NETGEAR DGFV338 manual FCC Statement, FCC Requirements for Operation in the United States

Page 3

DGFV338 ProSafe Wireless ADSL Modem VPN Firewall Router Reference Manual

Away from potential sources of interference, such as PCs, large metal surfaces, microwaves, and 2.4 GHz cordless phones.

In an elevated location such as a high shelf that is near the center of the wireless coverage area for all mobile devices.

Failure to follow these guidelines can result in significant performance degradation or inability to wirelessly connect to the wireless access point.

To meet FCC and other national safety guidelines for RF exposure, the antennas for this device must be installed to ensure a minimum separation distance of 20cm (7.9 in.) from persons. Further, the antennas shall not be collocated with other transmitting structures.

FCC Statement

DECLARATION OF CONFORMITY

We Netgear,

4500 Great America Parkway

Santa Clara, CA 95054, USA

Tel: +1 408 907 8000

declare under our sole responsibility that the product(s)

DGFV338 (Model Designation)

ProSafe Wireless ADSL Modem VPN Firewall Router (Product Name)

complies with Part 15 of FCC Rules.

Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation

To assure continued compliance, any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. (Example - use only shielded interface cables when connecting to computer or peripheral devices)

FCC Requirements for Operation in the United States

Radio Frequency Interference Warnings & Instructions

This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try and correct the interference by one or more of the following measures:

Reorient or locate the receiving antenna.

Increase the separation between the equipment and receiver.

Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.

Consult the dealer or an experienced radio/TV technician for help.

iii

v1.0, April 2007

Image 3
Contents NETGEAR, Inc Statement of Conditions Placement and Range GuidelinesTechnical Support TrademarksFCC Requirements for Operation in the United States FCC StatementEurope EU Declaration of Conformity Português Bestätigung des Herstellers/Importeurs Certificate of the Manufacturer/ImporterVoluntary Control Council for Interference Vcci Statement Terms Additional CopyrightsViii MD5 DGFV338 Product and Publication DetailsContents Chapter Wireless Configuration Chapter Virtual Private Networking Chapter LAN Configuration Appendix a Default Settings and Technical Specifications Xvi Conventions, Format and Scope About This ManualHow to Print this Manual How to Use This ManualXix Page Chapter Introduction Key Features of the Netgear ProSafe DGFV338Full Routing on Both the Adsl and 10/100 WAN Port Powerful, True Firewall with Content FilteringSecurity Virtual Private Networking VPNAutosensing Ethernet Connections with Auto Uplink Extensive Protocol Support Easy Installation and ManagementSystem Requirements Maintenance and SupportHardware Description Package ContentsNos LEDs Activity Description Object DescriptionsRouter Rear Panel Enter http//192.168.1.1 as the URL Router Login Factory DefaultsPlacement of your Netgear ProSafe DGFV338 Chapter Basic Installation and Configuration Using Adsl Microfilters optional Logging in and Configuring your Internet Connection Configuring Your Internet Connection using Auto Detect V1.0, April Internet Service Connections Manually Configuring your Adsl ConnectionEnter your Internet IP Address Manually Configuring your Ethernet Connection V1.0, April Enter your Internet IP Address V1.0, April V1.0, April V1.0, April Configuring the WAN Mode Use Dedicated WAN port V1.0, April On the Internet Configuring Dynamic DNS If NeededV1.0, April DynDNS Service Screen Traffic Meter Adsl Programming the Traffic MeterParameter Description Traffic Meter ParametersV1.0, April Implementing Wireless Security Chapter Wireless ConfigurationLUHOHVVDWD 6HFXULW\2SWLRQV Understanding Wireless Settings Wireless Access Point Wireless LANsV1.0, April Access Control List Advanced Wireless Router Settings Wireless Advanced OptionsWPA-PSK or WPA2-PSK Pre-Shared Key WEP and WPA/WPA2 Wireless Security Check List FormConfiguring Your Wireless Settings Configuring WEP V1.0, April Configuring WPA-PSK Configuring WPA2-PSK Configuring WPA-PSK and WPA2-PSK Configuring WPA with Radius Configuring WPA2 with Radius Configuring WPA and WPA2 with Radius Restricting Wireless Access by MAC Address V1.0, April V1.0, April Using Rules to Block or Allow Specific Kinds of Traffic Firewall Protection and Content Filtering OverviewAbout Service Based Rules Outbound Rules Service Blocking V1.0, April V1.0, April V1.0, April Outbound Rule Example Blocking Instant Messenger Inbound Rules Port ForwardingV1.0, April V1.0, April V1.0, April V1.0, April Inbound Rule Example a Local Public Web Server Inbound Rule Example One-to-One NAT Mapping V1.0, April Inbound Rule Example Exposed Host Considerations for Inbound Rules Order of Precedence for Rules Customized ServicesV1.0, April Outbound Rules Add Screen Quality of Service QoS PrioritiesWAN Security Checks Attack ChecksManaging Groups and Hosts V1.0, April V1.0, April Groups and Hosts Blocking Internet SitesV1.0, April V1.0, April Enabling Source MAC Filtering Setting up Port Triggering V1.0, April Port triggering Setting a Schedule to Block or Allow Specific Traffic Event Logs and Alerts V1.0, April V1.0, April Security and Administrator Management V1.0, April IP addressing requirements for VPNs in dual WAN port systems Dual WAN Port SystemsSetting up a VPN Connection using the VPN Wizard V1.0, April V1.0, April IKE Policy VPN Tunnel PoliciesIKE Policy Table Managing IKE PoliciesManaging VPN Policies VPN PolicyVPN Policy Table VPN Tunnel Connection StatusCreating a VPN Connection Between FVX538 and DGFV338 Configuring the ProSafe DGFV338V1.0, April V1.0, April V1.0, April V1.0, April Configuring the FVX538 Testing the Connection Configuring the DGFV338Creating a VPN Client Connection VPN Client to DGFV338 V1.0, April Configuring the VPN Client Todgfv Left frame, select Security Policy Todgfv Testing the Connection Certificate Authorities Generate Self Certificate Request, enter the required data Generating a Self Certificate RequestV1.0, April Managing your Certificate Revocation List CRL Uploading a Trusted CertificateUpload Extended Authentication Xauth ConfigurationConfiguring Xauth for VPN Clients V1.0, April User Database Configuration Radius Client Configuration Enter the Primary Radius Server IP address Mode Config Operation Manually Assigning IP Addresses to Remote Users ModeConfigConfiguring the ProSafe DGFV338 V1.0, April V1.0, April Configuring the ProSafe VPN Client for ModeConfig V1.0, April V1.0, April V1.0, April V1.0, April Performance Management Wireless Firewall Features That Reduce TrafficService Blocking Block Sites Wireless Firewall Features That Increase Traffic Source MAC FilteringPort Forwarding V1.0, April Using QoS to Shift the Traffic Mix Port TriggeringVPN Tunnels Administrator and Guest Access Authorization Changing the Passwords and Login Time-outTools for Traffic Management Enabling Remote Management Access Under Allow Remote Management, check the Yes radio box Https//172.21.4.18080 Command Line InterfaceTraffic Limits Reached Event AlertsRouter Status MonitoringRouter Status WAN Ports Internet Traffic V1.0, April Known PCs and Devices LAN Ports and Attached DevicesKnown PCs and Devices table Dhcp LogFirewall Security Port Triggering StatusPort Triggering Status data V1.0, April VPN Tunnels VPN Status Data Using a Snmp ManagerV1.0, April Diagnostics Diagnostics Configuration File Management Settings Backup and Firmware UpgradeBackup and Restore Settings Click default Router Upgrade To upgrade router software Setting the Time ZoneV1.0, April Using the Firewall as a Dhcp server Chapter LAN ConfigurationSecurity and Firewall Protection Configuring the LAN Setup OptionsUsing Address Reservation Configuring Multi Home LAN IPs V1.0, April Gateway IP and DNS server IPs Adding or Editing a Static Route Configuring Static RoutesRouting Information Protocol RIP V1.0, April Static Route Example Enabling Universal Plug and Play UPnPSettings Description UPnP Portmap Table settingsV1.0, April Basic Functions Power LED Not OnTroubleshooting the Web Configuration Interface LEDs Never Turn OffLAN or Internet Port LEDs Not On Troubleshooting the ISP Connection V1.0, April Testing the LAN Path to Your Firewall Troubleshooting a TCP/IP Network Using a Ping UtilityPing -n 10 IP address Testing the Path from Your PC to a Remote DeviceProblems with Date and Time Restoring the Default Configuration and PasswordV1.0, April Table A-1. Default Configuration Settings Default Factory SettingsFeature Default Behavior Table A-2. Technical Specifications Technical SpecificationsSpecification Description Electromagnetic Emissions Appendix B Related Documents V1.0, April Numerics IndexIndex-2 Index-3 Index-4 Index-5 Index-6 Index-7 Index-8
Related manuals
Manual 10 pages 13.59 Kb