WIRELESS INTERNET

WIRELESS INTERNET
:,5(/(66,17(51(7
%52$'%$1'5287(5
0RGHO'1
8VHU¶V0DQXDO
Table of Contents
1. Introduction................................................................................................................................. 3
2. Connecting the Router ................................................................................................................ 4
3. Verifying Connection to the Router............................................................................................ 5
4. Configuring the Router ............................................................................................................... 8
Cable Modem.............................................................................................................................. 9
DSL ........................................................................................................................................... 10
5. Connecting to the Router Wirelessly ........................................................................................ 11
6. Web Configuration Utility ........................................................................................................ 12
6.1 Setup ................................................................................................................................... 12
6.1.1 Basic Setup....................................................................................................................... 12
6.1.2 DDNS............................................................................................................................... 14
6.1.3 MAC Address Clone........................................................................................................ 15
6.1.4 Advanced Routing ........................................................................................................... 16
6.2. Wireless.............................................................................................................................. 17
6.2.1 Basic Wireless Settings.................................................................................................... 17
6.2.2 Wireless Security ............................................................................................................. 18
WEP ...................................................................................................................................... 18
WPA...................................................................................................................................... 19
WPA with RADIUS.............................................................................................................. 20
6.2.3 Wireless MAC Filter........................................................................................................ 21
6.2.4 Advanced Wireless Settings ............................................................................................ 22
6.3 Security ............................................................................................................................... 23
6.3.1 Firewall ............................................................................................................................ 23
6.3.2 VPN Passthrough ......................................................................................................... 24
6.4 Access Restrictions ............................................................................................................. 25
6.4.1 Internet Access Policy...................................................................................................... 25
6.5 Applications & Gaming ...................................................................................................... 28
6.5.1 Port Range Forwarding .................................................................................................... 28
6.5.2 Port Range Triggering...................................................................................................... 29
6.5.3 DMZ................................................................................................................................. 30
6.5.4 QoS .................................................................................................................................. 31
6.6 Administration .................................................................................................................... 32
6.6.1 Management..................................................................................................................... 32
6.6.2 Log ................................................................................................................................... 33
6.6.3 Diagnostics....................................................................................................................... 34
6.6.4 Factory Defaults............................................................................................................... 35
6.6.5 Firmware Upgrade ........................................................................................................... 36
6.6.6 Restart .............................................................................................................................. 37
6.7 Status................................................................................................................................... 38
6.7.1 Router............................................................................................................................... 38
6.7.2 LAN ................................................................................................................................. 39
6.7.3 Wireless Network............................................................................................................. 40
7. Troubleshooting ........................................................................................................................ 41
Technical Support ......................................................................................................................... 42
2
1. Introduction
Congratulations on your purchase of this Super G Wireless Broadband Router. This
product is specifically designed for Small Office and Home Office needs. It provides a
complete SOHO solution for Internet surfing and is easy to configure and operate even
for non-technical users. Instructions for installing and configuring this product can be
found in this manual. Before you install and use this product, please read this manual
carefully for proper operation of this product.
Basic Functions
x
x
x
x
x
NAT Routing
Connects multiple computers to a broadband (cable or DSL) modem to surf the
Internet.
Auto-Sensing Ethernet Switch
Equipped with a 4-port auto-sensing Ethernet switch.
Firewall
All unwanted packets from outside intruders are blocked to protect your Intranet.
DHCP Server Supported
All of the networked computers can retrieve TCP/IP settings automatically from
this product.
Web-Based Configuration
Configurable through any networked computer’s web browser using Netscape or
Internet Explorer.
Security Functions
x
x
VPN Pass-Through
Support VPN pass-through.
SPI Mode Supported
When SPI Mode is enabled, the router will check every incoming packet to
determine if the packet is valid.
Advanced Functions
x
x
System Time Supported
o Allows you to synchronize the system time with a network time server.
UPNP (Universal Plug-and-Play) Supported
3
&RQQHFWLQJWKH5RXWHU
1RWH3ULRUWRFRQQHFWLQJWKHURXWHUEHVXUHWRSRZHURII\RXUFRPSXWHU'6/&DEOH
PRGHPDQGWKHURXWHU<RXVKRXOGVHWXSWKHURXWHUZLWKDZLUHGFRQQHFWLRQILUVWEHIRUH
DWWHPSWLQJWRVHWXSDQ\ZLUHOHVVFRQQHFWLRQ
6WHS&RQQHFWRQHHQGRIDQHWZRUNFDEOHWRWKH,QWHUQHWSRUWRIWKHURXWHUDQG
FRQQHFWWKHRWKHUHQGRIWKHFDEOHWRWKH'6/&DEOHPRGHP
6WHS:LWKDQRWKHUQHWZRUNFDEOHFRQQHFWRQHHQGRIWKHFDEOHWR\RXUFRPSXWHU¶V
QHWZRUNFDUGDQGFRQQHFWWKHRWKHUHQGWRRQHRIWKH/$1SRUWVRIWKHURXWHU
6WHS3RZHURQWKH'6/&DEOHPRGHPDQGZDLWIRUWKHOLJKWVRQWKHPRGHPWRVHWWOH
GRZQ
6WHS3RZHURQWKHURXWHUE\FRQQHFWLQJRQHHQGRIWKHVXSSOLHGSRZHUDGDSWHUWRWKH
SRZHUMDFNRIWKHURXWHUDQGFRQQHFWLQJWKHRWKHUHQGWRDQHOHFWULFDORXWOHW
6WHS3RZHURQ\RXUFRPSXWHU
6WHS0DNHVXUHWKH,QWHUQHW :LUHOHVVDQGWKH/$1 SRUWVWKDWWKHFRPSXWHULV
FRQQHFWHGWRDUHOLW,IQRWWU\WKHDERYHVWHSVDJDLQ
3. Verifying Connection to the Router
Step 1 Go to Start, Run, type command (for Windows 95/98/ME) or cmd (for Windows
2000/XP) and click OK. You will see the command prompt as below.
Step 2 Type ping 192.168.1.1 and press Enter. You should get four reply responses
back.
Step 3 If you get Request timed out, or Destination host unreachable, double-check
the network cable connection between the computer and the router and try Step 2 again.
If you still encounter problem, go to the next step; otherwise proceed to Section 3,
Configure the Router.
Step 4 For Windows 2000/XP, type ipconfig/release and press Enter.
5
Step 5 Type ipconfig/renew and press Enter. You should get an IP address of
192.168.1.x (where x is a number between 2 - 254). Proceed to Section 3, Configure
the Router. If you don’t get an IP address, reset the router by holding in the reset
button at the back of the router for 10 seconds while it is ON and try ipconfig/renew
again.
Step 6 For Windows 95/98/ME go to Start, Run, type winipcfg and click OK.
Step 7 Select your network card from the drop-down menu and click Release.
6
Step 8 After your IP address is released, click Renew. You should get an IP address of
192.168.1.x (where x is a number between 2 - 254). If you don’t get an IP address,
reset the router by holding in the reset button at the back of the router for 10 seconds
while it is ON and try Renew again.
7
4. Configuring the Router
Step 1 Open the web browser and type 192.168.1.1 in the URL Address field and press
Enter.
Step 2 Enter admin for both the username and password fields and click OK.
8
&DEOH0RGHP
)RUPRVWFDEOHPRGHPXVHUV\RXVKRXOGEHDEOHWRFRQQHFWWRWKH,QWHUQHWZLWKRXWDQ\
FRQILJXUDWLRQ,I\RXU,63KDVSURYLGHG\RXZLWKDKRVWQDPHHQWHULWLQWKHRSWLRQDO
+RVW1DPHILHOG&OLFN$SSO\DQG 2. WRVDYHWKHVHWWLQJ
,I\RXU,63UHTXLUHVDUHJLVWHUHG0$&$GGUHVVFOLFNRQWKH0$&$GGUHVV&ORQHWDE
VHOHFW (QDEOHGDQGFOLFNRQWKH&ORQH0\3&¶V0$&EXWWRQ&OLFN$SSO\DQG 2. WR
VDYHWKHVHWWLQJ
,I\RXKDYHWURXEOHFRQQHFWLQJWRWKH,QWHUQHWSOHDVHUHIHUWRWKH7URXEOHVKRRWLQJ
VHFWLRQDWWKHHQGRIWKLVJXLGH
'6/
)RU'6/XVHUVIROORZWKHVWHSVEHORZWRFRQILJXUHWKHURXWHU
6WHS6HOHFW333R( IURPWKHGURSGRZQPHQX
6WHS(QWHU\RXUXVHUQDPHDQGSDVVZRUGSURYLGHGE\\RXU,63
1RWH'HSHQGLQJRQWKH,63\RXPD\QHHGWRLQFOXGHWKHGRPDLQQDPHZLWK\RXU
XVHUQDPH
([DPSOH XVHUQDPH#GHDROFRP
6WHS&OLFN$SSO\DQG 2. WRVDYHWKHVHWWLQJ
,I\RXKDYHWURXEOHFRQQHFWLQJWRWKH,QWHUQHWSOHDVHUHIHUWRWKH7URXEOHVKRRWLQJ
VHFWLRQDWWKHHQGRIWKLVPDQXDO
&RQQHFWLQJWRWKH5RXWHU:LUHOHVVO\
%HORZDUHWKHGHIDXOWZLUHOHVVVHWWLQJVRIWKHURXWHU<RXPXVWFRQILJXUH\RXUZLUHOHVV
QHWZRUNFDUGWRWKHVDPHVHWWLQJVLQRUGHUWRHVWDEOLVKDZLUHOHVVFRQQHFWLRQWRWKH
URXWHU3OHDVHUHIHUWR\RXUZLUHOHVVQHWZRUNFDUG¶VPDQXDORQKRZWRFRQILJXUHWKHVH
VHWWLQJV
66,' GHIDXOW
2SHUDWLQJ0RGH,QIUDVWUXFWXUH
$XWKHQWLFDWLRQ2SHQ6\VWHP
&KDQQHO
:(3 GLVDEOHG
,I\RXZDQWWRFKDQJHWKHURXWHU¶VZLUHOHVVVHWWLQJVORJLQWRWKHURXWHUDQGVHOHFWWKH
:LUHOHVV WDE%HVXUHWRFOLFN$SSO\DQG 2. WRVDYHWKHVHWWLQJ
:HE&RQILJXUDWLRQ8WLOLW\
7KLVURXWHUKDVDEXLOWLQZHEFRQILJXUDWLRQXWLOLW\WKDW\RXFDQXVHWRFRQILJXUHWKH
URXWHU¶VVHWWLQJV6LPSO\ORJLQWRWKHURXWHUXVLQJ\RXUFRPSXWHU¶VZHEEURZVHU
6HWXS
%DVLF6HWXS
7KLVLVWKHGHIDXOWVFUHHQZKHQ\RXORJLQWRWKHURXWHU¶VZHEFRQILJXUDWLRQXWLOLW\<RX
FDQVHWXS\RXU,QWHUQHWFRQQHFWLRQKHUHDVZHOODVFRQILJXULQJWKH'+&3VHWWLQJVDQG
VHOHFWLQJ\RXU7LPH=RQH
5HPHPEHUWRFOLFN$SSO\DQG2.WRVDYH\RXUFKDQJHV
Assigning Static IP Address
If you want to assign a static IP Address to one of the computers in your network, click
on the Assign Static DHCP button.
Step 1 Enter the Static IP Address in the Assign this IP field.
Step 2 Enter the MAC address of the corresponding computer in the To this MAC field.
Step 3 Check the Enabled box.
Step 4 Click Save Settings.
13
''16
'\QDPLF'16''16DOORZVDQ\XVHUZKRZLVKHVWRDFFHVV\RXUVHUYHUWRUHDFKLWE\
DUHJLVWHUHG'16QDPHLQVWHDGRIDQ,3DGGUHVV%HIRUH\RXHQDEOH''16\RXQHHG
WRUHJLVWHUDQDFFRXQWZLWKRQHRIWKH''16SURYLGHUVOLVWHGLQWKHGURSGRZQPHQX
7R(QDEOH''16VHOHFWWKH''16SURYLGHU\RXKDYHUHJLVWHUHGZLWKDQGHQWHUWKH
UHTXLUHGILHOGV&OLFN$SSO\DQG2.WRVDYHWKHVHWWLQJ
0$&$GGUHVV&ORQH
6RPH,63VUHTXLUHDUHJLVWHUHG0$&DGGUHVVWRDFFHVVWKH,QWHUQHW<RXFDQXVHWKH
IROORZLQJVWHSVWRFORQH\RXU3&¶VUHJLVWHUHG0$&DGGUHVVWRDFFHVVWKH,QWHUQHW
6WHS6HOHFW(QDEOHGIURPWKHGURSGRZQPHQX
6WHS&OLFNWKH&ORQH0\3&¶V0$&EXWWRQ
6WHS&OLFN$SSO\DQG2.WRVDYHWKHVHWWLQJ
$GYDQFHG5RXWLQJ
<RXFDQFRQILJXUH\RXURZQVWDWLFURXWLQJWDEOHXVLQJWKH$GYDQFHG5RXWLQJIXQFWLRQ
7RVHHWKHFXUUHQWURXWLQJWDEOHFOLFNRQ6KRZ5RXWLQJ7DEOHEXWWRQ
%HVXUHWRFOLFN$SSO\DQG2.WRVDYHHDFKHQWU\
:LUHOHVV
%DVLF:LUHOHVV6HWWLQJV
<RXFDQFRQILJXUHWKHURXWHU¶VEDVLFZLUHOHVVVHWWLQJVRQWKLVVFUHHQ
0RGH&KRRVHIURP:LUHOHVV*RQO\6XSHU*0L[HG:LUHOHVV%RQO\RU'LVDEOHGWR
GLVDEOHWKH:LUHOHVVIXQFWLRQ
1HWZRUN1DPH66,'<RXFDQFKDQJHWKHURXWHU¶V66,'LQWKLVILHOG2QFH\RXKDYH
FKDQJHGWKH66,'\RXUQHWZRUNFOLHQWVQHHGWRUHFRQQHFWWKHPVHOYHVXVLQJWKHQHZ
66,'
&KDQQHO6HOHFWWKHGHVLUHGFKDQQHO$OOWKHQHWZRUNFOLHQWVQHHGWREHXVLQJWKHVDPH
FKDQQHO
66,'%URDGFDVW&KRRVHWRHQDEOHRUGLVDEOHWKHEURDGFDVWLQJRI\RXU66,'
:LUHOHVV6HFXULW\
<RXFDQFRQILJXUHZLUHOHVVVHFXULW\VXFKDV:(3RU:3$HQFU\SWLRQRQWKLVVFUHHQ
1RWH,WLVUHFRPPHQGHGWKDW\RXXVH:3$HQFU\SWLRQRYHU:(3LI\RXUZLUHOHVVFOLHQWV
VXSSRUW:3$$OORIWKHZLUHOHVVFOLHQWVPXVWXVHWKHVDPHVHFXULW\VHWWLQJVLQRUGHUWR
FRQQHFWWRWKHURXWHU
:(3
7RHQDEOH:(3VHOHFW:(3IURPWKH6HFXULW\0RGH
(QFU\SWLRQ&KRRVHIURPELWVRUELWV
3DVVSKUDVH<RXFDQHQWHUDSDVVSKUDVHDQGFOLFNRQWKH*HQHUDWHEXWWRQDQGWKH
URXWHUZLOODXWRPDWLFDOO\JHQHUDWHIRXU:(3NH\VIRU\RX
:(3.H\±0DQXDOO\DVVLJQDSDVVSKUDVHIRUHDFKNH\,I\RXVHOHFWHGELWV
HQFU\SWLRQHQWHU+(;FKDUDFWHUV)IRUHDFKNH\,I\RXVHOHFWHGELWV
HQFU\SWLRQHQWHU+(;FKDUDFWHUV)IRUHDFKNH\
7;.H\6HOHFWDNH\WREHWKHDFWLYHNH\
&OLFN $SSO\DQG2.WRVDYHWKHVHWWLQJ
:3$
7RHQDEOH:3$VHOHFW:3$36.RU:3$36. IURPWKH6HFXULW\0RGH
(QFU\SWLRQ0HWKRGV6HOHFWHLWKHU7.,3RU$(6DVWKHHQFU\SWLRQPHWKRG
3DVVSKUDVH(QWHUDSDVVSKUDVHEHWZHHQWRFKDUDFWHUVORQJ
.H\5HQHZDO(QWHUWKHGHVLUHGNH\UHQHZDOWLPHLQVHFRQGV
&OLFN $SSO\DQG2.WRVDYHWKHVHWWLQJ
:3$ZLWK5$',86
,I\RXDUHXVLQJD5$',86VHUYHULQ\RXUQHWZRUNIRUDXWKHQWLFDWLRQ\RXPD\FKRRVH
:3$ RU :3$ IURPWKH6HFXULW\0RGH
(QFU\SWLRQ0HWKRGV6HOHFWHLWKHU7.,3RU$(6DVWKHHQFU\SWLRQPHWKRG
5$',866HUYHU(QWHUWKH,3$GGUHVVRI\RXU5$',86VHUYHU
5$',863RUW(QWHUWKHSRUWQXPEHURI\RXU5$',86VHUYHU
6KDUHG.H\(QWHUWKHVKDUHGNH\
.H\5HQHZDO(QWHUWKHGHVLUHGNH\UHQHZDOWLPHLQVHFRQGV
&OLFN $SSO\DQG2.WRVDYHWKHVHWWLQJ
:LUHOHVV0$&)LOWHU
<RXFDQUHVWULFWFHUWDLQZLUHOHVVFOLHQWVIURPDFFHVVLQJWKHURXWHUE\VSHFLI\LQJWKHLU
0$&DGGUHVVDQGHQDEOLQJDFFHVVUHVWULFWLRQ
6HOHFW (QDEOHGIURPWKHGURSGRZQPHQXDQGFKRRVHZKHWKHUWKHVSHFLILHGZLUHOHVV
FOLHQWVZLOOEHSUHYHQWHGRUSHUPLWWHGWRDFFHVVWKHZLUHOHVVQHWZRUN(QWHUWKHLU0$&
DGGUHVVLQWKHILHOGVEHORZDQGFOLFN$SSO\DQG2.WRVDYHWKHVHWWLQJ
$GYDQFHG:LUHOHVV6HWWLQJV
<RXFDQFRQILJXUHYDULRXVDGYDQFHGZLUHOHVVVHWWLQJVRQWKLVVFUHHQ
&OLFN $SSO\DQG2.WRVDYHWKHVHWWLQJ
6HFXULW\
)LUHZDOO
63,)LUHZDOO3URWHFWLRQ6HOHFWWRHQDEOHRUGLVDEOH6WDWHIXO3DFNHW,QVSHFWLRQ
%ORFN$QRQ\PRXV,QWHUQHW5HTXHVWV(QDEOHRU'LVDEOH
:HE)LOWHUV<RXFDQVHOHFWWRILOWHU3UR[\-DYD$FWLYH;DQGRU&RRNLHV
&OLFN $SSO\DQG2.WRVDYHWKHVHWWLQJ
9313DVVWKURXJK
<RXFDQVHOHFWWRHQDEOHRUGLVDEOHWKHSDVVWKURXJKRI,36HF /73DQGRU3373
&OLFN $SSO\DQG2.WRVDYHWKHVHWWLQJ
$FFHVV5HVWULFWLRQV
,QWHUQHW$FFHVV3ROLF\
<RXFDQVHWXSSROLFLHVWKDWGHQ\RUDOORZVSHFLILFFOLHQWVWRDFFHVVWKH,QWHUQHW
(QWHU3ROLF\1DPH(QWHUDQDPHIRUWKHSROLF\
6WDWXV&KRRVHWRHQDEOHRUGLVDEOHWKHVHOHFWHGSROLF\
PCs: Click on the Edit List button to specify the network clients. Policy only applies to
the PCs that are in the list.
You can specify each client by its MAC Address or IP Address. You can also specify a
group of clients by entering their IP Address Range. Once you have specified all the
clients, click Save Settings.
Access Restrictions: Select to Deny or Allow the specified clients to access the
Internet by Day and Time.
26
Blocked Application Port
Select which application port to block, if any, when the specified PCs have Internet
access.
For your convenience, 10 preset applications and their ports are listed. If you have a
custom application, select Custom and manually enter its port number.
Website Blocking
You can block the specified clients from accessing certain websites by URL or Keyword.
Enter the URL or the Keyword you wish to block.
Click Apply and OK to save the setting.
To view all the policies, click the Summary button.
27
$SSOLFDWLRQV*DPLQJ
3RUW5DQJH)RUZDUGLQJ
,I\RXZDQWWRKRVWIWSVHUYHURURQOLQHJDPLQJ\RXPXVWRSHQXSSRUWVRQWKHURXWHU
7KLVSDJHDOORZV\RXWRVHWXSSRUWIRUZDUGLQJIRUWKHVSHFLILHGDSSOLFDWLRQV
%HIRUHXVLQJIRUZDUGLQJ\RXVKRXOGDVVLJQVWDWLF,3DGGUHVVHVWRWKHGHVLJQDWHG3&V
&OLFN $SSO\DQG2.WRVDYHWKHVHWWLQJ
3RUW5DQJH7ULJJHULQJ
3RUWWULJJHULQJDOORZVWKHURXWHUWRNHHSWUDFNRIRXWJRLQJGDWDIRUVSHFLILFSRUWQXPEHUV
7KHURXWHUUHPHPEHUVZKLFKFRPSXWHUVHQGVRXWZKDWGDWDVRZKHQWKHUHTXHVWHG
GDWDUHWXUQVWKURXJKWKHURXWHUWKHGDWDLVVHQWEDFNWRWKHSURSHUFRPSXWHUE\ZD\RI
,3DGGUHVVDQGSRUWPDSSLQJUXOHV
&OLFN $SSO\DQG2.WRVDYHWKHVHWWLQJ
'0=
'0='H0LOLWDUL]HG=RQH+RVWLVDKRVWZLWKRXWWKHSURWHFWLRQRIWKHURXWHU¶VILUHZDOO,W
DOORZVDFRPSXWHUWREHH[SRVHGWRXQUHVWULFWHGWZRZD\FRPPXQLFDWLRQZLWKWKH
,QWHUQHW<RXVKRXOGRQO\XVHWKLVIHDWXUHZKHQWKH3RUW)RUZDUGLQJIXQFWLRQIDLOVWR
PDNHDQDSSOLFDWLRQZRUN
:DUQLQJ6HWWLQJ\RXUFRPSXWHUDVD'0=KRVWH[SRVHVLWWRYDULRXVVHFXULW\
YXOQHUDELOLWLHV7KLVIHDWXUHVKRXOGEHXVHGRQO\ZKHQQHHGHG
'0=6HOHFWWRHQDEOHRUGLVDEOH'0=
6RXUFH,3$GGUHVV6HOHFWDQ\VRXUFH,3DGGUHVVRUVSHFLI\DVRXUFH,3DGGUHVV
+RVW,3$GGUHVV6SHFLI\WKHKRVW,3DGGUHVV
1RWH$Q\'0=KRVWVKRXOGKDYHDQHZVWDWLF,3DGGUHVVDVVLJQHGWRLWEHFDXVHLWV,3
DGGUHVVPD\FKDQJHZKHQXVLQJWKH'+&3IXQFWLRQ
&OLFN $SSO\DQG2.WRVDYHWKHVHWWLQJ
4R6
4R64XDOLW\RI6HUYLFHPDQDJHVLQIRUPDWLRQDVLWLVWUDQVPLWWHGDQGUHFHLYHG,W
HQVXUHVEHWWHUVHUYLFHWRWKRVHDSSOLFDWLRQZLWKDKLJKHUSULRULW\
&OLFN $SSO\DQG2.WRVDYHWKHVHWWLQJ
$GPLQLVWUDWLRQ
0DQDJHPHQW
7KH0DQDJHPHQWVFUHHQDOORZV\RXWRFKDQJHWKHURXWHU¶VORJLQSDVVZRUGDVZHOODV
RWKHUDGPLQLVWUDWLYHVHWWLQJV
5RXWHU3DVVZRUG6HWWKHURXWHU¶VORJLQSDVVZRUG
5HPRWH5RXWHU$FFHVV6HOHFWWRHQDEOHRUGLVDEOHUHPRWHPDQDJHPHQWXSJUDGHRI
WKHURXWHU<RXFDQDOORZUHPRWHPDQDJHPHQWIURPDQ\,3$GGUHVVRUDVSHFLILHG,3
$GGUHVVDVZHOODVWKHSRUWQXPEHU
83Q38QLYHUVDO3OXJDQG3OD\83Q3DOORZV:LQGRZV0HDQG;3WRDXWRPDWLFDOO\
FRQILJXUHWKHURXWHUIRUYDULRXV,QWHUQHWDSSOLFDWLRQVVXFKDVJDPLQJDQG
YLGHRFRQIHUHQFLQJ
%DFNXSDQG5HVWRUH<RXFDQFKRRVHWREDFNXSWKHURXWHU¶VVHWWLQJVVRWKDW\RXGRQ¶W
KDYHWRPDQXDOO\FRQILJXUHWKHVHWWLQJVDJDLQLI\RXUHVHWWKHURXWHUWRIDFWRU\GHIDXOW
/RJ
<RXFDQFKRRVHWRHQDEOHRUGLVDEOHORJJLQJRI\RXUQHWZRUNDFWLYLW\RQWKLVVFUHHQ
&OLFN $SSO\DQG2.WRVDYHWKHVHWWLQJ
'LDJQRVWLFV
7KH'LDJQRVWLFVVFUHHQDOORZV\RXWRSHUIRUP3LQJDQG7UDFHURXWHWHVWV
3LQJ7HVW(QWHUWKH,3RU85/$GGUHVV\RXZLVKWRSLQJDQGFOLFN6WDUWWR3LQJ
7UDFHURXWH(QWHUWKH,3RU85/$GGUHVV\RXZLVKWRWUDFHDQGFOLFN6WDUWWR7UDFHU
)DFWRU\'HIDXOWV
7KH)DFWRU\'HIDXOWVVFUHHQDOORZV\RXWRVHWDOOWKHURXWHU¶VVHWWLQJVWRWKHIDFWRU\
GHIDXOW
&OLFNRQWKH5HVWRUH)DFWRU\'HIDXOWVEXWWRQWRUHVWRUHDOOWKHVHWWLQJVWRGHIDXOW
)LUPZDUH8SJUDGH
7KH)LUPZDUH8SJUDGHVFUHHQDOORZV\RXWRXSJUDGHWKHURXWHU¶VILUPZDUH
<RXPXVWGRZQORDGDQGXQ]LSWKHQHZILUPZDUHILUVWIURPZZZGLJLWXVLQIR
&OLFNRQ%URZVHWREURZVHWRWKHQHZILUPZDUHDQGFOLFN6WDUWWR8SJUDGH
5HVWDUW
7KH5HVWDUWSDJHDOORZV\RXWRUHVWDUWWKHURXWHUZLWKRXWUHVWRULQJWKHVHWWLQJVWRIDFWRU\
GHIDXOW
&OLFNRQWKH5HVWDUWEXWWRQWRUHVWDUWWKHURXWHU
6WDWXV
5RXWHU
7KH5RXWHUVFUHHQGLVSOD\VYDULRXVVWDWXVRIWKHURXWHULQFOXGLQJWKHILUPZDUHYHUVLRQ
&OLFNRQWKH5HIUHVKEXWWRQWRUHORDGWKHVFUHHQ
/$1
7KH/$1VFUHHQGLVSOD\VYDULRXVVWDWXVDERXW\RXU/RFDO$UHD1HWZRUN
&OLFNRQWKH'+&3&OLHQW7DEOHWRGLVSOD\DOLVWRIDOOWKH'+&3FOLHQWVLQ\RXUQHWZRUN
:LUHOHVV1HWZRUN
7KH:LUHOHVV1HWZRUNVFUHHQGLVSOD\VYDULRXVVWDWXVDERXW\RXUZLUHOHVVQHWZRUN
7URXEOHVKRRWLQJ
,I\RXKDYHWURXEOHFRQQHFWLQJWRWKH,QWHUQHWWU\WKHIROORZLQJVWHSV
6WHS3RZHURIIWKH&DEOH'6/PRGHPURXWHUDQGFRPSXWHUDQGZDLWIRUPLQXWHV
6WHS7XUQRQWKH&DEOH'6/PRGHPDQGZDLWIRUWKHOLJKWVRQWKHPRGHPWRVHWWOH
GRZQ
6WHS7XUQRQWKHURXWHUDQGZDLWIRUWKHOLJKWVRQWKHURXWHUWRVHWWOHGRZQ
6WHS7XUQRQWKHFRPSXWHU
6WHS5HFRQILJXUHWKHURXWHUDVGHVFULEHGLQ6HFWLRQ
6WHS/RJLQWRWKHURXWHUDQGVHOHFWWKH6WDWXV WDE
6WHS9HULI\WKDWWKH,3$GGUHVV 'HIDXOW*DWHZD\DQGDWOHDVWRQHRIWKH'16ILHOGV
KDYHYDOLGQXPEHUVDVVLJQHGWRWKHPLQVWHDGRIDOO¶V
,I\RXVHHDOO¶VFOLFNRQWKH,35HQHZEXWWRQIRU&DEOH0RGHPXVHUVRUWKH&RQQHFW
EXWWRQIRU'6/XVHUV
,IHDFKILHOGKDVDYDOLGQXPEHUDVVLJQHGWKHURXWHULVFRQQHFWHGWRWKH,QWHUQHW
6DIHW\,QIRUPDWLRQ
7KLVGHYLFHPD\RQO\EHRSHUDWHGLQHQFORVHGGU\URRPV7RSUHYHQWWKHULVNRIILUHRUHOHFWULFDOVKRFNWKHGHYLFHPXVWEH
SURWHFWHGIURPPRLVWXUH,QWKHHYHQWRIDGHIHFWLYHSRZHUSOXJSOHDVHFRQWDFWDQDXWKRUL]HGUHWDLOHU,QWKHHYHQWRIGDPDJH
WRWKHKRXVLQJRUWKHSRZHUSOXJGRQRWRSHUDWH'RQRWRSHQWKHGHYLFH5HSDLUVPD\RQO\EHSHUIRUPHGE\DQDXWKRUL]HGUHWDLOHU
1RWH
,QWKHHYHQWRILQFRUUHFWLQVWDOODWLRQDQGLPSURSHUXVHLQDUHVLGHQWLDODUHDWKHGHYLFHPD\FDXVHGLVUXSWLRQVLQUDGLRGHYLFHVDQG
RWKHUHOHFWURQLFGHYLFHV3URSHUXVHPHDQVWKDWWKHGHYLFHLVRSHUDWHGZLWKVKLHOGHGFRQQHFWRUFDEOHVDVIDUDVSRVVLEOHIRU
QHWZRUNSURGXFWVDOVRZLWKVKLHOGHGFDEOHVRIFDWHJRU\HDQGKLJKHU7KHGHYLFHZDVWHVWHGDQGOLHVZLWKLQWKHOLPLWVIRUFRPSXWHU
DFFHVVRULHVRIFODVV$DFFRUGLQJWRWKHUHTXLUHPHQWVRI(1
:DUQLQJ
7KLVLVDFODVV$GHYLFH7KLVGHYLFHFDQFDXVHUDGLRLQWHUIHUHQFHLQUHVLGHQWLDODUHDVLQWKLVFDVHWKHRSHUDWRUPD\EHUHTXLUHGWR
SHUIRUPDQGEHDUWKHFRVWVIRUDSSURSULDWHPHDVXUHV
&RQIRUPLW\'HFODUDWLRQ
7KHGHYLFHIXOILOVWKH(0&UHTXLUHPHQWVRI(1FODVV$IRU,7(DQG(1'HYLFHVZLWKH[WHUQDORUEXLOWLQSRZHUVXSSO\
DOVRIXOILOWKHUHTXLUHPHQWVRI(1DQG(17KHEDVLFSURWHFWLRQUHTXLUHPHQWVRIWKH³(0&'LUHFWLYH´((&
DUHWKHUHIRUHIXOILOOHG7KH&(FRQIRUPLW\KDVEHHQFHUWLILHG7KHFRUUHVSRQGLQJGHFODUDWLRQVDUHDYDLODEOHIURPWKHPDQXIDFWXUHU
7UDGHPDUNV
$OOFRPSDQ\EUDQGDQGSURGXFWQDPHVXVHGLQWKHVHLQVWUXFWLRQVDUHWUDGHPDUNVRUUHJLVWHUHGPDUNVRIWKHFRUUHVSRQGLQJFRPSDQLHV
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertisement