Chapter 1: Introduction Welcome What’s in this Guide? Chapter 2: Planning your Wireless Network The Router’s Functions IP Addresses Why do I need a VPN? What is a VPN? Chapter 3: Getting to Know the The Back Panel The Front Panel Chapter 4: Connecting the Overview Wired Connection to a PC Wireless Connection to a PC Chapter 5: Configuring the PCs Overview Configuring Windows 98 and Millennium PCs Configuring Windows 2000 PCs Configuring Windows XP PCs Chapter 6: Configuring the Router Overview How to A
Windows 2000 or XP Instructions Appendix E: SNMP Functions Appendix F: Upgrading Firmware Appendix G: Windows Help Appendix H: Glossary Appendix I: Specifications Appendix J: Warranty Information Appendix K: Regulatory Information Appendix L: Contact Information
Chapter 1: Introduction Welcome Wireless-G is the upcoming 54Mbps wireless networking standard that’s almost five times faster than the widely deployed Wireless-B (802.11b) products found in homes, businesses, and public wireless hotspots around the country—but since they share the same 2.4GHz radio band, Wireless-G devices can also interoperate with existing 11Mbps Wireless-B equipment. Since both standards are built in, you can protect your investment in existing 802.
• Appendix C: Configuring IPSec between a Windows 2000 Pc and the Router This appendix instructs you on how to establish a secure IPSec tunnel using preshared keys to join a private network inside the VPN Router and a Windows 2000 or XP PC. • Appendix D: SNMP Functions This appendix explains SNMP. • Appendix E: Upgrading Firmware This appendix instructs you on how to upgrade the firmware on your Router if you should need to do so.
Chapter 2: Planning your Wireless Network The Router’s Functions Simply put, a router is a network device that connects two networks together. In this instance, the Router connects your Local Area Network (LAN), or the group of PCs in your home or office, to the Internet. The Router processes and regulates the data that travels between these two networks. The Router’s NAT feature protects your network of PCs so users on the public, Internet side cannot “see” your PCs.
Figure 2-1: Network If you use the Router to share your cable or DSL Internet connection, contact your ISP to find out if they have assigned a static IP address to your account. If so, you will need that static IP address when configuring the Router. You can get that information from your ISP. Dynamic IP Addresses A dynamic IP address is automatically assigned to a device on the network, such as PCs and print servers.
as follows: 1) MAC Address Spoofing Packets transmitted over a network, either your local network or the Internet, are preceded by a packet header. These packet headers contain both the source and destination information for that packet to transmit efficiently. A hacker can use this information to spoof (or fake) a MAC address allowed on the network. With this spoofed MAC address, the hacker can also intercept information meant for another user.
•VPN Router to VPN Router •Computer (using VPN client software that supports IPSec) to VPN Router The VPN Router creates a “tunnel” or channel between two endpoints, so that data transmissions between them are secure. A computer with VPN client software that supports IPSec can be one of the two endpoints.
Chapter 3: Getting to Know the Wireless-G VPN Broadband Router The Back Panel The Router’s ports, where a network cable is connected, are located on the back panel. Internet The Internet port connects to your modem. LAN (1-4) The LAN (Local Area Network) ports connect to your PC and other network devices. Power The Power port is where you will connect the power adapter. Reset Button There are two ways to Reset the Router's factory defaults.
Chapter 4: Connecting the Wireless-G VPN Broadband Router Overview The Router’s setup consists of more than simply plugging hardware together. You will have to configure your networked PCs to accept the IP addresses that the Router assigns them (if applicable), and you will also have to configure the Router with setting(s) provided by your Internet Service Provider (ISP).
Router’s rear panel (see Figure 4-2). This is the only port that will work for your modem connection. 3. Power on the cable or DSL modem. 4. Connect the power adapter to the Power port (see Figure 4-3), and then plug the power adapter into a power outlet. Figure 4-2: Internet Port Figure 4-1: LAN Ports Figure 4-3: Power Port NOTE: You should always change the SSID from its default, Wireless AP VPN Router, and enable WEP encryption.
Chapter 5: Configuring the PCs Overview The instructions in this chapter will help you configure each of your computers to be able to communicate with the Router. To do this, you need to configure your PC’s network settings to obtain an IP (or TCP/IP) address automatically, so your PC can function as a DHCP client. Computers use IP addresses to communicate with the Router and each other across a network, such as the Internet. First, find out which Windows operating system your computer is running.
1. Click the Start button. Select Settings and click the Control Panel icon. Double-click the Network and Dialup Connections icon. 2. Select the Local Area Connection icon for the applicable Ethernet adapter (usually it is the first Local Area Connection listed). Double-click the Local Area Connection. Click the Properties button. (See Figure 5-3.) 3. Make sure the box next to Internet Protocol (TCP/IP) is checked. Highlight Internet Protocol (TCP/IP), and click the Properties button. (See Figure 5-4.) 4.
Chapter 6: Configuring the Router Overview Wireless AP VPN Router recommends using the Setup CD-ROM for first-time installation of the Router and setting up additional computers. If you do not wish to run the Setup Wizard on the Setup CD-ROM, then follow the steps in this chapter and use the Router’s web-based utility to configure the Router. This chapter will describe each web page in the Utility and each page’s key functions.
configuration or monitoring. • Advanced Wireless Settings. On this screen you can access the Advanced Wireless features of Authentication Type, Basic Data Rates, Control Tx Rates, Beacon Interval, DTIM Interval, RTS Threshold, and Fragmentation Threshold. Security • Filter. To block specific users from Internet access, you can set up IP address, port, and MAC address filtering on the Filter screen. • VPN. To enable or disable IPSec, L2TP, and/or PPTP Pass-through, and set up VPN tunnels, use this screen.
Router’s default IP address, 192.168.1.1, in the Address field. Then press Enter. A password request page, shown in Figure 6-1 will appear. (non-Windows XP users will see a similar screen.) Enter admin (the default user name) in the User Name field, and enter admin (the default password) in the Password field. Then click the OK button. The Setup Tab The Basic Setup Tab The first screen that appears is the Basic Setup tab. (See Figure 6-2.) This tab allows you to change the Router's general settings.
terminated due to inactivity, Connect on Demand enables the Router to automatically re-establish your connection as soon as you attempt to access the Internet again. If you wish to activate Connect on Demand, click the radio button. In the Max Idle Time field, enter the number of minutes you want to have elapsed before your Internet connection terminates. • Keep Alive Option: Redial Period. If you select this option, the Router will periodically check your Internet connection.
• Host Name and Domain Name. These fields allow you to supply a host and domain name for the Router. Some ISPs require these names as identification. You may have to check with your ISP to see if your broadband Internet service has been configured with a host and domain name. In most cases, leaving these fields blank will work. • MTU. The MTU (Maximum Transmission Unit) setting specifies the largest packet size permitted for network transmission. Select Manual and enter the value desired.
changes, or click the Cancel Changes button to undo your changes. The DDNS Tab The Router offers a Dynamic Domain Name System (DDNS) feature. DDNS lets you assign a fixed host and domain name to a dynamic Internet IP address. It is useful when you are hosting your own website, FTP server, or other server behind the Router. Before you can use this feature, you need to sign up for DDNS service at one of two DDNS service providers, DynDNS.org or TZO.com. DDNS DDNS Service.
• Clone My MAC Address. If you want to clone the MAC address of the PC you are currently using to configure the Router, then click the Clone My MAC Address button. The Router will automatically detect your PC’s MAC address, so you do NOT have to call your ISP to change the registered MAC address to the Router’s MAC address. It is recommended that the PC registered with the ISP is used to open the MAC Address Clone tab.
Router. • Subnet Mask. The Subnet Mask (also known as the Network Mask) determines which portion of an IP address is the network portion, and which portion is the host portion. Take, for example, a network in which the Subnet Mask is 255.255.255.0. This determines (by using the values 255) that the first three numbers of a network IP address identify this particular network, while the last digit (from 1 to 254) identifies the specific host. • Default Gateway.
settings, between 1 and 11 (in North America). All devices in your wireless network must use the same channel in order to function correctly. • Wireless SSID Broadcast. When wireless clients survey the local area for wireless networks to associate with, they will detect the SSID broadcast by the Router. To broadcast the Router's SSID, keep the default setting, Enabled. If you do not want to broadcast the Router's SSID, then select Disabled.
WEP. WEP is a basic encryption method, which is not as secure as WPA. To use WEP, select a Default Key (choose which Key to use), and a level of WEP encryption, 64 bits 10 hex digits or 128 bits 26 hex digits. Then either generate a WEP key using a Passphrase or enter the WEP key manually. (See Figure 6-16.) • Change these settings as described here and click the Save Settings button to apply your changes or Cancel Changes to cancel your changes.
To add a computer to the network, click the Permit to access button, and enter the MAC address in the fields. Click the Select MAC Address From Networked Computers button, and the screen in Figure 618 will appear. Select the MAC Address from the list and click the Select button. To prevent access, click the Prevent from accessing button, then click Select MAC Address from the list. From the screen in Figure 6-18, select the MAC Address from the list, and click the Select button.
Delivery Traffic Indication Message (DTIM). A DTIM field is a countdown field informing clients of the next window for listening to broadcast and multicast messages. When the Router has buffered broadcast or multicast messages for associated clients, it sends the next DTIM with a DTIM Interval value. Its clients hear the beacons and awaken to receive the broadcast and multicast messages. • RTS Threshold This value should remain at its default setting of 2347. The range is 0-2347 bytes.
time. If multicasting is permitted, then the Router will allow IP multicast packets to be forwarded to the appropriate computers. Select Enabled to filter multicasting, or Disabled to disable this feature. • Block Anonymous Internet Requests. This keeps your network from being “pinged” or detected and reinforces your network security by hiding your network ports, so it is more difficult for intruders to work their way into your network.
VPN Gateway: Assign this VPN as default route Local Secure Group and Remote Secure Group. The Local Secure Group is the computer(s) on your LAN that can access the tunnel. Local Secure Group defines the endpoint on local site. It can be one IP address, IP Range, Subnet, or NONE (Host).
tunnel. The remote VPN device can be another VPN Router, a VPN Server, or a computer with VPN client software that supports IPSec. The IP Address may either be static (permanent) (select IP Addr.) or dynamic (changing) (select FQDN for DDNS,or Any), depending on the settings of the remote VPN device. Make sure that you have entered the IP Address correctly, or the connection cannot be made.
manual key management is used in small static environments or for troubleshooting purposes. Both sides must use the same Key Management method. Encryption Algorithm: There are two methods of encryption, DES and 3DES. The Encryption method determines the length of the key used to encrypt/decrypt ESP packets. DES is 56-bit encryption and 3DES is 168-bit encryption. 3DES is recommended because it is more secure, and both sides must use the same Encryption method.
for specific VPN tunnels. Phase 1 • Phase 1 is used to create a security association (SA), often called the IKE SA. After Phase 1 is completed, Phase 2 is used to create one or more IPSec SAs, which are then used to key IPSec sessions. • Operation Mode. There are two modes: Main and Aggressive, and they exchange the same IKE payloads in different sequences. Main mode is more common; however, some people prefer Aggressive mode because it is faster.
Internet usage. You can set up Internet access policies for specific PCs and set up filters by using network port numbers. • Internet Access Policy. Multiple Filters can be saved as Internet Access Policies. When you wish to edit one, select the number of the Policy from the drop-down menu. The tab will change to reflect the settings of this Policy. If you wish to delete this Policy, click the Delete button. To see a summary of all Policies, click the Summary button.
The Applications and Gaming Tab Port Range Forwarding The Port Forwarding screen sets up public services on your network, such as web servers, ftp servers, e-mail servers, or other specialized Internet applications. (Specialized Internet applications are any applications that use Internet access to perform functions such as videoconferencing or online gaming. Some Internet applications may not require any forwarding.) (See Figure 6-35.
the Cancel Changes button to undo your changes. Figure 6-37: UPnP Forwarding DMZ The DMZ screen (see Figure 6-38) allows one local user to be exposed to the Internet for use of a special-purpose service such as Internet gaming and videoconferencing, through Software DMZ, or a user can use LAN Port 4 as a DMZ Port, through Hardware DMZ. Whereas Port Range Forwarding can only forward a maximum of 10 ranges of ports, DMZ hosting forwards all the ports for one PC at the same time. • Software DMZ.
Simple Network Management Protocol (SNMP) is a popular network monitoring and management protocol. To enable SNMP, click Enabled. To disable SNMP, click Disabled. • Identification. In the Contact field, enter contact information for the Router. In the Device Name field, enter the name of the Router. In the Location field, specify the area or location where the Router resides. • Get Community. Enter the password that allows read-only access to the Router’s SNMP information. • Set Community.
Select the type of attacks that you want to be alerted to. Select Syn Flooding, IP Spoofing, Win Nuke, Ping of Death, or Unauthorized Login attempt. General Log. Select the type of activity you would like to log. Select System Error Messages, Deny Policies, Allow Policies, Content Filtering, Data Inspection, authorized Login, or Configuration Changes. When finished making your changes on this tab, click the Save Settings button to save these changes, or click the Cancel Changes button to undo your changes.
Information The information displayed is the Hardware Version, Software Version, MAC Address, Local MAC Address, and System Up Time. WAN Connections The WAN Connections displayed are the Network Access, WAN IP Address, Subnet Mask, Default Gateway, and DNS. Click the Refresh button if you want to Refresh your screen. Figure 6-44: Router Local Network The Local Network information that is displayed is the IP Address, Subnet Mask, DHCP Server, and DHCP Client Lease Info.
for the information. 6. Click the OK button in the TCP/IP properties window, and click Close or the OK button for the Network window. 7. Restart the computer when asked. • For Windows 2000: 1. Click Start, Settings, and Control Panel. Double-click Network and Dial-Up Connections. 2. Right-click the Local Area Connection that is associated with the Ethernet adapter you are using, and select the Properties option. 3.
2. I want to test my Internet connection. A Check your TCP/IP settings. For Windows 98, Me, 2000, and XP: • Refer to “Chapter 4: Configure the PCs” for details. Make sure Obtain IP address automatically is selected in the settings. For Windows NT 4.0: • Click Start, Settings, and Control Panel. Double-click the Network icon. • Click the Protocol tab, and double-click on TCP/IP Protocol.
2. Make sure you are using the right Internet connection settings. Contact your ISP to see if your Internet connection type is DHCP, Static IP Address, or PPPoE (commonly used by DSL consumers). Please refer to the Setup section of “Chapter 6: The Router’s Web-based Utility” for details on Internet connection settings. 3. Make sure you have the right cable. Check to see if the Internet column has a solidly lit Link/Act LED. 4.
1 to 254). Note that each IP address must be unique within the network. • Your VPN may require port 500/UDP packets to be passed to the computer that is connecting to the IPSec server. Refer to “Problem #7, I need to set up online game hosting or use other Internet applications” for details. • Check the Neo-Meridian website for more information at www.Neo-Meridian.com. 6. I need to set up a server behind my Router and make it available to the public.
Unreal Tournament (UT), you would enter the range 7777 to 27900. 4. Check the protocol you will be using, TCP and/or UDP. 5. Enter the IP address of the PC or network device that you want the port server to go to. For example, if the web server’s Ethernet adapter IP address is 192.168.1.100, you would enter 100 in the field provided. Check “Appendix D: Finding the MAC Address and IP Address for Your Ethernet Adapter” for details on getting an IP address. 6.
If you have proxy settings, you need to disable these on your computer. Because the Router is the gateway for the Internet connection, the computer does not need any proxy settings to gain access. Please follow these directions to verify that you do not have any proxy settings and that the browser you use is set to connect directly to the LAN. • For Microsoft Internet Explorer 5.0 or higher: 1. Click Start, Settings, and Control Panel. Double-click Internet Options. 2. Click the Connections tab. 3.
• There is a setup option to “keep alive” the connection. This may not always work, so you may need to reestablish connection periodically. 1. To connect to the Router, go to the web browser, and enter http://192.168.1.1 or the IP address of the Router. 2. Enter the password, if asked. (The default password is admin.) 3. On the Setup screen, select the option Keep Alive, and set the Redial Period option at 20 (seconds). 4. Click the Save Settings button. 5.
working correctly. You can remove the Router to verify a direct connection. • Manually configure the TCP/IP settings with a DNS address provided by your ISP. • Make sure that your browser is set to connect directly and that any dial-up is disabled. For Internet Explorer, click Tools, Internet Options, and then the Connection tab. Make sure that Internet Explorer is set to Never dial a connection. For Netscape Navigator, click Edit, Preferences, Advanced, and Proxy.
do? If you have a dedicated Unreal Tournament server running, you need to create a static IP for each of the LAN computers and forward ports 7777, 7778, 7779, 7780, 7781, and 27900 to the IP address of the server. You can also use a port forwarding range of 7777 ~ 27900. If you want to use the UT Server Admin, forward another port. (Port 8080 usually works well but is used for remote admin. You may have to disable this.) Then in the [UWeb.WebServer] section of the server.
that version contains new features that you would like to use. Downloading a more current version of Router firmware will not enhance the quality or speed of your Internet connection, and may disrupt your current connection stability. Will the Router function in a Macintosh environment? Yes, but the Router’s setup pages are accessible only through Internet Explorer 4.0 or Netscape Navigator 4.0 or higher for Macintosh. I am not able to get the web configuration screen for the Router.
Can I run an application from a remote computer over the wireless network? This will depend on whether or not the application is designed to be used over a network. Consult the application’s documentation to determine if it supports operation over a network. What is the IEEE 802.11g standard? It is one of the IEEE standards for wireless networks. The 802.11g standard allows wireless networking hardware from different manufacturers to communicate, provided that the hardware complies with the 802.
touch with the original access point or whether it should seek a new one. When a node no longer receives acknowledgment from its original access point, it undertakes a new search. Upon finding a new access point, it then re-registers, and the communication process continues. What is ISM band? The FCC and their counterparts outside of the U.S. have set aside bandwidth for unlicensed use in the ISM (Industrial, Scientific and Medical) band. Spectrum in the vicinity of 2.
any Ethernet networking device, such as a network adapter, that allows the network to identify it at the hardware level. For all practical purposes, this number is usually permanent. Unlike IP addresses, which can change every time a computer logs onto the network, the MAC address of a device stays the same, making it a valuable identifier for the network. How do I reset the Router? Press the Reset button on the back panel for about ten seconds. This will reset the Router to its default settings.
their device set to the same channel or bandwidth can also receive those transmission. Wireless networks are easy to find. Hackers know that, in order to join a wireless network, your wireless PC will typically first listen for "beacon messages". These are identifying packets transmitted from the wireless network to announce its presence to wireless nodes looking to connect.
"packet sniffer", software available on the Internet, along with other freeware or shareware hacking utilities available on the Internet, to acquire your WEP keys and other network information to defeat security. Jamming Attacks Jamming Attacks, when a powerful signal is sent directly into your wireless network, can effectively shut down your wireless network. This type of attack is not always intentional and can often come about simply due to the technology. This is especially possible in the 2.
being hacked into through one of the methods described here. With wireless networks, even with WEP encryption, open to the persistent hacker, how can you protect your data? The following section will tell you how to do just that. Maximizing Wireless Security Security experts will all tell you the same thing: Nothing is guaranteed. No technology is secure by itself. An unfortunate axiom is that building the better mousetrap can often create a better mouse.
5)SSID There are a few things you can do to make your SSID more secure: a.Disable Broadcast b.Make it unique c.Change it often Most wireless networking devices will give you the option of broadcasting the SSID. This is a option for convenience, allowing anyone to log into your wireless network. In this case, however, anyone includes hackers. So don't broadcast the SSID. A default SSID is set on your wireless devices by the factory. (The Neo-Meridian default SSID is "Neo-Meridian".
Current encryption technology offers 64-bit and 128-bit WEP encryption. If you are using 64-bit WEP, swap out your old wireless units for 128-bit encryption right away. Where encryption is concerned, the bigger and more complex, the better. A WEP key is a string of hexadecimal characters that your wireless network uses in two ways. First, nodes in your wireless network are identified with a common WEP key. Second, these WEP keys encrypt and decrypt data sent over your wireless network.
length for 64-bit encryption or 26 characters in length for 128-bit encryption. All points in your wireless network must use the same WEP key to utilize WEP encryption. Once the Passphrase is entered, click the Generate key to generate a WEP key. When finished making your changes on this tab, click the Save Settings button to save these changes, or click the Cancel Changes button to undo your changes.
screen. How to Establish a Secure IPSec Tunnel Step 1: Create an IPSec Policy 1. Click the Start button, select Run, and type secpol.msc in the Open field. The Local Security Setting screen will appear as shown in Figure B-1. 2. Right-click IP Security Policies on Local Computer (Win XP) or IP Security Policies on Local Machine (Win 2000), and click Create IP Security Policy. 3. Click the Next button, and then enter a name for your policy (for example, to_Router). Then, click Next. 4.
8. The Filters Properties screen will appear, as shown in Figure B-8. Select the Addressing tab. In the Source address field, select A specific IP Subnet, and enter the IP Address: 192.168.1.0 and Subnet mask: 255.255.255.0. (Enter your new values if you have changed the default settings.) In the Destination address field, select My IP Address. 9. If you want to enter a description for your filter, click the Description tab and enter the description there. 10.
Figure C-17: Connection Type Tab Figure C-18: Properties Screen 10. Go to the IP Filter List tab, and click the filter list Router->win, as shown in Figure B-19. 11. Click the Filter Action tab, and select the filter action Require Security, as shown in Figure B-20. Then, click the Edit button. From the Security Methods tab, shown previously in Figure B-12, verify that the Negotiate security option is enabled, and deselect the Accept unsecured communication, but always respond using IPSec check box.
5. Enter the IP Address and Subnet Mask of the local VPN Router in the Local Secure Group fields. To allow access to the entire IP subnet, enter 0 for the last set of IP Addresses. (e.g. 192.168.1.0). 6. Enter the IP Address and Subnet Mask of the VPN device at the other end of the tunnel (the remote VPN Router or device with which you wish to communicate) in the Remote Security Router fields. 7. Select fromtwo different types of encryption: DES or 3DES (3DES is recommended because it is more secure).
for your Ethernet adapter and is shown as a series of numbers and letters. The MAC address/Adapter Address is what you will use for MAC address cloning or MAC filtering. The example in Figure E-3 shows the Ethernet adapter’s IP address as 192.168.1.100. Your computer may show something different. Figure D-2: MAC Address/Adapter Address Figure D-1: IP Configuration Screen Note: The MAC address is also called the Adapter Address. Windows 2000 or XP Instructions 1. Click Start and Run.
Appendix G: Windows Help All wireless products require Microsoft Windows. Windows is the most used operating system in the world and comes with many features that help make networking easier. These features can be accessed through Windows Help and are described in this appendix. TCP/IP Before a computer can communicate with the Access Point, TCP/IP must be enabled. TCP/IP is a set of instructions, or protocol, all PCs follow to communicate over a network. This is true for wireless networks as well.
Boot - To start a device and cause it to start executing instructions. Bridge - A device that connects different networks. Broadband - An always-on, fast Internet connection. Browser - An application program that provides a way to look at and interact with all the information on the World Wide Web. Buffer - A shared or assigned memory area that is used to support and coordinate different computing and networking activities so one isn't held up by the other.
Encryption - Encoding data transmitted in a network. Ethernet - IEEE standard network protocol that specifies how data is placed on and retrieved from a common transmission medium. Finger - A program that tells you the name associated with an e-mail address. Firewall - A set of related programs located at a network gateway server that protects the resources of a network from users from other networks. Firmware - The programming code that runs a networking device.
Node - A network junction or connection point, typically a computer or work station. OFDM (Orthogonal Frequency Division Multiplexing) - Frequency transmission that separates the data stream into a number of lower-speed data streams, which are then transmitted in parallel to prevent information from being lost in transit. Packet - A unit of data sent over a network.
Static Routing - Forwarding data in a network via a fixed path. Subnet Mask - An address code that determines the size of the network. Switch - 1. A data switch that connects computing devices to host computers, allowing a large number of devices to share a limited number of ports. 2. A device for making, breaking, or changing the connections in an electrical circuit. TCP (Transmission Control Protocol) - A network protocol for transmitting data that requires acknowledgement from the recipient of data sent.
LEDs Power, Internet, Ethernet (1, 2, 3, 4), Wireless-G, DMZ Security Features WEP, 802.1x Authentication WEP Key Bits 64, 128 Dimensions 7.32" x 6.89" x 1.89" (W x H x D) (186 mm x 175 mm x 48 mm) Unit Weight 1.26 lb (0.57 kg) Power External, 5V DC, 2.5A Certifications FCC, IC-03 Operating Temp. 0ºC to 40ºC (32ºF to 104ºF) Storage Temp.
DAMAGES, HOWEVER CAUSED REGARDLESS OF THE THEORY OF LIABILITY, ARISING OUT OF OR RELATED TO THE USE OF OR INABILITY TO USE THE PRODUCT, EVEN IF NEO-MERIDIAN HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IN NO EVENT WILL NEO-MERIDIAN' LIABILITY EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT. The foregoing limitations will apply even if any warranty or remedy provided under this Section fails of its essential purpose.
Appendix K: Regulatory Information Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
INDUSTRY CANADA (CANADA) This Class B digital apparatus complies with Canadian ICES-003. Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. The use of this device in a system operating either partially or completely outdoors may require the user to obtain a license for the system according to the Canadian regulations.
MHz respectively) may be used in France. License required for every indoor and outdoor installations. Please contact ART for procedure to follow. Deutschland D: Anmeldung im Outdoor-Bereich notwending, aber nicht genehmigungspflichtig. Bitte mit Händler die Vorgehensweise abstimmen. Germany D: License required for outdoor installations. Check with reseller for procedure to follow Italia I: E' necessaria la concessione ministeriale anche per l'uso interno.