User Manual
WiFi Chime C-1030 User Manual Version: 2.0 TECOM CO., LTD. ‐1‐ Ver.2.0 Safety Precautions Please follow these safety precautions to prevent injury or damage to property that may be caused by fire or electrical damage. DOs: 1.) Use the type of power recommended as seen on the label of your device. 2.) Use the power adapter in the product package. 3.) Pay attention to the power load of the outlet or prolonged lines. An overburdened power outlet, damaged lines or plugs may cause electric shock or even fire. Check your power cords regularly to ensure their safe functioning. If you find any damage line or parts, please repair or replace them immediately. 4.) Leave space around your device to allow heat dissipation. This is necessary to avoid damage caused by the overheating of the device. The long and thin holes on the device are designed for heat dissipation to ensure that the device continues normal functioning. Do not cover these heat dissipation holes. DON’Ts: 1.) Do not keep this device close to a heat source or in a high temperature environment. Keep the device away from direct sunlight. 2.) Do not keep this device in a damp or moist place. Do not spill any fluids on this device. 3.) Do not connect this device to a PC or other electronic product unless instructed by our customer service engineers or your internet service provider. Bad connections may cause a power surge or fire risk. 4.) Do not place this device on an unstable surface or support. ‐2‐ Ver.2.0 2 Northern America FCC Statement This equipment generates uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions in this manual, may cause interference to radio communications. This equipment as been tested and found to comply with the limits for a Class B computing device pursuant to Subpart J of Part 15 of FCC rules, which are designed to provide reasonable protection against radio interference when operated in a commercial environment. Operation of this equipment in a residential area is likely to cause interference, in which case the user, at his or her own expense, will be required to take whatever measures are necessary to correct the interface. Europe CE Declaration of Conformity This equipment complies with the requirements relating to electromagnetic compatibility, EN55032 Class B for ITE and EN 50082‐1. This meets the essential protection requirements of the European Council Directive 2014/53/EEC on the approximation of the laws of the Member States relating to electromagnetic compatibility. Japan VCCI Declaration of Conformity This equipment complies with the Class B standard of the Voluntary Control Council for Interference from Information Technology Equipment (VCCI). This meets the essential protection requirements of Japan laws relating to electromagnetic compatibility. Copyright Notice ©Copyright, 2010. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in retrieval system or translated in to any language or computer language, in any from or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise, without the prior written permission of Owner (The Company). The Company reserves the right to revise the publication and make changes from time to time in the contents hereof without obligation of this company to notify person of such revision or changes. The material contained herein is supplied without representation or warranty of any kind. The Company therefore assumes no responsibility and shall have no liability of any kind arising from the supply or use of this document or the material contained herein. Trademarks Windows 98/2000/XP/NT™, NetMeeting™, Internet Explorer™ are registered trademarks of Microsoft Corporation. All company, brand and product names are trademarks or registered trademarks of their respective owners. ‐3‐ Ver.2.0 Revision History Version Date Update Log Author 2.0 2nd version for C-1030 User Manual. Sony 2015‐02‐04 ‐4‐ Ver.2.0 1 . PRODUCT OVERVIEW C-1030, networking standard compliant Wireless adapter, provides the best quality data transmission for the truly high‐speed ‘connected home’ experience. It allows users to extend a local area network via existing Wireless. Installation at home (or in a small office) is quick and easy as the C1030 comes with plug‐and‐play technology. C-1030 supports (802.11n 1x1) operation based on WSC-N101 module and can be used with two fully programmable reception and transmission paths to attain up to 1Gbps PHY rates co‐existence with UPA technology networks. Key Features: Performance Support ITU‐T G.hn baseband plans 25, 50, 100 and 150 MHz and MIMO techniques for powerline (based on G.9963) boosting to prevent noise interference from other home appliances. ‐5‐ Ver.2.0 3. C-1030 Web Configuration 3.1. Login Page Figure3.1‐1 shows the login window. Here, the login information should be filled in as shown below: Figure 3.1‐1 The default IP address of the C-1030 Wireless is 10.10.10.254 Username: admin Password: admin After login we can see Quick Setup page ‐6‐ Ver.2.0 3.2. Quick Setup Figure3.2‐1 displays the Quick setup page of the device. Figure 3.2‐1 Using quick setup we can configure below list. • NTP settings • Operation Mode • Network Settings • Wireless Settings ‐7‐ Ver.2.0 3.3. Basic Setup Figure3.3‐1 shows basic setup of the device Figure 3.3‐1 ‐8‐ Ver.2.0 3.3.1. Operation Mode Figure3.3.1‐1 displays operation mode settings Figure 3.3.1‐1 In this page we can set bridge mode or gateway mode 3.3.2. WAN Figure3.3.3‐1, Figure3.3.3‐2, Figure3.3.3‐3 and Figure3.3.3‐4 displays WAN settings information WAN has static, DHCP, PPPoE and 3G connection types. Configure static connection type as below ‐9‐ Ver.2.0 Figure3.3.3‐1 Configure DHCP connection type as below ‐ 10 ‐ Ver.2.0 Figure3.3.3‐2 ‐ 11 ‐ Ver.2.0 Figure3.3.3‐3 PPPoE Select this option if your ISP requires you to use a PPPoE connection. This option is typically used for DSL services. Select Dynamic PPPoE to obtain an IP address automatically for your PPPoE connection. Select Static PPPoE to use a static IP address for your PPPoE connection. Please enter the information accordingly. Username: Enter your username for your PPPoE connection. Password: Enter your password for your PPPoE connection Operation Mode: For PPPoE connection, you can select Always on or Connect on‐demand. Connect on demand is dependent on the traffic. If there is no traffic (or Idle) for a pre‐specified period of time), the connection will tear ‐ 12 ‐ Ver.2.0 down automatically. And once there is traffic send or receive, the connection will be automatically on. 3.3.3. Wireless Figure3.3.4‐1 and Figure3.3.4‐2 displays basic wireless information The following page is Wireless LAN settings. Please select and input the correct information in the following item to set Wireless function. Figure 3.3.4‐1 ‐ 13 ‐ Ver.2.0 Figure 3.3.4‐2 We can configure below settings using basic wireless settings page SSID: The SSID is a unique name to identify the DSL Router in the wireless LAN. Wireless clients associating to the DSL Router must have the same SSID. Broadcast SSID: Select No to hide the SSID such that a station can not obtain the SSID through passive scanning. Select yes to make the SSID visible so a station can obtain the SSID through passive scanning. Channel ID the range of radio frequencies used by IEEE 802.11b/g wireless devices is called a channel ‐ 14 ‐ Ver.2.0 3.4. Advanced Setup Figure3.4‐1 shows Advanced Setup menu list Figure 3.4‐1 3.4.1. Advanced Wireless Figure3.4.1‐1, Figure3.4.1‐2, Figure3.4.1‐3 shows Advanced Wireless settings and Wi‐Fi multimedia ‐ 15 ‐ Ver.2.0 The following page is Advanced Wireless settings. Please select and input the correct information in the following item to set Wireless functions. Figure 3.4.1‐1 ‐ 16 ‐ Ver.2.0 Figure 3.4.1‐2 Figure 3.4.1‐3 ‐ 17 ‐ Ver.2.0 Beacon Interval The Beacon Interval value indicates the frequency interval of the beacon. Enter a value between 20 and 1000. A beacon is a packet broadcast by the Router to synchronize the wireless network. DTIM This value, between 1 and 255, indicates the interval of the Delivery Traffic Indication Message (DTIM). RTS Threshold The RTS (Request to Send) threshold (number of bytes) for enabling RTS handshake Data with its frame size larger than this value will perform the RTS handshake, setting this attribute to be larger than the maximum MSDU (MAC service data unit) size turns off the RTS handshake, setting this attribute to zero turns on the RTS handshake. Enter a value between 0 and 2432. Fragmentation Threshold The threshold (number of bytes) for the fragmentation boundary for directed messages. It is the maximum data fragment size that can be sent. Enter a value between 256 and 2432. ‐ 18 ‐ Ver.2.0 3.4.2. Security Figure3.4.2‐1, Figure3.4.2‐2, Figure3.4.2‐3, and Figure3.4.2‐4 shows wireless Security information Figure 3.4.2‐1 ‐ 19 ‐ Ver.2.0 Figure 3.4.2‐2 Figure 3.4.2‐3 Figure 3.4.2‐4 Using this page we can set SSID choice, Security mode, Access Policy and WPA. ‐ 20 ‐ Ver.2.0 Security Mode OPEN WEP WEP (Wired Equivalent Privacy) encrypts data frames before transmitting over the wireless network. Select Disable to allow all wireless computers to communicate with the access points without any data encryption. Select 64‐ bit WEP or 128‐bit WEP to use data encryption. Key#1~Key#4 The WEP keys are used to encrypt data. Both the DSL Router and the wireless clients must use the same WEP key for data transmission. If you chose 64‐bit WEP, then enter any 10 hexadecimal digits ("0‐9", "A‐F") preceded by 0x for each key (1‐4). If you chose 128‐bit WEP, then enter 26 hexadecimal digits ("0‐9", "AF") preceded by 0x for each key (1‐4).The values must be set up exactly the same on the Access Points as they are on the wireless client stations. The same value must be assigned to Key 1 on both the access point (your DSL Router) and the client adapters, the same value must be assigned to Key 2 on both the access point and the client stations and so on, for all four WEP keys. WPA‐PSK Wi‐Fi Protected Access, pre‐shared key. Encrypts data frames before transmitting over the wireless network. Pre‐shared Key: the Pre‐shared Key is used to encrypt data. Both the DSL Router and the wireless clients must use the same WPA‐PSK key for data transmission. WPA2‐PSK Short for Wi‐Fi Protected Access 2 ‐ Pre‐Shared Key, and also called WPA or WPA2 Personal, it is a method of securing your network using WPA2 ‐ 21 ‐ Ver.2.0 with the use of the optional Pre‐Shared Key (PSK) authentication, which was designed for home users without an enterprise authentication server. To encrypt a network with WPA2‐PSK you provide your router not with an encryption key, but rather with a plain‐English passphrase between 8 and 63 characters long. Using a technology called TKIP (for Temporal Key Integrity Protocol), that passphrase, along with the network SSID, is used to generate unique encryption keys for each wireless client. And those encryption keys are constantly changed. Although WEP also supports passphrases, it does so only as a way to more easily create static keys, which are usually comprised of the hex characters 0‐9 and A‐F. WPA Algorithms TKIP TKIP stands for “Temporal Key Integrity Protocol.” It was a stopgap encryption protocol introduced with WPA to replace the very‐insecure WEP encryption at the time. TKIP is actually quite similar to WEP encryption. AES AES stands for “Advanced Encryption Standard.” This was a more secure encryption protocol introduced with WPA2, which replaced the interim WPA standard. TKIPAES When you set your router to use WPA2, you usually have the option to use AES, or TKIP+AES. When your device is set to "WPA2 with TKIP+AES" it means that network devices that can use WPA2 will connect with WPA2, and network devices that can only use WPA will connect with WPA. ‐ 22 ‐ Ver.2.0 3.4.3. WPS Figure3.4.3‐1, Figure3.4.3‐2 shows WPS settings Wi‐Fi Protected Setup (WPS; originally Wi‐Fi Simple Configuration) is a network security standard that attempts to allow users to easily secure a wireless home network but could fall to brute‐force attacks if one or more of the network's access points do not guard against the attack. Figure 3.4.3‐1 ‐ 23 ‐ Ver.2.0 Figure 3.4.3‐2 WPS Settings There two WPS mode, one is PIN code and other one is PBC. PIN method in which a personal identification number (PIN) has to be read from either a sticker or display on the new wireless device. This PIN must then be entered at the "representant" of the network, usually the network's access point. Alternately, a PIN provided by the access point may be entered into the new device. This method is the mandatory baseline mode and every WPScertified product must support it. Push button method in which the user has to push a button, either an actual or virtual one, on both the access point and the new wireless client device. Support of this mode is mandatory for access points and optional for connecting devices. ‐ 24 ‐ Ver.2.0 Example of configuration 1. Make sure WPS is enabled on system wise. 2. For Pin method 1). Select radio button PIN method. 2). Enable your Wi‐Fi client (Notebook, Mobile, PAD…etc). And check WPS. 3). Take PIN at client and specify same one in your AP device. 4). Click “Apply“below “WPS Progress” table to trigger WPS session. 5). Once connected, “WPS current status” will be put “Connected”. ‐ 25 ‐ Ver.2.0 3. For PBC at Web 1). Select the following radio button, and click “Apply” Button to trigger WPS session. 2). at Wi‐Fi client side, select PBC method. Within 2 minutes, they are automatically connected. 3). Once connected, “WPS current status” will be put “Connected”. 4. For physical PBC on the housing: 1). Special Note: WPS is enabled on system wise. ‐ 26 ‐ Ver.2.0 2). At wifi client side, select PBC method. 3). Within 2 minutes, please push physical PBC button at housing. 3.4.4. Station List Figure3.4.4‐1 display the wireless network station list Figure 3.4.4‐1 3.4.5. Routing Figure3.4.5‐1, Figure3.4.5‐2 displays Static Routing Settings ‐ 27 ‐ Ver.2.0 Figure 3.4.5‐1 Figure 3.4.5‐2 3.4.6. Port Forwarding Figure3.4.6‐1, Figure3.4.6‐2 displays Port Forwarding setup and information ‐ 28 ‐ Ver.2.0 Figure 3.4.6‐1 ‐ 29 ‐ Ver.2.0 Figure 3.4.6‐2 3.4.7. DMZ Settings Figure3.4.7‐1 displays DMZ settings page The De‐Militarized Zone (DMZ) is a network which, when compared to the LAN, has fewer firewall restrictions, by default. This zone can be used to host servers (such as a web server, ftp server, or email server, for example) and give public access to them. The eighth LAN port on the router can be dedicated as a hardware DMZ port for safely providing services to the Internet, without compromising security on your LAN. ‐ 30 ‐ Ver.2.0 FCC+IC USER WARNING 1.§ P15.21 Information to user. Notice: Any changes or modifications not expressly approved by the party responsible for compliance could void your authority to operate the equipment. 法文: Aucune modification apportée à l’appareil par l’utilisateur, quelle qu’en soit la nature. Tout changement ou modification peuvent annuler le droit d’utilisation de l’appareil par l’utilisateur. 2.§ P15.105 Information to the user. ‐ 31 ‐ Ver.2.0 Note: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: —Reorient or relocate the receiving antenna. —Increase the separation between the equipment and receiver. —Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. —Consult the dealer or an experienced radio/TV technician for help. 法文: This Class B digital apparatus complies with Canadian ICES‐003. To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the equivalent isotropically radiated power (e.i.r.p.) is not more than that permitted for successful communication. This device complies with Industry Canada licence‐exempt RSS standard(s). Operation is subject to the following two conditions: 1. This device may not cause interference, and 2. This device must accept any interference, including interference that may cause undesired operation of the device. Cet appareil numérique de la classe B est conforme à la norme NMB‐003 Canada. Pour réduire le risque d’interférence aux autres utilisateurs, le type d’antenne et son gain doivent être choisies de façon que la puissance isotrope rayonnée équivalente (PIRE) ne dépasse pas ce qui est nécessaire pour une communication réussie. Cet appareil est conforme à la norme RSS Industrie Canada exempts de licence norme(s). Son fonctionnement est soumis aux deux conditions suivantes: 1. Cet appareil ne peut pas provoquer d’interférences et 2. Cet appareil doit accepter toute interférence, y compris les interférences qui peuvent causer un mauvais fonctionnement du dispositif. ‐ 32 ‐ Ver.2.0 3.§ P15.19 FCC Labelling requirement Notice: This device complies with Part 15 of the FCC Rules and Industry Canada license‐exempt RSS standard(s). Operation is subject to the following two conditions: (1) this device may not cause interference, and (2) this device must accept any interference, including interference that may cause undesired operation of the device. 法文: Le présent appareil est conforme aux CNR d'Industrie Canada applicables aux appareils radio exempts de licence. L'exploitation est autorisée aux deux conditions suivantes : (1) l'appareil ne doit pas produire de brouillage, et (2) l'utilisateur de l'appareil doit accepter tout brouillage radioélectrique subi, même si le brouillage est susceptible d'en compromettre le fonctionnement. 4.FCC/IC RF Radiation Exposure Statement: FCC IC 1. This Transmitter must not be co‐located or operating in conjunction with any other antenna or transmitter. 2. This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with a minimum distance of 20 centimeters between the radiator and your body. 法文: 1.L'émetteur ne doit pas être colocalisé ni fonctionner conjointement avec à autre antenne ou autre émetteur. 2.Cet appareil est conforme aux limites d'exposition aux rayonnements de la IC pour un environnement non contrôlé. L'antenne doit être installé de façon à garder une distance minimale de 20 centimètres entre la source de rayonnements et votre corps. ‐ 33 ‐
Source Exif Data:
EXIF Metadata provided by EXIF.tools