User manual MOTOROLA BR700

Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Lastmanuals provides you a fast and easy access to the user manual MOTOROLA BR700. We hope that this MOTOROLA BR700 user guide will be useful to you.

Lastmanuals help download the user guide MOTOROLA BR700.


Mode d'emploi MOTOROLA BR700
Download

You may also download the following manuals related to this product:

   MOTOROLA BR700 DATA SHEET (64 ko)
   MOTOROLA BR700 SUPPLEMENTARY GUIDE (107 ko)

Manual abstract: user guide MOTOROLA BR700

Detailed instructions for use are in the User's Guide.

[. . . ] User Guide Ethernet Broadband Router BR700 WARNING: TO PREVENT FIRE OR SHOCK HAZARD, DO NOT EXPOSE THIS PRODUCT TO RAIN OR MOISTURE. THE UNIT MUST NOT BE EXPOSED TO DRIPPING OR SPLASHING. DO NOT PLACE OBJECTS FILLED WITH LIQUIDS, SUCH AS VASES, ON THE UNIT. CAUTION: TO ENSURE REGULATORY COMPLIANCE, USE ONLY THE PROVIDED POWER AND INTERFACE CABLES. [. . . ] The URL that the recipient of the policy is able to access. For example, a Kid Policy would be able to access: www. kids. com. Separate multiple URLs with semicolons. Policy Table Policy Name Allowed URL SECTION 3, CONFIGURATION 3-11 SECTION 3 Field Denied URL Description CONFIGURATION The URL that the recipient of the policy isn't able to access. For example, a Kid Policy would not be able to access: www. Words that deny Internet access to the PC whenever the PC encounters them. For example, the word "cormorant" will deny the PC access to www. audubon. org. Separate multiple Keywords with semicolons. URL Filter Keyword Schedule The time of day that the policy is in effect. This will use MAC addresses for filtering. You can enter multiple MAC addresses for a single policy or multiple policies for a single MAC address. Manually enter a MAC Address or click on a Learned MAC Address. Click Add (below MAC Address) to enter it into the MAC Filter list. You can Update and Remove MAC Address in the table by selecting it and performing the action. MAC Filter Learned MAC Address(es) The MAC address(es) discovered on the LAN appear here. 3-12 SECTION 3, CONFIGURATION CONFIGURATION To create a policy, follow this procedure: 1 2 Enter a Name in the Policy Name field. SECTION 3 Decide if you want to Allow or Deny a URL. You can add more than one URL, separated by semicolons. The following selections are optional for the policy: !Enable a time-based policy by enabling and selecting the time/date options. Select a MAC Address to which the policy will apply. You can easily select a MAC Address by clicking one in the Learned MAC Address field. 3 Click Add (below the Policy table) to save the policy. Parental Control - URL Log This screen enables you to view URLs (web site addresses) that have been accessed by PCs on your network. To access the screen, click PARENTAL CONTROL > URL LOG. Click Refresh to update the list with the latest URL Log. SECTION 3, CONFIGURATION 3-13 SECTION 3 Field Time MAC Visited URL Description CONFIGURATION Displays the time of access. The URL (website) that the PC has accessed. Configuring Networking Settings The Configuring Networking subsections describe the settings that enable you to configure your router to work with your Local Area Network (LAN). Generally use the default settings, as deeper knowledge of computer networking is required when adjusting these settings. The following screens are available in Networking: ! [. . . ] A switch is more advanced because it can connect more than two segments. T TCP Transmission Control Protocol on OSI Transport Layer 4 provides reliable transport over the network for data transmitted using IP (network layer three). It is an end-to-end protocol defining rules and procedures for data exchange between hosts on top of connectionless IP. TCP uses a timer to track outstanding packets, 5-8 SECTION 5, GLOSSARY GLOSSARY SECTION 5 checks error in incoming packets, and retransmits packets if requested. TCP/IP The Transmission Control Protocol/Internet Protocol suite provides standards and rules for data communication between networks on the Internet. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE MOTOROLA BR700

Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets...
In any way can't Lastmanuals be held responsible if the document you are looking for is not available, incomplete, in a different language than yours, or if the model or language do not match the description. Lastmanuals, for instance, does not offer a translation service.

Click on "Download the user manual" at the end of this Contract if you accept its terms, the downloading of the manual MOTOROLA BR700 will begin.

Search for a user manual

 

Copyright © 2015 - LastManuals - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.

flag