Page 66 / 72 Scroll up to view Page 61 - 65
Chapter 4: Additional Information
64
Chapter 4
FCC Declaration of Conformity and Industry Canada Information
This device complies with Part 15 of the FCC Rules.
Operation is subject to the following two
conditions: (1) this device may not cause harmful interference, and (2) this device must accept
any interference received, including interference that may cause undesired operation.
Trade Name: RCA
Model: DCW725
Thomson
Model: TCW720, TCW725
Equipment Classification:
Computing Device Accessory
Responsible Party:
Thomson Inc.
10330 N. Meridian Street
Indianapolis, IN 46290
Telephone
580-634-0151
This equipment has been tested and found to comply with the limits for a Class B digital device,
pursuant to Part 15 of the FCC Rules.
These limits are designed to provide reasonable protection
against harmful interference in a residential installation.
This equipment generates, uses, and can
radiate radio frequency energy and, if not installed and used in accordance with the instructions,
may cause harmful interference to radio communications.
However there is no guarantee that
interference will not occur in a particular installation.
If this equipment does cause harmful
interference to radio or television reception, which can be determined by turning the equipment
off and on, the user is encouraged to try and correct the interference by one or more of the
following measures:
• Reorient or relocate the receiving antenna.
• Increase the separation between the equipment and receiver.
• Connect this equipment into an outlet on a circuit different from that to which the receiver is
connected.
• Consult your service provider or an experienced radio/TV technician for help.
FCC regulations state that unauthorized changes or modifications to this equipment may void the
user’s authority to operate it.
This Class B digital apparatus meets all requirements of the Canadian Interference Causing
Equipment Regulations.
Page 67 / 72
Chapter 4: Additional Information
Chapter 4
65
Product Specifications
WAN
Cable Interface F type female 75 ohm
LAN
4 10/100 BASE-T 1 USB, 1.1 Connector Type B, 1 IEEE 802.11b/g (2.4
GHz Unlicensed ISM radio band)
System Power
9-12V / 1A
EMI/EMC
FCC Class B, CE Class B, VCCI Class B.
Operation Requirement
Operating Temp. 0ºC to 40ºC (32ºF to 104ºF) Storage Temp. -20ºC to
70ºC (-4ºF to 158ºF) Operating
Humidity
10% to 85% Non-Condensing Storage Humidity 5% to 90% Non-
Condensing
Dimensions
186 x 155 x 63 (mm)
Main features:
Cable Modem Connection
DOCSIS 1.0, 1.1, and 2.0 RFI compliant
All DOCSIS 2.0 modulation types auto detection downstream
All DOCSIS 2.0 modulation types auto detection upstream
Fragmentation and concatenation enabling Quality of Service (QoS) features
IP and LLC filtering
USB Interface
USB 1.1 compliant full speed (12 Mbps) device interface for Windows 98SE, Windows 2000,
Windows Me, or Windows XP
Page 68 / 72
Chapter 4: Additional Information
66
Chapter 4
Wireless Interface
11 Mbps IEEE 802.11b and 54 Mbps 802.11g Wireless LAN
Frequency band: 2400-2497 MHz
Supports 64/128 bit RC4 authentication and encryption
Auto fallback to lower data rates as wireless gateway <=> PC distance increases
Communicates with all Wi-Fi certified wireless adapters
Wired Equivalent Privacy (WEP) and WiFi Protected Access (WPA) security
Networking
IEEE 802.1d compliant bridging
DHCP Client
DHCP Server
DNS Relay
ARP
ICMP
FTP/TFTP
Telnet
Security and Firewall
Password protected configuration via web browser
IP filtering; allows you to configure IP address filters
MAC filtering; allows you to configure MAC address filters
Port filtering; allows you to configure TCP/UDP port filters
URL content filtering
URL filtering blocks Proxy, Cookies, Java and ActiveX
Traffic and Security Event log
PAP and CHAP authentication with PPP
Page 69 / 72
Chapter 4: Additional Information
Chapter 4
67
Stateful Packet Inspection to protect against both Denial of Service and Distributed Denial of
Service attacks, including:
• Reassembly attacks
SYN Attack (SYN Flood)
• ICMP Flood
Ping of Death Attack
• Tear Drop Attack
• IP Spoofing Attack
• LAND Attack
• Jolt
Winnuke Attack (Netbios out-of-bound)
• OverDrop
• BONK, BOINK
• Blind Spoofing
• Echo/Chargen
• Storm
• Smurf Attack
• Mime Flood
De-Militarized Zone (DMZ) support, allowing a LAN side computer to expose all non-filtered
ports to the WAN
URL keyword blocking for web access control
NAT
With popular ALG support
With port triggers
With port forwarding, including support for:
Page 70 / 72
Chapter 4: Additional Information
68
Chapter 4
FTP
IRC
H.323
Quake
Blizzard games
Chat ALG
Real Audio/Video
CUSEEME
Netmeeting
MS Games (excluding game zone)
DIABOLO II
Activision Games
PCAnywhere
SSL
NNTP
Virtual Private Network (VPN) Feature
PPTP and IPSec pass-through can be enabled/disabled

Rate

3.5 / 5 based on 2 votes.

Popular RCA Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top