Note that these tech- niques may not solve the problem. If the Power Light is not illuminated when the power cord is plugged in, the Gateway has suffered a critical error and technical support should be contacted. The Gateway is successfully configured and ready for use. Wireless 11ac bonded vdsl2 modem gateway with moca 2. Read the on-screen information, then unplug all telephones and other devices from their phone jacks. A congratulations window appears.
|Date Added:||11 March 2011|
|File Size:||36.49 Mb|
|Operating Systems:||Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X|
|Price:||Free* [*Free Regsitration Required]|
The settings are configured. Of course, you can build a strong hash password with special character, numbers, greek and latin. Wireless Light – The Wireless light illuminates when the Modem is connected wirelessly. These addresses should be included on the 7. Electronic Security Appendix C Computer Security Network Applications Network applications such gf701 software actiintec that allow remote access to the computer also make the computer vulnerable to access from other people on the Internet.
Troubleshooting This chapter contains a list of problems that may be encountered while using the Gateway, and techniques to try and overcome the problem. The Network window appears. Page 92 Chapter 8 Setting Up a Network 9.
ACTIONTEC GTWG USER MANUAL Pdf Download.
Read the instructions, select Initial Setup by clicking on the appropriate check box, then click Next. Plug the other end of the yellow Ethernet cable into an Ethernet port on the back of the computer.
Of course, if you have any questions or need further assistance you may contact us. Disabling NAT allows the computers connected to the Gateway to be accessed by outside parties. After connecting your Modem and powering it on, start your computer and follow these steps: Confirm the Power light on the front of the Gateway glows solid green, then click Next.
All computers using Public have the Public Addresses statically assigned. Plug a phone filter into every phone actiobtec with a telephone or other device connected to it, then plug the ends of the phone lines disconnected in step 3 into the phone filters plugged into wall jacks. An example of a create a set of -bit ate circles, then enter five hexadecimal digit pairs in each Key text box Key 1- Key 2- Key 3- Key Actiintec Chapter 8 Setting Up a Network 1.
Find a seamless wireless channel instead of what the router finds automatically.
ActionTec GT701-WG User Manual
We can remind you though? By pressing ‘print’ button you will print only current page. Time for a bulletin on the fridge, folks! Chapter 2 Setting Up the Gateway 2.
Transparent Bridging Select this option to use the Gateway as a transparent bridge. If a password is not set, someone on the Internet can access the Gateway and change its configuration or steal your login name and password.
Actiontec GTWG | eBay
Select the appropriate modem payment option, then click Next. Appendix C Computer Security Network Applications Network applications such as software programs that allow remote access to the computer also make the computer vulnerable to access from other people on the Internet. Chapter 2 Setting Up the Gateway Read the instructions, select Adding Computers by clicking on the appropriate check box, then adtiontec Next.
Each key comprises five hexa- decimal digit pairs. Page 90 Chapter 8 Setting Up a Network 5. If the Main Menu screen does not appear, make sure the Ethernet cable is properly connected.
Do not unplug the power cord from the Modem during the Reset process, the Upgrade firmware process, or the Restore Default Settings process. The computer is connected to the network via USB.
Security checklist for Actiontec GT701-WG router
The connections should look like the configuration in the picture, below if the first computer is connected via Ethernet; if the first computer is connected via USB, the purple cable will be plugged into the purple port.
If the document is not available, contact the immediately. actionted
The latter three options are different types of wireless security.