User manual PHILIPS SNB5600

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual PHILIPS SNB5600. We hope that this PHILIPS SNB5600 user guide will be useful to you.


PHILIPS SNB5600 : Download the complete user guide (2549 Ko)

You may also download the following manuals related to this product:

   PHILIPS SNB5600 (3476 ko)
   PHILIPS SNB5600 (3028 ko)
   PHILIPS SNB5600 (2351 ko)
   PHILIPS SNB5600 (2378 ko)
   PHILIPS SNB5600 (3024 ko)
   PHILIPS SNB5600 (5247 ko)
   PHILIPS SNB5600 (2379 ko)
   PHILIPS SNB5600 (2308 ko)
   PHILIPS SNB5600 (2554 ko)

Manual abstract: user guide PHILIPS SNB5600

Detailed instructions for use are in the User's Guide.

[. . . ] Register your product and get support at www. philips. com/welcome SNB5600 EN Wireless Router Table of contents 1 1. 1 1. 2 1. 3 1. 4 1. 5 1. 6 1. 7 2 2. 1 2. 2 2. 3 2. 4 3 3. 1 3. 2 3. 3 3. 4 3. 4. 1 3. 4. 2 4 4. 1 4. 2 4. 3 4. 3. 1 4. 3. 2 4. 3. 3 4. 4 4. 4. 1 4. 4. 2 4. 4. 3 4. 4. 4 4. 4. 5 4. 5 Important Safety information Network range & speed information Conformity Recycling and disposal FCC Radiation Exposure Statement Software licenses Disclaimer Your Wireless Router What's in the box What else will you need Overview of the front side of the wireless router Overview of the rear side of the wireless router Getting started Install Connect Connection overview Install a WiFi device Install a Wireless USB adapter SNB5600 Install another WiFi device Configuring the Wireless Router Log on the webpages Webpages' menu structure SYSTEM Time zone Password Settings Remote management WAN Dynamic IP Address PPPoE Static IP Address Clone MAC Address DNS LAN 2 2 2 2 2 2 2 2 3 4. 8 3 3 4 4 5 5 5 6 7 7 7 8 8 8 8 8 9 9 9 9 9 10 10 10 10 5 6 Technical data Frequently asked questions 17 18 4. 8. 1 4. 8. 2 4. 8. 3 4. 8. 4 4. 8. 5 4. 8. 6 4. 9 4. 10 4. 11 4. 11. 1 4. 11. 2 4. 11. 3 4. 12 4. 13 4. 13. 1 4. 13. 2 4. 13. 3 4. 13. 4 FIREWALL Access Control MAC Filter URL blocking Schedule rule Intrusion detection DMZ UPnP DDNS TOOLS Configuration Tools Firmware Upgrade Reset STATUS SET UP WIZARD Getting started Time zone Wireless settings Connection type settings 12 13 13 13 13 13 14 14 14 15 15 15 15 15 16 16 16 16 16 4. 6 4. 6. 1 4. 6. 2 4. 6. 3 4. 7 4. 7. 1 4. 7. 2 4. 7. 3 4. 7. 4 WIRELESS Channel and SSID Access control Security NAT Address Mapping Virtual server Special Applications NAT Mapping Table 10 10 11 11 11 12 12 12 12 Table of contents 1 1 Important 1. 4 Recycling and disposal Disposal instructions for old products : The WEEE directive (Waste Electrical and Electronic Equipment Directive ; 2002/96/EC) has been put in place to ensure that products are recycled using best available treatment, recovery and recycling techniques to ensure human health and high environmental protection. Your product is designed and manufactured with high quality materials and components, which can be recycled and reused. Do not dispose of your old product in your general household waste bin. Inform yourself about the local separate collection system for electrical and electronic products marked by this symbol : Take time to read this user manual before you use your Wireless Router. [. . . ] 802. 1X The router can transmit your data securely over the wireless network. Matching security mechanisms must be setup on your router and wireless client devices. You can choose the allowed security mechanisms in this page and configure them in the sub-pages. WEP If 802. 1x is used in your network, then you should enable this function for the Wireless Router. These parameters are used for the Wireless Router to connect to the authentication server. 4. 7 NAT If you use WEP to protect your wireless network, you need to set the same parameters for the Wireless Router and all your wireless clients. You may automatically generate encryption keys or manually enter the keys. To generate the key automatically with passphrase, check the Passphrase box, enter a string of characters. Note The passphrase can consist of up to 32 alphanumeric characters. Configuring the Wireless Router Network Address Translation allows multiple users to access the Internet sharing one public IP. Check the box to enable the NAT module function. 11 4. 7. 1 Address Mapping 4. 7. 3 Special Applications Allows one or more public IP addresses to be shared by multiple internal users. This also hides the internal network for increased privacy and security. Enter the Public IP address you wish to share into the Global IP field. Enter a range of internal IPs that will share the global IP into the "from" field. Some applications require multiple connections, such as Internet gaming, video-conferencing, and Internet telephony. These applications may not work when Network Address Translation (NAT) is enabled. If you need to run applications that require multiple connections, use these pages to specify the additional public ports to be opened for each application. 4. 7. 2 Virtual server 4. 7. 4 NAT Mapping Table If you configure the Wireless Router as a virtual server, remote users accessing services such as web or FTP at your local site via public IP addresses can be automatically redirected to local servers configured with private IP addresses. In other words, depending on the requested service (TCP/UDP port number), the Wireless Router redirects the external service request to the appropriate server (located at another internal IP address). For example, if you set Type/Public Port to TCP/80 (HTTP or web) and the Private IP/Port to 192. 168. 2. 2/80, then all HTTP requests from outside users will be transferred to 192. 168. 2. 2 on port 80. Therefore, by just entering the IP address provided by the ISP, Internet users can access the service they need at the local address to which you redirect them. A list of ports is maintained at the following link : http://www. iana. org/assignments/ports-numbers This page displays the current NAPT (Network Address Port Translation) address mappings. 4. 8 FIREWALL The Wireless Router's firewall inspects packets at the application layer, maintains TCP and UDP session information including time-outs and the number of active sessions, and provides the ability to detect and prevent certain types of network attacks. 12 Configuring the Wireless Router Network attacks that deny access to a network device are called Denial-of-Service (DoS) attacks. DoS attacks are aimed at devices and networks with a connection to the Internet. Their goal is not to steal information, but to disable a device or network so users no longer have access to network resources. The Wireless Router firewall function protects against the following DoS attacks : IP Spoofing, Land Attack, Ping of Death, IP with zero length, Smurf Attack, UDP port loopback, Snork Attack, TCP null scan, and TCP SYN flooding. The firewall does not significantly affect system performance, so we advise leaving it enabled to protect your network. [. . . ] "Restore" can be used to restore the saved backup configuration file. "Restore to Factory Defaults" resets the Wireless Router to the original settings. You will be asked to confirm your decision. 4. 11. 2 Firmware Upgrade The Status page displays WAN/LAN connection status, firmware, and hardware version numbers, illegal attempts to access your network, as well as information on DHCP clients connected to your network. The security log may be saved to a file by clicking "Save" and choosing a location. Use the Firmware Upgrade screen to update the firmware or user interface to the latest versions. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE PHILIPS SNB5600




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual PHILIPS SNB5600 will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.