Page 6 / 80 Scroll up to view Page 1 - 5
WVC200-210 User Guide
2
Finding Information in Your PDF Documents
Getting Started
In this example, you would type the characters 800@, followed by the IP address of your
device, followed by a colon and the number 5090.
Finding Information in Your PDF Documents
The PDF Find/Search tool lets you find information quickly and easily online.
You can:
Search an individual PDF
Search multiple PDFs at once (for example, all PDFs in a specific folder or disk drive)
Perform advanced searches
Finding Text in a PDF
By default, the Find toolbar is open. If it has been closed, choose
Edit > Find
.
Use Find to search for text in an open PDF:
1.
Enter your search terms in the
Find
box on the toolbar.
2.
Optionally click the arrow next to the Find text box to refine your search (such as Whole
words only).
3.
Press
Enter
.
Acrobat jumps to the first instance of the search term.
Pressing
Enter
again
continues to more instances of the term.
Finding Text in Multiple PDFs
The
Search
window lets you search for terms in multiple PDFs.
The PDFs do not need to be
open.
Either:
Choose
Edit
>
Search
or
Click the arrow next to the
Find
box and choose Open Full Acrobat Search.
The
Search
window appears.
In the
Search
window:
1.
Enter the text you want to find.
2.
Choose
All PDF Documents in
3.
From the drop-down box, choose
Browse for Location
.
4.
Choose the location you want to search, either on your computer or on a network, then
click
OK
.
5.
If you want to specify additional search criteria, click
Advanced Search Options
, and
choose the options you want.
Page 7 / 80
WVC200-210 User Guide
3
Finding Information in Your PDF Documents
Getting Started
6.
Click
Search.
For more information about the Find and Search functions, see the Adobe Acrobat online help.
Page 8 / 80
WVC200-210 User Guide
4
2
Ad-Hoc and Infrastructure Modes
Planning Your Wireless Network
Planning Your Wireless Network
A wireless local area network (WLAN) is exactly like a regular local area network (LAN), except
that each computer in the WLAN uses a wireless device to connect to the network. Computers
and other devices, such as peripherals, in a WLAN share the same frequency channel and SSID,
which is an identification name for wireless devices.
Ad-Hoc and Infrastructure Modes
Unlike wired networks, wireless networks have two different modes in which they may be set
up: infrastructure and ad-hoc.
An infrastructure configuration is a WLAN and wired LAN
communicating to each other through an access point. An ad-hoc configuration is computers
with wireless capabilities communicating directly with each other. Choosing between these
two modes depends on whether or not the wireless network needs to share data or peripherals
with a wired network or not.
If the computers on the wireless network need to be accessed by a wired network or need to
share a peripheral, such as a printer, with the wired network computers, the wireless network
should be set up in infrastructure mode. The basis of infrastructure mode centers around an
access point, which serves as the main point of communications in a wireless network. (A
wireless router can also be used because a wireless router incorporates the capabilities of an
access point.) Access points transmit data to PCs equipped with wireless network cards, which
can roam within a certain radial range of the access point.
Multiple access points can be
arranged to work in succession to extend the roaming range, and can be set up to
communicate with your Ethernet (wired) hardware as well.
If the wireless network is relatively small and needs to share resources only with the other
computers on the wireless network, then the ad-hoc mode can be used. Ad-hoc mode allows
computers equipped with wireless transmitters and receivers to communicate directly with
each other, eliminating the need for an access point.
The drawback of this mode is that
wireless-equipped computers are not able to communicate with computers on a wired
network. And, of course, communication between the wireless-equipped computers is limited
by the distance and interference directly between them.
Network Layout
The PTZ Internet Camera is compatible with all 802.11g routers, such as model number
WRVS4400N, as well as access points, including model number WAP4400N. The camera can
also communicate with network adapters, such as the Wireless-G Notebook Adapter (model
number WPC4400N) for your laptop computers, Wireless-G PCI Adapter (model numbers
WMP200) for your desktop PCs, and Wireless-G USB Adapter (model number WUSB200) for
your computers when you want to enjoy USB connectivity.
With these, and many other Linksys products, your networking options are limitless. Go to the
Linksys website at
www.linksys.com/international
for more information about products that
work with the PTZ Internet Camera.
Page 9 / 80
WVC200-210 User Guide
5
Wireless Security
Planning Your Wireless Network
Wireless Security
Linksys wants to make wireless networking as safe and easy for you as possible. The current
generation of Linksys products provide several network security features, but they require
specific action on your part for implementation. So, keep the following in mind whenever you
are setting up or using your wireless network.
Security Precautions
The following is a complete list of security precautions to take (at least steps 1 through 5 should
be followed):
1.
Change the default SSID.
2.
Disable SSID Broadcast.
3.
Change the default password for the Administrator account.
4.
Change the SSID periodically.
5.
Use the highest encryption algorithm possible. Use WPA if it is available. Please note that
this may reduce your network performance.
6.
Change the WEP encryption keys periodically.
Security Threats Facing Wireless Networks
Wireless networks are easy to find. Hackers know that in order to join a wireless network,
wireless networking products first listen for “beacon messages”. These messages can be easily
decrypted and contain much of the network’s information, such as the network’s SSID (Service
Set Identifier). Here are the steps you can take:
Change the administrator’s password regularly.
With every wireless networking device you
use, keep in mind that network settings (SSID, WEP keys, etc.) are stored in its firmware. Your
network administrator is the only person who can change network settings. If a hacker gets a
hold of the administrator’s password, he, too, can change those settings. So, make it harder for a
hacker to get that information. Change the administrator’s password regularly.
SSID.
There are several things to keep in mind about the SSID:
Disable Broadcast
Make it unique
Change it often
NOTE:
Some of these security features are available only
through the network router or access point. Refer to the
router or access point’s documentation for more
information.
Page 10 / 80
WVC200-210 User Guide
6
Security Threats Facing Wireless Networks
Planning Your Wireless Network
Most wireless networking devices will give you the option of broadcasting the SSID. While this
option may be more convenient, it allows anyone to log into your wireless network. This
includes hackers. So, don’t broadcast the SSID.
Wireless networking products come with a default SSID set by the factory. (The Linksys default
SSID is “linksys”.) Hackers know these defaults and can check these against your network.
Change your SSID to something unique and not something related to your company or the
networking products you use.
Change your SSID regularly so that any hackers who have gained access to your wireless
network will have to start from the beginning in trying to break in.
MAC Addresses.
Enable MAC Address filtering. MAC Address filtering will allow you to provide
access to only those wireless nodes with certain MAC Addresses. This makes it harder for a
hacker to access your network with a random MAC Address.
WEP Encryption.
Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless
security concerns. This is overstating WEP’s ability. Again, this can only provide enough security
to make a hacker’s job more difficult.
There are several ways that WEP can be maximized:
Use the highest level of encryption possible
Use “Shared Key” authentication
Change your WEP key regularly
WPA/WPA2 Personal.
Wi-Fi Protected Access (WPA) This method offers two encryption
methods, TKIP and AES, with dynamic encryption keys.
A network encrypted with WPA/WPA2 is more secure than a network encrypted with WEP,
because WPA/WPA2 uses dynamic key encryption. To protect the information as it passes over
the airwaves, you should enable the highest level.
Implementing encryption may have a negative impact on your network’s performance, but if
you are transmitting sensitive data over your network, encryption should be used.
These security recommendations should help keep your mind at ease while you are enjoying
the most flexible and convenient technology Linksys has to offer.
CAUTION:
Always remember that each device in your
wireless network MUST use the same encryption method
and encryption key or your wireless network will not
function properly.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top