all | frequencies |
|
|
exhibits | applications |
---|---|---|---|---|---|
manuals |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 |
|
USERS MANUAL 1 | Users Manual | 653.52 KiB | ||||
1 |
|
USERS MANUAL 2 | Users Manual | 456.46 KiB | ||||
1 | Cover Letter(s) | |||||||
1 | External Photos | |||||||
1 | ID Label/Location Info | |||||||
1 | ID Label/Location Info | |||||||
1 | Internal Photos | |||||||
1 | RF Exposure Info | |||||||
1 | Test Report | |||||||
1 | Test Report | |||||||
1 | Test Report | |||||||
1 | Test Report | |||||||
1 | Test Report | |||||||
1 | Test Report | |||||||
1 | Test Report | |||||||
1 | Test Report | |||||||
1 | Test Report | |||||||
1 | Test Report | |||||||
1 | Test Report | |||||||
1 | Test Setup Photos |
1 | USERS MANUAL 1 | Users Manual | 653.52 KiB |
FCC ID: SZD-990186 (IC: 5746A-990186) Report No. M050109_Cert_WMIR-103G APPENDIX N USER MANUAL - PART 1 This document must not be copied or reproduced, except in full without the written permission of the Manager, EMC Technologies Pty Ltd. The certificate on page 3 may be reproduced in full. www.emctech.com.au User Manual
Quick Setup
Warranty
Contact Details
Product Registration
Quick Setup This guide walks you through the installation of your CyberGuard SG appliance. Installing the CyberGuard SG appliance into a well planned network is quick and easy. However, network planning and design is outside the scope of this guide. Please take some time to plan your network prior to installing your CyberGuard SG appliance. To add the CyberGuard SG appliance to your local area network (LAN), the basic steps are:
Unpack your CyberGuard SG appliance
Set up a PC to connect to the Web Management Console
Set up your CyberGuard SG appliances password and LAN
Set up your CyberGuard SG appliances Internet connection connection settings settings
Set up the PCs on your LAN to access the Internet Occasionally you will see a box like the following, which contains important technical information:
Note: Example. System Requirements These steps assume that you have a PC running Microsoft Windows
(95/98/Me/2000/XP) with an Ethernet network interface card installed. You may need to be logged in with administrator privileges. For a more a thorough description of configuring the CyberGuard SG appliance, please refer to the User Manual on your CyberGuard SG CD
(\doc\UserManual.pdf). For troubleshooting and answers to frequently asked questions, contact your network administrator or consult the Knowledge Base at:
http://www.cyberguard.com/snapgear/knowledgebase.html For product compliance information, please refer to the CyberGuard SG CD (\doc\Compliance.pdf). 2 STEP 1 Unpack the CyberGuard SG appliance Check the following items were included with your CyberGuard SG appliance:
Power adapter
CyberGuard SG CD
2 Ethernet cables (1 blue straight through cable and 1 gray or red crossover cable or 2 blue straight through cables) 2 Antenna Assemble the antenna onto the SG565
Step 1a Before powering on the SG565 the antenna must be fitted. Screw the two antenna onto the terminals ANT A and ANT B at the rear of the device Warning: To comply with the FCC and ANSI C95.1 RF exposure limits, it is recommended for the Cyberguard SG565 device be installed so as to provide a separation distance of at least 20 cm (8 inches) from all persons and that the antenna must not be co-located or operating in conjunction with any other antenna or radio transmitter. It is recommended that the user limit exposure time if the antenna is positioned closer than 20 cm (8 inches). Step 1b Power on the SG565 On the rear panel of the CyberGuard SG appliance you will see network
(LAN 4 ports), Internet (Internet/ WAN) and serial ports, a Reset/Erase button, antenna outlets and a power inlet. The front panel of the CyberGuard SG appliance contains activity LEDs
(lights) that vary slightly between models. These provide information on the operating status of your CyberGuard SG appliance. Note: Power is ON when power is applied (use only the power adapter packaged with the unit). System/Heart Beat/TST flashes when the CyberGuard SG appliance is running. The SG565 may also initially have all other front panel LEDs flashing. If these LEDs do not behave in this manner before your CyberGuard SG appliance has been attached to the network, you may need to perform a factory reset. Press the black Reset/Erase button on rear panel twice within two seconds to restore factory default settings. If the LEDs are still not flashing after 30 seconds, you may need to contact customer support. STEP 2 Set up a PC to connect to the Web Management Console The CyberGuard SG appliance ships with initial, static IP settings of:
LAN IP address:
LAN subnet mask:
192.168.0.1 255.255.255.0 Note: The Internet/WAN and DMZ interfaces are by default inactive, i.e. there are no network services such as DHCP in operation, and no IP address is configured. If you attach the CyberGuard SG units LAN port directly to a LAN with an existing DHCP server, or a PC running a DHCP service, before performing the initial setup steps described below, it will automatically obtain an additional address. Your CyberGuard SG appliance will still be reachable at 192.168.0.1. However, it is strongly recommended that you perform the initial setup steps 2, 3 and 4 before connecting your CyberGuard SG appliance to your LAN. Your CyberGuard SG appliance will need an IP address suitable for your LAN before it is connected. You may choose to use the CyberGuard SG appliances initial network settings as a basis for your LAN settings. Connect the supplied power adapter to the CyberGuard SG appliance. Connect the CyberGuard SG appliances LAN Ethernet port directly to your PCs network interface card using the crossover cable (red or gray). Next, you must modify your PCs network settings to enable it to communicate with the CyberGuard SG appliance. 3 4 Click Start -> (Settings ->) Control Panel and double click Network Connections (or in 95/98/Me, double click Network). Right click on Local Area Connection and select Properties. Note: If there is more than one existing network connection, select the one corresponding to the network interface card to which the CyberGuard SG appliance is attached. Select Internet Protocol (TCP/IP) and click Properties (or in 95/98/Me, TCP/IP -> your network card name if there are multiple entries) and click Properties. Select Use the following IP address and enter the following details:
IP address:
Subnet mask:
Default gateway:
192.168.0.100 255.255.255.0 192.168.0.1 Select Use the following DNS server addresses and enter:
Preferred DNS server: 192.168.0.1 Note: If you wish to retain your existing IP settings for this network connection, click Advanced and Add the secondary IP address of 192.168.0.100, subnet mask 255.255.255.0. 5 6 STEP 3 Set up the CyberGuard SG appliances password and LAN connection settings Launch Internet Explorer (or your preferred web browser) and navigate to 192.168.0.1. The Web Management Console will display. Select Quick Setup Wizard from the center of the page. You will be prompted to log in. Enter the initial user name and password for the CyberGuard SG appliance:
root default User name:
Password:
Note: If you are unable to connect to the Management Console at 192.168.0.1, or the initial username and password are not accepted, press the black Reset button on the CyberGuard SG appliances rear panel twice, wait 20 30 seconds, and try again. Pressing this button twice within 2 seconds returns the CyberGuard SG appliance to its factory default settings. Enter and confirm a password for your CyberGuard SG appliance. This is the password for the user root, the main administrative user account on the CyberGuard SG appliance. It is therefore important that you choose a password that is hard to guess, and keep it safe. The new password will take effect immediately, and you will be prompted to enter it when completing the next step. The Quick Setup Wizard will display. Hostname: You may change the name your CyberGuard SG appliance knows itself by. This is not generally necessary. Manual configuration: Select this to manually specify your CyberGuard SG appliances LAN connection settings. Skip: LAN already configured: Select this if you wish to use the CyberGuard SG appliances initial network settings (IP address 192.168.0.1 and subnet mask 255.255.255.0) as a basis for your LAN settings. You may skip to STEP 4. Obtain LAN IP address from a DHCP server on LAN: It is recommended that you statically configure your CyberGuard SG appliances LAN connection settings rather than rely on an existing DHCP server. However, you may select this if you have an existing DHCP server that you wish to have automatically configure your CyberGuard SG appliances LAN connection settings. You may skip to STEP 4. Click Next. 7 8 Note: This page will only display if you previously selected Manual configuration. Otherwise skip to STEP 4. Enter an IP address and Subnet mask for your CyberGuard SG appliances LAN connection. You may choose to use the CyberGuard SG appliances initial network settings if you are sure no other PC or network device already has the address of 192.168.0.1. The IP address will later be used as the gateway address for the PCs on your LAN. To gain access through this gateway, the PCs on your LAN must have an IP address within the bounds of the subnet described by the CyberGuard SG appliances IP address and subnet mask (e.g. using the CyberGuard SG appliances initial network settings, 192.168.0.2 192.168.0.254). Take note of this IP address and subnet mask, as you will need them later on. Click Next. STEP 4 Set up the CyberGuard SG appliances Internet connection settings First, attach your CyberGuard SG appliance to your modem device or Internet connection medium. If necessary, give the modem device some time to power up. Select your Internet connection type and click Next. If connecting using a cable modem, select the appropriate ISP. Choose Generic cable modem provider if unsure. If connecting using a regular analog modem, enter the details provided by your ISP. If connecting using an ADSL modem, select Auto detect ADSL connection type and enter the details provided by your ISP. If auto detection fails and you are unsure of your ADSL connection type, contact your ISP. If you have a direct connection to the Internet (e.g. a leased line), enter the IP settings provided by your ISP. Note: For detailed help for each of these options, please refer to the User Manual. Once the CyberGuard SG appliances Internet connection has been set up, click Next, select Reboot and click Next again. Note: If you changed the CyberGuard SG appliances LAN connection settings in STEP 3, it may become uncontactable at this point. The next step describes how to set up the PCs on your network to access the CyberGuard SG appliance and the Internet. STEP 5 Set up the PCs on your LAN to access the Internet If you havent already, connect your CyberGuard SG appliances LAN port directly to your LAN hub using the straight through Ethernet cable
(blue). Note: if you are setting up the SG565, you may also connect PCs directly to its LAN switch. To access the Internet, the PCs on your LAN must all be set up to use the CyberGuard SG appliance as their default gateway. This can be done a number of different ways depending on how your LAN is set up. If your LAN has a DHCP server already, proceed to STEP 5A. If your LAN does not have a DHCP server, proceed to STEP 5B. If you are not sure, you probably want STEP 5B. STEP 5A LAN with a DHCP server Add a lease to your existing DHCP server to reserve an IP address for the CyberGuard SG appliances LAN connection. If you chose to set the CyberGuard SG appliances LAN connection settings using Manual configuration, you may simply remove this address from the pool of available addresses. Enter this same IP address as the gateway IP address to be handed out by the DHCP server. Enter this same IP address as the DNS server IP address to be handed out by the DHCP server. Restart all the PCs on the network (this will reset their gateway and DNS addresses). Note: The purpose of restarting the PCs is to force them to gain a new DHCP lease. Alternatively you can use a utility such as ipconfig to release then renew a lease, or disable and re-enable the network connection. 9 10 STEP 5B LAN with no DHCP server Alternatively, to activate your CyberGuard SG appliance's DHCP server:
A DHCP server allows PCs to automatically obtain network settings when they start up. If your network does not have a DHCP server, you may either manually set up each PC on your network, or set up the CyberGuard SG appliance's DHCP server. Note: If you only have several PCs, we suggest manually setting up your network. If you have more PCs, enabling the CyberGuard SG appliances DHCP server is more scalable. To manually set up each Windows PC on your network:
Click Start -> (Settings ->) Control Panel and double click Network Connections (or in 95/98/Me, double click Network). If presented with multiple connections, right click on Local Area Connection (or appropriate network connection) and select Properties. Select Internet Protocol (TCP/IP) and click Properties (or in 95/98/Me, TCP/IP -> [your network card name] if there are multiple entries). Enter the following details:
IP address is an IP address that is part of the same subnet range as the CyberGuard SG appliances LAN connection (e.g. if using the default settings, 192.168.0.2 192.168.0.254).
Subnet mask is the subnet mask of the CyberGuard SG appliances LAN connection.
Default gateway is the IP address of the CyberGuard SG appliances LAN connection.
Preferred DNS server is the IP address of the CyberGuard SG appliances LAN connection. Click OK (or in 95/98/Me, Add then OK, reboot the PC if prompted to do so). Perform these steps for each PC on your network. You are now finished. 11 12 Launch Internet Explorer (or your preferred web browser) and navigate to the IP address of the CyberGuard SG appliances LAN connection. Note: If you changed your CyberGuard SG appliances LAN connection settings from its default settings in STEP 3, it may be uncontactable at this point. If so, manually set up a single PC as described at the beginning of STEP 5B before continuing. The Web Management Console will display. Select DHCP Server from the Networking menu. Click Add Server and configure the DHCP server with the following details:
Gateway Address is the IP address of the CyberGuard SG appliances LAN connection, or leave it blank.
DNS Address is the IP address of the CyberGuard SG appliances LAN connection, or leave it blank.
WINS Address (optional) is the IP address of any existing WINS server on your LAN.
Default Lease Time and Maximum Lease Time should generally
be left at their default values. Initial Dynamic IP Address Range is a range of free IP addresses on your LANs subnet for the CyberGuard SG appliance to hand out to PCs on your LAN. Note: For a detailed description of configuring DHCP Server Settings, please refer to the User Manual. Each PC on your LAN must now be set up to use DHCP. For each PC on your LAN:
Click Start -> (Settings ->) Control Panel and double click Network Connections (or in 95/98/Me, double click Network). If presented with multiple connections, right click on Local Area Connection (or appropriate network connection) and select Properties. Select Internet Protocol (TCP/IP) and click Properties (or in 95/98/Me, TCP/IP -> [your network card name] if there are multiple entries) and click Properties (in 95/98/Me, you may also have to click the IP Address tab). Check Obtain an IP address automatically, check Obtain DNS server address automatically and click OK (in 95/98/Me, reboot the PC if prompted to do so). You are now finished.
Common VPN Scenarios Generally there are two common scenarios in which you will want to set up your CyberGuard SG appliance(s):
LAN-to-LAN: Linking two branch offices across the Internet. For this case we recommend using IPSec. The VPN connection can operate with both static and dynamic public (Internet) IP addresses. For the example below we assume that CyberGuard SG appliances are installed at either end, and that both have a static public IP address, or one is static and one is dynamic. The example tunnel will be using pre-
shared keys for authentication, aggressive mode for keying, and be established going out through the default gateway interface. Proceed to CyberGuard SG to CyberGuard SG VPN (IPSec). Please refer to the IPSec section of the User Manual if you are trying to set up something more complex, and for a detailed description of all available options. Roaming: Connecting to your CyberGuard SG appliance, installed at your home or office, from a single PC at a remote location. For this case we recommend using PPTP because the client is standard in Windows and other operating systems, and it is quite simple to set up. Proceed to Remote Workstation to CyberGuard SG VPN (PPTP). CyberGuard SG to CyberGuard SG VPN (IPSec) Perform these steps for either end of the connection. Unless instructed otherwise, leave all options at their default settings. STEP 1 Enable IPSec Select IPSec from the VPN menu. Underneath IPSec General Settings select This end has a static IP address IPSec endpoint, or This end has a dynamic IP address IPSec endpoint as appropriate. This is referring to the public (Internet) IP address of this CyberGuard SG appliance. Check with your ISP if unsure. Check Enable IPSec, and click Apply. 13 14 STEP 2 Add a New IPSec Connection Select the Add New Tunnel tab at the top of the window. STEP 4 Remote Endpoint Settings If you selected The remote party has a static IP address, enter the other CyberGuard SG appliance's public (Internet) IP address in The remote party's IP address. If you selected The remote party has a dynamic IP address, enter snap@branch as the Required Endpoint ID. Note: Please note again that this example is not suitable for setting up a connection where both ends have dynamic IP address, for this scenario please refer to the IPSec section of the User Manual. Click Continue. STEP 5 Phase 1 Settings Enter a descriptive name for the connection in Tunnel name. Select This tunnel will be using Aggressive mode Automatic Keying
(IKE). Select The remote party has a static IP address or The remote party has a dynamic IP address as appropriate. This is referring to the public (Internet) IP address of the other CyberGuard SG appliance. Check with your ISP if unsure. Click Continue. STEP 3 Local Endpoint Settings If you selected This end has a dynamic IP address IPSec endpoint, enter snap@branch as the Required Endpoint ID. Click Continue. 15 16 You must choose a Preshared Secret to authenticate the connection. This passphrase can be any character string you like (recommended at least 24 characters), it may contain spaces, and must be entered identically on both CyberGuard SG appliances. Note: It is important that you keep this information secret, much like a password. The preshared secret is fundamental to IPSec encryption. Click Continue. STEP 6a Phase 2 Settings Enter the network address and network mask for the Local Network
(this CyberGuard SG appliance) and the Remote Network (the other CyberGuard SG appliance). You can check this by opening Diagnostics in a new browser window and looking under LAN Interface, e.g. if the IP Address is 192.168.1.1 and Netmask is 255.255.255.0, enter 192.168.1.0/255.255.255.0. Note: The two LANs being connected by the IPSec connection must have network addresses that are different to each other, e.g. 192.168.1.0/255.255.255.0 and 192.168.2.0/255.255.255.0. Click Apply and you're done. STEP 6b Repeat Your CyberGuard SG appliance is now activated for IPSec VPN. Once you have completed the steps at each end you will be up and running. STEP 7 Verify Under Tunnel List in the General Settings tab, check Status to see whether the connection is Down or Running. Status will display Negotiating Phase 1 then Negotiating Phase 2 as the connection is being established. Remote Workstation to CyberGuard SG VPN (PPTP) STEP 1 Enable PPTP Server Select PPTP VPN Server from the Networking menu. The table below describes the fields in the PPTP VPN Server Setup page and the options in enabling and configuring VPN access. Enable PPTP Check this box to enable the establishment of PPTP connections to your CyberGuard SG appliance. IP Address(es) to Assign VPN Clients Enter a range of free IP addresses on your LAN to assign to the remote connections. Authentication Scheme Authentication Database MSCHAPv2 is the most secure and recommended. It uses encrypted passwords. CHAP is less secure, and similarly PAP is even less secure, but more common. In some cases you may have to choose them if the default does not work. Leave this as Local unless you wish to use another server to authenticate PPTP VPN clients. Refer to the User Manual if this is the case. 17 18 STEP 2 Add User Account(s) Once you have set up the VPN server, select Continue. Before remote users can set up a VPN tunnel to the CyberGuard SG appliances PPTP server, they must have user accounts set up. The field options in the Add New Account are detailed below. Username This User Name is required for VPN authentication only. The name selected is case sensitive (for example Jimsmith is not the same as jimsmith). Windows Domain Optional. Most Windows clients expect you to specify a domain name in upper case. Password Enter the password for the remote VPN user. Confirm Re-enter the password to confirm. As new VPN user accounts are added, they are displayed on the updated Account List. To modify the password of an existing account, Select the account in the Account List then enter New Password and Confirm in the Delete or Change Password for the Selected Account field. Similarly to delete an existing account, Select the account in the Account List then check Delete in the Delete or Change Password for the Selected Account field. If you request a change to a User Account and it is successful, the PPTP VPN Server Setup page will be displayed with the change noted. If the change was unsuccessful, an error will be reported. STEP 3 Configure Remote Client At the remote sites there is generally no need for any special client software. Your CyberGuard SG appliances PPTP server supports the standard PPTP client software included with Windows. The virtual private network connection is simple to configure using the standard Dial-Up Networking software. PPTP is also compatible with Linux/Unix PPTP client software. These instructions will cover a Windows 2000 client. Please refer to the User Manual if you have a different operating system. Click Start, Settings, Network and Dialup Connections. Choose Make New Connection. Choose Connect to a private network through the Internet. Click Next. 19 20 Enter the CyberGuard SG appliances public (Internet) IP address in the Destination Address and click Next. Select the Connection Availability that you require on the next window and click Next, which will display the final window in this wizard. Choose a name for your new VPN connection, e.g. My Office VPN. Your client machine should be connected to the Internet in the normal way (dialout, ADSL, cable modem etc.). Enter the Username and Password set up earlier and click the Connect button. After you have been authenticated to the network, you can check your e-
mail, use the office printer, access shared files and browse the network as if you were physically connected to the LAN. To disconnect the VPN tunnel connection to the remote CyberGuard SG appliance double click on the Dial-Up Networking icon in the Windows task bar and close the connection. STEP 4 Verify Your VPN connection is easily verified by attempting a connection as above. Once the connection has succeeded your clients Windows task bar will contain a Dial-Up Networking icon and will flash to indicate activity. You may also double click this icon to see further statistics.
Terms and Conditions SnapGear Warranty Standard Warranty SnapGear, Inc., its parent, affiliates and subsidiaries, (collectively, "SnapGear") warrant your SnapGear product to be in good working order and to be free from defects in workmanship and material (except in those cases where the materials are supplied by the Purchaser) under normal and proper use and service for the period of one (1) year from the date of original purchase from an Authorized SnapGear reseller. In the event that this product fails to meet this warranty within the applicable warranty period, and provided that SnapGear confirms the specified defects, Purchaser's sole remedy is to have SnapGear, in SnapGear's sole discretion, repair or replace such product at the place of manufacture, at no additional charge other than the cost of freight of the defective product to and from the Purchaser. Repair parts and replacement products will be provided on an exchange basis and will be either new or reconditioned. SnapGear will retain, as its property, all replaced parts and products. Notwithstanding the foregoing, this hardware warranty does not include service to replace or repair damage to the product resulting from accident, disaster, abuse, misuse, electrical stress, negligence, any non-
SnapGear modification of the product except as provided or explicitly recommended by SnapGear, or other cause not arising out of defects in material or workmanship. This hardware warranty also does not include service to replace or repair damage to the product if the serial number or seal or any part thereof has been altered, defaced or removed. If SnapGear does not find the product to be defective, the Purchaser will be invoiced for said inspection and testing at SnapGear's then current rates, regardless of whether the product is under warranty. 21 22 Limitation of Liability No action, regardless of form, arising from this warranty may be brought by either party more than two (2) years after the cause of action has occurred. Purchaser expressly agrees that SnapGear's liability, if any, shall be limited solely to the replacement or repair of the product in accordance with the warranties specifically and expressly set forth herein. The remedies of the Purchaser are the exclusive and sole remedies available, and, in the event of a breach or repudiation of any provision of this agreement by SnapGear, the Purchaser shall not be entitled to receive any incidental damages as that term is defined in Section 2-715 of the Uniform Commercial Code. SnapGear waives the benefit of any rule that disclaimer of warranty shall be construed against SnapGear and agrees that such disclaimers herein shall be construed liberally in favor of SnapGear. THE FOREGOING WARRANTIES ARE THE SOLE AND EXCLUSIVE WARRANTIES GIVEN IN CONNECTION WITH THE PRODUCT AND THE HARDWARE. SNAPGEAR DISCLAIMS ALL OTHER WARRANTIES, EXPRESS OR INCLUDING WITHOUT LIMITATION, ANY WARRANTIES AS TO THE SUITABILITY OR MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. SNAPGEAR DOES NOT PROMISE THAT THE PRODUCT IS ERROR-FREE OR WILL OPERATE WITHOUT INTERRUPTION. IN NO EVENT SHALL SNAPGEAR BE LIABLE FOR ANY LOST OR ANTICIPATED PROFITS, OR ANY INCIDENTAL, EXEMPLARY, SPECIAL OR CONSEQUENTIAL DAMAGES, REGARDLESS OF WHETHER SNAPGEAR WAS ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IMPLIED, Extended Four Year Warranty If Purchaser buys Extended Warranty at time of purchase of the product or within thirty (30) days from date of original purchase, the period of warranty will be extended by three (3) additional years to a total of four
(4) years. Return Procedure If this product requires service during the applicable warranty period, a Return Materials Authorization (RMA) number must first be obtained from SnapGear. Product that is returned to SnapGear for service or repair without an RMA number will be returned to the sender unexamined. Product should be returned, freight prepaid, in its original or equivalent packaging, to an authorized SnapGear Service Center. Proof of purchase date must accompany the returned product and the Purchaser shall agree to insure the product or assume the risk of loss of damage in transit. Contact SnapGear for further information. Technical Support or Install Guide, Purchaser is entitled to thirty (30) days free telephone support (USA ONLY) and thirty (30) days free e-mail support (world wide) from date of purchase provided that the Purchaser first register their product(s) with SnapGear either via filling in and posting or faxing the form found in the Quick form in http://www.snapgear.com/registration.html. Telephone and e-mail support is available from 9:00 AM to 5:00 PM, Mountain Time. SnapGear's standard warranty includes free access to SnapGear's Knowledge Base as well as any application notes, white papers and other on-line resources that may become available from time to time. SnapGear reserves the right to discontinue all support for products that are no longer covered by warranty. on-line filling the 23 24 SNAPGEAR END USER LICENSE AGREEMENT IMPORTANT READ BEFORE USING THE ACCOMPANYING SOFTWARE YOU SHOULD CAREFULLY READ THE FOLLOWING TERMS AND CONDITIONS BEFORE USING THE ACCOMPANYING SOFTWARE, THE USE OF WHICH IS LICENSED FOR USE ONLY AS SET FORTH BELOW. IF YOU DO NOT AGREE TO THE TERMS AND CONDITIONS OF THIS AGREEMENT, DO NOT USE THE SOFTWARE. IF YOU USE ANY PART OF THE SOFTWARE, SUCH USE WILL INDICATE THAT YOU ACCEPT THESE TERMS. You have acquired a product that includes SnapGear (SnapGear) proprietary software and/or proprietary software licensed to SnapGear. This SnapGear End User License Agreement
(EULA) is a legal agreement between you (either an individual or a single entity) and SnapGear for the installed software product of SnapGear origin, as well as associated media, printed materials, and online or electronic documentation (Software). By installing, copying, downloading, accessing, or otherwise using the Software, you agree to be bound by the terms of this EULA. If you do not agree to the terms of this EULA, SnapGear is not willing to license the Software to you. In such event, do not use or install the Software. If you have purchased the Software, promptly return the Software and all accompanying materials with proof of purchase for a refund. Products with separate end user license agreements that may be provided along with the Software are licensed to you under the terms of those separate end user license agreements. LICENSE GRANT. Subject to the terms and conditions of this EULA, SnapGear grants you a nonexclusive right and license to install and use the Software on a single CPU, provided that, (1) you may not rent, lease, sell, sublicense or lend the Software; (2) you may not reverse engineer, decompile, disassemble or modify the Software, except and only to the extent that such activity is expressly permitted by applicable law notwithstanding this limitation; and (3) you may not transfer rights under this EULA unless such transfer is part of a permanent sale or transfer of the Product, you transfer at the same time all copies of the Software to the same party or destroy such materials not transferred, and the recipient agrees to this EULA. No license is granted in any of the Softwares proprietary source code. This license does not grant you any rights to patents, copyright, trade secrets, trademarks or any other rights with respect to the Software. You may make a reasonable number of copies of the electronic documentation accompanying the Software for each Software license you acquire, provided that, you must reproduce and include all copyright notices and any other proprietary rights notices appearing on the electronic documentation. SnapGear reserves all rights not expressly granted herein. INTELLECTUAL PROPERTY RIGHTS. The Software is protected by copyright laws, international copyright treaties, and other intellectual property laws and treaties. SnapGear and its suppliers retain all ownership of, and intellectual property rights in (including copyright), the Software components and all copies thereof, provided however, that certain components of the Software are components licensed under the GNU General Public License (version 2), which SnapGear supports. You may obtain a copy of the GNU General Public License at http:/www.fsf.org/copyleft/gpl.html. SnapGear will provide source code for any of the components of the Software licensed under the GNU General Public License upon request. EXPORT RESTRICTIONS. You agree that you will not export or re-export the Software, any part thereof, or any process or service that is the direct product of the Software in violation of any applicable laws or regulations of the United States or the country in which you obtained them. U.S. GOVERNMENT RESTRICTED RIGHTS. The Software and related documentation are provided with Restricted Rights. Use, duplication, or disclosure by the Government is subject to restrictions set forth in subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 or subparagraphs (c) (1) and (2) of the Commercial Computer Software Restricted Rights at 48 C.F.R. 52.227-19, as applicable, or any successor regulations. TERM AND TERMINATION. This EULA is effective until terminated. The EULA terminates immediately if you fail to comply with any term or condition. In such an event, you must destroy all copies of the Software. You may also terminate this EULA at any time by destroying the Software. GOVERNING LAW AND ATTORNEYS FEES. This EULA is governed by the laws of the State of Utah, USA, excluding its conflict of law rules. You agree that the United Nations Convention on Contracts for the International Sale of Goods is hereby excluded in its entirety and does not apply to this EULA. If you acquired this Software in a country outside of the United States, that countrys laws may apply. In any action or suit to enforce any right or remedy under this EULA or to interpret any provision of this EULA, the prevailing party will be entitled to recover its costs, including reasonable attorneys fees. ENTIRE AGREEMENT. This EULA constitutes the entire agreement between you and SnapGear with respect to the Software, and supersedes all other agreements or representations, whether written or oral. The terms of this EULA can only be modified by express written consent of both parties. If any part of this EULA is held to be unenforceable as written, it will be enforced to the maximum extent allowed by applicable law, and will not affect the enforceability of any other part. Should you have any questions concerning this EULA, or if you desire to contact SnapGear for any reason, please contact the SnapGear representative serving your company. 25 26
Contact Details USA 7984 South Welby Park Drive Suite #101 West Jordan, UT 84088 USA Phone +1 801 282 8492
+1 801 282 8496 Fax
Product Registration Australia 825 Stanley St Woolloongabba QLD 4102 Australia Phone +61 7 3435 2888
+61 7 3891 3630 Fax For prompt product registration please go to the CyberGuard website at:
http://www.cyberguard.com/snapgear/registration.html You will require a current email address to register your product. THE FOLLOWING DISCLAIMER OF WARRANTY AND LIMITATION OF LIABILITY IS INCORPORATED INTO THIS EULA BY REFERENCE. NOT FAULT TOLERANT. THE SOFTWARE IS NOT FAULT TOLERANT. YOU HAVE INDEPENDENTLY DETERMINED HOW TO USE THE SOFTWARE IN THE DEVICE, AND SNAPGEAR HAS RELIED UPON YOU TO CONDUCT SUFFICIENT TESTING TO DETERMINE THAT THE SOFTWARE IS SUITABLE FOR SUCH USE. LIMITED WARRANTY. SnapGear warrants the media containing the Software for a period of ninety (90) days from the date of original purchase from SnapGear or its authorized retailer. Proof of date of purchase will be required. Any updates to the Software provided by SnapGear
(which may be provided by SnapGear at its sole discretion) shall be governed by the terms of this EULA. In the event the product fails to perform as warranted, SnapGears sole obligation shall be, at SnapGears discretion, to refund the purchase price paid by you for the Software on the defective media, or to replace the Software on new media. SnapGear makes no warranty or representation that its Software will meet your requirements, will work in combination with any hardware or application software products provided by third parties, that the operation of the software products will be uninterrupted or error free, or that all defects in the Software will be corrected. SNAPGEAR DISCLAIMS ANY AND ALL OTHER WARRANTIES, WHETHER EXPRESS OR IMPLIED, IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. OTHER THAN AS STATED HEREIN, THE ENTIRE RISK AS TO SATISFACTORY QUALITY, PERFORMANCE, ACCURACY, AND EFFORT IS WITH YOU. ALSO, THERE IS NO WARRANTY AGAINST INTERFERENCE WITH YOUR ENJOYMENT OF THE SOFTWARE OR AGAINST INFRINGEMENT. IF YOU HAVE RECEIVED ANY WARRANTIES REGARDING THE DEVICE OR THE SOFTWARE, THOSE WARRANTIES DO NOT ORIGINATE FROM, AND ARE NOT BINDING ON, SNAPGEAR. NO LIABILITY FOR CERTAIN DAMAGES. EXCEPT AS PROHIBITED BY LAW, SNAPGEAR SHALL HAVE NO LIABILITY FOR COSTS, LOSS, DAMAGES OR LOST OPPORTUNITY OF ANY TYPE WHATSOEVER, INCLUDING BUT NOT LIMITED TO, LOST OR ANTICIPATED PROFITS, LOSS OF USE, LOSS OF DATA, OR ANY INCIDENTAL, EXEMPLARY SPECIAL OR CONSEQUENTIAL DAMAGES, WHETHER UNDER CONTRACT, TORT, WARRANTY OR OTHERWISE ARISING FROM OR IN CONNECTION WITH THIS EULA OR THE USE OR PERFORMANCE OF THE SOFTWARE. IN NO EVENT SHALL SNAPGEAR BE LIABLE FOR ANY AMOUNT IN EXCESS OF THE LICENSE FEE PAID TO SNAPGEAR UNDER THIS EULA. SOME STATES AND COUNTRIES DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS LIMITATION MAY NOT APPLY TO YOU. INCLUDING WITHOUT LIMITATION, ANY 27 28 Part Number: 520093-00 February 7th, 2005 Product Compliance Information 520055-07-SPC 1 Contents of Kits Part Descriptions Products SG300
(was LITE300) 990126 Telephone extension cable, 6ft (1.8m) Ethernet cross-over cable, 6ft (1.8m) grey Ethernet cross-over cable, 6ft (1.8m) red Ethernet patch cable, 6ft
(1.8m) blue 5VDC switching power supply unit 6VDC switching power supply unit 6VDC wall mount plug pack 12VDC wall mount plug pack IEC mains power supply cable Quick Installation Guide CDrom 2 1 1 1 SG630
(was PCI630) 990071 SG635
(was PCI635) 990135 1 1 1 1 SG530
(was SME530) 990064 Quantities SG550
(was SME550) 990065 SG570
(was SME570) 990107 SG575
(was SME575) 990108 SG710 990136 SG710+
990183 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 520055-07-SPC 2 Compliance Certifications Products FCC Class A FCC Class B CE C-Tick TUV Industry Canada 520055-07-SPC Relevant Certifications Relevant to SG300
(was LITE300) 990126 SG630
(was PCI630) 990071 SG635
(was PCI635) 990135 SG530
(was SME530) 990064 SG550
(was SME550) 990065 SG570
(was SME570) 990107 SG575
(was SME575) 990108 SG710 990136 SG710+
990183 3 Hereby, CyberGuard Corporation., declares that this ITE is in compliance with the essential requirements and other relevant provisions of Directive 1999/5/EC. CyberGuard Corporation. vakuuttaa tten ett ITE tyyppinen laite on direktiivin 1999/5/EY oleellisten vaatimusten ja sit koskevien direktiivin muiden ehtojen mukainen. Hierbij verklaart CyberGuard Corporation. dat het toestel ITE in overeenstemming is met de essentile eisen en de andere relevante bepalingen van richtlijn 1999/5/EG Bij deze verklaart CyberGuard Corporation. dat deze ITE voldoet aan de essentile eisen en aan de overige relevante bepalingen van Richtlijn 1999/5/EC. Par la prsente CyberGuard Corporation. dclare que l'appareil ITE est conforme aux exigences essentielles et aux autres dispositions pertinentes de la directive 1999/5/CE Par la prsente, [nom du constructeur] dclare que ce [type d'quipement] est conforme aux exigences essentielles et aux autres dispositions de la directive 1999/5/CE qui lui sont applicables Hrmed intygar CyberGuard Corporation. att denna ITE str I verensstmmelse med de vsentliga egenskapskrav och vriga relevanta bestmmelser som framgr av direktiv 1999/5/EG. Undertegnede CyberGuard Corporation. erklrer herved, at flgende udstyr ITE overholder de vsentlige krav og vrige relevante krav i direktiv 1999/5/EF Hiermit erklrt CyberGuard Corporation., dass sich dieser/diese/dieses ITE in bereinstimmung mit den grundlegenden Anforderungen und den anderen relevanten Vorschriften der Richtlinie 1999/5/EG befindet". (BMWi) Hiermit erklrt CyberGuard Corporation. die bereinstimmung des Gertes ITE mit den grundlegenden Anforderungen und den anderen relevanten Festlegungen der Richtlinie 1999/5/EG. (Wien) CyberGuard Corporation. ITE 1999/5/
Con la presente CyberGuard Corporation. dichiara che questo ITE conforme ai requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999/5/CE. Por medio de la presente CyberGuard Corporation. declara que el ITE cumple con los requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva 1999/5/CE CyberGuard Corporation. declara que este ITE est conforme com os requisitos essenciais e outras disposies da Directiva 1999/5/CE. 520055-07-SPC 4 Compliance Information EMC, Safety and R&TTE Directive Compliance The CE mark, if applicable, is affixed to this product to confirm compliance with the following European Community Directives:
compatibility; and o Council Directive 89/336/EEC of 3 May 1989 on the approximation of the laws of Member States relating to electromagnetic o Council Directive 73/23/EEC of 19 February 1973 on the harmonization of the laws of Member States relating to electrical o Council Directive 1999/5/EC of 9 March on radio equipment and telecommunications terminal equipment and the mutual equipment designed for use within certain voltage limits; and recognition of their conformity. FCC Part 15 Regulations This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Increase the separation between the equipment and receiver. Plug the equipment into an outlet on a circuit different from that to which the receiver is connected. o Reorient or relocate the receiving antenna. o o o Consult the dealer or an experienced radio/TV technician for help. This device complies with Part 15 of the FCC rules. Operation of this device is subject to the following conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference that may cause undesired operation. WARNING Changes or modifications to this unit not expressly approved by the party responsible for compliance could void the users authority to operate the equipment. RF Exposure Statement IMPORTANT NOTE: To comply with FCC RF exposure compliance requirements, the antenna used for this transmitter must be installed to provide a separation distance of at least 20cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. Industry Canada This Class B digital apparatus complies with Canadian ICES-003. Cet appariel numrique de la classe B est conforme la norme NMB-003 du Canada. Operation is subject to the following two conditions:
This device may not cause harmful interference, and
This device must accept any interference, including interference that may cause undesired operation of the device. Antenna Statements This device has been designed to operate with an antenna having a maximum gain of 1.46dBi. Antenna having a higher gain is strictly prohibited per regulations of Industry Canada. The required antenna impedance is 50 ohms. To reduce potential radio interference to others, the antenna type and its gain should be so chosen that the equivalent isotropic radiated power (EIRP) is not more than that required for successful communication. RF Exposure Statement The installer of this radio equipment must ensure that the antenna is located or pointed such that it does not emit RF fields in excess of Health Canada limits for the general population; consult safety code 6, obtainable from Health Canadas website www.hc-sc.gc.ca/rpb. 520055-07-SPC 5 FCC Part 68 Regulations require that the following information be provided to the customer:
Product:
Model:
FCC Registration Number:
1. This equipment complies with Part 68 of the FCC rules. On the side or bottom of this equipment is a label that contains, among MultiTech Systems modem module MT5634SMI AU7-USA-25814-M5-E other information, the FCC Registration Number and Ringer Equivalence Number (REN), if applicable, for this equipment. If required, this information must be given to the telephone company. 2. An FCC-compliant telephone cord and modular plug is provided with this equipment. This equipment is designed to be connected to the telephone network or premises wiring using a compatible modular jack that is Part 68-compliant. See installation instructions for details. If your telephone equipment causes harm to the telephone network, the telephone company may discontinue your service temporarily. If possible they will notify you in advance. But if advance notice isnt practical, you will be notified as soon as possible. You will be advised of your right to file a complaint with the FCC. 4. Your telephone company may make changes in its facilities, equipment, operations or procedures that could affect the proper 3. operation of your equipment. If they do, you will be given advance notice to give you an opportunity to maintain an uninterrupted service. If you experience trouble with this equipment, please contact AT&T Global for repair/warranty information. The telephone company may ask you to disconnect this equipment from the network until the problem has been corrected or until you are suer the equipment id not malfunctioning. 5. 6. This unit contains no user-serviceable parts. 7. The FCC recommends that the AC outlet to which equipment requiring AC power is provided with and AC surge arrestor. 8. The REN is ude to determine the quantity of devices which may connected to the telephone line. Excessive RENs on the telephone line may result in the devices not ringing in response to an incomming call. In most, but not all areas, the sum of RENs should not exceed five (5.0). To be certain of the number of devices that may be connected to a line, as determined by the total RENs, contact the local telephone company. 9. The following information may be required when applying to your local telephone company for leased line facilities. Service Type Analog REN 0.3B USOC RJ-11C Canadian Equipment Limitations NOTE: The Industry Canada Certification label identifies certified equipment. This certification means that the equipment meets certain telecommunications network protective, operational and safety requirements. The Department of Commerce does not guarantee the equipment will operate to the users satisfaction. Before installing this equipment, users should ensure that it is permissible to be connected to the facilities of the local telecommunications company. The equipment must also be installed using an acceptable method of connection. In some cases, the companys inside wiring associated with a single line individual service may be extended by means of a certified connector assembly
(telephone extension cord). The customer should be aware that compliance with the above conditions may not prevent degradation of service in some situations. Repairs to certified equipment should be made by an authorized Canadian maintenance facility designated by the supplier. Any repairs or alterations made by the user to this equipment, or equipment malfunctions, may give the telecommunications company cause to request the user to disconnect the equipment. Users should ensure for their own protection that the electrical ground connections of the power utility, telephone lines and internal metallic water pipe system, if present, are connected together. This precaution may be particularly important in rural areas. WARNING Users should not attempt to make such connections themselves, but should contact the appropriate electric inspection authority, or an electrician, as appropriate. The load number (LN) assigned to each terminal device denotes the percentage of the total load to be connected to a telephone loop that is used by the device, to prevent overloading. The termination on a loop may consist of of any combination of devices subject only to the equipment that the total of the LNs of all devices does not exceed 100. The ringer equivalence number (REN) assigned to each terminal adaptor is used to determine the total number of devices that may be connected to each circuit. The sum of the RENs from all devices in the circuit should not exceed a total of 5.0. 520055-07-SPC 6 Declaration of Conformity Low Voltage Directive (73/23/EEC) EMC Directive (89/336/EEC) R & TTE Directive (1999/5/EC) The products herewith comply with all applicable essential requirements of all applicable directives Application of Council Directive Applicable Standards Manufacturer:
EN55022: 1998; A1: 2000, A2: 2003 EN55024: 1998; A1: 2001, A2: 2003 EN61000-3-2: 2000 EN61000-3-3: 1995; A1: 2001 EN60950: 2000 (where applicable) CyberGuard Corporation 350 SW 12th Avenue Deerfield Beach Florida 33442 USA Phone: +1 954 375 3500 Fax: +1 954 375 3501 Information Technology Equipment Type of Equipment:
Equipment Description:
Part #
990126 990071 990135 990064 990065 990107 990108 990136 990183 Description KIT SG300 (was LITE300) KIT SG630 (was PCI630) KIT SG635 (was PCI635) KIT SG530 (was SME530) KIT SG550 (was SME550) KIT SG570 (was SME570) KIT SG575 (was SME575) KIT SG710 KIT SG710+
I, the undersigned, hereby declare that the equipment specified above conforms to the above Directives and Standards. Mr. Rick Stevenson
(NAME OF AUTHORIZED PERSON) General Manager (SnapGear Division)
(TITLE OF AUTHORIZED PERSON) 16 March 2005
(DATE OF ISSUE) 520055-07-SPC 7
1 | USERS MANUAL 2 | Users Manual | 456.46 KiB |
Wireless LAN 802.11g User's Manual Version 1.0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, whether electronic, mechanical, photocopying, recording, or otherwise without the prior writing of the publisher. April 2004 Users Guide 1 Contents 1. Introduction _________________________________________________________________ 3 2. Wireless LAN Basics _________________________________________________________ 4 3. Installation for Windows platform ______________________________________________ 5 3.1. Installation Overview ____________________________________________________________6 3.2. Install Procedure for Windows XP _______________________________________________7 3.3. Install Procedure for Windows 98/ME/2000 ______________________________________9 4. Configuration Utility _________________________________________________________ 17 4.1 Link Information _________________________________________________ !
Users Guide 2 1. Introduction Thank you for purchasing your Wireless LAN 802.11g Adapter. This Quick Installation Guide will assist you with the installation procedure. The package you have received should contain the following items:
Wireless LAN 802.11g Adapter Quick Installation Guide CD containing Wireless LAN Management utility, drivers and Multi-lingual Users Guide Note: if anything is missing, please contact your vendor The CD contains drivers and Configuration Utility program that is used for managing the Wireless LAN Adapters and establishing the wireless connection with your Local Area Network. Note: This manual is valid for all Wireless LAN 11g Series products, such as PC Card, USB, mini-USB, PCI adapter, mini-PCIetc. Users Guide 3 2. Wireless LAN Basics Wireless LAN (Local Area Networks) systems offer a great number of advantages over a traditional, wired system. Wireless LANs (WLANs) are more flexible, easier to setup and manage and often more cost effective than their wired equivalence. Using radio frequency (RF) technology, WLANs transmit and receive data over the air, minimizing the need for wired connections. Thus, WLANs combine data connectivity with user mobility, and, through simplified configuration, enable movable LANs. With wireless LANs, users can access shared information without looking for a place to plug in and network managers can set up or augment networks without installing or moving wires. Wireless LANs offer the following productivity, convenience and cost advantages over traditional wired networks:
Mobility - Wireless LAN systems can provide LAN users with access to real-time information anywhere in their organization. This mobility supports productivity and service opportunities not possible with wired networks. Installation Speed and Simplicity - Installing a wireless LAN system can be fast and easy and can eliminate the need to pull cable through walls and ceilings. Installation Flexibility - Wireless technology allows the network to go where wires cannot go. Reduced Cost-of-Ownership - While the initial investment required for wireless LAN hardware might be higher than the cost of wired LAN hardware, overall installation expenses and life-cycle costs will be significantly lower. Long-term cost benefits are greatest in dynamic environments requiring frequent moves, adds, and changes. Scalability - Wireless LAN systems can be configured in a variety of topologies to meet the needs of specific applications and installations. Configurations are easily changed and range from peer-
to-peer to full infrastructure networks, also allow roaming over a broad area. Users Guide 4 3. Installation for Windows platform The following section will assist you in installing wireless LAN Adapter successfully. You will first install software (Utility) and then insert / attach the Wireless LAN Adapter to your system, and finally set the network properties to accommodate resource sharing and select the type of wireless network that you wish to install. The Wireless LAN card can easily be installed and used, without bothering to connect cables for keeping your computer to use network resources. Users Guide 5 3.1. Installation Overview Here are some steps you will perform in establishing your wireless network connection:
Install the Access Point at first. AP is needed in case of Infrastructure network mode. Install the software using the Install CD. Install the Wireless LAN Card (WIRELESS LAN 802.11g Adapter). Install the network protocol(s) required to communicate on your network. Most likely you will need the TCP/IP protocol. Users Guide 6 3.2. Install Procedure for Windows XP Important Notice In order to make right use of WPA, please ensure that your current Wireless Adapters driver, and Wireless Utility can support it, WPA needs 802.1x authentication (when RADIUS mode is chosen), though the Operating System must also support 802.1x protocol. For Microsofts OS family, only Windows XP has incorporated this by default. The rest of the OS must installed 3er partys client software such as Funk ODySSey. Note: Do not insert the WLAN Adapter until you are asked to do so, failure of which may result in unsuccessful installation of your WLAN device. 1. Insert the given Installation CD in the CD-ROM and then click on the Install Config Utilities. Follow the instruction to finish the installation. 2. Insert your WLAN card into PCMCIA/PCI slot or USB connector of your system, and then system will detect new hardware. Select Install the software automatically (Recommended) , and then click Next to continue. Users Guide 7 Once your system detected the driver, Microsoft will show a warning message as below. Click Continue Anyway for next step. After copy the file to your system, then the setup is finish. Users Guide 8 3.3. Install Procedure for Windows 98/ME/2000 Note: Do not insert the WLAN Adapter until you are asked to do so, failure of which may result in unsuccessful installation of your WLAN device. Please follow the following steps one by one in order to install the WLAN Adapter successfully. 1. Power on your computer and allow Windows 98/ME/2000 to load fully. 2. Be sure that the Wireless LAN 802.11g Adapter is not inserted yet. 3. Insert the given Installation CD in the CD-ROM and then click on the Install Config Utilities. At the Welcome window, click Next. Users Guide 9 4. Accept the license agreement. Accept the license agreement. Click Yes to accept. Click Yes to finish the setup. Users Guide 10 5. Insert / attach Wireless LAN 802.11g Adapter to your system Windows will recognize the WLAN adapter and auto detect the driver, if the system did not find the driver automatically, please install the driver manually. Click Yes to finish the installation. Users Guide 11 6. Click the right button of mouse on My Computer """" Properties """" Hardware""""Device Manager. Check whether it has WLAN adapter in one of the sockets or not. If you find Wireless Network PC Card in one of the sockets, it means the card is detected properly. 7. Click right button of mouse on the Network Neighborhood. Users Guide 12 8. Select Properties from the pop up menu. For Windows 98 the networks properties box appears.
* For Windows ME and 2000, please select the Local Area Connections properties to check the following menu. 9. Click on the General tab and then click on the Install button. Select Network Component Type box appears. Click on the Protocol then click the Add button. Users Guide 13 10. Select Network Protocols box appears. From the list of network protocols list, select NetBEUI, then click OK. 11. The NetBEUI protocol is now installed. After clicking on OK return back to Network Component Type box. 12. Repeat the step 9 and 10 to add IPX/SPX protocol. Users Guide 14 13. Click on the TCP/IP option for setting the IP address for your computer. You can select either Obtain an IP address automatically or Use the following IP address setting. If your choice is the second one then enter the IP value, Subnet masking, DNS, Domain/ Workgroup name, and Gateway Address values. After setting these parameters appropriately, click OK to return to Network Component Type and you can select the File and Printer Sharing options as well for sharing your computers resources. Click on OK. 14. Screen message do want to restart your Computer will pop up. Select Yes. It will shut down your computer and restart. Important: In order to make sure that the changed values could take effect, please Restart your computer before continue. Users Guide 15 Uninstall Procedure Step 1:
If you want to uninstall the WLAN adapter, just simply click Start Menu " Program " Wireless Network """" Uninstall, it shall uninstall all related programs. Step 2:
Restart your Computer. Users Guide 16 4. Configuration Utility Wireless LAN 802.11g Wireless LAN adapter uses its own management software. All functions controlled by user are provided by this application. Usually this application starts automatically, or click icon from Start Menu to start the Utility application. A new icon -
should appear in your Icon tray. If the icon is in red, it means that Wireless LAN 802.11g NIC configuration is invalid or incomplete. Sometimes icon can be colored in yellow. This may happen when communication is defined poor connection or incorrectly. Figure 1 Icon tray with a new icon Users Guide 17 4. 1 Link Information This field is used to display the current status of connection. When the state shows Connected to Network means normal flow of operation in Infrastructure mode. The PC is connected to access point. Networking is available. A state of Scanning means that the node is searching for available access point and detecting the SSID for an available access point within range. This field will also display an error message for some reason if the driver fails to initialize. Network Type Infrastructure Mode - The driver will scan all available channels continuously until it finds one or more Access Points that match its SSID. At that point it will try and authenticate and associate with the Access Point. Peer to Peer Mode - The driver will scan for 5 seconds looking for an existing Ad Hoc network using the same SSID.
- Current Channel and Transmit Rate Shows the channel of the radio and transmit rate being currently used for an active connection. This value has no meaning when the radio is Scanning
- Link Quality The Link Quality bar graph is only active when the node is in Infrastructure Mode. The bar graph displays the quality of the link between the node and Access Point.
- Signal Strength The Signal Strength bar graph is only active when the node is in Infrastructure Mode. The bar graph displays normalized signal strength as reported by the radio, averaged over all frames over 100 bytes long that are received from the Access Point. Users Guide 18 Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:
- Reorient or relocate the receiving antenna.
- Increase the separation between the equipment and receiver.
- Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
- Consult the dealer or an experienced radio/TV technician for help. FCC Caution: To assure continued compliance, any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. Statement Needed to be Shown on End Product Since this module is installed inside the end product, the end product should be affixed a label on visible area showing that this product contain a RF module, and also its FCC ID. IMPORTANT NOTE:
FCC Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. The OEM integrator has to be aware not to provide information to the end user regarding how to install or remove this RF module in the users manual of the end product which integrate this module. This device is intended only for OEM integrators under the following conditions:
1) The antenna must be installed such that 20 cm is maintained between the antenna and users, and 2) The transmitter module may not be co-located with any other transmitter or antenna. As long as the 2 conditions above are met, further transmitter testing will not be required. However, the OEM integrator is still responsible for testing their end-product for any additional compliance requirements required with this module installed (for example, digital device emissions, PC peripheral requirements, etc.). IMPORTANT NOTE: In the event that these conditions can not be met (for example certain laptop configurations or co-location with another transmitter), then the FCC authorization is no longer considered valid and the FCC ID can not be used on the final product. In these circumstances, the OEM integrator will be responsible for re-evaluating the end product (including the transmitter) and Obtaining a separate FCC authorization. End Product Labelling This transmitter module is authorized only for use in devices where the antenna may be installed such that 20 cm may be maintained between the antenna and users (for example access points, routers, wireless ASDL modems, Notebook and similar equipment). The final end product must be labeled in a visible area with the following: Contains TX FCC ID: MXF-MI930401G . Manual Information That Must be Included The users manual for end users must include the following information in a prominent location IMPORTANT NOTE: To comply with FCC RF exposure compliance requirements, the antenna used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter.
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2005-03-17 | 2412 ~ 2462 | DTS - Digital Transmission System | Original Equipment |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 | Effective |
2005-03-17
|
||||
1 | Applicant's complete, legal business name |
Cyberguard Corporation
|
||||
1 | FCC Registration Number (FRN) |
0012641395
|
||||
1 | Physical Address |
350 SW 12th Avenue
|
||||
1 |
Deerfield Beach, Florida 33442
|
|||||
1 |
United States
|
|||||
app s | TCB Information | |||||
1 | TCB Application Email Address |
T******@TIMCOENGR.COM
|
||||
1 | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
app s | FCC ID | |||||
1 | Grantee Code |
SZD
|
||||
1 | Equipment Product Code |
990186
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 | Name |
R****** S****
|
||||
1 | Title |
General Manager - Snapgear
|
||||
1 | Telephone Number |
+61 7********
|
||||
1 | Fax Number |
+61 7********
|
||||
1 |
r******@cyberguard.com
|
|||||
app s | Technical Contact | |||||
n/a | ||||||
app s | Non Technical Contact | |||||
n/a | ||||||
app s | Confidentiality (long or short term) | |||||
1 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 | Equipment Class | DTS - Digital Transmission System | ||||
1 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | Mini PCI WLAN 802.11b/g in SG565 Firewall | ||||
1 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 | Modular Equipment Type | Does not apply | ||||
1 | Purpose / Application is for | Original Equipment | ||||
1 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | No | ||||
1 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 | Grant Comments | Power listed is conducted. The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users and installers must be provided with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance. | ||||
1 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 | Firm Name |
EMC Technologies Pty. Ltd.
|
||||
1 | Name |
M**** E******
|
||||
1 | Telephone Number |
617-3********
|
||||
1 | Fax Number |
617-3********
|
||||
1 |
b******@emctech.com.au
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | 68 | 2412.00000000 | 2462.00000000 | 0.0960000 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC