Log:
Assessments - 0, GPA: 0 ( )

Instruções de Operação Philips, Modelo CPWNA100/00

Fabricante : Philips
Arquivo Tamanho: 2.28 mb
Arquivo Nome :
Língua de Ensino: en
Ir para baixar



Facilidade de uso


Default Key – Choose the Key ID that has the encr yption string you prefer. If you are using a key generated from the passphrase, you must use the same passphrase and key on each wireless device. For an example of how to change your encr yption settings, please see the chapter on "An example of how to secure your wireless network." • Configuration - sub-tab Advanced Keep the Advanced settings at their default values, unless you have a specific reason for changing them. Click Help if you need more information on these settings. ENGLISH 19 • Link information The Link information tab displays information on the wireless network name (Network Name) to which there is a wireless connection, the signal strength and link quality, the connection speed, the channel and the number of transmitted/received (Tx/Rx) fragments. • IP information The IP information tab displays information on the Host Name, IP Address, Subnet Mask, and Gateway. This window also contains buttons for releasing and renewing the IP address. This is done to bring a computer back onto the network after moving it to a different location, or after experiencing an unexpected outage. First release, then renew the IP address. Computers on DHCP networks often (but not always) re-establish network connectivity automatically. 20 ENGLISH • Site Survey Selecting the Site Sur vey tab displays a list of available wireless network access points. Next, click Rescan to update the list. It shows you the following information: • The name of the wireless connection (Network Name, or SSID) • Signal strength and wireless link quality • An icon reflecting if encr yption is enabled Double-click one of the network names to open the Profile Wizard for establishing a wireless connection with that network. Note: refer to the "How to..?" booklet on how to set-up a wireless connection. •Version information Selecting this tab displays vendor and version information. ENGLISH 21 Chapter 5 - General network and security related information The DOs and DON'Ts of securing your wireless network Note: For an example of how to encrypt your wireless network, please see the chapter on "An example of how to secure your wireless network." DO Enable the highest encr yption key level that your hardware provides for. Upgrade your hardware, if possible. If you do not protect your wireless network, all data from your PC might be accessible by, for example, your neighbours or passers-by. Use a wireless base station or router with Network Address Translation (NAT) and firewall enabled for sharing your Internet connection. Change the default passwords for your network devices. Leaving these at default makes it easy for an outsider to gain access. Position wireless base stations away from windows and toward the centre of your home.This decreases the strength of the signal outside your home. Some wireless base stations allow you to control access based on the unique Media Access Control (MAC) address of the network adapter tr ying to associate with it. If a MAC address has not been registered in the wireless base station, it will not associate with it. If your base station has this feature, enable it and add the MAC addresses of the network adapters. Just use common sense: Install an anti-virus program on each computer on your network and use it regularly to check your computers for viruses. Remember to update the anti-virus program on a regular basis. DON'T Do not rely on radio transmission range limitations to secure your network. Enable wireless security (WEP/WPA) to protect your network from unwanted access. Use encr yption keys and passwords that are hard to guess. Do not change passwords to reflect your name, address, or anything that would be easy to guess. Never open attachments to email messages that you are not expecting. In addition, scan all diskettes and home-made CDs for viruses before opening files from them, or before star ting your computer from them. Do not load a program from an unknown source onto one of your network computers. Do not ignore the common signs of viruses: unusual messages that appear 22 ENGLISH on your screen, decreased system performance, missing data, and inability to access your hard drive. If you notice any of these problems on your computer, run your anti-virus program immediately to minimise the chances of losing data. Do not connect your home network to broadband Internet without taking security measures: If you do not have a wireless base station installed on your network and you are sharing Internet access through one of the computers, you may want to consider installing firewall software. Securing your network from Internet access Check in the documentation of your wireless base station or router whether it provides you with a built-in firewall and network address translation (NAT), which provide security for an “always-on” broadband Internet connection that is shared among the computers and devices on your home network. Computers on an Ad Hoc network m...


Escreva a sua própria avaliação do dispositivo



Mensagem
Seu nome :
Introduza os dois dígitos :
capcha





categorias