User's Guide
Table Of Contents
- Table of Contents
- Get Started
- Device Basics
- Your Network Connection
- LCD Touchscreen Interface
- Interpreting the LCD
- LCD Information Screens
- Data Usage Screen
- Billing Cycle Screen
- Session Screen
- Connected Devices Screen
- Device Screen
- Wi-Fi Screen
- Main Wi-Fi Screen
- Guest Wi-Fi Screen
- WPS Screen
- Wi-Fi Options Screen
- Block List Screen
- Settings Screen
- Display Screen
- Display > Timeout Screen
- Network Screen
- Roaming Screen
- Status Screen
- Updates Screen
- Sleep Screen
- GPS Screen
- Reset Screen
- More Screen
- Support Screen
- About Screen
- Mobile Apps Screen
- Feedback Screen
- Alerts Screen
- Zing Manager (Browser) Interface
- Device Settings
- Display Settings
- Router Settings
- Enabling VPN Passthrough
- UPnP (Universal Plug and Play)
- DHCP
- DNS Mode
- Enabling Port Forwarding
- Enabling Port Forwarding for an Application
- Disabling Port Forwarding for an Application
- DMZ – General
- Enabling DMZ
- Configuring DMZ
- Port Filtering Panel: Enabling Port Filterings
- Port Filtering Panel: Enabling Port Filtering for an Application
- Port Filtering Panel: Disabling Port Filtering for an Application
- Login Settings
- Configuring Networks
- Software and Reset
- GPS Settings
- Configuring the Wi-Fi Network
- Setting the Maximum Number of Wi-Fi Devices
- Wi-Fi Security
- Change Wi-Fi Network Names and Passwords
- Displaying Wi-Fi Network Name and Password on LCD Home Screen
- Enable / Disable the Block List
- Displaying and Blocking Currently Connected Devices (Block List)
- View and Unblock Devices (Block List)
- Allowing or Denying Computers Access to the Network (MAC Filter)
- Disable Wi-Fi When Tethering Device (Connected Through USB)
- Setting the Sleep (Inactivity) Timer
- Wi-Fi Channel
- Wi-Fi Range
- Frequently Asked Questions
- How Can I Tell I’m Connected to GSM, 3G or LTE?
- How Do I Connect to Wi-Fi?
- Is Roaming on LTE Supported?
- What Do I Do if I Forget the Main or Guest Wi-Fi Password?
- What Do I Do if I Forget the Administrator Password?
- If the Connection is “Always On,” Am I Always Being Billed?
- Questions About GPS
- Questions About WPS
- How Do I Access My Corporate Network Through a VPN?
- Are Terminal Sessions Supported?
- Tips
- Troubleshooting
- Technical Specifications
- Safety Information
- Regulatory Notices
- Legal
- Index
6. As an exception to the Sections above, you may also combine or link a "work that uses the
Library" with the Library to produce a work containing portions of the Library, and distribute that
work under terms of your choice, provided that the terms permit modification of the work for the
customer's own use and reverse engineering for debugging such modifications.
You must give prominent notice with each copy of the work that the Library is used in it and that
the Library and its use are covered by this License. You must supply a copy of this License. If
the work during execution displays copyright notices, you must include the copyright notice for
the Library among them, as well as a reference directing the user to the copy of this License.
Also, you must do one of these things:
a) Accompany the work with the complete corresponding machine-readable source code
for the Library including whatever changes were used in the work (which must be distributed
under Sections 1 and 2 above); and, if the work is an executable linked with the Library, with the
complete machine-readable "work that uses the Library", as object code and/or source code, so
that the user can modify the Library and then relink to produce a modified executable containing
the modified Library. (It is understood that the user who changes the contents of definitions files
in the Library will not necessarily be able to recompile the application to use the modified
definitions.)
b) Use a suitable shared library mechanism for linking with the Library. A suitable
mechanism is one that (1) uses at run time a copy of the library already present on the user's
computer system, rather than copying library functions into the executable, and (2) will operate
properly with a modified version of the library, if the user installs one, as long as the modified
version is interface-compatible with the version that the work was made with.
c) Accompany the work with a written offer, valid for at least three years, to give the
same user the materials specified in Subsection 6a, above, for a charge no more than the cost
of performing this distribution.
d) If distribution of the work is made by offering access to copy from a designated place,
offer equivalent access to copy the above specified materials from the same place.
e) Verify that the user has already received a copy of these materials or that you have
already sent this user a copy.
For an executable, the required form of the "work that uses the Library" must include any data
and utility programs needed for reproducing the executable from it. However, as a special
exception, the materials to be distributed need not include anything that is normally distributed
(in either source or binary form) with the major components (compiler, kernel, and so on) of the
operating system on which the executable runs, unless that component itself accompanies the
executable.
It may happen that this requirement contradicts the license restrictions of other proprietary
libraries that do not normally accompany the operating system. Such a contradiction means you
cannot use both them and the Library together in an executable that you distribute.
Legal 173










