Benutzeranleitung / Produktwartung WRV54G des Produzenten Cisco
Zur Seite of 101
A Division of Cisco Systems, Inc. ® Model No. VPN Broadband Router Wireless- G WRV54G User Guide WIRELESS GH z 2.4 802.11g.
Wireless-G VPN Broadband Router Copyright and Trademarks Specifications are subject to change without notice. Instant Etherfast, Linksys, and the Linksys logo are registered trademarks of Linksys Group, Inc. Othe r brands and product names are trademarks or registered trademarks of their respective holders.
EtherFast Cable/DSL Router with 8-Port Switch Table of Contents Chapter 1: Introduction 1 Welcome 1 What’s in this Guide? 2 Chapter 2: Planning your Wireless Network 4 The Router’s Functions 4 IP .
EtherFast Cable/DSL Router with 8-Port Switch Frequently Asked Questions 56 Chapter 8: Wireless Security 63 A Brief Overview 63 What Are The Risks? 63 Chapter 9: Configuring IPSec between a Windows 20.
1 Chapter 1: Introduction Welcome Wireless-G Broadband VPN Router Chapter 1: Introduction Welcome Wireless-G is the upcoming 54Mbps wireless networking standar d that’s almost five times faster than the w idely deployed Wireless-B (802.
2 Chapter 1: Introduction What’s in this Guide? Wireless-G Broadband VPN Router What’s in this Guide? This user guide covers the steps for setting up and using the Wireless-G VPN Broadband Router. • Chapter 1: Introduction This chapter describes the Wireless-G VPN Broadband Router applicatio ns and this User Guide.
3 Chapter 1: Introduction What’s in this Guide? Wireless-G Broadband VPN Router • Appendix G: Finding the MAC Address and IP Address for your Ethernet Adapter. This appendix describes how to find the MAC address for your computer’s Ethenet adapter so you can use the MAC filtering and/or MAC address cloning feature of the Router.
4 Chapter 2: Planning your Wireless Network The Router ’s Functions Wireless-G VPN Broadband Router Chapter 2: Planning your Wireless Network The Router’s Functions Simply put, a router is a network device that connects two networks together.
5 Chapter 2: Planning your Wireless Network Why do I need a VPN? Wireless-G VPN Broadband Router If you use the Router to share your cable or DSL Interne t connection, contact your ISP to find out if they have assigned a static IP address to your account.
6 Chapter 2: Planning your Wireless Network What is a VPN? Wireless-G VPN Broadband Router At this point, your data becomes open to hackers using a variety of methods to steal not only the data you are transmitting but also your network login and security data.
7 Chapter 2: Planning your Wireless Network What is a VPN? Wireless-G VPN Broadband Router a secure connection that, in effect, operates as if you were directly connected to your loca l network.
8 Chapter 2: Planning your Wireless Network What is a VPN? Wireless-G VPN Broadband Router Computer (using VPN client software that supports IPSec) to VPN Router The following is an example of a computer-to-VPN Router VPN. (See Figure 2-3.) In her hotel room, a traveling businesswoman dials up her ISP.
9 Chapter 3: Getting to Know the Wireless-G VPN Broadband Router The Back Panel Wireless-G VPN Broadband Router Chapter 3: Getting to Know the Wireless-G VPN Broadband Router The Back Panel The Router’s ports, where a network cable is connected, are located on the back panel.
10 Chapter 3: Getting to Know the Wireless-G VPN Broadband Router The Front Panel Wireless-G VPN Broadband Router The Front Panel The Router's LEDs, where information about network activity is displayed, are located on the front panel. Power Green.
11 Chapter 4: Connecting the Wireless-G Broa dba nd Router Overview Wireless-G VPN Broadband Router Chapter 4: Connecting the Wireless-G Broadband Router Overview The Router’s setup consists of more than simply plugging hardware together.
12 Chapter 4: Connecting the Wireless-G Broa dba nd Router Wired Connection to a PC Wireless-G VPN Broadband Router Wired Connection to a PC 1. Before you begin, make sure that all of your network ’s hardware is powered off, including the Router, PCs, and cable or DSL modem.
13 Chapter 4: Connecting the Wireless-G Broa dba nd Router Wireless Connection to a PC Wireless-G VPN Broadband Router • The Power LED on the front panel will light up gree n as soon as the power adapter is connecte d properly. The Power LED will flash for a few seconds, then light up steady when the self-test is complete.
14 Chapter 5: Configuring the PCs Overview Wireless-G VPN Broadband Router Chapter 5: Configuring the PCs Overview The instructions in this chapter will help you configure each of your computers to be able to communicate with the Router.
15 Chapter 5: Configuring the PCs Configuring Windows 2000 PCs Wireless-G VPN Broadband Router 4. Now click the Gateway tab, and verify that the Insta lled Gateway field is blank. Click the OK button. 5. Click the OK button again. Windows may ask you for the original Windows installation disk or additional files.
16 Chapter 5: Configuring the PCs Configuring Windows XP PCs Wireless-G VPN Broadband Router Configuring Windows XP PCs The following instructions assume you are running Windows XP with the d efault interface.
17 Chapter 6: Configuring the Router Overview Wireless-G VPN Broadband Router Chapter 6: Configuring the Router Overview Linksys recommends using the Setup CD-ROM for first- time installation of the Router an d setting up additional computers.
18 Chapter 6: Configuring the Router Overview Wireless-G VPN Broadband Router • Advanced Wireless Settings. On this screen you can access the Advanced Wireless features of Authentication Type, Basic Data Rates, Control Tx Rates, Beacon Interval, DTIM Interval, RTS Threshold, and Fragmentatio n Threshold.
19 Chapter 6: Configuring the Router How to Access the Web-based Utility Wireless-G VPN Broadband Router Status • Router. This screen provides status inform ation about the Router. • Local Network. This provides status information about the local network.
20 Chapter 6: Configuring the Router The Setup Tab Wireless-G VPN Broadband Router Static (See Figure 6-3.) If you are required to use a permanent IP address to connect to the Internet, then select Static IP. • IP Address. This is the Router’s IP address, when s een from the WAN, or the Internet.
21 Chapter 6: Configuring the Router The Setup Tab Wireless-G VPN Broadband Router PPTP (See Figure 6-5.) Point to Point Tunneling Protocol (PPTP) is a service that applies to connections in Europe only (see Figure 6- 5). • Internet IP Address. This is the Router’s IP address, when seen from the Internet.
22 Chapter 6: Configuring the Router The Setup Tab Wireless-G VPN Broadband Router 1200 to 1500 range. For most DSL users, it is reco mmended to use the value 1492. By default, MTU is set at 1500 when disabled. Network Setup • Gateway IP. The values for the Router’s Local IP A ddress and Subnet Mask are shown here.
23 Chapter 6: Configuring the Router The Setup Tab Wireless-G VPN Broadband Router The DDNS Tab The Router offers a Dynamic Domain Name System (DDNS) feature. DDNS lets you assign a fixed host and domain name to a dynamic Internet IP address. It is useful when you are ho sting your own website, FTP server, or other server behind the Router.
24 Chapter 6: Configuring the Router The Setup Tab Wireless-G VPN Broadband Router MAC Address Clone Tab (See Figure 6-8.) The Router’s MAC address is a 12-digit code assigned to a unique piece of hardware for identification, like a social security number.
25 Chapter 6: Configuring the Router The Setup Tab Wireless-G VPN Broadband Router Static Routing If the Router is connected to more than one network, it may be necessary to set up a static route between them. A static route is a pre-determined pathway that network inform ation must travel to reach a specific host or network.
26 Chapter 6: Configuring the Router The Wireless Tab Wireless-G VPN Broadband Router The Wireless Tab Basic Wireless Settings (See Figure 6-11.) This screen allows you to choose your wireless network mode and wireless security. Wireless Network • Wireless Network Mode.
27 Chapter 6: Configuring the Router The Wireless Tab Wireless-G VPN Broadband Router Wireless Security • Wireless SSID Broadcast. When wireless clients survey the local area for wire less networks to associate with, they will detect the SSID broadcast by the Router.
28 Chapter 6: Configuring the Router The Wireless Tab Wireless-G VPN Broadband Router Wireless Network Access (See Figure 6-13.) Wireless Network Access. If this function is enabled, only the computers on the list will be allowed access to the wireless network.
29 Chapter 6: Configuring the Router The Wireless Tab Wireless-G VPN Broadband Router Advanced Wireless Settings (See Figure 6-15.) On this screen you can access the Advanced Wireless features, including Authentication Type, Basic Data Rates, Control Tx Rates, Beacon Interval, DTIM Int erval, RTS Threshold, and Fragmentation Threshold.
30 Chapter 6: Configuring the Router The Security Tab Wireless-G VPN Broadband Router The Security Tab Firewall When you click the Security tab, you will see the Firewall screen (see Figure 6-16).
31 Chapter 6: Configuring the Router The Security Tab Wireless-G VPN Broadband Router VPN Virtual Private Networking (VPN) is a security measure that basically creates a secure connection between two remote locations. This connection is very specific as far as its settings are concerned; this is what creates the security.
32 Chapter 6: Configuring the Router The Security Tab Wireless-G VPN Broadband Router settings of the remote VPN device. Make sure that you have entered the IP Address correctly, or the connection cannot be made.
33 Chapter 6: Configuring the Router The Security Tab Wireless-G VPN Broadband Router When finished making your changes on this tab, click the Save Settin gs button to save these changes, or click the Cancel Changes button to undo your changes.
34 Chapter 6: Configuring the Router The Security Tab Wireless-G VPN Broadband Router Other Options • Unauthorized IP Blocking. Click Enabled to block unauthorized IP addresses. Enter in the Rejects Number field to specify how many times IKE must fail before bloc kin g that unauthorized IP address.
35 Chapter 6: Configuring the Router The Access Restrictions Tab Wireless-G VPN Broadband Router • WEP Encryption. Select the level of WEP encryption you wish to use, 64-bit 10 hex digits or 1 28-bit 26 hex digits.
36 Chapter 6: Configuring the Router The Access Restrictions Tab Wireless-G VPN Broadband Router 2. Click the Edit List button. This will open the List of PCs screen, shown in Figure 6-24. From this screen, you can enter the IP address or MAC address of any PC to which this policy will apply.
37 Chapter 6: Configuring the Router The Applications and Gami ng Tab Wireless-G VPN Broadband Router The Applications and Gaming Tab Port Range Forwarding The Port Forwarding screen sets up public services on your network, such as web servers, ftp servers, e-mail servers, or other specialized Internet applications.
38 Chapter 6: Configuring the Router The Applications and Gami ng Tab Wireless-G VPN Broadband Router Port Triggering Port Triggering is used for special Internet applications whose outgoing ports differ from the incoming ports. For this feature, the Router will watch outgoing data for s pecific port numbers.
39 Chapter 6: Configuring the Router The Applications and Gami ng Tab Wireless-G VPN Broadband Router UPnP Forwarding The UPnP screen provides options for customization of port services for applications. (See Figure 6-28.) Enter the Application in the field.
40 Chapter 6: Configuring the Router The Applications and Gami ng Tab Wireless-G VPN Broadband Router DMZ The DMZ screen (see Figure 6-29) allows one local user to be exposed to the Internet for use o.
41 Chapter 6: Configuring the Router The Administration Tab Wireless-G VPN Broadband Router Figure 6-30: Mana gement The Administration Tab Management The Management screen, shown in Figure 6-30, allows you to change the Router’s access settings as well as configure the SNMP and UPnP (Universal Plu g and Play) features.
42 Chapter 6: Configuring the Router The Administration Tab Wireless-G VPN Broadband Router Figure 6-31: Log • SNMP Trap-Community. Enter the password required by the remote host computer that will receive trap messages or notices sent by the Router.
43 Chapter 6: Configuring the Router The Administration Tab Wireless-G VPN Broadband Router • Syslog Server IP Address. Enter the I P Address of the Syslog Server . • Syslog Priority. Select the priority from the drop-down list. Notification Queue Length • Log queue Length.
44 Chapter 6: Configuring the Router The Administration Tab Wireless-G VPN Broadband Router Factory Default (See Figure 6-33.) If you have exhausted all other options and wish to restore the Router to its factory default settings and lo se all your settings, click Yes .
45 Chapter 6: Configuring the Router Status Wireless-G VPN Broadband Router Status Router This screen displays information about your Router and its WAN (Internet) Connections. (See Figure 6-35.) Information The information displayed is the Hardware Version, Softw are Version, MAC Address, Local MAC Address, and System U p Time.
46 Chapter 6: Configuring the Router Status Wireless-G VPN Broadband Router Local Network The Local Network information that is displayed is the IP Address, Subnet Mask, DHCP Server, and DHCP Client Lease Info. To view the DHCP Clients Table, click the DHCP Clients button.
47 Chapter 6: Configuring the Router Status Wireless-G VPN Broadband Router Wireless The Wireless Network information that is displayed is the MAC Address, Mode, SSID, Channel, and Encryption Function. (See Figure 6-38.) Click the Refresh button if you want to Refresh your screen.
48 Appendix A: Troubleshootin g Common Problems and Solution s Wireless-G VPN Broadband Router Appendix A: Troubleshooting This appendix consists of two parts: “Common Problems and Solutions” and “Freque ntly Asked Questions.” Provided are possible solutions to problems that may occu r during the installation and operation of the Router.
49 Appendix A: Troubleshootin g Common Problems and Solution s Wireless-G VPN Broadband Router 7. Toward the bottom of the window, select Use the following DNS server ad dresses, and enter the Preferred DNS server and Alternative DNS server (pro vided by your ISP).
50 Appendix A: Troubleshootin g Common Problems and Solution s Wireless-G VPN Broadband Router For Windows 98 and Me: • Click Start and Run . In the Open field, type in command. Press the Enter key or click the OK button. For Windows NT, 2000, and XP: • Click Star t and Run .
51 Appendix A: Troubleshootin g Common Problems and Solution s Wireless-G VPN Broadband Router 4. I am not able to access the Setup page of the Router’s web-based utility. • Refer to “Problem #2, I want to test my Internet connection” to verify that your computer is properly connected to the Router.
52 Appendix A: Troubleshootin g Common Problems and Solution s Wireless-G VPN Broadband Router 2. Enter any name you want to use for the Customized Application. 3. Enter the External Port range of the service you are using. For exam ple, if you have a web server, you would enter the range 80 to 80.
53 Appendix A: Troubleshootin g Common Problems and Solution s Wireless-G VPN Broadband Router Customized External Port TCP UDP IP Address Enable Application UT 7777 to 27900 X X 192.168.1.100 X Halflife 27015 to 27015 X X 192.168.1.105 X PC Anywhere5631 to 5631 X 192.
54 Appendix A: Troubleshootin g Common Problems and Solution s Wireless-G VPN Broadband Router 10. I am a PPPoE user, and I need to remove th e proxy settings or t he dial-up pop-up window. If you have proxy settings, you need to disable these on y our computer.
55 Appendix A: Troubleshootin g Common Problems and Solution s Wireless-G VPN Broadband Router Gateway: 192.168.1.1 • Perform the upgrade using the TFTP program or the Router’s web-based utility through its Administration tab. 14. My DSL service’s PPPoE is always dis connecting.
56 Appendix A: Troubleshootin g Frequently Asked Questions Wireless-G VPN Broadband Router flash the firmware by assigning a static IP address to the computer, and then upgra de the firmware. Try using the following settings, IP Address: 192.168.1.50 and Subnet Mask: 255.
57 Appendix A: Troubleshootin g Frequently Asked Questions Wireless-G VPN Broadband Router Does the Internet connection of the Ro uter support 100Mbps Ethernet? The Router’s current hardware design .
58 Appendix A: Troubleshootin g Frequently Asked Questions Wireless-G VPN Broadband Router the same time, even if on the same LAN (not a problem with 1.0.1.3). As far as hosting games, the HL server does not need to be in the DMZ. Just forward port 27015 to the local IP address of the server computer.
59 Appendix A: Troubleshootin g Frequently Asked Questions Wireless-G VPN Broadband Router What is DMZ Hostin g? Demilitarized Zone (DMZ) allows one IP address (computer ) to b e exposed to the Internet. Some applications require multiple TCP/IP ports to be open.
60 Appendix A: Troubleshootin g Frequently Asked Questions Wireless-G VPN Broadband Router What is the IEEE 802.11g sta ndard? It is one of the IEEE standards for wireless networks. The 802.11g standard allows wireless networking hardware from different manufacturers to communicate, provided that the hardware complies with the 802.
61 Appendix A: Troubleshootin g Frequently Asked Questions Wireless-G VPN Broadband Router acknowledgment from its original access point, it undertakes a new search. Upon finding a new access point, it then re-registers, and the communication process continues.
62 Appendix A: Troubleshootin g Frequently Asked Questions Wireless-G VPN Broadband Router practical purposes, this number is usually permanent. Unlike IP addresses, which can change e very time a computer logs onto the network, the MAC address of a device stays the same, making it a valuable identifier for the network.
63 Appendix B: Wireless Security A Brief Overview Wireless-G VPN Broadband Router Appendix B: Wireless Security A Brief Overview Whenever data - in the form of files, emails, or messages - is transmitted o ver your wireless network, it is open to attacks.
64 Appendix B: Wireless Security What Are The Risks? Wireless-G VPN Broadband Router But even WEP has its problems. WEP's encryption algorithm is referred to as "simple", which also m eans "weak", because the technology that scrambles the wireless signal isn't too hard to crack for a pe rsistent hacker.
65 Appendix B: Wireless Security What Are The Risks? Wireless-G VPN Broadband Router Active Attacks Hackers use Active Attacks for three purposes: 1) st ealing data, 2) using your network, and 3) modifying your network so it's easier to hack in the next time.
66 Appendix B: Wireless Security What Are The Risks? Wireless-G VPN Broadband Router examples below, your implementation and administration of network security measures is the key to maximizing wireless security. No preventative measure will guarantee network se curity but it will make it more difficult for someone to hack into your network.
67 Appendix B: Wireless Security What Are The Risks? Wireless-G VPN Broadband Router There are a few things you can do to make your SSID more secure: a. Disable Broadcast b. Make it unique c. Change it often Most wireless networking devices will give you the option of broadcasting the SSID.
68 Appendix B: Wireless Security What Are The Risks? Wireless-G VPN Broadband Router not completely secure. One piece of info rmation still not en crypted is the MAC address, which hackers can use to break into a network by spoofin g (or faking) the MAC address.
69 Appendix B: Wireless Security What Are The Risks? Wireless-G VPN Broadband Router 2.4GHz/802.11b and 802.11g WEP Encryption WEP encryption for the Wireless-G VPN Broadband Router is configured through the Web-Utility's Wireless tab.
70 Appendix C: Configuring IPSec between a Windows 2000 PC and the Router Introduct ion Wireless-G VPN Boradband Router Appendix C: Configuring IPSec between a Windows 2000 PC and the Router Introduct.
71 Appendix C: Configuring IPSec between a Windows 2000 PC and the Router How to Establish a Secure IPSec Tunnel Wireless-G VPN Boradband Router How to Establish a Secure IPSec Tunnel Step 1: Create an IPSec Policy 1. Click the Start button, select Run , and type secpol.
72 Appendix C: Configuring IPSec between a Windows 2000 PC and the Router How to Establish a Secure IPSec Tunnel Wireless-G VPN Boradband Router 3. The IP Filter List screen should appear, as shown in Figure C-4. Enter an ap propriate name, such as win->router, for the filter list, and de-select the Use Add Wizard check box.
73 Appendix C: Configuring IPSec between a Windows 2000 PC and the Router How to Establish a Secure IPSec Tunnel Wireless-G VPN Boradband Router 8. The IP Filter List screen should appear, as shown in Figure C-7. Enter an ap propriate name, such as router->win for the filter list, and de-select the Use Add Wizard check box.
74 Appendix C: Configuring IPSec between a Windows 2000 PC and the Router How to Establish a Secure IPSec Tunnel Wireless-G VPN Boradband Router Step 3: Configure Individual Tunnel Rules Tunnel 1: win->router 1. From the IP Filter List tab, shown in Figur e C-10, click the filter list win->router.
75 Appendix C: Configuring IPSec between a Windows 2000 PC and the Router How to Establish a Secure IPSec Tunnel Wireless-G VPN Boradband Router 4. Select the Authentication M ethods tab, shown in Figure C-13, and click the Edit bu tton.
76 Appendix C: Configuring IPSec between a Windows 2000 PC and the Router How to Establish a Secure IPSec Tunnel Wireless-G VPN Boradband Router 7. Select the Tunnel Setting tab, shown in Figure C-16, and click The tunnel endpoint is specified by this IP Address radio button.
77 Appendix C: Configuring IPSec between a Windows 2000 PC and the Router How to Establish a Secure IPSec Tunnel Wireless-G VPN Boradband Router 10. Go to the IP Filter List tab, and click the filter list router->win , as shown in Figure C-19.
78 Appendix C: Configuring IPSec between a Windows 2000 PC and the Router How to Establish a Secure IPSec Tunnel Wireless-G VPN Boradband Router 13. Change the authentication method to Use this string to pr otect the key exchange (preshared key) , and enter the preshared key string, such as XYZ12345, as shown in Figure C-22.
79 Appendix C: Configuring IPSec between a Windows 2000 PC and the Router How to Establish a Secure IPSec Tunnel Wireless-G VPN Boradband Router 16. Click the Connectio n Type tab, shown in Figure C-25, and select All network connect ions . Then click the OK (for Windows XP) or Close (for Windows 2000) button to finish.
80 Appendix C: Configuring IPSec between a Windows 2000 PC and the Router How to Establish a Secure IPSec Tunnel Wireless-G VPN Boradband Router Step 5: Create a Tunnel Thro ugh the Web-Based Utility 1. Open your web browser, and enter 192.168.1.1 in the Address field.
81 Appendix D: F inding the MA C Address and IP Addr ess for Your Ethernet Adapter Windows 98 or Me Instructions Wireless-G Broadband Router Appendix D: Finding the MAC Address and IP Address for Your.
82 Appendix D: F inding the MA C Address and IP Addr ess for Your Ethernet Adapter Windows 2000 or XP Instructions Wireless-G Broadband Router Windows 2000 or XP Instructions 1. Click Start and Run . In the Open field, enter cmd . Press the Enter key or click the OK button.
83 Appendix E: SNMP Fu nctions Wireless-G VPN Broadband Router Appendix E: SNMP Functions SNMP (Simple Network Management Protocol) is a widely-u sed network monitoring and control protocol. Data is passed from a SNMP agent, such as the VPN Router, to the workstation console used to oversee the network.
84 Appendix F: Upgrading Firmware Wireless-G VPN Broadband Router Appendix F: Upgrading Firmware The Router's firmware is upgraded through the Web-Utilit y's Firmware Upgrade tab from the Administration tab.
85 Appendix G: Windows Help Wireless-G VPN Broadband Router Appendix G: Windows Help All wireless products require Microsoft Windows. Windows is the most used ope rating system in the world and comes with many features that help make networking easier.
86 Appendix H: Glossary Wireless-G VPN Broadband Router Appendix H: Glossary 802.11a - An IEEE wireless networking standard that specifies a maximum data transfer rate of 54Mbps and an operating frequency of 5GHz. 802.11b - An IEEE wireless networking standard that specifies a maximum data transfer rate of 11Mbps and an operating frequency of 2.
87 Appendix H: Glossary Wireless-G VPN Broadband Router Buffer - A block of memory that temporarily holds data to be work ed on later when a device is currently too busy to accept the data. Cable Modem - A device that con nects a computer to the cable television network, which in turn con nects to the Internet.
88 Appendix H: Glossary Wireless-G VPN Broadband Router Dynamic IP Address - A temporary IP address assigned by a DHCP server. Encryption - Encoding data to prevent it from being read by unauthorized people. Ethernet - An IEEE standard network protocol that specifie s how data is placed on and retrieved from a common transmission medium.
89 Appendix H: Glossary Wireless-G VPN Broadband Router IPCONFIG - A Windows 2000 and XP utility that displays the IP address for a particular networking device. IPSec (Internet Protocol Security) - A VPN protocol used to implement secure exchange of packets at the IP layer.
90 Appendix H: Glossary Wireless-G VPN Broadband Router PPPoE (Point to Point Protocol over Ethernet) - A type of broadband connection that provides authentication (username and password) in addition to data transport.
91 Appendix H: Glossary Wireless-G VPN Broadband Router TCP/IP (Transmission Control Protocol/Internet Protocol) - A network protocol for transmitting data that requires acknowledgement from the recipient of data sent. Telnet - A user command and TCP/IP protocol used for accessing remote PCs.
92 Appendix I: Specifications Wireless-G VPN Broadband Router Appendix I: Specifications Standards IEEE 802.3, 802.3u, 802.11b and 802.11g Ports One Internet, Ethernet (1-4), Power Buttons One Reset B.
93 Appendix J: Regulatory Info rmation Wireless-G VPN Broadband Router Appendix J: Regulatory Information FCC STATEMENT This product has been tested and complies with the specifications for a Class B digital device, pursuant to Part 15 of the FCC Rules.
94 Appendix J: Regulatory Info rmation Wireless-G VPN Broadband Router EN 300-328-1, EN 300-328-2 Technical requirements for Radio equipment. Caution: This equipment is intended to be used in all EU and EFTA countrie s. Outdoor use may be restricted to certain frequencies and/or may require a license for operation.
95 Appendix J: Regulatory Info rmation Wireless-G VPN Broadband Router An FCC compliant telephone cord and modular plug is provided with this equipment. Th is equipment is designed to be connected to the telephone network or premises wi ring using a compatible modular jack, which is FCC Part 68 compliant.
96 Appendix K: Warranty Information Wireless-G VPN Broadband Router Appendix K: Warranty Information LIMITED WARRANTY Linksys warra nts to You that, for a period o f three years (the “Warrant y Period”), yo ur Linksys Pr oduct will be su bstantially free of defects in materials a nd workmanship under normal use.
97 Appendix L: Contact Informatio n Wireless-G VPN Broadband Router Appendix L: Contact Information Need to contact Linksys? Visit us online for information on the latest products and updates to your existing products at: http://www.linksys.com/international If you experience problems with any Linksys product, you can e-mail us at: Austria support.
Ein wichtiger Punkt beim Kauf des Geräts Cisco WRV54G (oder sogar vor seinem Kauf) ist das durchlesen seiner Bedienungsanleitung. Dies sollten wir wegen ein paar einfacher Gründe machen:
Wenn Sie Cisco WRV54G noch nicht gekauft haben, ist jetzt ein guter Moment, um sich mit den grundliegenden Daten des Produkts bekannt zu machen. Schauen Sie zuerst die ersten Seiten der Anleitung durch, die Sie oben finden. Dort finden Sie die wichtigsten technischen Daten für Cisco WRV54G - auf diese Weise prüfen Sie, ob das Gerät Ihren Wünschen entspricht. Wenn Sie tiefer in die Benutzeranleitung von Cisco WRV54G reinschauen, lernen Sie alle zugänglichen Produktfunktionen kennen, sowie erhalten Informationen über die Nutzung. Die Informationen, die Sie über Cisco WRV54G erhalten, werden Ihnen bestimmt bei der Kaufentscheidung helfen.
Wenn Sie aber schon Cisco WRV54G besitzen, und noch keine Gelegenheit dazu hatten, die Bedienungsanleitung zu lesen, sollten Sie es aufgrund der oben beschriebenen Gründe machen. Sie erfahren dann, ob Sie die zugänglichen Funktionen richtig genutzt haben, aber auch, ob Sie keine Fehler begangen haben, die den Nutzungszeitraum von Cisco WRV54G verkürzen könnten.
Jedoch ist die eine der wichtigsten Rollen, die eine Bedienungsanleitung für den Nutzer spielt, die Hilfe bei der Lösung von Problemen mit Cisco WRV54G. Sie finden dort fast immer Troubleshooting, also die am häufigsten auftauchenden Störungen und Mängel bei Cisco WRV54G gemeinsam mit Hinweisen bezüglich der Arten ihrer Lösung. Sogar wenn es Ihnen nicht gelingen sollte das Problem alleine zu bewältigen, die Anleitung zeigt Ihnen die weitere Vorgehensweise – den Kontakt zur Kundenberatung oder dem naheliegenden Service.