Summary of the content on the page No. 1
IMPORTANT INSTRUCTIONS
1. Read and understand all instructions. Follow all warnings and instructions marked on the
product.
2. Do not use this product near water—e.g., near a tub, wash basin, kitchen sink or laundry
tub, in a wet basement, or near a swimming pool.
3. Never push objects of any kind into this product through openings, as they may touch
dangerous voltages.
4. SAVE THESE INSTRUCTIONS.
10/100Mbps 4-Port Internet Gateway
SAFETY INFORMATION DESCRIPTION
Leviton’s 10/100Mbps 4-Port Inte
Summary of the content on the page No. 2
Environmental Specifications INSTALLATION Dimensions: 2.5˝H x 6.5W˝ x 3.27˝D 1: INTRODUCTION As the interface between WAN and LAN, the Gateway provides a secure solution for Internet access over Power: 12VDC@1000mA a shared netowrk in a home or small office environment. With the built-in NAT technology, the Gateway Emissions: FCC ClassB delivers firewall protection, preventing network intruders and hackers. Compliant with IEEE 802.3, IEEE Operating Temperature: 0°C to 50°C (32°F to 122°F) 802.3u
Summary of the content on the page No. 3
4. In the Configuration window, select LED Color Function the TCP/IP protocol line that has Diag (green): Lights to indicate the Gateway is in self-diagnosis mode during boot-up. The LED turns off been associated with your network to indicate successful completion of self-diagnosis. card or adapter. (Figure 33) Power (yellow): Lights to indicate the Gateway has power. Link/Act (green): 1. Lights to indicate a functioning network link from the Gateway through the corresponding port 33 (1 throug
Summary of the content on the page No. 4
4. Connect one end of a standard network 3. Click the “Apply” button. cable to the RJ-45 WAN port on the WAN MAC Clone (Figure 31) Inside the SMC Category 5e Gateway. Then connect the other end of Voice & Data Enter the MAC Address if your ISP allows access of one specific PC’s Ethernet MAC address. Click Restore Module the cable to either a Cable or DSL modem. Phone from MAC Address to return Telephone Line Distribution Module 5. Supply the power to the Gateway using the A supplied AC/DC Power
Summary of the content on the page No. 5
5 THE SETUP WIZARD The Gateway's Setup Wizard will guide you step by step to configure network. Please follow the instructions as the wizard's pages request and change the settings in accordance to the information provided by your ISP . If you use a DSL modem for broadband access, please go to the sectioned titled "PPPoE Connection 30 for WAN". If a fixed IP is used, please read the section titled "Fixed IP for WAN". If you're using a calbe modem, please refer to 3.2.4 Dynamic IP for WAN. Creat
Summary of the content on the page No. 6
Field Definitions: The Max Idle time is the amount of time you would like to pass before the Gateway disconnects from the Ineternet due to inactivity. Enter zero (0) in the field to remain connected despite idle time. The idle time ranges from 0 to 60 minutes. The Maximum Transmit Unit (MTU) is a feature which determines the maximum number of bytes transmitted per packet. This should not be changed unless directed by your ISP . Fixed IP for WAN If your ISP has assigned a static IP address, you
Summary of the content on the page No. 7
PPTP For WAN (Figure 9) Privilege (Figure 28) 1. Choose “YES” and "PPTP" when prompted with this screen: Privilege setting allows you to keep certain PCs on your network from accessing to the Internet. You can set up a filter through an IP address or network port number. Users who have their IP address or Port number listed on the “Blocked Private Address” field or “Block Private Ports” field will no longer be able to access the Internet. 9 2. Click “Next”. On the next screen, enter the informa
Summary of the content on the page No. 8
12 26 Alias IP Setup (Figure 13) The Alias IP Setup allows you to enter a maximum of 5 IP addresses that can be distributed to your Firewall Setting (Figure 27) computer. Note that this function is effective only when your ISP supports it. If you want to delete the NAT allows all of the computers on your network to use one IP address. entered IP address, pull down the IP address and highlight the address you want to delete. Click "Delete Hacker Attack Protect keeps your network away from hacker
Summary of the content on the page No. 9
Backup (Figure 24) Time (Figure 15) You can save and restore the current configuration file to your computer. Select the appropriate Time Zone for your Gateway; this will help in tracking activity and hacker attempt logs. 24 15 Setup the Advanced Features Once you’ve configured the basic settings discussed in section 3.2, you may move to the settings of GATEWAY STATUS PAGE (FIGURE 16) Advanced Features. In this section, we’ll explain the setting of LAN IP,DHCP,Firewall, Privilege, Virtual Statu
Summary of the content on the page No. 10
DHCP Table (Figure 17) 3.4 VIEWING THE TOOLS This table shows the number of clients who exist on your DHCP pool and their information such as MAC System Log (Figure 20) Address, Computer name and IP Address. You can acquire the information of the system in this screen, including the time, the type and the message. 20 17 Hacker Log (Figure 21) You can detect the intrusion from this screen. This screen shows the information of the unauthorized Routing Table (Figure 18) access request to your netw