Page 101 / 123 Scroll up to view Page 96 - 100
96
Action
tec 54 Mbps Wireless DSL Gateway User Manual
3.
When the “Control Panel” window appears, double-click
Network
Connections
.
4.
In the “Network Connections” window, double-click
Local Area Connection
.
A number may be displayed after the Local Area Connection. If more than
one Local Area Connection is listed, locate the one that corresponds to the
network card installed in your computer by finding the name of the network
card in the “Device Name” column.
Downloaded from
www.Manualslib.com
manuals search engine
Page 102 / 123
97
Appendix B
Switching to Static IP on the Computer
5.
The “Local Area Connection Properties” window appears. Select
General
.
6.
In the “This connection uses the following items” list box, double-click
Internet Protocol (
TCP/IP
)
.
7.
The “Internet Protocol (
TCP/IP
) Properties” window appears.
8.
In the
General
tab, make sure the circle next to “Use the following
IP
Address”
is selected. When active, a black dot appears in the circle. If the circle already
contains a black dot, leave it alone.
Downloaded from
www.Manualslib.com
manuals search engine
Page 103 / 123
98
Action
tec 54 Mbps Wireless DSL Gateway User Manual
9.
Enter the following address in the “
IP
Address” text box:
192.168.1.2
Enter the periods in the address by pressing the space bar on the keyboard.
10.
Enter the following address in the “Subnet mask” text box:
255.255.255.0
Enter the periods in the address by pressing the space bar on the keyboard.
11.
Click
OK
. The Internet Protocol (
TCP/IP
) Properties window disappears.
12
In the Local Area Connection Properties window, click
Close
.
The Local Area
Connection Properties window disappears.
13.
Click
Close
in the Local Area Connection Status window. The window
disappears.
14.
Close the Network and Dial-up Connections window by clicking on the “
x
button at the upper right corner of the window.
The computer restarts. It is now set up with a static
IP
address, allowing the user to
access the Gateway’s Web Configuration Utilities (Advanced Setup, Utilities, etc.).
Downloaded from
www.Manualslib.com
manuals search engine
Page 104 / 123
99
Computer Security
The Internet is a giant network of computers located all over the world. When a
computer is connected to the Internet, it can exchange information with any other
computer on the Internet. This allows a computer user to send e-mail, surf the
World Wide Web, download files, and buy products and services online, but it also
makes the computer vulnerable to attack from persons intent on doing malicious
mischief, or worse. Unless access to the computer is controlled, someone on the
Internet can access the information on the computer and damage or destroy that
information.
Action
tec recommends securing your computer from unwanted intrusion. Security
is ultimately the end user’s responsibility. Please secure your computer, and don’t
be a victim.
Comparing DSL Service with a Dial-Up Modem
With a dial-up modem, a computer user makes an Internet connection by dialing
a telephone number, surfs the Internet for a period of time, and then disconnects
the dial-up modem. No one on the Internet can access a computer that is not con-
nected to the Internet.
Unlike a dial-up modem,
DSL
service is “always connected.” The connection is
always available – there is no need to dial a phone number to access the Internet.
The computer can be connected to the Internet all the time.
With both types of Internet connections, access to the computer must be con-
trolled to make sure someone on the Internet doesn’t access the information on
the computer. The longer the computer is connected to the Internet, the easier it
is for someone on the Internet to find the computer and attempt to access it with-
out permission.
DSL
service also provides fast Internet connections. This not only
improves Internet performance, it also improves Internet performance for anyone
attempting to access the computer.
C
Downloaded from
www.Manualslib.com
manuals search engine
Page 105 / 123
100
Action
tec 54 Mbps Wireless DSL Gateway User Manual
Gateway Security
If connecting to the
ISP
through Point-to-Point Protocol (
PPP
), be sure to pro-
vide the Gateway an administrative password. If a password is not set, someone
on the Internet can access the Gateway and change its configuration or steal your
PPP
login name and password. For instructions on setting the password, see the
“Advanced Setup chapter.
If connecting to the
ISP
through bridging mode, the Gateway should be safe from
unwarranted and illegal intrusion.
Computer Security
To protect the valuable information on the computer, review the following topics.
These topics cover software programs and operating system features affecting the
security of the computer’s data.
Anti-Virus Programs
The computer should have an anti-virus program, and the virus definitions should
be updated on a regular basis – at least once a month.
E-Mail Attachments
Never run a program received as an attachment to an e-mail message unless the
program is known to be safe. A program from an unknown source can delete all
the files on the computer’s hard disk or install a “backdoor” software application
that lets people on the Internet gain access to the computer without permission.
Internet Browsers
Always exit the Internet browser (Internet Explorer or Netscape Navigator, for
example). Never “minimize” the browser or leave it open in the background.
Breaking into a computer is easier when an Internet browser is running.
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top