Billion 7300 nx manual


















Save Configuration. Web Configuration Open your web browser, enter the IP address of your router, which by default is System Up-Time: Records system up-time. Connection: The current connection status. Gateway: The IP address of the default gateway. It is case sensitive and must not excess 32 characters.

Make sure your wireless clients have exactly the ESSID as the device, in order to get connected to your network. The default mode of wireless security is Disable. For more information , turn to wireless security for help. Username: Enter the username provided by your ISP. You can input up to alphanumeric characters case sensitive. Password: Enter the password provided by your ISP. You can input up to alphanumeric characters case sensitive Service Name: This item is for identification purposes.

If it is required, your ISP provides you the information. Maximum input is 15 alphanumeric characters. Select the one provided by your ISP Auth. Protocol: Default is Auto. Leave this at 0. The size of the largest datagram excluding media-specific headers that IP will attempt to send through the interface. For detail, please turn to ADSL profile.

If you are uncertain what services are available to you, and then please select Automatic. The service provider is able to attach anything to an APN to create a data connection, requirements for APNs varies between different service providers. Most service providers have an internet portal which they use to connect to a DHCP Server, thus giving you access to the internet i.

Authentication Protocol: Default is Auto. A PIN code is a numeric value used in certain systems as a password to gain access, and authenticate. Default setting is Disable. In this case, if you want to join this wireless network, enter the exactly ESSID manually and some security settings. America , Europe, France, etc. The Channel ID will be different based on this setting. As long as the passwords match, a client will be granted access to a WLAN.

If you want to use wireless, you can select Enable. For security propose, change to a unique ID name which is already built into the router wireless interface. It is case sensitive and must not exceed 32 characters. Make sure your wireless clients have exactly the ESSID as the device in order to connect to your network. The input format is in character style and key size should be in the range between 8 and 63 characters. This process is done automatically.

Default value is Thus, any clients using the wireless setting to search for available or specific router on the network will not be able to discover the router whose Hide ESSID function is set to enabled. The default setting is disabled. The input format is in character style and the key size should be in the range between 8 and 63 characters.

Note: Wireless performance may degrade if the selected channel ID is already being occupied by other AP s. If you do not have any wireless, select Disable. WEP Authentication: To prevent an unauthorized wireless station from accessing the data transmitted over the network, the router offers a secure data encryption, known as WEP.

There are 3 options to select from: Open System, Shared key or both. Key : Enter the key to encrypt wireless data. To allow encrypted data transmission, the WEP Encryption Key values on all wireless stations must be the same as the router. There are four keys for your selection. Click Apply to confirm the settings. Host Name lets you change the router name. Current time: Set the current time. See the Time Zone section for more information.

Hardware Version: Device version. Software Version: Firmware version. Click the link, the following will appear. Upstream: Upstream rate. Downstream: Downstream rate. Line Attenuation Upstream : This is attenuation of signal in upstream. Line Attenuation Downstream : This is attenuation of signal in downstream.

Refresh: Press this button to get the latest statistics. Click Status to go to 3G configuration page. Signal Strength: The signal strength bar indicates current 3G signal strength. Network Name: The network name that the device is connected to. Card Name: The name of the 3G card. Card Firmware: The current firmware for the 3G card. See the Firewall section of this manual for more information on this feature.

Interface: The interface name on the router that this IP address connects to. Register Information: Register time information. You can trace historical information with this function. Please see the Firewall section of this manual for more details on how to enable Firewall logging.

Name: the description of this application. Internal Port: the internal service port. IP Address: the internal host IP address. Click Continue to go to next step. Or select Manually to go to step 4.

Step 3: wait when the ADSL is scanning. Also you can Abort to manually setting and go to next step 4. Step 4: type the username and password provided by your ISP. Click Continue to go on. Step 5: wait while the device is configured. Step 6: WAN connection configuration is successful. Step 7: Click Next to Wireless to do wireless configuration. For detail, please turn to WLAN in this manual for help.

Step 8: wait while saving configuration to Flash. Step 9: success. Protocol: The current ATM protocol in the device Click on the Continue button and wait for your connection to be connected. If connection is successful the following image will be shown. Each IP address entered in the fields must be in the appropriate IP form, which is four IP octets separated by a dot x. The Router will not accept the IP address if it is not in this format. Netmask: Type the subnet mask assigned to you by your ISP if given.

Service Name: Enter a name for this connection. The size of the largest datagram excluding media-specific headers an IP attempts to send through the interface. Click on the Continue button and wait for your connection to be connected. TEL No. Username: The username provided by your service provider. These functions are described in the following sections. Users usually only have one subnet in their LAN. The default IP address for the router is Netmask: The default subnet mask on this router.

It helps to connect two or more local networks to the ISP or remote node. In this case, an internal router is not required. Just drop documents in, press the job button, and PaperStream Capture will scan and save all of your documents to your pre-configured destination.

Integrations add support for scanning to cloud, server, and web-based systems. Instant QC shows scans directly on the touchscreen so users can verify page count and see scans in real time. Be assured that details are captured clearly with detailed zoom and 3 levels of thumbnail quality. Cutting-edge PaperStream image processing resides in PaperStream IP Net, optimizing every scan automatically to make it the clearest, most legible scan possible.

Enterprise Solution Datasheet. No local PC, monitor, or keyboard is needed. Integrated Wi-Fi allows optimized placement in hard-to-reach, high-traffic areas without having to pay for expensive Ethernet cabling. Installed on a Windows Server, PaperStream NX Manager provides easy-to-use, web-based, centralized management, allowing the IT professional to remotely control and administer workflows.

Control up to 1, scanners, even at remote branches and offices via VPN. Users log in to the device, put in documents, and press customizable buttons to send scans to the correct destination. Little to no training required. Not only is direct data transfer to client-unique web systems possible with SDK use, but secure data transfer is also possible with strong data encryption. Users can scan and save documents without any requirement for a local computer. Customized job menus ensure efficient and secure decentralized data entry is possible for each user.

It is also possible for different job menus to be assigned to each scanner, and avoid any authentication processes. With PaperStream NX Manager, users can scan from mobile or web applications opened up on smart devices or thin client terminals. Seamless integration into company systems enables use of a variety of devices for scanning operations. Developers can utilize suitable SDK for their clients who want to use their own systems.

An interface for development of web applications that carry out scanning functions. An interface for development of applications to manage jobs and job groups. Not only can users link the scanner to NFC, but can also link the scanner with their currently used authentication server.

An interface for development of applications designed to link PaperStream NX Manager with various systems. The server software carries out user authentication, job management, image processing of scanned data, and data output for the fiNX. Automatic sharing of authentication methods and job settings throughout all connected scanners can be done with PaperStream NX Manager, capable of managing up to 1, fiNX scanners. The software specializes in centralized management of multiple scanners, including batch updates of scanner settings and firmware, as well as monitoring of errors and consumables status.

This is also capable of managing up to 1, scanners per server. Documents folded in half and carbon-copy sales slips are also an ease to scan with Manual Feed Mode. The touch screen enables users to perform operations intuitively, like scanning and data checking, with thumbnail reviews of scans. The screen also displays messages or instructions with illustrations so that users can handle errors themselves. Connection without need for the USB cable allows the scanner to be positioned wherever needed, to improve user productivity, reduce interruptions, and make more room for more frequently used equipment.

Both advanced driver and software, PaperStream IP and PaperStream Capture, enable users to fully enjoy simple scanning operations and high quality images, like our other Fujitsu image scanners.

Easy NX Connect is a convenient software package that includes multiple authentications and destinations in one license allowing businesses to connect to popular cloud applications without the need for complicated IT or professional services. In keeping with our promise to provide continuous improvements to our best in class imaging products, we are announcing new connectors for the Easy NX Connect for fiNX scanner with NX Manager.

Easily scan directly into popular destinations with these connectors:. Find out the details about your product's warranty and information on how to extend your warranty.

Network Deployed. Standalone Solution. Scan without the computer Users can scan and save documents without any requirement for a local computer. Reduce operation cost with centralized management The user authentication function, job menu, and other scan settings are all centrally managed with PaperStream NX Manager and Scanner Central Admin. If you prefer to specify an SNTP server other than those in the drop-down list, simply enter its IP address as shown above. Think of your router as a dedicated computer, and the firmware as the software it runs.

Over time this software may be improved and modified. Your router allows you to upgrade the software it runs to take advantage of these changes. Clicking on Browse allows you to select the new firmware image file you have downloaded to your PC. Once the correct file is selected, click Upgrade to update the firmware in your router.

New Firmware Image: Type in the location of the file you wish to upload in this field or click Browse… to locate it. Browse…: Click Browse… to find the file with the.

Remember that you must decompress compressed. Upgrade: Click upgrade to begin the upload process. This process may take up to three minutes. DO NOT power down the router or interrupt the firmware upgrade while it is still in process.

Improper operation may damage the router. Please see section 2. This is useful if you wish to experiment with different settings, knowing that you have a backup handy in the case of any mistakes. Press Backup to select where on your local PC to save the settings file. You may also change the name of the file when saving if you wish to keep multiple backups.

Press Browse… to select a file from your PC to restore. Settings files saved to your PC should not be manually edited in any way. Select the settings files you wish to use, and press Restore to load those settings into the router. If you wish to restart the router using the factory default settings for example, after a firmware upgrade or if you have saved an incorrect configuration , select Factory Default Settings to reset to factory default settings.

You can set up multiple user accounts, each with their own password. Once you have clicked Edit on the account you want to edit, the information of the account will be displayed above. Just go ahead and change the password. These options are the same when creating a user account, with the exception that once created you cannot change the username.

Password: Enter the password of your email account. Username: Enter the name for the account. Password: Set the password for the account. Login: This option specifies the maximum number of users both anonymous and non-anonymous that are allowed to be using the FTP server simultaneously. Samba Access: If you enable this function, this account has the access authority to Samba Server. Service Name: enter the name for this Samba service.

Home Directory: the home directory for the account. Add: Click this button to add a new account and it will appear at the bottom table. In the above example, we add a user named test. And the user is granted with authority of FTP and Samba server access. Use Samba server, please enable first.

In the listing, all the folders in the USB device will be shown. For example, in the following diagram, you will Folder home and ytt. Directory Name Enter the directory name which you wish to create in the Directory Name field. Enter directory name in the directory name field and choose partition path which the directory will located. Are you sure to deleter data? Workgroup: Enter the workgroup name in this field which should be same as workgroup name for PCs. In Network Neighborhood, you will find this Samba server name.

Click Apply to confirm the configuration. In User Management section, set the authority for the user. Default setting is set to disable. Anonymous Login: Enable or disable Anonymous Login. Anonymous Permit: Enable or disable Anonymous Permit. Users: This option specifies the maximum number of user accounts. Stay Timeout: Enter the Stay timeout value. Auto-disconnect when there is no activity for a predetermined period of time.

The default value is seconds. Click Apply to save the configuration. Firewall: Prevents access from outside your network. This natural firewall is on when the NAT function is enabled. When using Virtual Servers port mapping your PCs are exposed to the ports specified opened in your firewall packet filter settings.

Firewall Security and Policy General Settings : Inbound direction of Packet Filter rules prevent unauthorized computers or applications accessing your local network from the Internet. Intrusion Detection: Enable Intrusion Detection to detect, prevent, and log malicious attacks. This configuration program allows you to set up to 6 different filter rules for different users based on their IP addresses or their network Port number. As long as one of the rules is satisfied, the specified action will be taken.

Rule Name: Users-define description to identify this entry. The maximum name length is 32 characters, and then can choose application that they want from listbox. Input the range you want to filter out. If you leave empty or 0. Select TCP if you wish to search for the connection-based application service on the remote server using the port number. Or select UDP if you want to search for the connectionless application service on the remote server using the port number. Action: If a packet matches this filter rule, Forward allows the packets to pass or Drop disallow the packets to pass this packet.

It is recommended that this option be configured by an advanced user. Direction: Determine whether the rule is for outgoing packets or for incoming packets. Time Schedule: It is self-defined time period.

You may specify a time schedule for your prioritization policy. Add: Click this button to add a new packet filter rule and the added rule will appear at the bottom table. Edit: Check the Rule No. Delete: Check the Rule No. Reorder: Be aware that packet filtering parameters appear in priority order i. Click Add to add the item configured and the corresponding information will be listed below just as the following. The easiest and safest way is that the filtered IP address is assigned to a specific PC that is not allowed to access an outside resource such as the Internet.

You configure the filtered IP address manually for this PC, but it stays in the same subnet with the router. There are no pre-defined MAC address filter rules; you can add the filter rules to meet your requirements. The format of MAC address could be: xx:xx:xx:xx:xx:xx or xx-xx-xx-xx-xx-xx.

This feature is disabled by default. Check Allow or Block to activate the filter. Time Schedule: A self defined time period. For Add, Edit, Delete, see the Packet filter. The router automatically detects and blocks a DoS Denial of Service attack if a user enables this function. This kind of attack is not to access confidential data on the network; instead, it aims to disrupt specific equipment or the entire network. If this happens, users will have trouble accessing the network resources.

Intrusion Detection: Check Enable if you wish to detect intruders accessing your computer without permission. Log: Check Log if you wish to generate logs when the filer rule is applied to the Intrusion Detection.

There are no pre-defined URL filter rules; you can add filter rules to meet your requirements. When enabled, your specified keywords list is checked to see if any keywords are present in URLs accessed to determine if the connection attempt should be blocked.

Domains Filtering: Checks the domain name in URLs accessed against your list of domains to block or allow. The checking procedure is: 1. Check the domain in the URL to determine if it is in the trusted list. If yes, the connection attempt is sent to the remote web server. If not, it is checked with the forbidden list. If present, the connection attempt is dropped.

If the packet matches neither of the above, it is sent to the remote web server. For example to block traffic to www. QoS: Keeping Your Net Connection Fast and Responsive Configurable by internal IP address, external IP address, protocol, and port, the Quality of Service QoS gives you full control over which types of outgoing data traffic should be given priority by the router, ensuring bandwidth-consumption data like gaming packets, latency-sensitive application like voice, or even mission critical files, move through the router at lightning speed, even under heavy load.

You can throttle the speed at which different types of outgoing data pass through the router. In addition, you can simply change the priority of different types of upload data and let the router sort out the actual speeds.

This page will show the brief information for policies you have added or edited. This page will also display the total available Non-assigned bandwidth, in percentage, can be assigned.

Application: A name that identifies an existing policy. Direction: The traffic flow direction to be controlled by the QoS policy. You can assign the priority for the application or you can limit the rate your application used. Protocol: The Protocol will be controlled. For other protocols, at least one value shall be given. Note: To be sure the router s in the backbones network have the capability in executing and checking the DSCP through-out the QoS network. It also is the maximal rate for this policy.

When you choose Limited, type the Ratio proportion. If you choose Prioritization for the rule, you parameter Priority would be available, you can set the priority for this rule.

Ratio: Assign the data ratio for this policy to be controlled. For 0. Priority: Specify the priority for the bandwidth. You can specify which application can External Ports: The Application port values for remote machines you want to control.

Time Schedule: Scheduling your prioritization policy. Data Always rate. Data rate. VoIP application Voice is latency-sensitive application. In TCP and UDP networks a port is a bit number used to identify which application program usually a server incoming connections should be delivered to. Servers follow the well-known port assignments so clients can locate them. If you wish to run a server on your network that can be accessed from the WAN i.

You also need to use port forwarding if you wish to host an online game server. The reason is that when using NAT, your publicly accessible IP address is used by and points to your router, which needs to deliver all traffic to the private IP addresses used by your PCs.

Port numbers range from 0 to , but only port numbers 0 to are reserved for privileged services and are The registered ports are numbered from through The remaining ports, referred to as dynamic ports, or private ports, are numbered from through Application: Select the service you wish to configure Protocol: Automatic when you choose Application from listbox or select a protocol type which you want. Internal IP Address: Enter the IP address of a specific internal server to which requests from the specified port is forwarded.

Add: Click to add a new virtual server rule. Click again and the next figure appears. When your router needs to allow outside users to access internal servers, e. You can set up a local server with a specific port number for the service to use, e. When an incoming access request to the router for a specified port is received, it is forwarded to the corresponding internal server. If the port is not listed as a predefined application, you need to add it manually.

In addition to specifying the port number used, you also need to specify the protocol used. The protocol is determined by the particular application. Using port mapping does have security implications, since outside users are able to connect to PCs on your network. If the DHCP server option is enabled, you have to be very careful in assigning the IP addresses of the virtual servers in order to avoid conflicts.

You can configure the virtual server IP address manually, but it must still be in the same subnet as the router.

In each time profile, you may schedule specific day s i. Monday through Sunday to restrict or allowing the usage of the Internet by users or applications. Refer to Time Zone for details. You router time should correspond with your local time. If the time is not set correctly, your Time Schedule will not function properly. Name: A user-define description to identify this time portfolio.

Day in a week: The default is set from Sunday through Saturday. You may specify the days for the schedule to be applied. Start Time: The default is set at AM. You may specify the start time of the schedule. End Time: The default is set at PM. You may specify the end time of the schedule. Select the Apply button to apply your changes.

Users who do not understand the features should not attempt to reconfigure their router, unless advised to do so by support staff. Destination: The destination subnet IP address. Netmask: Subnet mask of the destination IP addresses based on above destination.



0コメント

  • 1000 / 1000