User Guide
Page 2
... BE IN ACCORDANCE WITH NATIONAL WIRING CODES AND CONFORM TO LOCAL REGULATIONS. CAUTION: CHANGES AND MODIFICATIONS NOT EXPRESSLY APPROVED BY MOTOROLA FOR COMPLIANCE COULD VOID USER'S AUTHORITY TO OPERATE THE EQUIPMENT. When using this equipment. Overloaded AC outlets, extension cords, frayed power cords, damaged ... Do not overload outlets or extension cords, as this can result in a risk of the instructions listed here and/or in the user manual before you operate this device, basic safety precautions should always be fully inserted with all warning and caution statements in a shock or fire...
... BE IN ACCORDANCE WITH NATIONAL WIRING CODES AND CONFORM TO LOCAL REGULATIONS. CAUTION: CHANGES AND MODIFICATIONS NOT EXPRESSLY APPROVED BY MOTOROLA FOR COMPLIANCE COULD VOID USER'S AUTHORITY TO OPERATE THE EQUIPMENT. When using this equipment. Overloaded AC outlets, extension cords, frayed power cords, damaged ... Do not overload outlets or extension cords, as this can result in a risk of the instructions listed here and/or in the user manual before you operate this device, basic safety precautions should always be fully inserted with all warning and caution statements in a shock or fire...
User Guide
Page 5
... is 50 ohms. To reduce potential radio interference to other users, the antenna type and its transmit antenna) that required for successful communication. Motorola may make improvements or changes in the product(s) described in this manual at least 20 cm (8 inches). Microsoft Windows screen shots...FCC Certification This product contains a radio transmitter and accordingly has been certified as translation, transformation or adaptation) without written permission from Motorola, Inc. To comply with 47 CFR Part 15 of Industry Canada. Equipment (or its gain should be so chosen that ...
... is 50 ohms. To reduce potential radio interference to other users, the antenna type and its transmit antenna) that required for successful communication. Motorola may make improvements or changes in the product(s) described in this manual at least 20 cm (8 inches). Microsoft Windows screen shots...FCC Certification This product contains a radio transmitter and accordingly has been certified as translation, transformation or adaptation) without written permission from Motorola, Inc. To comply with 47 CFR Part 15 of Industry Canada. Equipment (or its gain should be so chosen that ...
User Guide
Page 28
... and press ENTER to obtain an IP address for the PC from the DHCP server on a Macintosh or UNIX Systems Follow the instructions in your user manual. The Run window is displayed: 4 Click the Renew button to Windows. Obtaining an IP Address on the SBG940. 5 Type exit and press ENTER to return... IP address for the PC from the DHCP server on the SBG940. The IP Configuration window is displayed. 3 Type winipcfg.exe and click OK. SBG940 User Guide 20
... and press ENTER to obtain an IP address for the PC from the DHCP server on a Macintosh or UNIX Systems Follow the instructions in your user manual. The Run window is displayed: 4 Click the Renew button to Windows. Obtaining an IP Address on the SBG940. 5 Type exit and press ENTER to return... IP address for the PC from the DHCP server on the SBG940. The IP Configuration window is displayed. 3 Type winipcfg.exe and click OK. SBG940 User Guide 20
User Guide
Page 45
... history of sessions the firewall terminated because: • The policy was authorized by the SBG940 firewall. If you reboot the SBG940 or manually clear the blacklist by clicking Clear on the Firewall > LOGS - blacklist page. Select this box to log attacks using common network intrusion ...display the blocking log, click blocking. Any IP address the firewall determines to have breached the active policy is always generated. SBG940 User Guide 37 It also lists the start of normal data traffic. To display the intrusion log, click intrusion. Overview Installation Troubleshooting ...
... history of sessions the firewall terminated because: • The policy was authorized by the SBG940 firewall. If you reboot the SBG940 or manually clear the blacklist by clicking Clear on the Firewall > LOGS - blacklist page. Select this box to log attacks using common network intrusion ...display the blocking log, click blocking. Any IP address the firewall determines to have breached the active policy is always generated. SBG940 User Guide 37 It also lists the start of normal data traffic. To display the intrusion log, click intrusion. Overview Installation Troubleshooting ...
User Guide
Page 61
... Me • Configuring TCP/IP in Windows 2000 • Configuring TCP/IP in Windows XP • Follow the instructions in your Macintosh or UNIX user manual After configuring TCP/IP, perform one of the following to verify the IP address: • Verifying the IP Address in Windows 98, Windows 98 SE..., or Windows Me • Verifying the IP Address in Windows 2000 or Windows XP • Follow the instructions in your Macintosh or UNIX user manual Configuring TCP/IP in Windows 98, Windows 98 SE, or Windows Me 1 On the Windows Desktop, click Start. 2 Select Settings and then Control Panel...
... Me • Configuring TCP/IP in Windows 2000 • Configuring TCP/IP in Windows XP • Follow the instructions in your Macintosh or UNIX user manual After configuring TCP/IP, perform one of the following to verify the IP address: • Verifying the IP Address in Windows 98, Windows 98 SE..., or Windows Me • Verifying the IP Address in Windows 2000 or Windows XP • Follow the instructions in your Macintosh or UNIX user manual Configuring TCP/IP in Windows 98, Windows 98 SE, or Windows Me 1 On the Windows Desktop, click Start. 2 Select Settings and then Control Panel...
User Guide
Page 86
... Never provide the PSK Passphrase to anyone who is not authorized to use your card requires you to manually start scanning for Wi-Fi Protected Access from other wireless adapters, you must configure the same passphrase (.../expertzone/columns/ bowman/03july28.asp Overview of the WPA Wireless Security Update in the SBG940 Setup Program. SBG940 User Guide 78 For more information, see "Configuring the Wireless Network Name on each wireless client. The SBG940 cannot...match the SBG940 WEP key On a WLAN client equipped with a Motorola wireless adapter, you can identify your WLAN.
... Never provide the PSK Passphrase to anyone who is not authorized to use your card requires you to manually start scanning for Wi-Fi Protected Access from other wireless adapters, you must configure the same passphrase (.../expertzone/columns/ bowman/03july28.asp Overview of the WPA Wireless Security Update in the SBG940 Setup Program. SBG940 User Guide 78 For more information, see "Configuring the Wireless Network Name on each wireless client. The SBG940 cannot...match the SBG940 WEP key On a WLAN client equipped with a Motorola wireless adapter, you can identify your WLAN.
User Guide
Page 99
SBG940 User Guide 91 If the computer does not locate the driver, t he previous window is displayed. If the computer successfully locates the driver, you may need ... device" is displayed again. 7 Select Specify a location and type the location of the CD-ROM drive: To load the driver successfully, you can skip to manually select the NetMotCM.sys file on the CD-ROM. Overview Installation Troubleshooting Contact FAQ Specifications Glossary License Configuration: Basic Gateway TCP/IP Wireless USB 5 Click...
SBG940 User Guide 91 If the computer does not locate the driver, t he previous window is displayed. If the computer successfully locates the driver, you may need ... device" is displayed again. 7 Select Specify a location and type the location of the CD-ROM drive: To load the driver successfully, you can skip to manually select the NetMotCM.sys file on the CD-ROM. Overview Installation Troubleshooting Contact FAQ Specifications Glossary License Configuration: Basic Gateway TCP/IP Wireless USB 5 Click...
User Guide
Page 125
... 75 ohms. Signal level expressed in dB as motorola.com, that assigns private IP addresses to the destination computer without exposing confidential data. Internet users outside users to private data. (The term comes from the source to clients. SBG940 User Guide 117 A "de-militarized zone" is one...is a distributed Internet database; For the most part, it has been replaced by "leasing" an IP address and subnet mask to manually assign static IP addresses by the term packet. DHCP eliminates the need to each client. A nonlinear reproduction of measurement referenced to one...
... 75 ohms. Signal level expressed in dB as motorola.com, that assigns private IP addresses to the destination computer without exposing confidential data. Internet users outside users to private data. (The term comes from the source to clients. SBG940 User Guide 117 A "de-militarized zone" is one...is a distributed Internet database; For the most part, it has been replaced by "leasing" an IP address and subnet mask to manually assign static IP addresses by the term packet. DHCP eliminates the need to each client. A nonlinear reproduction of measurement referenced to one...
User Guide
Page 135
...) modulation sends two bits of 16 possible amplitude and phase combinations. • 64 QAM encodes six bits per symbol period with one signaling element. SBG940 User Guide 127 The destination mirrors the transmitted (from) or received (to) data on the source port to enable the person managing the network to -Point... exchanging data. The four constellation points represented by the SBG940 LAN only; Quality of service describes the priority, delay, throughput, and bandwidth of autodiscovery or manually configuring a cable modem on the Internet.
...) modulation sends two bits of 16 possible amplitude and phase combinations. • 64 QAM encodes six bits per symbol period with one signaling element. SBG940 User Guide 127 The destination mirrors the transmitted (from) or received (to) data on the source port to enable the person managing the network to -Point... exchanging data. The four constellation points represented by the SBG940 LAN only; Quality of service describes the priority, delay, throughput, and bandwidth of autodiscovery or manually configuring a cable modem on the Internet.
User Guide
Page 137
...is logically ANDed with the destination IP address of the IP address is permanently assigned to a host. subscriber A home or office user who accesses television, data, or other services from an input cable between two or more advanced than just the source and destination ... enterprise SMTP Simple Mail Transfer Protocol is a standard to subscribers. Normally, a static IP address must be assigned manually. subnetwork A part of dynamic IP address. SBG940 User Guide 129 The opposite of a network; station IEEE 802.11b term for transferring e-mail. Hosts and routers use...
...is logically ANDed with the destination IP address of the IP address is permanently assigned to a host. subscriber A home or office user who accesses television, data, or other services from an input cable between two or more advanced than just the source and destination ... enterprise SMTP Simple Mail Transfer Protocol is a standard to subscribers. Normally, a static IP address must be assigned manually. subnetwork A part of dynamic IP address. SBG940 User Guide 129 The opposite of a network; station IEEE 802.11b term for transferring e-mail. Hosts and routers use...