background image

 

11

The default password and access privilege for each account are as follows. 

Admin: 

The administrator can access all area of the AMG-2000. 

User Name:

 admin 

Password: 

admin 

Manager:

 The manager can access the area under 

User Authentication

 to manage the user account, but no 

permission to change the settings of the profiles of Firewall, Specific Route and Schedule.   

User Name:

 manager 

Password:

 manager 

Operator: 

The operator can only access the area of 

Create On-demand User

 to create and print out the new 

on-demand user accounts.   

User Name:

 operator 

 

Password:

 operator 

 

2. 

After successfully logging into AMG-2000, you can enter the web management interface and see the welcome 

screen. There is a

 Logout

 button on the upper right corner to log out the system when finished. 

 

Summary of Contents for AMG-2000

Page 1: ...AMG 2000 AP Management Gateway User Manual V1 01 1027...

Page 2: ...eps 9 3 2 SOFTWARE CONFIGURATION 10 3 2 1 Quick Configuration 10 3 2 2 User Login Portal Page 18 4 WEB INTERFACE CONFIGURATION 20 4 1 SYSTEM CONFIGURATION 21 4 1 1 Configuration Wizard 21 4 1 2 System...

Page 3: ...TIES 111 4 5 1 Change Password 111 4 5 2 Backup Restore Settings 113 4 5 3 Firmware Upgrade 114 4 5 4 Restart 114 4 6 STATUS 115 4 6 1 System Status 115 4 6 2 Interface Status 117 4 6 3 Current Users...

Page 4: ...arning that requires special attention of readers a highlight box with the eye catching italic font is used as below Warning For security purposes you should immediately change the Administrator s pas...

Page 5: ...ork from a single point y Comprehensive Security Features Integrated user authentication based on industry standards Authorized end to end communication for both wireless and wired networks Standards...

Page 6: ...pecified external databases server The user authentication is processed via the SSL encrypted web interface This interface is compatible to most desktop devices and palm computers The following figure...

Page 7: ...us 2 x WAN 1 x Private 4 x LAN 2 1 2 Technical Specification y Networking Supports Router NAT mode Supports Static IP DHCP PPPoE on WAN interface Configurable LAN ports authentication Supports IP Plug...

Page 8: ...ime frame y AP Management Supports up to 12 manageable IEEE 802 11 compliant APs Centralized remote management via HTTP SNMP interface Automatic discovery of managed APs and list of managed APs Allows...

Page 9: ...unts Detailed per user traffic history based on time and data volume for both local and on demand accounts Traffic history report in an automatic email to administrator y System Administration Multi l...

Page 10: ...to install the TCP IP network protocol 3 1 2 Package Contents The standard package of AMG 2000 includes y AMG 2000 x 1 y CD ROM x 1 y Quick Installation Guide x 1 y Power Adaptor DC 5V x 1 y Cross Ov...

Page 11: ...8 3 1 3 Panel Function Descriptions Front Panel Rear Panel...

Page 12: ...vate Port and the administrator can enter the web management interface to perform configurations via Private Port 4 Connect an Ethernet cable to one of the LAN1 LAN4 Port on the rear panel Connect the...

Page 13: ...complete the quick configuration 1 Use the network cable of the 10 100BaseT to connect a PC to one of the LAN1 LAN4 port and then start a browser such as Microsoft IE or Firefox Next enter the gateway...

Page 14: ...to change the settings of the profiles of Firewall Specific Route and Schedule User Name manager Password manager Operator The operator can only access the area of Create On demand User to create and...

Page 15: ...tem Configuration will appear Then click on Configuration Wizard and click the Run Wizard button to start the wizard 5 Configuration Wizard First of all you will see a welcome screen to briefly introd...

Page 16: ...ated or use the default NTP Server Enter the IP address or domain name of external time server for AMG 2000 time synchronization or use the default DNS Server Enter an IP address of DNS Server Contact...

Page 17: ...ent Set PPPoE Client s Information Enter the Username and Password provided by your ISP Click Next to continue y Step 5 Set Authentication Methods Set the user s information in advance Enter an easily...

Page 18: ...main Name and server port of the POP3 server provided by your ISP and then choose enable SSL or not Click Next to continue RADIUS User RADIUS Enter RADIUS server IP Domain Name authentication port acc...

Page 19: ...ter the information for Server IP Address and enable disable Transparent Login used to login AMG 2000 automatically when login to NT domain This option normally requires extra configuration to work we...

Page 20: ...on the screen Please do not interrupt AMG 2000 until the message has disappeared This indicates that a complete and successful restart process has finished Caution During every step of the wizard if y...

Page 21: ...will appear on the Internet browser Type in user information of a valid user account Assumes local user database is chosen in the configuration wizard key in the username and password created and then...

Page 22: ...screen There is an extra line showing Remaining usage and a Redeem button y Remaining usage Show the remaining time or data volume that the on demand user can used to surf Internet y Redeem When the r...

Page 23: ...terface Status WAN1 Configuration Policy Configuration Manual Configuration Monitor IP List Firmware Upgrade Current Users WAN2 Failover Additional Configuration Template Settings Walled Garden List R...

Page 24: ...ing functions Configuration Wizard System Information WAN1 Configuration WAN2 Failover LAN1 4 Configuration and Private LAN Configuration 4 1 1 Configuration Wizard Please refer to 3 2 2 User Login Po...

Page 25: ...2000 instead of its IP address y Home Page Enter the website of a Web Server to be the homepage When users log in successfully they will be directed to the homepage set Usually the homepage is set to...

Page 26: ...ormation base MIB of the system However for the external system SNMP is a read only function y User Logon SSL Enable to activate https encryption or disable to activate http non encryption login page...

Page 27: ...s used by the system Alternate DNS Server The substitute DNS server is used by the system This is an optional field y Dynamic IP address It is only applicable for the network environment where a DHCP...

Page 28: ...ddress of the PPTP Client manually or select DHCP to get the IP address automatically The fields with red mark are required Please fill in these fields There is a Dial on demand function under PPTP If...

Page 29: ...bled the system will check the three URLs to detect the WAN ports connection status y None The WAN2 Port is disabled You can still enter up to three URLs and check Warning of Internet Disconnection to...

Page 30: ...ible function is enabled when WAN1 connection is recovered the routed traffic will be back to WAN1 y Dynamic IP Address Select this when WAN2 Port can obtain IP address automatically such as a DHCP Se...

Page 31: ...e also can be enabled like as the function for Static IP Address 4 1 5 LAN1 4 Configuration Clients access the network through LAN1 4 ports must log in for authentication first In this section you can...

Page 32: ...Enable DHCP Relay 1 Disable DHCP Server Disable DHCP Server function 2 Enable DHCP Server Choose Enable DHCP Sever function and set the appropriate configuration for the DHCP server The fields with re...

Page 33: ...ant to use the Reserved IP Address List function click on the Reserved IP Address List on the management interface Then the setup of the Reserved IP Address List as shown in the following figure will...

Page 34: ...the requirements IP Address Enter the desired IP address for the private port Subnet Mask Enter the desired subnet mask for the private port y DHCP Server Configuration There are three methods to set...

Page 35: ...nter the IP address of WINS server Lease Time Choose the time to change the DHCP Reserved IP Address List For reserved IP address settings in detail please click the hyperlink of Reserved IP Address I...

Page 36: ...33 3 Enable DHCP Relay If you want to enable this function you must specify other DHCP Server IP address See the following figure...

Page 37: ...d one on demand server that the administrator can apply with different policy Click on the server name to set the related configurations for that particular server After completing and clicking Apply...

Page 38: ...other letters are not allowed Black List There are 5 sets of black lists You can select one of them or choose None Please refer to 4 2 2 Black List Configuration for more information Authentication Me...

Page 39: ...ters all other letters are not allowed Receipt Header There are two fields Receipt Header 1 and Receipt Header 2 for the receipt s header Enter your own receipt header message or use the default Recei...

Page 40: ...Remain Time Volume The total time Volume that the user can use currently Status The status of the account Normal indicates that the account is not in use and not overdue Online indicates that the acco...

Page 41: ...ount after the activation of the account After this duration the account will self expires Price The price charged for this billing plan Create On demand User Click this to enter the Create On demand...

Page 42: ...r all plans available Search Select a time period to get a period report The report tells the total expenses and individual accounting of each plan for all plans available for that period of time y Au...

Page 43: ...cal User List screen and click the individual Username to edit that account Add User Click Add User to enter the Add User interface Fill in the necessary information such as Username Password MAC opti...

Page 44: ...face Click the Browse button to select the text file for the user account upload Then click Submit to complete the upload process The uploading file should be a text file and the format of each line i...

Page 45: ...dicates policy number to use When adding user accounts by uploading a file the existing accounts in the embedded database will not be replaced by new ones Download User Click this to enter the Users L...

Page 46: ...l All This will delete all the users at once Delete This will delete the users individually Edit User If you want to edit the content of individual user account click the username of the desired user...

Page 47: ...ttings Roaming Out This is the Radius Roaming Out function that our company cooperates with III Institute for Information Industry When you select Roaming Out the local user can login from other site...

Page 48: ...e blanks with red asterisks are necessary information These settings will become effective immediately after clicking the Apply button Server IP Enter the IP address domain name given by your ISP Port...

Page 49: ...her configuration The Radius server sets the external authentication for user accounts Enter the related information for the primary server and or the secondary server the secondary server is not requ...

Page 50: ...Enter a line of characters for example meeting room for identifying AMG 2000 itself to the RADIUS server Please use numbers 0 to 9 alphabets a to z or A to Z dash underline _ and dot and all other le...

Page 51: ...ot allowed These settings will become effective immediately after clicking the Apply button y Authentication Method LDAP Choose LDAP in the Authentication Method field the hyperlink beside the pull do...

Page 52: ...e Enter the account attribute of the LDAP server y Authentication Method NT Domain Choose NTDomain in the Authentication Method field the hyperlink beside the pull down menu will become NT Domain Sett...

Page 53: ...most If a user in the black list wants to log into the system the user s access will be denied The administrator can use the pull down menu to select the desired black list y Select Black List There...

Page 54: ...51 If the administrator wants to remove a user from the black list just select the user s Delete check box and then click the Delete button to remove that user from the black list...

Page 55: ...l Request Bandwidth setting for that policy y Policy 1 8 Select Policy Select Policy 1 Policy 8 Firewall Profile Click the hyperlink of Setting for Firewall Profile the Firewall Profiles list will app...

Page 56: ...the rule will be enabled Action There are two options Block and Pass Block is to prevent packets from passing and Pass is to permit packets passing Protocol There are three protocols to select TCP UD...

Page 57: ...he drop down menu or enter an IP address manually into the blank Check the Enable box to enable this function Destination IP Address The destination IP address of the host or the network Destination S...

Page 58: ...55 after clicking the Apply button Total Bandwidth Choose one bandwidth limit for that particular policy...

Page 59: ...56 Individual Maximum Bandwidth Choose a bandwidth for the maximum bandwidth of an individual user...

Page 60: ...57 Individual Request Bandwidth Choose a bandwidth for the minimum bandwidth of an individual user y Global Policy Select Policy Select Global to set the Firewall Profile and Specific Route Profile...

Page 61: ...on the list Check Active to enable that rule Rule Item This is the rule that you have selected Rule Name The rule name can be changed here Enable this Rule After checking this function the rule will...

Page 62: ...d destination subnet masks Source Destination Start End Port Enter the range of source and destination ports Specific Route Profile Click the hyperlink of Setting for Specific Route Profile the Specif...

Page 63: ...and there is a logout button for the logout If enabled When the users try to close the small window there will be a new popup window to confirm the logout in case the users click the logout button by...

Page 64: ...dministrator can use the default login page or get the customized login page by setting the template page uploading the page or downloading from the specific website After finishing the setting you ca...

Page 65: ...62 b Choose Template Page to make a customized login page here Click Select to pick up a color and then fill in all of the blanks You can click Preview to see the result first...

Page 66: ...page by uploading Click the Browse button to select the file for the login page upload Then click Submit to complete the upload process After the upload process is completed the new login page can be...

Page 67: ...ck Delete to delete the file In AMG 2000 the end user first gets a login page when she he opens its web browser right after associating with an access point However in some situations the hotspot owne...

Page 68: ...nk href include style css rel stylesheet type text css title Login title script language javascript1 2 var pham document cookie var disableButton false function getCookie name name append to name stri...

Page 69: ...adImages arguments for i 0 i a length i if a i indexOf 0 d MM_p j new Image d MM_p j src a i function MM_findObj n d v4 01 var p i x if d d document if p n indexOf 0 parent frames length d parent fram...

Page 70: ...if form myusername value alert Please enter username form myusername focus form myusername select disableButton false return false if form mypassword value alert Please enter password form mypassword...

Page 71: ...You disagree with the disclaimer therefore you will NOT be able to log in return false disclaimer style display none login style display return true script head body style font family Arial bgcolor F...

Page 72: ...information for accuracy and verify it with third parties We may disclose personal information to respond to legal requirements enforce our policies respond to claims that an activity violates the ri...

Page 73: ...ation against unauthorized access and disclosure However as you probably know third parties may unlawfully intercept or access transmissions or private communications and other users may abuse or misu...

Page 74: ...onclick javascript if Before_Submit Enter Enter submit onMouseOut MM_swapImgRestore onMouseOver MM_swapImage Image3 images submit0 gif 1 img src images submit gif name Image3 width 124 height 38 borde...

Page 75: ...e to purchase by Credit Card Online a script font td tr table div form form action reminder shtml method post name Reminder input type hidden name myusername value input type hidden name mypassword va...

Page 76: ...ge is successfully loaded an upload success page will show up Preview can be clicked to see the uploaded page If user checks I agree and clicks Next then he she is prompted to fill in the login name a...

Page 77: ...Next a window will pop up to tell user that he she cannot log in d Choose the External Page selection and you can get the login page from the specific website Enter the website address in the External...

Page 78: ...of this page Please not that is needed in your HTML code to make sure the page works correctly 3 Logout Page The users can apply their own logout page here The process is similar to that of Logout Pag...

Page 79: ...default setting of the logout interface click the Use Default Page button 4 Login Success Page The administrator can use the default login success page or get the customized login success page by sett...

Page 80: ...an click Preview to see the result first c Choose Uploaded Page and you can get the login success page by uploading Click the Browse button to select the file for the login success page upload Then cl...

Page 81: ...le and click Delete to delete the file d Choose the External Page selection and you can get the login success page e from the specific website Enter the website address in the External Page Setting fi...

Page 82: ...Template Page to make a customized login success page for on demand here Click Select to pick up a color and then fill in all of the blanks You can click Preview to see the result first c Choose Uplo...

Page 83: ...filename of the images to upload in the Upload Images field on the Upload Images Files page and then click Submit The system will show the used space and the maximum size of the image file of 512K If...

Page 84: ...cess page for on demand can be previewed by clicking Preview button at the bottom of this page 6 Logout Success Page The administrator can use the default logout success page or get the customized log...

Page 85: ...n click Preview to see the result first c Choose Uploaded Page and you can get the logout success page by uploading Click the Browse button to select the file for the logout success page upload Then c...

Page 86: ...cess page click the Use Default Page button to restore it to default After the image file is uploaded the file name will show on the Existing Image Files field Check the file and click Delete to delet...

Page 87: ...gin the users will receive a welcome mail from AMG 2000 The administrator can edit the content of this welcome mail y Enhance User Authentication With this function only the users with their MAC addre...

Page 88: ...anual Configuration Template Settings Firmware Management and AP Upgrade 4 3 1 AP List All of the AP under the management of AMG 2000 will be shown in the list The AP can be edited by clicking the hyp...

Page 89: ...86 Click Apply Template to select one template to apply to the AP...

Page 90: ...ral Settings LAN Interface Setting Wireless Interface Setting and Access Control Setting Click the hyperlink to go on the configuration General Setting Click Setting to enter the General Setting inter...

Page 91: ...APs in the wireless network It is case sensitive and has a maximum length of 32 bytes y SSID Broadcast Select this option to enable the SSID to broadcast in your network When configuring the network...

Page 92: ...conds The entered time means how often the beacon signal transmission between the access point and the wireless network y Preamble Type The length of the CRC Cyclic Redundancy Check block for communic...

Page 93: ...and then input the Key Check 802 1x Authentication to enable this function and enter the related data if necessary y WPA WPA is Wi Fi s encryption method that protects unauthorized network access by...

Page 94: ...n and network access control Select 802 1x or WPA PSK security type and enter the related information below WPA2 only can use AES encryption type y WPA Mixed If you want to use TKIP and AES encryption...

Page 95: ...AMG 2000 The default is Disabled y Status After clicking the hyperlink of Status you can see the basic information of the AP including AP Name AP Type LAN MAC Wireless LAN MAC Up Time Report Time SSID...

Page 96: ...Last Reporting Time LAN Status The table shows the information about IP Address Subnet Mask and Gateway Wireless LAN Status The table shows all of the related wireless information Access Control Stat...

Page 97: ...94 Associated Client Status The table shows the clients connecting to the AP and the related information of the client...

Page 98: ...192 168 2 1 192 168 2 1 ID the default is admin and Password the default is 1234 of the AP Then click the Discover button and the APs match the given settings will show in the list below If the IP ad...

Page 99: ...ress as you set ex 192 168 2 2 Check the Add box to add the AP and it will be listed to the AP list Click Configuring to go on the related configuration For the details please refer to 4 3 1 AP List y...

Page 100: ...For the Auto Discovery Status when you enable this function the system will scan once every 10 minutes or the time you set If any AP is discovered and Auto Add AP enabled it will be assigned an availa...

Page 101: ...nfigure the AP individually There are three templates provided and click Edit to go on configuration Before configure the template you can copy the configuration mode of a AP to the template by select...

Page 102: ...99 After entering the interface you can revise the configuration for demand and change administrator s password About other function settings please refer to 4 3 1 AP List...

Page 103: ...100 4 3 5 Firmware Management In this function you can upload the AP s firmware and also can download the present firmware to the local or delete it...

Page 104: ...101 4 3 6 AP Upgrade Check the APs which need to be upgraded and select the upgrade version of firmware and then click Apply to upgrade firmware...

Page 105: ...network can access the private machine via the external IP similar to DMZ usage in firewall product There are 40 sets of static Internal IP Address and External IP Address available If a host needs a...

Page 106: ...s in the managed network via WAN port IP of AMG 2000 Please enter the External Service Port Local Server IP Address and Local Server Port According to the different services provided the network servi...

Page 107: ...on IP address listed here the connection packet will be converted and redirected to the corresponding destination Please enter the IP Address and Port of Destination and the IP Address and Port of Tra...

Page 108: ...e are some workstations belonging to the managed server that need to access the network without authentication enter the IP addresses of these workstations in this list The Remark blank is not necessa...

Page 109: ...ettings will become effective immediately after clicking Apply Warning Permitting specific MAC addresses to have network access rights without going through standard authentication process at the LAN1...

Page 110: ...tor can understand the some networking devices by this feature On each monitored item with a WEB server running you may add a link for the easy access by selecting a protocol http or https and click t...

Page 111: ...efined in this list Users without the network access right can still have a chance to experience the actual network service free of charge Please enter the website IP Address or Domain Name in the lis...

Page 112: ...e to access the network If there is a matching then the end users will be directed to the system first for authentication After a successful authentication the end users will be redirected back to the...

Page 113: ...immediately after clicking Apply y DDNS Enabling or disabling of this function y Provider Select the DNS provider y Host name The IP address domain name of the WAN port y Username E mail The register...

Page 114: ...AMG 2000 User Name admin Password admin Manager The manager can only access the configuration pages under User Authentication to manage the user accounts but has no permission to change the settings o...

Page 115: ...112 Caution If the administrator s password is lost the administrator s password still can be changed through the text mode management interface on the serial port console printer port...

Page 116: ...system settings Click Backup to create a db database backup file and save it on disk y Restore system settings Click Browse to search for a db database backup file created by AMG 2000 and click Resto...

Page 117: ...ation before upgrading the firmware 2 Please restart the system after upgrading the firmware Do not power on off the system during the upgrade or the restart process It may damage the system and cause...

Page 118: ...stem Status Interface Status Current Users Traffic History and Notification Configuration to provide system status information and online user status 4 6 1 System Status This section provides an overv...

Page 119: ...stands for that the system is currently using the proxy server or not Friendly Logout Enabled disabled stands for the setting of hiding displaying an extra confirmation window when users click the lo...

Page 120: ...le Timer The number of minutes allowed for the users to be inactive User Multiple Login Enabled disabled stands for the current setting to allow disallow multiple logins form the same account Preferre...

Page 121: ...ess The IP address of the LAN1 4 port LAN1 4 Subnet Mask The Subnet Mask of the LAN1 4 port Status Enable disable stands for status of the DHCP server on the LAN1 4 port WINS IP Address The WINS serve...

Page 122: ...Users In this function each online user s information including Username IP MAC Pkts In Bytes In Pkts Out Bytes Out Idle Source AP and Kick Out will be shown Administrator can force out a specific on...

Page 123: ...lly send out the history information to that email address y Traffic History As shown in the following figure each line is a traffic history record consisting of 9 fields Date Type Name IP MAC Pkts In...

Page 124: ...n in the following figure each line is a roaming in traffic history record consisting of 15 fields Date Type Name NSID NASIP NASPort UserMAC UserIP SessionID SessionTime Bytes in Bytes Out Pkts In Pkt...

Page 125: ...il y SMTP The IP address of the sender s SMTP server y Auth Method The system provides four authentication methods Plain Login CRAM MD5 and NTLMv1 or None to use none of the above Depending on which a...

Page 126: ...123 y Syslog Configuration Enter the IPs and Ports of the Syslog server to receive system events including Traffic History and On demand User Log...

Page 127: ...124 4 7 Help On the screen the Help button is on the upper right corner Click Help to the Online Help window and then click the hyperlink of the items to get the information...

Page 128: ...use arrow keys on the keyboard to browse the menu and press the Enter key to make selection or confirm what you enter 3 Once the console port of AMG 2000 is connected properly the console main screen...

Page 129: ...via the browser for the system failed inexplicitly Administrator can choose this utility and set AMG 2000 into safe mode then administrator can management this device with browser again Synchronize c...

Page 130: ...administrator s password again Caution Although it does not require a username and password for the connection via the serial port the same management interface can be accessed via SSH Therefore we r...

Page 131: ...t Connection Setup If the Internet Connection of this client PC has been configured as use local area network already you can skip this setup Windows 9x 2000 1 Choose Start Control Panel Internet Opti...

Page 132: ...ork LAN and click Next 5 DO NOT choose any option in the following LAN window for Internet configuration and just click Next 6 Choose No and click Next 7 Finally click Finish to exit the Internet Conn...

Page 133: ...Choose Start Control Panel Internet Option 3 Choose the Connections label and then click Setup 4 Click Next when Welcome to the New Connection Wizard screen appears 5 Choose Connect to the Internet an...

Page 134: ...up my connection manually and then click Next 7 Choose Connect using a broadband connection that is always on and then click Next 8 Finally click Finish to exit the Connection Wizard Now you have com...

Page 135: ...AMG 2000 LAN port please follow the following steps Check the TCP IP Setup of Window 9x ME 1 Choose Start Control Panel Network 2 Choose Configuration label and select TCP IP AMD PCNET Family Etherne...

Page 136: ...ess and enter the information given by the network administrator in IP Address and Subnet Mask on the IP Address label and then click OK y Choose Gateway label and enter the gateway address of AMG 200...

Page 137: ...to use DHCP or specific IP address please proceed to the following steps 4 1 Using DHCP If want to use DHCP please choose Obtain an IP address automatically and click OK This is also the default sett...

Page 138: ...ck the right button of the mouse on the Local Area Connection icon and select Properties 3 Select General label and choose Internet Protocol TCP IP and then click Properties Now you can choose to use...

Page 139: ...etwork administrator for the information of the AMG 2000 IP address Subnet Mask New gateway and DNS server address y Please choose Use the following IP address and enter the information given from the...

Page 140: ...and please make sure you have enabled the Active directory Service on the Windows Server When the AMG 2000 is set up Windows Server should be also ready by the MIS in your company Then you can add new...

Page 141: ...sword and enter it again for confirmation The password must be six characters or more Depend on the request to check the four selections below Then click the Next The new user ccc is created successfu...

Page 142: ...get the information to fill in the fields of LDAP Server For example Server IP www 2k3lab idv tw Port 389 Base DN ou OU dc 2k3lab dc idv dc tw Account Attribute CN Note Usually the users are created...

Page 143: ...140 could be CN or uid...

Page 144: ...sing some proxy server which provide by Internet Service Providers In Hotspots mobility users usually enable their proxy setting of the browsers such as IE Firefox or the others so we need to set some...

Page 145: ...142 3 Click the Proxy Server Properties from left menu and the homepage of the Proxy Server Properties will appear 4 Add your ISP s proxy Server IP and Port into External Proxy Server Setting...

Page 146: ...143 5 Enable Built in Proxy Server in Internal Proxy Server Setting 6 Click Apply to save the settings...

Page 147: ...sk their users to enable their proxy setting of the browsers such as IE Firefox or others to reduce the internet access loading so we need to set some proxy configuration in the Gateway Caution Some e...

Page 148: ...145 3 Click the Proxy Server Properties from left menu and the homepage of the Proxy Server Properties will appear 4 Add your proxy Server IP and Port into External Proxy Server Setting...

Page 149: ...146 5 Disable Built in Proxy Server in Internal Proxy Server Setting...

Page 150: ...ke sure your proxy server is always available Client setting It is necessary for clients to add default gateway IP address into proxy exception information By the way user login successful page will a...

Page 151: ...hroughput up to 54 Mbps It also operates in the 2 4 GHz frequency band but uses a different radio technology in order to boost overall bandwidth VLAN Defines changes to Ethernet frames that will enabl...

Page 152: ...bles such as the rate of data transmission speed between networked devices network overhead number of users and the type of device used to connect PCs to a network It is similar to a pipeline in that...

Page 153: ...ving a website FTP or e mail server with a dynamic IP address using a fixed domain name Default Gateway A device that forwards Internet traffic from your local area network DHCP A utility that enables...

Page 154: ...bers like 107 22 55 26 Every website has its own specific IP address on the Internet Domain Name The unique name that identifies an Internet site Domain Names always have 2 or more parts separated by...

Page 155: ...bps and Gigabit Ethernet 1000 Mbps are becoming popular Firewall A system that secures a network and prevents access by unauthorized users Firewalls can be software hardware or a combination of both F...

Page 156: ...ng standards for computers and communications Internet appliance A computer that is intended primarily for Internet access is simple to set up and usually does not support installation of third party...

Page 157: ...rnet connections printers files and drives When Wi Fi is used to connect the devices the system is known as a wireless LAN or WLAN LDAP Lightweight Directory Access Protocol A set of protocols for acc...

Page 158: ...cess by automatically generating the WEP encryption keys for the company products POP Post Office Protocol Short for Post Office Protocol a protocol used to retrieve e mail from a mail server Most e m...

Page 159: ...ger companies and organizations to improve network operations and security a proxy server is able to prevent direct communication between two or more networks The proxy server forwards allowable data...

Page 160: ...s in Management Information Bases MIBs and return this data to the SNMP requesters Software Instructions for the computer A series of instructions that performs a particular task is called a program S...

Page 161: ...etwork or Subnet Found in larger networks these smaller networks are used to simplify addressing between numerous computers Subnets connect to the central network through a router hub or gateway Each...

Page 162: ...smit a file over a network URL Uniform Resource Locator The address of a file located on the Internet VoIP Voice transmission using Internet Protocol to create digital packets distributed over the Int...

Page 163: ...eless data WEP is available in 40 bit also called 64 bit or in 108 bit also called 128 bit encryption modes As 108 bit encryption provides a longer algorithm that takes longer to decode it can provide...

Reviews: