If you want to take your computing to the next level, the Actiontec 54 Mbps Wireless Gateway is sure to be one of the keys to your success. System Requirements Your Montana. Page 24 Chapter 2 Setting Up the Gateway 6. These limits are designed to provide reasonable protection against harmful interference in a residential installa- tion. This allows a computer user to send E-mail, surf the World Wide Web, download files, and buy products and services online, but it also makes the computer vulnerable to attack from persons intent on doing malicious mischief, or worse. Chapter 2 Setting Up the Gateway 3.

Uploader: Fenrirg
Date Added: 16 December 2004
File Size: 46.4 Mb
Operating Systems: Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X
Downloads: 85920
Price: Free* [*Free Regsitration Required]

No additional import charges at gt071 Report item – opens in a wf window or tab. Plug the larger end of the Power cord into a power outlet, then click Next. Your router has a web interface, so you will login to it using your web browser. Navigate to the port forwarding section. Now we need to find the port forwarding section in your router. If the document is not available, contact the immediately.

The Installation Buddy checks the configuration of the Gateway. This item will ship to United Statesbut the seller has not specified shipping options. Appendix C Computer Security Network Applications Network applications such as software programs that allow remote access to the computer also make the computer vulnerable to access from other people on the Internet. Wireless Light – The Wireless light illuminates when the Modem is connected wirelessly. Protect it The amount of protection directly depends on the password complexity, and the effort taken to protect that password of your Actiontec GTWG router.

  INTEL 82574L GIGABIT NETWORK CONNECTION DRIVER DOWNLOAD

See other items More Of course, you can build a strong hash password with special character, numbers, greek and latin. Create a port forward entry. Page 98 Chapter 8 Setting Up a Network 9. If you are forwarding a range of ports separated by a hyphen then enter the lowest number of that range into the Port MapPort Start box and the highest number of that range into the Port End box.

Security checklist for Actiontec GT701-WG router

Enter your email on below! Read the on-screen information, then unplug all telephones and other devices from their phone jacks.

Seller does not offer returns. The settings are configured.

You are covered by the eBay Money Back Guarantee if you receive an item that is not as described in the listing. You will now be taken to the login page where you can enter default username: If the Power Light is not illuminated when the power cord is plugged in, the Gateway has suffered a critical error and technical support should be contacted.

When installing any software, consult the user manual and help files supplied with the software for detailed information. Contact the seller – opens in a new window or tab and request a wt method to your location. Refer to eBay Return policy for more details.

  APACER ER 151 DRIVER DOWNLOAD

– ActionTec GTwg Configuration

Enter text from picture: The Gateway has been configured to support a single static Power light stops blinking, the Gateway is ready for use. Note that the phone jack into which you will plug your Modem can NOT have a filter on it. Page 38 Chapter 2 Setting Up the Gateway 3. This means that if possible, you should consider hardwire using Ethernet cable the devices that tend to consume a lot of bandwidth. Back to home page.

Try unplugging your Actiontec modem on a quarterly basis to stay proactive Never reset, always reboot modem. To set up a click in the circle next to PSK String, then enter at least eight alphanumeric characters in the text box. Wireless clients can be moved anywhere within the cover- age area of the access point and remain connected to the network. This allows a computer user to send E-mail, surf the World Wide Web, download files, and buy products and services online, but it also makes the computer vulnerable to attack from persons intent on doing malicious mischief, or worse.