EasyManua.ls Logo

NEC P350W - Page 12

NEC P350W
222 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
x
Important Information
Regulatory Statement:
OperationofthisdeviceissubjectedtothefollowingNationalregulationsandmaybeprohibitedtouseifcertain
restrictionshouldbeapplied.
France:
Outdooruselimitedto10mWe.i.r.p.withintheband2454–2483.5MHz.DerogationinFrenchoverseasdepartments
ofGuyaneandLaReunion:outdoorusenotallowedinband2400-2420MHz.
• Cautions on security when using wireless LAN products
WithawirelessLAN,radiowavesareusedinsteadofLANcablesfortheexchangeofdatabetweenthewireless
accesspoints(computers,etc.),offeringtheadvantagethatLANconnectionscanbemadefreelywithintherange
oftheradiowaves.
Ontheotherhand,theradiowavesreachallpointswithinthisrange,regardlessofwallsorotherobstacles,possibly
resultingintheproblemsdescribedbelowifthepropersecuritymeasuresarenottaken.
Contents of transmissions may be intercepted
Maliciousthirdpartiesmaypurposelyintercepttheradiowavesandstealinformationcontainedinthetransmissions,
includingsuchpersonalinformationasIDnumbers,passwords,creditcardnumbers,e-mailmessages,etc.
Improper intrusions
Maliciousthirdpartiesmaywithoutpermissionaccessthepersonalorcompanynetworkandstealpersonalor
condentialinformation,pretendtobesomeoneelseandleakincorrectinformation,rewriteinformationthathas
beenintercepted,introducecomputervirusesorotherwisedamagedataorthesystem,etc.
WirelessLANcardsandwirelessaccesspointsgenerallyincludesecuritymeasuresfordealingwiththeseproblems.
Makingthepropersecuritysettingsbeforeusingtheproductscanreducetheriskofsuchproblemsarising.
Werecommendthatyoufullyunderstandtheproblemsthatcanarisewhenusingtheproductswithoutmakingthe
securitysettings,thenthatyoumakethesecuritysettingsbasedonyourowndecisionandatyourowndiscretion.

Table of Contents

Related product manuals