Home > 3Com > Router > 3Com Router WL-537 User Manual

3Com Router WL-537 User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual 3Com Router WL-537 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 19 3Com manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							
    E
    END USER SOFTWARE LICENSE
    AGREEMENT
    IMPORTANT: READ BEFORE INSTALLING THE SOFTWARE
    3Com END USER SOFTWARE LICENSE AGREEMENT
    YOU SHOULD CAREFULLY READ THE FOLLOWING TERMS AND CONDITIONS BEFORE DOWNLOADING, INSTALLING AND USING THIS 
    PRODUCT, THE USE OF WHICH IS LICENSED BY 3COM CORPORATION (ì3COMî) TO ITS CUSTOMERS FOR THEIR USE ONLY AS SET FORTH 
    BELOW. DOWNLOADING, INSTALLING OR OTHERWISE USING ANY PART OF THE SOFTWARE OR DOCUMENTATION INDICATES THAT YOU 
    ACCEPT THESE TERMS AND CONDITIONS. IF YOU DO NOT AGREE TO THE TERMS AND CONDITIONS OF THIS AGREEMENT, DO NOT 
    DOWNLOAD, INSTALL OR OTHERWISE USE THE SOFTWARE OR DOCUMENTATION, DO NOT CLICK ON THE "I AGREE" OR SIMILAR BUTTON. 
    AND IF YOU HAVE RECEIVED THE SOFTWARE AND DOCUMENTATION ON PHYSICAL MEDIA, RETURN THE ENTIRE PRODUCT WITH THE 
    SOFTWARE AND DOCUMENTATION UNUSED TO THE SUPPLIER WHERE YOU OBTAINED IT.
    LICENSE:  3Com grants you a nonexclusive, nontransferable (except as specified herein) license to use the accompanying software program(s ) in 
    executable form (the ìSoftwareî) and accompanying documentation (the ìDocumentationî), subject to the terms and restrictions se t forth in this 
    Agreement. You are not permitted to lease, rent, distribute or sublicense (except as specified herein) the Software or Document ation or to use the 
    Software or Documentation in a time-sharing arrangement or in any other unauthorized manner.  Further, no license is granted to  you in the human 
    readable code of the Software (source code).  Except as provided below, this Agreement does not grant you any rights to patents , copyrights, trade 
    secrets, trademarks, or any other rights with respect to the Software or Documentation.
    Subject to the restrictions set forth herein, the Software is licensed to be used on any workstation or any network server owne d by or leased to you, for 
    your internal use, provided that the Software is used only in connection with this 3Com product.  You may reproduce and provide  one (1) copy of the 
    Software and Documentation for each such workstation or network server on which the Software is used as permitted hereunder.  O therwise, the 
    Software and Documentation may be copied only as essential for backup or archive purposes in support of your use of the Softwar e as permitted 
    hereunder.  Each copy of the Software and Documentation must contain 3Com’s and its licensors’ proprietary rights and copyright  notices in the same 
    form as on the original.  You agree not to remove or deface any portion of any legend provided on any licensed program or docum entation delivered to 
    you under this Agreement.
    ASSIGNMENT; NO REVERSE ENGINEERING:   You may transfer the Software, Documentation and the licenses granted herein to another party in the 
    same country in which you obtained the Software and Documentation if the other party agrees in writing to accept and be bound b y the terms and 
    conditions of this Agreement. If you transfer the Software and Documentation, you must at the same time either transfer all cop ies of the Software and 
    Documentation to the party or you must destroy any copies not  transferred. Except as set forth above, you may not assign or transfer your rights under 
    this Agreement.
    Modification, reverse engineering, reverse compiling, or disassembly  of the Software is expressly prohibited. However, if you are a European Union (ìEUî) 
    resident, information necessary to achieve interoperability of the Software with other programs within the meaning of the EU Di rective on the Legal 
    Protection of Computer Programs is available to you from 3Com upon written request.
    EXPORT:   This product, Software and/or technical data (collectively "Product") may contain encryption.  This Product is subject to U.S.  and EU export 
    control laws and regulations and may be subject to export or import regulations in other countries, including controls on encry ption products.  You 
    agree that you will not export, reexport or transfer the Product (or any copies thereof) or any products utilizing the Product  in violation of any applicable 
    laws or regulations of the United States or the country where you legally obtained it.  You are responsible for obtaining any l icenses to export, reexport, 
    transfer or import the Product.  
    In addition to the above, the Product may not be used by, or exported or reexported to (i) any U.S.- or EU- sanctioned or embar goed country, or to 
    nationals or residents of such countries ; or (ii) to any person, entity, organization or other party identified on the U.S. Dep artment of Commerce’s Table 
    of Denial Orders or the U.S. Department of Treasury’s lists of "Specially Designated Nationals and Blocked Persons," as publish ed and revised from time 
    to time; (iii) to any party engaged in nuclear, chemical/biological weapons or missile proliferation activities,  unless author ized by U.S. and local (as 
    required) law or regulations.
    TRADE SECRETS; TITLE:   You acknowledge and agree that the structure, sequence and organization of the Software are the valuable trade secrets of  
    						
    							
    126APPENDIX E: END USER SOFTWARE LICENSE AGREEMENT
    3Com and its suppliers. You agree to hold such trade secrets  in confidence. You further acknowledge and agree that ownership of , and title to, the 
    Software and Documentation and all subsequent copies thereof regardless of the form or media are held by 3Com and its suppliers .
    UNITED STATES GOVERNMENT LEGENDS:   The Software, Documentation and any other technical data provided hereunder is commercial in nature 
    and developed solely at private expense.  The Software is delivered as ìCommercial Computer Softwareî as defined in DFARS 252.2 27-7014 (June 1995) 
    or as a commercial item as defined in FAR 2.101(a) and as such is provided with only such rights as are provided in this Agreem ent, which is 3Com’s 
    standard commercial license for the Software.  Technical data is provided with limited rights only as provided in DFAR 252.227- 7015 (Nov. 1995) or FAR 
    52.227-14 (June 1987), whichever is applicable.
    TERM AND TERMINATION:   The licenses granted hereunder are perpetual unless terminated earli er as specified below. You may terminate the licenses 
    and this Agreement at any time by destroying the Software and Documentation together with all copies and merged portions in any  form. The licenses 
    and this Agreement will also terminate immediately if you fail to comply with any term or condition of this Agreement. Upon suc h termination you 
    agree to destroy the Software and Documentation, together with all copies and merged portions in any form.
    LIMITED WARRANTIES AND LIMITATION OF LIABILITY:  All warranties and limitations of liability applicable to the Software are as stated on the 
    Limited Warranty Card or in the product manual, whether in paper or electronic form, accompanying the Software.   Such warranti es and limitations of 
    liability are incorporated herein in their entirety by this reference. 
    GOVERNING LAW:    This Agreement shall be governed by the laws of the State of California, U.S.A. excluding its conflicts of laws principles and 
    excluding the United Na tions Convention on Contracts for the International Sale of Goods.
    SEVERABILITY:   In the event any provision of this Agreement is found to be invalid, illegal or unenforceable, the validity, legality and enfo rceability of 
    any of the remaining provisions shall not in any way be affected or impaired and a valid, legal and enforceable provision of si milar intent and economic 
    impact shall be substituted therefor.
    ENTIRE AGREEMENT:   This Agreement sets forth the entire understanding and  agreement between you and 3Com and supersedes all prior 
    agreements, whether written or oral, with respect to the Software and Documentation, and may be amended only in a writing signe d by both parties.
    Should you have any questions concerning this Agreement or if you desire to contact 3Com for any reason, please contact the 3Co m subsidiary serving 
    your country, or write: 3Com Corporation, Customer Support Information, 350 Campus Drive, Marlborough, MA  01752-3064
    3Com Corporation
    350 Campus Drive,
    Marlborough, MA 01752-3064
    Copyright © 2004 3Com Corporation and its licensors.  All right s reserved.  3Com is a registered trademark of 3Com Corporation. 
    						
    							
    F
    ISP INFORMATION
    Information 
    Regarding Popular 
    ISPs
    WAN TypesCharacteristicsPopular ISPs
    Dynamic IP
    (Clone MAC)Cable modem ISP, non-hostname 
    based. Need to clone the MAC 
    address in the Advanced tab of 
    the Internet Settings page.MediaOne, RoadRunner, 
    Optimum Online, Time Warner, 
    Charter, Adelphia, Metrocast.
    Dynamic IP
    (Hostname)Cable ISP, Requires Hostname to 
    authenticate ie. cx213818-B. 
    Need to enter the hostname in the 
    Internet Settings page.@Home Network, Cogoco, 
    ComCast, Cox, Excite, Rogers, 
    Shaw, Insight, Videotron
    PPPoE
    (DSL)Usually special software installed 
    on PC, MacPOET/WinPOET, 
    EnterNet 300. The Router has this 
    software built in and you can 
    remove it from your PC. You will 
    need to enter the user name and 
    password that your ISP provided 
    to you in the PPPoE page of the 
    Router. Leave the service name 
    blank unless your ISP requires it.Bell*, Century Tel, Citizens, 
    Primus, Prodigy, Snet, Sprint FC, 
    Verizon, First World, Brightnet, 
    Earthlink, Ameritech, Covad, 
    Mindspring, Sympatico DSL, 
    USwest, Owest, SNet
    PPTPCable or DSL, always on. Some 
    European ISPs require a PPTP 
    tunnel to authenticate their 
    network.KPN (Netherlands), Austria 
    Telecom 
    						
    							
    128APPENDIX F: ISP INFORMATION
    *Bell includes Bell Advantage, Bell Canada, Bell South, PacBell and 
    Southwestern Bell.
    Static
    (DSL)DSL Modem, always on. Need to 
    enter ALL IP information from ISP 
    in the Static IP address section of 
    the Internet Settings page.CableSpeed, Cnet, Direct Link, 
    Drizzle, DSL Extreme, Earthlink 
    Wireless, Fast Point, Flashcom, 
    GTE-WhirlWind, Heavenet, HSA 
    Corp, I-55, InterAccess, LinkLine, 
    Mission, Nauticom, NAS, Omitel, 
    Onterra, Phatpipe, Rhythms, 
    Speakeasy, Sterling, XO, Zyan
    Static
    (Cable)Cable Modem, Always on, ISP 
    assigns specific IP information 
    which needs to be entered on the 
    “Fixed IP” page of the Router.Cox Cable, Sprint, US Cable, 
    Cable-Cable 
    						
    							
    GLOSSARY
    802.11bThe IEEE specification for wireless Ethernet which allows speeds of up to 
    11 Mbps. The standard provides for 1, 2, 5.5 and 11 Mbps data rates. 
    The rates will switch automatically depending  on range and environment.
    802.11g The IEEE specification for wireless Ethernet which allows speeds of up to 
    54 Mbps. The standard provides for 6, 12, 24, 36, 48 and 54 Mbps data 
    rates. The rates will switch automatically depending on range and 
    environment.
    10BASE-T The IEEE specification for 10 Mbps Ethernet over Category 3, 4 or 5 
    twisted pair cable.
    100BASE-TX The IEEE specification for 100 Mbps Fast Ethernet over Category 5 
    twisted-pair cable. 
    Access Point An Access Point is a device through which wireless clients connect to 
    other wireless clients and which acts as a bridge between wireless clients 
    and a wired network, such as Ethernet. Wireless clients can be moved 
    anywhere within the coverage area of  the access point and still connect 
    with each other. If connected to an Ethernet network, the access point 
    monitors Ethernet traf fic and forwards appropriate Ethernet messages to 
    the wireless network, while al so monitoring wireless client radio traffic 
    and forwarding wireless client messages to the Ethernet LAN.
    Ad Hoc mode Ad Hoc mode is a configuration supported by most wireless clients. It is 
    used to connect a peer to peer network toget her without the use of an 
    access point. It offers lower performance than infrastructure mode, which 
    is the mode the Router uses. (see also Infrastructure mode.)
    Auto-negotiation Some devices in the OfficeConne ct range support auto-negotiation. 
    Auto-negotiation is where two devices sharing a link, automatically  
    						
    							
    130GLOSSARY
    configure to use the best common speed. The order of preference (best 
    first) is: 100BASE-TX full duplex, 1 00BASE-TX half duplex, 10BASE-T full 
    duplex, and 10BASE-T half duplex. Au to-negotiation is defined in the IEEE 
    802.3 standard for Ethernet and is an operation that takes place in a few 
    milliseconds.
    Bandwidth The information capacity, measured in bits per second, that a channel can 
    transmit. The bandwidth of Ethernet is  10 Mbps, the bandwidth of Fast 
    Ethernet is 100 Mbps. The bandwidth for 802.11b wireless is 11Mbps.
    Category 3 Cables One of five grades of Twisted Pair (TP) cabling defined by the EIA/TIA-586 
    standard. Category 3 is voice grade cable  and can only be used in 
    Ethernet networks (10BASE-T) to transmit  data at speeds of up to 10 
    Mbps. 
    Category 5 Cables One of five grades of Twisted Pair (TP) cabling defined by the EIA/TIA-586 
    standard. Category 5 can be used in Eth ernet (10BASE-T) and Fast 
    Ethernet networks (100BASE-TX) and  can transmit data up to speeds of 
    100 Mbps. Category 5 cabling is  better to use for network cabling than 
    Category 3, because it supports both Ethernet (10 Mbps) and Fast 
    Ethernet (100 Mbps) speeds.
    Channel Similar to any radio device, the OfficeConnect Cable/DSL Router allows 
    you to choose different radio channels in the wireless spectrum. A 
    channel is a particular frequency with in the 2.4GHz spectrum within 
    which the Router operates.
    Client The term used to described the desktop PC that is connected to your 
    network. 
    DDNS Dynamic Domain Name Server. A method that enables Internet users to 
    tie their domain name(s) to comp uters or servers. DDNS enables a domain 
    name to follow an IP address automatically when the IP address changes.
    DHCP Dynamic Host Configuration Protocol. This  protocol automatically assigns 
    an IP address for every computer  on your network. Windows 95, 
    Windows 98 and Windows NT 4.0  contain software that assigns IP 
    addresses to workstations on a networ k. These assignments are made by 
    the DHCP server software that run s on Windows NT Server, and Windows  
    						
    							
    GLOSSARY131
    95 and Windows 98 will call the server to obtain the address. Windows 
    98 will allocate itself an address if no DHCP server can be found.
    DNS Server Address DNS stands for Domain Name System, which allows Internet host 
    computers to have a domain name (such as 3c om.com) and one or more 
    IP addresses (such as 192.34.45.8). A DNS server keeps a database of 
    host computers and their respective domain names and IP addresses, so 
    that when a domain name is requested (as in typing “3com.com” into 
    your Internet browser), the user is sent  to the proper IP address. The DNS 
    server address used by the compute rs on your home network is the 
    location of the DNS server your ISP has assigned.
    DSL modem DSL stands for digital subscriber line.  A DSL modem uses your existing 
    phone lines to send and receive data at high speeds.
    Encryption A method for providing a level of security to wireless data transmissions. 
    The OfficeConnect Cable/DSL Router and Wireless Cable/DSL Router offer 
    a choice of encryption methods. See “WPA” and “WEP” for details.
    ESSID Extended Service Set Identifier. The ESSID  is a unique identifier for your 
    wireless network. You must have the same ESSID entered into the Router 
    and each of it's wireless clients.
    Ethernet A LAN specification developed jointly by Xerox, Intel and Digital 
    Equipment Corpor ation. Ethernet networks use  CSMA/CD to transmit 
    packets at a rate of 10 Mbps over a variety of cables.
    Ethernet Address See MAC address.
    Fast Ethernet An Ethernet system that is designed to operate at 100 Mbps.
    Firewall Electronic protection that prevents  anyone outside of your network from 
    seeing your files or damaging your computers.
    Full Duplex A system that allows packets to be transmit ted and received at the same 
    time and, in effect, doubles the potential  throughput of a link. 
    						
    							
    132GLOSSARY
    Router A device that acts as a central  hub by connecting to each computer's 
    network interface card and managing the  data traffic between the local 
    network and the Internet.
    Half Duplex A system that allows packets to transmitted and received, but not at the 
    same time. Contrast with full duplex. 
    Hub A device that regenerates LAN traffic so  that the transmission distance of 
    that signal can be extended. Hubs are similar to repeaters, in that they 
    connect LANs of the same type; however they connect more LANs than a 
    repeater and are gener ally more sophisticated.
    IEEE Institute of Electrical and  Electronics Engineers. This American 
    organization was founded in 1963 and sets standards for computers and 
    communications.
    IETF Internet Engineering Task Force. An organization responsible for 
    providing engineering solutions for  TCP/IP networks. In the network 
    management area, this group is responsible  for the development of the 
    SNMP protocol.
    Infrastructure mode Infrastructure mode is the wireless configuration supported by the Router. 
    You will need to ensure all of your clients are set up to use infrastructure 
    mode in order for them to communicate with the Access Point built into 
    your Router. (see also Ad Hoc mode)
    IP Internet Protocol. IP is a layer 3 network protocol that is the standard for 
    sending data through a network. IP is part of the TCP/IP set of protocols 
    that describe the routing of packets to addressed devices. An IP address 
    consists of 32 bits divided into two or three fields: a network number and 
    a host number or a network number, a subnet number, and a host 
    number.
    IP Address Internet Protocol Address. A unique  identifier for a device attached to a 
    network using TCP/IP. The address is wr itten as four octets separated with 
    periods (full-stops), and is made up of  a network section, an optional 
    subnet section and a host section. 
    						
    							
    GLOSSARY133
    ISPInternet Service Provider. An ISP is a business that provides connectivity to 
    the Internet for individuals and ot her businesses or organizations.
    LAN Local Area Network. A network of end stations (such as PCs, printers, 
    servers) and network devices (hubs and switches) that cover a relatively 
    small geographic area (usually not larger than a  floor or building). LANs 
    are characterized by high transmission speeds over short distances (up to 
    1000 metres).
    MAC Media Access Control. A protocol specified by the IEEE for determining 
    which devices have access to a network at any one time.
    MAC Address Media Access Control Address. Also called the hardware or physical 
    address. A layer 2 address associated with a particular network device. 
    Most devices that connect to a LAN have a MAC address assigned to 
    them as they are used to identify other  devices in a network. MAC 
    addresses are 6 bytes long. 
    NAT Network Address Translation. NAT enables all the computers on your 
    network to share one IP address. The NAT capability of the Router allows 
    you to access the Internet from any computer on your home network 
    without having to purchase more IP addresses from your ISP.
    Network A Network is a collection of comput ers and other computer equipment 
    that are connected for the purpose  of exchanging information or sharing 
    resources. Networks vary in size, some are within a single room, others 
    span continents.
    Network Interface Card (NIC) A circuit board installed into a piece of computing equipment, for 
    example, a computer, that enables you to connect it to the network. A 
    NIC is also known as an adapter or adapter card.
    Protocol A set of rules for communication between devices on a network. The 
    rules dictate format, timing, sequencing and error control.
    PPPoE Point-to-Point Protocol over Ethernet.  Point-to-Point Protocol is a method 
    of data transmission originally created for dial-up connections; PPPoE is 
    for Ethernet connections. 
    						
    							
    134GLOSSARY
    PPTP Point-to-Point Tunneling Protocol is a method of secure data transmission 
    between two remote sites over the internet.
    RIP Routing Information Protocol. RIP a llows an administrator to set up 
    routing information on one RIP enab led device, and have that routing 
    information replicated to all RIP enabled devices on the network. 
    RJ-45 A standard connector used to connect Ethernet networks. The “RJ” 
    stands for “registered jack”.
    Server A computer in a network that is shar ed by multiple end stations. Servers 
    provide end stati ons with access to shared network services such as 
    computer files and printer queues.
    SPI Stateful Packet Inspection. This feature requires the firewall to remember 
    what outgoing requests have been sent and only allow responses to 
    those requests back through the firewall. This way, un-requested 
    attempts to access the network will be denied.
    SSID Service Set Identifier. Some vendors of wireless products use SSID 
    interchangeably with ESSID.
    Subnet Address An extension of the IP addressing scheme that allows a site to use a single 
    IP network address for multiple physical networks. 
    Subnet mask A subnet mask, which may be a part of the TCP/IP information provided 
    by your ISP, is a set of four numb ers configured like an IP address. It is 
    used to create IP address numbers use d only within a particular network 
    (as opposed to valid IP address num bers recognized by the Internet, 
    which must assigned by InterNIC).
    Subnets A network that is a co mponent of a larger network. 
    Switch A device that interconnects several LANs to form a single logical LAN that 
    comprises of several LAN segments. Switches are similar to bridges, in 
    that they connect LANs of a different type; however they connect more 
    LANs than a bridge and are generally more sophisticated. 
    						
    All 3Com manuals Comments (0)