Page 391 / 414 Scroll up to view Page 386 - 390
Two-Factor Authentication
391
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
Figure 226.
2.
A one-time passcode (
something the user has
) is generated.
Figure 227.
Note:
The one-time passcode is time-synchronized to the authentication
server so that the OTP can be used only once and needs to be used
before the expiration time. If a user does not use this passcode
before it expires, the user needs to go through the request process
again to generate a new OTP.
3.
Proceed to the 2 Factor Authentication login screen, and enter the one-time passcode as the
login password.
Page 392 / 414
Two-Factor Authentication
392
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
Figure 228.
Page 393 / 414
393
C
C.
Notification of Compliance (Wired)
NETGEAR Wired Products
Regulatory Compliance Information
This section includes user requirements for operating this product in accordance with National
laws for usage of radio spectrum and operation of radio devices. Failure of the end-user to
comply with the applicable requirements may result in unlawful operation and adverse action
against the end-user by the applicable National regulatory authority.
This product's firmware limits operation to only the channels allowed in a particular Region or
Country.
Therefore, all options described in this user's guide may not be available in your
version of the product.
FCC Requirements for Operation in the United States
FCC Information to User
This product does not contain any user serviceable components and is to be used with
approved antennas only. Any product changes or modifications will invalidate all applicable
regulatory certifications and approvals
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two
conditions: (1) This device may not cause harmful interference, and (2) this device must
accept any interference received, including interference that may cause undesired operation.
FCC Guidelines for Human Exposure
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled
environment. This equipment should be installed and operated with minimum distance of
20 cm between the radiator and your body. This transmitter must not be co-located or
operating in conjunction with any other antenna or transmitter.
FCC Declaration Of Conformity
We, NETGEAR, Inc., 350 East Plumeria Drive, San Jose, CA 95134, declare under our sole
responsibility that the ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N complies
with Part 15 of FCC Rules.
Operation is subject to the following two conditions:
This device may not cause harmful interference, and
This device must accept any interference received, including interference that may cause
undesired operation.
Page 394 / 414
Notification of Compliance (Wired)
394
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
FCC Radio Frequency Interference Warnings & Instructions
This equipment has been tested and found to comply with the limits for a Class B digital
device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide
reasonable protection against harmful interference in a residential installation. This
equipment uses and can radiate radio frequency energy and, if not installed and used in
accordance with the instructions, may cause harmful interference to radio communications.
However, there is no guarantee that interference will not occur in a particular installation.
If this equipment does cause harmful interference to radio or television reception, which can
be determined by turning the equipment off and on, the user is encouraged to try to correct
the interference by one or more of the following methods:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and the receiver.
Connect the equipment into an electrical outlet on a circuit different from that which the
radio receiver is connected.
Consult the dealer or an experienced radio/TV technician for help.
Modifications made to the product, unless expressly approved by NETGEAR, Inc., could void
the user's right to operate the equipment.
Canadian Department of Communications Radio Interference Regulations
This digital apparatus, ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N, does not
exceed the Class B limits for radio-noise emissions from digital apparatus as set out in the Radio
Interference Regulations of the Canadian Department of Communications.
This Class [B] digital apparatus complies with Canadian ICES-003.
Cet appareil numérique de la classe [B] est conforme à la norme NMB-003 du Canada.
European Union
The ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N complies with essential
requirements of EU EMC Directive 2004/108/EC and Low Voltage Directive 2006/95/EC as
supported by applying the following test methods and standards:
EN55022: 2006 / A1: 2007
EN55024: 1998 / A1: 2001 / A2 : 2003
EN60950-1: 2005 2nd Edition
EN 61000-3-2:2006
EN 61000-3-3:1995 w/A1: 2001+A2: 2005
GPL License Agreement
GPL may be included in this product; to view the GPL license agreement, go to
.
For GNU General Public License (GPL) related information, please visit
.
Page 395 / 414
Notification of Compliance (Wired)
395
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
Additional Copyrights
AES
Copyright (c) 2001, Dr. Brian Gladman, [email protected], Worcester, UK.
All rights reserved.
TERMS
Redistribution and use in source and binary forms, with or without modification, are permitted
subject to the following conditions:
1.
Redistributions of source code must retain the above copyright notice, this list of
conditions, and the following disclaimer.
2.
Redistributions in binary form must reproduce the above copyright notice, this list of
conditions, and the following disclaimer in the documentation and/or other materials
provided with the distribution.
3.
The copyright holder’s name must not be used to endorse or promote any products
derived from this software without his specific prior written permission.
This software is provided “as is” with no express or implied warranties of correctness or fitness
for purpose.
Open SSL
Copyright (c) 1998–2000 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted
provided that the following conditions are met:
1.
Redistributions of source code must retain the above copyright notice, this list of
conditions, and the following disclaimer.
2.
Redistributions in binary form must reproduce the above copyright notice, this list of
conditions, and the following disclaimer in the documentation and/or other materials
provided with the distribution.
3.
All advertising materials mentioning features or use of this software must display the
following acknowledgment: “This product includes software developed by the OpenSSL
Project for use in the OpenSSL Toolkit (
).
4.
The names “OpenSSL Toolkit” and “OpenSSL Project” must not be used to endorse or
promote products derived from this software without prior written permission. For written
permission, contact [email protected].
5.
Products derived from this software may not be called “OpenSSL” nor may “OpenSSL”
appear in their names without prior written permission of the OpenSSL Project.
6.
Redistributions of any form whatsoever must retain the following acknowledgment: “This
product includes software developed by the OpenSSL Project for use in the OpenSSL
Toolkit (
).
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT “AS IS,” AND ANY
EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young ([email protected]). This
product includes software written by Tim Hudson ([email protected]).

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top