmission.
WPA2‐PSK
Short for Wi‐Fi Protected Access 2 ‐ Pre‐Shared Key, and also called WPA
or WPA2 Personal, it is a method of securing your network using WPA2
‐ 21 ‐
Ver.2.0
with the use of the optional Pre‐Shared Key (PSK) authentication, which
was designed for home users without an enterprise authentication server.
To encrypt a network with WPA2‐PSK you provide your router not with an
encryption key, but rather with a plain‐English passphrase between 8 and 63
characters long.
Using a technology called TKIP (for Temporal Key Integrity Protocol), that
passphrase, along with the network SSID, is used to generate unique
encryption keys for each wireless client. And those encryption keys are
constantly changed. Although WEP
also supports passphrases, it does so only as a way to more easily create
static keys, which are usually comprised of the hex characters 0‐9 and A‐F.
WPA Algorithms
TKIP
TKIP stands for “Temporal Key Integrity Protocol.” It was a stopgap encryption
protocol introduced with WPA to replace the very‐insecure WEP encryption at
the time. TKIP is actually quite similar to WEP encryption.
AES
AES stands for “Advanced Encryption Standard.” This was a more secure
encryption protocol introduced with WPA2, which replaced the interim WPA
standard.
TKIPAES
When you set your router to use WPA2, you usually have the option to use
AES, or TKIP+AES. When your device is set to "WPA2 with TKIP+AES" it
means that network devices that can use WPA2 will connect with WPA2, and
network devices that can only use WPA will connect with WPA.
‐ 22 ‐
Ver.2.0
3.4.3. WPS
Figure3.4.3‐1, Figure3.4.3‐2 shows WPS settings
Wi‐Fi Protected Setup (WPS; originally Wi‐Fi Simple Configuration) is a
network security standard that attempts to allow users to easily secure a
wireless home network but could fall to brute‐force attacks if one or more of
the network's access points do not guard against the attack.
Figure 3.4.3‐1
‐ 23 ‐
Ver.2.0
Figure 3.4.3‐2
WPS Settings
There two WPS mode, one is PIN code and other one is PBC.
PIN method in which a personal identification number (PIN) has to be
read from
either a sticker or display on the new wireless device. This PIN must then be
entered at the "representant" of the network, usually the network's access
point. Alternately, a PIN provided by the access point may be entered into the
new device. This method is the mandatory baseline mode and every
WPScertified product must support it.
Push button method
in which the user has to push a button, either an actual or virtual one, on
both the access point and the new wireless client device. Support of this
mode is mandatory for access points and optional for connecting devices.
‐ 24 ‐
Ver.2.0
Example of configuration
1.
Make sure WPS is enabled on system wise.
2. For Pin method
1). Select radio button PIN method.
2). Enable your Wi‐Fi client (Notebook, Mobile, PAD…etc). And check
WPS. 3). Take PIN at client and specify same one in your AP device.
4). Click “Apply“below “WPS Progress” table to trigger WPS
session. 5). Once connected, “WPS current status” will be put
“Connected”.
‐ 25 ‐
Ver.2.0
3. For PBC at Web
1). Select the following radio button, and click “Apply” Button to trigger WPS
session.
2). at Wi‐Fi client side, select PBC method. Within 2 minutes, they are
automatically connected.
3). Once connected, “WPS current status” will be put “Connected”.
4. For physical PBC on the housing:
1). Special Note: WPS is enabled on system wise.
‐ 26 ‐
Ver.2.0
2). At wifi client side, select PBC method.
3). Within 2 minutes, please push physical PBC button at housing.
3.4.4. Station List
Figure3.4.4‐1 display the wireless network station list
Figure 3.4.4‐1
3.4.5. Routing
Figure3.4.5‐1, Figure3.4.5‐2 displays Static Routing Settings
‐ 27 ‐
Ver.2.0
Figure 3.4.5‐1
Figure 3.4.5‐2
3.4.6. Port Forwarding
Figure3.4.6‐1, Figure3.4.6‐2 displays Port Forwarding setup and information
‐ 28 ‐
Ver.2.0
Figure 3.4.6‐1
‐ 29 ‐
Ver.2.0
Figure 3.4.6‐2
3.4.7. DMZ Settings
Figure3.4.7‐1 displays DMZ settings page
The De‐Militarized Zone (DMZ) is a network which, when compared to the LAN,
has fewer firewall restrictions, by default. This zone can be used to host servers
(such as a web server, ftp server, or email server, for example) and give public
access to them.
The eighth LAN port on the router can be dedicated as a hardware DMZ port
for safely providing services to the Internet, without compromising security on
your LAN.
‐ 30 ‐
Ver.2.0
FCC+IC USER WARNING
1.§ P15.21 Information to user.
Notice:
Any changes or modifications not expressly approved by the party responsible for
compliance could void your authority to operate the equipment.
法文:
Aucune modification apportée à l’appareil par l’utilisateur, quelle qu’en soit la nature.
Tout changement ou modification peuvent annuler le droit d’utilisation de l’appareil
par l’utilisateur.
2.§ P15.105 Information to the user.
‐ 31 ‐
Ver.2.0
Note: This equipment has been tested and found to comply with the limits for a Class B
digital device, pursuant to part 15 of the FCC Rules. These limits are designed to
provide reasonable protection against harmful interference in a residential installation.
This equipment generates, uses and can radiate radio frequency energy and, if not
installed and used in accordance with the instructions, may cause harmful interference
to radio communications. However, there is no guarantee that interference will not
occur in a particular installation. If this equipment does cause harmful interference to
radio or television reception, which can be determined by turning the equipment off
and on, the user is encouraged to try to correct the interference by one or more of the
following measures:
—Reorient or relocate the receiving antenna.
—Increase the separation between the equipment and receiver.
—Connect the equipment into an outlet on a circuit different from that to which the
receiver is connected.
—Consult the dealer or an experienced radio/TV technician for help.
法文:
This Class B digital apparatus complies with Canadian ICES‐003.
To reduce potential radio interference to other users, the antenna type
and its gain should be so chosen that the equivalent isotropically radiated
power (e.i.r.p.) is not more than that permitted for successful
communication.
This device complies with Industry Canada licence‐exempt RSS standard(s).
Operation is subject to the following two conditions:
1. This device may not cause interference, and
2. This device must accept any interference, including interference that may
cause undesired operation of the device.
Cet appareil numérique de la classe B est conforme à la norme NMB‐003
Canada.
Pour réduire le risque d’interférence aux autres utilisateurs, le type
d’antenne et son gain doivent être choisies de façon que la puissance
isotrope rayonnée équivalente (PIRE) ne dépasse pas ce qui est
nécessaire pour une communication réussie.
Cet appareil est conforme à la norme RSS Industrie Canada exempts de licence
norme(s). Son fonctionnement est soumis aux deux conditions suivantes:
1. Cet appareil ne peut pas provoquer d’interférences et
2. Cet appareil doit accepter toute interférence, y compris les interférences
qui peuvent causer un mauvais fonctionnement du dispositif.
‐ 32 ‐
Ver.2.0
3.§ P15.19 FCC Labelling requirement
Notice:
This device complies with Part 15 of the FCC Rules and Industry Canada license‐exempt RSS
standard(s). Operation is subject to the following two conditions: (1) this device may not
cause interference, and (2) this device must accept any interference, including interference
that may cause undesired operation of the device.
法文:
Le présent appareil est conforme aux CNR d'Industrie Canada applicables aux appareils
radio exempts de licence. L'exploitation est autorisée aux deux conditions suivantes : (1)
l'appareil ne doit pas produire de brouillage, et (2) l'utilisateur de l'appareil doit accepter
tout brouillage radioélectrique subi, même si le brouillage est susceptible d'en
compromettre le fonctionnement.
4.FCC/IC RF Radiation Exposure Statement:
FCC IC
1. This Transmitter must not be co‐located or operating in conjunction with any other
antenna or transmitter.
2. This equipment complies with FCC RF radiation exposure limits set forth for an
uncontrolled environment. This
equipment should be installed and operated with a minimum distance of 20 centimeters
between the radiator and your
body.
法文:
1.L'émetteur ne doit pas être colocalisé ni fonctionner conjointement avec à autre
antenne ou autre émetteur. 2.Cet appareil est conforme aux limites d'exposition aux
rayonnements de la IC pour un environnement non contrôlé. L'antenne doit être installé
de façon à garder une distance minimale de 20 centimètres entre la source de
rayonnements et votre corps.
‐ 33 ‐

Source Exif Data:

EXIF Metadata provided by EXIF.tools
FCC ID Filing: D6XC1030

Navigation menu