WiFi Chime C-1030 User Manual Version: 2.0 TECOM CO., LTD.
Ver.2.0 Safety Precautions Please follow these safety precautions to prevent injury or damage to property that may be caused by fire or electrical damage. DOs: 1.) Use the type of power recommended as seen on the label of your device. 2.) Use the power adapter in the product package. 3.) Pay attention to the power load of the outlet or prolonged lines. An overburdened power outlet, damaged lines or plugs may cause electric shock or even fire.
Ver.2.0 2 Northern America FCC Statement This equipment generates uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions in this manual, may cause interference to radio communications. This equipment as been tested and found to comply with the limits for a Class B computing device pursuant to Subpart J of Part 15 of FCC rules, which are designed to provide reasonable protection against radio interference when operated in a commercial environment.
Ver.2.0 Revision History Version Date Update Log Author 2.0 2nd version for C-1030 User Manual.
Ver.2.0 1 . PRODUCT OVERVIEW C-1030, networking standard compliant Wireless adapter, provides the best quality data transmission for the truly high‐speed ‘connected home’ experience. It allows users to extend a local area network via existing Wireless. Installation at home (or in a small office) is quick and easy as the C1030 comes with plug‐and‐play technology. C-1030 supports (802.
Ver.2.0 3. C-1030 Web Configuration 3.1. Login Page Figure3.1‐1 shows the login window. Here, the login information should be filled in as shown below: Figure 3.1‐1 The default IP address of the C-1030 Wireless is 10.10.10.
Ver.2.0 3.2. Quick Setup Figure3.2‐1 displays the Quick setup page of the device. Figure 3.2‐1 Using quick setup we can configure below list.
Ver.2.0 3.3. Basic Setup Figure3.3‐1 shows basic setup of the device Figure 3.
Ver.2.0 3.3.1. Operation Mode Figure3.3.1‐1 displays operation mode settings Figure 3.3.1‐1 In this page we can set bridge mode or gateway mode 3.3.2. WAN Figure3.3.3‐1, Figure3.3.3‐2, Figure3.3.3‐3 and Figure3.3.3‐4 displays WAN settings information WAN has static, DHCP, PPPoE and 3G connection types.
Ver.2.0 Figure3.3.
Ver.2.0 Figure3.3.
Ver.2.0 Figure3.3.3‐3 PPPoE Select this option if your ISP requires you to use a PPPoE connection. This option is typically used for DSL services. Select Dynamic PPPoE to obtain an IP address automatically for your PPPoE connection. Select Static PPPoE to use a static IP address for your PPPoE connection. Please enter the information accordingly. Username: Enter your username for your PPPoE connection.
Ver.2.0 down automatically. And once there is traffic send or receive, the connection will be automatically on. 3.3.3. Wireless Figure3.3.4‐1 and Figure3.3.4‐2 displays basic wireless information The following page is Wireless LAN settings. Please select and input the correct information in the following item to set Wireless function. Figure 3.3.
Ver.2.0 Figure 3.3.4‐2 We can configure below settings using basic wireless settings page SSID: The SSID is a unique name to identify the DSL Router in the wireless LAN. Wireless clients associating to the DSL Router must have the same SSID. Broadcast SSID: Select No to hide the SSID such that a station can not obtain the SSID through passive scanning. Select yes to make the SSID visible so a station can obtain the SSID through passive scanning. Channel ID the range of radio frequencies used by IEEE 802.
Ver.2.0 3.4. Advanced Setup Figure3.4‐1 shows Advanced Setup menu list Figure 3.4‐1 3.4.1. Advanced Wireless Figure3.4.1‐1, Figure3.4.1‐2, Figure3.4.
Ver.2.0 The following page is Advanced Wireless settings. Please select and input the correct information in the following item to set Wireless functions. Figure 3.4.
Ver.2.0 Figure 3.4.1‐2 Figure 3.4.
Ver.2.0 Beacon Interval The Beacon Interval value indicates the frequency interval of the beacon. Enter a value between 20 and 1000. A beacon is a packet broadcast by the Router to synchronize the wireless network. DTIM This value, between 1 and 255, indicates the interval of the Delivery Traffic Indication Message (DTIM).
Ver.2.0 3.4.2. Security Figure3.4.2‐1, Figure3.4.2‐2, Figure3.4.2‐3, and Figure3.4.2‐4 shows wireless Security information Figure 3.4.
Ver.2.0 Figure 3.4.2‐2 Figure 3.4.2‐3 Figure 3.4.2‐4 Using this page we can set SSID choice, Security mode, Access Policy and WPA.
Ver.2.0 Security Mode OPEN WEP WEP (Wired Equivalent Privacy) encrypts data frames before transmitting over the wireless network. Select Disable to allow all wireless computers to communicate with the access points without any data encryption. Select 64‐ bit WEP or 128‐bit WEP to use data encryption. Key#1~Key#4 The WEP keys are used to encrypt data. Both the DSL Router and the wireless clients must use the same WEP key for data transmission.
Ver.2.0 with the use of the optional Pre‐Shared Key (PSK) authentication, which was designed for home users without an enterprise authentication server. To encrypt a network with WPA2‐PSK you provide your router not with an encryption key, but rather with a plain‐English passphrase between 8 and 63 characters long. Using a technology called TKIP (for Temporal Key Integrity Protocol), that passphrase, along with the network SSID, is used to generate unique encryption keys for each wireless client.
Ver.2.0 3.4.3. WPS Figure3.4.3‐1, Figure3.4.3‐2 shows WPS settings Wi‐Fi Protected Setup (WPS; originally Wi‐Fi Simple Configuration) is a network security standard that attempts to allow users to easily secure a wireless home network but could fall to brute‐force attacks if one or more of the network's access points do not guard against the attack. Figure 3.4.
Ver.2.0 Figure 3.4.3‐2 WPS Settings There two WPS mode, one is PIN code and other one is PBC. PIN method in which a personal identification number (PIN) has to be read from either a sticker or display on the new wireless device. This PIN must then be entered at the "representant" of the network, usually the network's access point. Alternately, a PIN provided by the access point may be entered into the new device. This method is the mandatory baseline mode and every WPScertified product must support it.
Ver.2.0 Example of configuration 1. Make sure WPS is enabled on system wise. 2. For Pin method 1). Select radio button PIN method. 2). Enable your Wi‐Fi client (Notebook, Mobile, PAD…etc). And check WPS. 3). Take PIN at client and specify same one in your AP device. 4). Click “Apply“below “WPS Progress” table to trigger WPS session. 5). Once connected, “WPS current status” will be put “Connected”.
Ver.2.0 3. For PBC at Web 1). Select the following radio button, and click “Apply” Button to trigger WPS session. 2). at Wi‐Fi client side, select PBC method. Within 2 minutes, they are automatically connected. 3). Once connected, “WPS current status” will be put “Connected”. 4. For physical PBC on the housing: 1). Special Note: WPS is enabled on system wise.
Ver.2.0 2). At wifi client side, select PBC method. 3). Within 2 minutes, please push physical PBC button at housing. 3.4.4. Station List Figure3.4.4‐1 display the wireless network station list Figure 3.4.4‐1 3.4.5. Routing Figure3.4.5‐1, Figure3.4.
Ver.2.0 Figure 3.4.5‐1 Figure 3.4.5‐2 3.4.6. Port Forwarding Figure3.4.6‐1, Figure3.4.
Ver.2.0 Figure 3.4.
Ver.2.0 Figure 3.4.6‐2 3.4.7. DMZ Settings Figure3.4.7‐1 displays DMZ settings page The De‐Militarized Zone (DMZ) is a network which, when compared to the LAN, has fewer firewall restrictions, by default. This zone can be used to host servers (such as a web server, ftp server, or email server, for example) and give public access to them. The eighth LAN port on the router can be dedicated as a hardware DMZ port for safely providing services to the Internet, without compromising security on your LAN.
Ver.2.0 FCC+IC USER WARNING 1.§ P15.21 Information to user. Notice: Any changes or modifications not expressly approved by the party responsible for compliance could void your authority to operate the equipment. 法文: Aucune modification apportée à l’appareil par l’utilisateur, quelle qu’en soit la nature. Tout changement ou modification peuvent annuler le droit d’utilisation de l’appareil par l’utilisateur. 2.§ P15.105 Information to the user.
Ver.2.0 Note: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
Ver.2.0 3.§ P15.19 FCC Labelling requirement Notice: This device complies with Part 15 of the FCC Rules and Industry Canada license‐exempt RSS standard(s). Operation is subject to the following two conditions: (1) this device may not cause interference, and (2) this device must accept any interference, including interference that may cause undesired operation of the device. 法文: Le présent appareil est conforme aux CNR d'Industrie Canada applicables aux appareils radio exempts de licence.