Log:
valutazioni - 0, GPA: 0 ( )

Istruzioni per l'uso NETGEAR, Modello R6250

Produttore : NETGEAR
File Size : 2.5 mb
File Nome :
Lingua di insegnamento: en
Vai a scaricare



Facilità d'uso


View details about the USB Control Center software. Control Center Configuration 1.Select Tools > Configuration. 2.Specify the following settings: •Automatically execute when logging on Windows. Enable this utility to start automatically when you are logged in to Windows. •Timeout. Specify the time-out value for holding the USB resource when it is not in use. •Language. Select the display language for this utility. 3.Click OK. Your changes are saved. USB Printer The first time you use a printer, click Connect. You might be asked to install the driver for this printer. After the driver is installed, the printer status changes to Available. Note:Some USB printers (for example, HP and Lexmark printers) request that you do not connect the USB cable until you are prompted to do so by the printer driver installation software. If the USB printer is detected and connected automatically, you need to disconnect the printer and wait for the prompt asking you to click Connect. Once the printer shows Available status, it is no longer grayed out in a Paused state in the Windows Printers and Faxes window. Figure 9. Printers and Faxes screen This USB printer is ready. The utility does not need to hold the connection of this USB printer. When this printer has a print job, the USB utility connects to this USB printer automatically and prints. After the print job is done, the printer status returns to the Paused state. Scan with a Multifunction Printer You can use the scan feature of a multifunction printer. 1.Make sure that the printer status shows as Available. 2.Click the Network Scanner button. This activates the scanner window to perform scans. 7. Security Customize the Firewall Settings This chapter explains how to use the basic firewall features of the router to prevent objectionable content from reaching the computers and devices on your network. This chapter includes the following sections: •Keyword Blocking of HTTP Traffic •Block Services (Port Filtering) •Port Triggering to Open Incoming Ports •Port Forwarding to Permit External Host Communications •How Port Forwarding Differs from Port Triggering •Set Up Port Forwarding to Local Servers •Set Up Port Triggering •Schedule Blocking •Security Event Email Notifications For information about Live Parental Controls, see Parental Controls on page 22. Keyword Blocking of HTTP Traffic Use keyword blocking to prevent certain types of HTTP traffic from accessing your network. The blocking can be always or according to a schedule. 1.Select Advanced > Security > Block Sites. 2.Select one of the keyword blocking options: •Per Schedule. Turn on keyword blocking according to the Schedule screen settings. •Always. Turn on keyword blocking all the time, independent of the Schedule screen. 3.In the Keyword field, enter a keyword or domain, click Add Keyword, and click Apply. The Keyword list supports up to 32 entries. Here are some sample entries: •Specify XXX to block •Specify .com if you want to allow only sites with domain suffixes such as .edu or .gov. •Enter a period (.) to block all Internet browsing access. 1.Select the keyword you want to delete from the list. 2.Click Delete Keyword. 3.Click Apply. Your changes are saved. You can exempt one trusted computer from blocking and logging. The computer you exempt has to have a fixed IP address. 1.In the Trusted IP Address field, enter the IP address. 2.Click Apply. Your changes are saved. Block Services (Port Filtering) Services are functions that server computers perform at the request of client computers. For example, web servers serve web pages, time servers serve time and date information, and game hosts serve data about other players’ moves. When a computer on the Internet sends a request for service to a server computer, a service or port number identifiefs the requested service. This number is the destination port number in the transmitted IP packets. For example, a packet that is sent with the destination port number 80 is an HTTP (web server) request. The Internet Engineering Task Force (IETF at has defined and published the service numbers for many common protocols in RFC1700, “Assigned Numbers.” Service numbers for other applications are typically chosen from the range 1024 - 65535 by the authors of the application. Although the router already holds a list of many service port numbers, you are not limited to these choices. You can often determine port number information by contacting the publisher of the application, by asking user groups or newsgroups, or by searching. The Block Services screen lets you add and block specific Internet services by computers on your network. This is called service blocking or port filtering. To add a service for blocking, first determine which port number or range of numbers the application uses. 1.Select Advanced > Security > Block Services. 2.Select either Per Schedule or Always. 3.If you selected Per Schedule, specify a time perio...


Scrivi la tua opinione del dispositivo



Il messaggio
Il tuo nome :
Inserire le due cifre :
capcha





categorie