User's Manual
Table Of Contents
- Contents
- Product Description 2
- The Product Package 3
- System Requirements 4
- Network Requirements 4
- Note to Customers Who Have a Symphony HomeRF Base Station 5
- Interoperability Between Symphony Products 5
- What Is Wireless Networking? 7
- Supported Configurations 8
- Pre-installation Considerations 11
- Installation Procedure 12
- Composer Features 16
- Conductor Management and Configuration Features 23
- Networking Features 27
- Administrative Features 30
- Default Switcher Profiles 31
- Location Switcher Icon 32
- Switching Between Profiles 34
- Editing a Profile 34
- Creating and Deleting Profiles 37
- Examples of When to Use Profiles 37
- Additional Information for Wireless Networks That Communicate With Another Network 39
- Sharing a Dial-up Modem 40
- Application Hints 44
- Common Installation Problems 49
- USB Adapter’s LED Indicator 53
- Introduction
- Wireless Networking for the Home & Small Office
- Installation
- Symphony Composer Installation Wizard
- Symphony Maestro Configuration Tool
- Symphony Location Switcher
- Using the Wireless Network
- Uninstalling Symphony Software
- Troubleshooting
- A. How to Reach Technical Support
- B. Specifications
- C. Regulatory Information
45
Therefore, the Symphony radio signals are secure against unauthorized access
by eavesdroppers.
In addition, Symphony’s Network Address Translation (NAT) software acts as
an Internet firewall to protect against authorized access from other users on the
Internet.
However, Proxim recommends that you establish passwords for each drive that
you share on the local area network, particularly if you are using the Sym-
phony Conductor to share connectivity to another network (which is a feature
that does not use NAT). Depending on the type of Internet connection you
have, others may be able to access your computer’s files from over the Inter-
net. Finally, users who store personal information, such as bank records, on
their computers may also want to consider installing a third-party security pro-
gram to provide additional protection.
Accessing E-Mail
Each computer on the wireless network can send and receive e-mail exactly as
if you were directly connected to the Internet. Each computer that accesses e-
mail must have e-mail software installed and configured.
Typically, when you access your e-mail account, messages are downloaded
from your ISP’s mail server and stored on that computer’s hard drive. Later,
you can go back to that same computer to review your messages. However, if
you access your e-mail account from a different computer, you will not be able
to access the messages that were downloaded to the hard drive of the other
computer.
It is recommended that every time you access a unique e-mail account, you do
so from the same computer. This way, you will always have access to all mes-
sages for that e-mail address. If your ISP allows you to store your e-mail on its
mail server or you use a Web-based e-mail service, you may be able to access
all of your messages from any computer on your home network. Also, if you
want multiple e-mail addresses for the same Internet account, contact your ISP
to determine if it supports this option.
Playing Games Over the Home Network
You may play multiplayer games over your home network as long as the game
supports operation over a LAN (local area network). Refer to the game’s user
guide for more information.