Linksys EtherFast BEFVP41の取扱説明書

デバイスLinksys EtherFast BEFVP41の取扱説明書

デバイス: Linksys EtherFast BEFVP41
カテゴリ: ネットワークルーター
メーカー: Linksys
サイズ: 2.6 MB
追加した日付: 8/3/2014
ページ数: 45
説明書を印刷

ダウンロード

使い方は?

私たちの目的は、皆様方にデバイスLinksys EtherFast BEFVP41の取扱説明書に含まれたコンテンツを可能な限り早く提供することです。オンラインプレビューを使用すると、Linksys EtherFast BEFVP41に関してあなたが抱えている問題に対する解決策の内容が素早く表示されます。

便宜上

説明書Linksys EtherFast BEFVP41をこちらのサイトで閲覧するのに不都合がある場合は、2つの解決策があります:

  • フルスクリーン表示 – 説明書を(お使いのコンピュータにダウンロードすることなく)便利に表示させるには、フルスクリーン表示モードをご使用ください。説明書Linksys EtherFast BEFVP41のフルスクリーン表示を起動するには、全画面表示ボタンを押してください。
  • コンピュータにダウンロード - Linksys EtherFast BEFVP41の説明書をお使いのコンピュータにダウンロードし、ご自身のコレクションに加えることもできます。デバイス上のスペースを無駄にしたくない場合は、いつでもManualsBaseサイトでダウンロードすることもできます。
Linksys EtherFast BEFVP41 取扱説明書 - Online PDF
Advertisement
« Page 1 of 45 »
Advertisement
印刷版

多くの人々は画面表示ではなく印刷された説明書を読むほうを好みます。説明書を印刷するオプションも提供されており、上記のリンクをクリックすることによりそれを利用できます - 説明書を印刷。説明書Linksys EtherFast BEFVP41を全部印刷する必要はなく、選択したページだけを印刷できます。紙を節約しましょう。

要旨

次のページにある説明書Linksys EtherFast BEFVP41の内容のプレビューは、以下にあります。次のページにある説明書の内容をすぐに表示したい場合は、こちらをご利用ください。

内容要旨
ページ1に含まれる内容の要旨

USER GUIDE
®
EtherFast Cable/DSL VPN Router
with 4-Port Switch
Model: BEFVP41

ページ2に含まれる内容の要旨

About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that you should pay special attention to while using the product. WARNING: This exclamation point indicates that there is a caution or warning and it is something that could damage your property or product. WEB: T

ページ3に含まれる内容の要旨

Table of Contents Chapter 1: Introduction 1 Introduction to VPNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 VPN Examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 VPN Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Chapter 2: Product Overview 3 Front Panel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

ページ4に含まれる内容の要旨

Table of Contents Appendix F: Software License Agreement 30 Software in Linksys Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30 Software Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30 EtherFast Cable/DSL VPN Router with 4-Port Switch iii

ページ5に含まれる内容の要旨

Introduction Chapter 1 VPN Examples Chapter 1: The following are examples of a VPN tunnel between two Introduction VPN routers and a VPN tunnel between a computer using VPN client software and a VPN router. Thank you for choosing the Linksys by Cisco EtherFast Cable/DSL VPN Router with 4-Port Switch. The Router VPN Router to VPN Router lets you access the Internet through its four switched For example, at home, a telecommuter uses his VPN ports. You can also use the Router to share resou

ページ6に含まれる内容の要旨

Introduction Chapter 1 Off-Site There are additional ways to enhance data security beyond the VPN Router. Here are some suggestions: Internet • Enhance security on your other networks. Install firewall routers for your Internet connections, and use the most up-to-date security measures for wireless networking. Notebook with VPN • Narrow the scope of your VPN tunnel as much as Client Software possible. Rather than allowing a range of IP addresses, use the addresses specific to the endpoint

ページ7に含まれる内容の要旨

Product Overview Chapter 2 Back Panel Chapter 2: Product Overview Front Panel Reset There are two ways to reset the Router to its factory default settings. Use a straightened paper clip or similar object to press and hold the Reset button for approximately five seconds. You can also restore the defaults from the Power (Green) The Power LED lights up and Administration > Factory Defaults screen of the will stay on while the Router is powered on. Router’s web-based utility. It flashes whe

ページ8に含まれる内容の要旨

Advanced Configuration Chapter 3 Chapter 3: Advanced Configuration After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use. However, if you’d like to change its advanced settings, use the Router’s web-based utility. This chapter describes each web page of the utility and each page’s key functions. You can access the utility via a web browser on a computer connected to the Router. The web-based utility has these main tabs: Setup, Securit

ページ9に含まれる内容の要旨

Advanced Configuration Chapter 3 before your Internet connection terminates. The default Static IP Max Idle Time is 5 minutes. If you are required to use a permanent IP address to Keep Alive: Redial Period If you select this option, connect to the Internet, select Static IP. the Router will periodically check your Internet connection. If you are disconnected, then the Router will automatically re-establish your connection. To use this option, select Keep Alive. In the Redial Period field,

ページ10に含まれる内容の要旨

Advanced Configuration Chapter 3 PPTP Point-to-Point Tunneling Protocol (PPTP) is a service that applies to connections in Europe only. Connection Type > Heart Beat Signal User Name and Password Enter the User Name and Password provided by your ISP. Heart Beat Server Enter the IP address of your ISP’s Heart Beat server. This is provided by your ISP. Connection Type > PPTP Connect on Demand: Max Idle Time You can configure the Router to cut the Internet connection after it has been IP Addres

ページ11に含まれる内容の要旨

Advanced Configuration Chapter 3 Router select the best MTU for your Internet connection, amount of time, in minutes, that the user will be “leased” keep the default setting, Automatic. this dynamic IP address. After the time is up, the user will be automatically assigned a new dynamic IP address. The Size When Manual is selected in the MTU field, this option default is 0 minutes, which means one day. is enabled. Leave this value in the 1200 to 1500 range. The default size is 1400. Time Set

ページ12に含まれる内容の要旨

Advanced Configuration Chapter 3 Advanced Routing Setup > MAC Address Clone A MAC address is a 12-digit code assigned to a unique Dynamic Routing piece of hardware for identification. Some ISPs will require NAT If this Router is hosting your network’s connection to you to register a MAC address in order to access the the Internet, keep the default, Enabled. If another router Internet. If you do not wish to re-register the MAC address exists on your network, select Disabled. (When NAT is w

ページ13に含まれる内容の要旨

Advanced Configuration Chapter 3 Routing Table Block WAN Requests For each route, the Destination LAN IP address, Subnet Block Anonymous Internet Requests This feature Mask, Gateway, Hop Count, and Interface are displayed. makes it more difficult for outside users to work their Click Refresh to update the information. way into your network. This feature is enabled by default. Select Disabled to allow anonymous Internet requests. Click Save Settings to apply your changes, or click Cancel Cha

ページ14に含まれる内容の要旨

Advanced Configuration Chapter 3 IP Address VPN Tunnel Only the computer with a specific IP address will be able The Router creates a tunnel between two endpoints, to access the tunnel. so that the data traveling between these endpoints is secure. IP Addr. Enter the appropriate address. Select Tunnel Entry Select the tunnel you wish to create. IP Range It is possible to create up to 50 simultaneous tunnels. This option is a combination of the Subnet and IP Address Delete To delete a tunnel

ページ15に含まれる内容の要旨

Advanced Configuration Chapter 3 for a specific computer on the Internet (for example: encryption keys will not be able to obtain future IPSec keys. vpn.myvpnserver.com). Select Enabled to ensure that the initial key exchange and IKE proposals are secure. Any Pre-shared Key This specifies the pre-shared key used The remote VPN Router will accept a request from any to authenticate the remote IKE peer. Based on this Pre- IP address. The remote VPN device can be another VPN shared key, a key

ページ16に含まれる内容の要旨

Advanced Configuration Chapter 3 Key Lifetime Enter the number of seconds you want the key to last before a re-key negotiation between each endpoint is completed. The default is 3600 seconds. Phase 2 The Encryption, Authentication, and PFS settings are automatically displayed. Group Select the Diffie-Hellman Group, which is a cryptographic technique that uses public and private keys for encryption and decryption. Select 768-bit or 1024-bit. Key Lifetime Enter the number of seconds you want

ページ17に含まれる内容の要旨

Advanced Configuration Chapter 3 7. Select any Blocked Services and enter a range of ports in the fields provided. If the service you want to block is not listed or you want to edit a service’s settings, then click Add/Edit Service. 8. If you want to block websites with specific URL addresses, enter each URL in a separate field next to Website Blocking by URL Address. 9. If you want to block websites using specific keywords, enter each keyword in a separate field next to Website Blocking

ページ18に含まれる内容の要旨

Advanced Configuration Chapter 3 Start and End Enter the number or range of port(s) Click Save Settings to apply your changes, or click Cancel used by the server or Internet applications. Check Changes to cancel your changes. with the Internet application documentation for more information. Applications and Gaming > UPnP TCP UDP Select the protocol used for this application, Forwarding either TCP or UDP, or Both. The UPnP Forwarding screen displays preset application IP Address For each a

ページ19に含まれる内容の要旨

Advanced Configuration Chapter 3 TFTP (Trivial File Transfer Protocol) - A version of the TCP/IP Applications and Gaming > DMZ FTP protocol that has no directory or password capability. The DMZ feature allows one network computer to be Finger - A UNIX command widely used on the Internet exposed to the Internet for use of a special-purpose to find out information about a particular user, such as a service such as Internet gaming or videoconferencing. telephone number, whether the user is cu

ページ20に含まれる内容の要旨

Advanced Configuration Chapter 3 Data is passed from an SNMP agent, such as the Router, to the workstation console used to oversee the network. The Router then returns information contained in a Management Information Base (MIB), a data structure that defines what is obtainable from the device and what can be controlled. SNMP functions, such as statistics, configuration, and device information, are not available without third-party management software. The Router is compatible with all


類似の説明書
# 取扱説明書 カテゴリ ダウンロード
1 Linksys ADSL2+ Gateway with 4-Port Switch AG300 取扱説明書 ネットワークルーター 38
2 Linksys ADSLME1 取扱説明書 ネットワークルーター 6
3 Linksys 2 取扱説明書 ネットワークルーター 12
4 Linksys AE1000 取扱説明書 ネットワークルーター 13
5 Linksys AG041 (EU) 取扱説明書 ネットワークルーター 3
6 Linksys AG241 取扱説明書 ネットワークルーター 26
7 Linksys 8-Port EG008W 取扱説明書 ネットワークルーター 13
8 Linksys BEFSR41 v2 取扱説明書 ネットワークルーター 115
9 Linksys BEFSK41 取扱説明書 ネットワークルーター 8
10 Linksys BEPSR11 取扱説明書 ネットワークルーター 4
11 Linksys ADSL Modem AM200 取扱説明書 ネットワークルーター 35
12 Linksys BEPSR41 取扱説明書 ネットワークルーター 6
13 Linksys BEFSR41-v2 取扱説明書 ネットワークルーター 65
14 Linksys BEPSR31 取扱説明書 ネットワークルーター 1
15 Linksys CISCO WAG200G 取扱説明書 ネットワークルーター 117
16 Sony BKS-R3202/R3210/R3220 取扱説明書 ネットワークルーター 77
17 Sony DVS-V3232B/V3232M 取扱説明書 ネットワークルーター 3
18 Sony BVS-V3232 取扱説明書 ネットワークルーター 8
19 Sony DMX-WL1 取扱説明書 ネットワークルーター 6
20 Sony BVS-A3232 取扱説明書 ネットワークルーター 6