NEC ZA-SA3500G Parts list manual

SA3500G Function Manual
1th edition October 2018
NEC Platforms, Ltd.
*Explained based on the target firmware Ver. 5.0.10
Model Name
ZA-SA3500G

2Contents|
Contents
Contents ........................................................................................................................................................2
1. Introduction ................................................................................................................................................8
1.1. Limitations and Disclaimer ......................................................................................................................8
1.2. Notes Concerning Radio Waves.............................................................................................................. 10
1.3. Notes on Export................................................................................................................................... 10
1.4. About the Software Used in this Product ................................................................................................. 11
1.5. License for Maintenance Upgrade Function.............................................................................................. 11
1.6. License concerning the Security/Scan Function ........................................................................................ 12
1.7. Terms of Use of Home IP Location Function............................................................................................. 12
1.8. Software License Agreement ................................................................................................................. 14
1.9. Environmental of this Product................................................................................................................ 16
1.10. Trademarks ....................................................................................................................................... 16
1.11. Safety Instructions ............................................................................................................................. 17
1.12. Preventing Damage to this Product....................................................................................................... 20
1.13. Precaution for Data and Wireless LAN Security....................................................................................... 21
2. About the Product...................................................................................................................................... 22
2.1. Overview ............................................................................................................................................ 22
2.2. Features ............................................................................................................................................. 23
2.3. Product Specification ............................................................................................................................ 24
2.3.1. Product Exterior ............................................................................................................................. 24
2.3.2. Basic Specifications......................................................................................................................... 26
2.3.3. Lamp Indicator .............................................................................................................................. 28
2.3.4. Device Label .................................................................................................................................. 31
2.4. Components........................................................................................................................................ 32
3. Function Specification................................................................................................................................. 33
3.1. Protocol Stack...................................................................................................................................... 36
3.1.1. Bridge Mode .................................................................................................................................. 36
3.1.2. Router Mode .................................................................................................................................. 37
3.2. Installable Network .............................................................................................................................. 38
3.2.1. Bridge Mode .................................................................................................................................. 39
3.2.2. Router Mode .................................................................................................................................. 40
3.3. Security/Scan Function ......................................................................................................................... 41
3.3.1. Security/Scan Function Overview ..................................................................................................... 41
3.3.2. Scanned Traffic .............................................................................................................................. 41
3.3.3. Disclaimer ..................................................................................................................................... 42
3.3.4. Working with the Server.................................................................................................................. 42
3.3.5. License Expiration Operation............................................................................................................ 45
3.3.6. Firewall (FW)............................................................................................................................... 47
3.3.7. Antivirus (AV)............................................................................................................................... 48
3.3.8. Intrusion Prevention System (IPS).................................................................................................. 51

|Contents 3
3.3.9. Web Guard (WG).......................................................................................................................... 53
3.3.10. URL Filter (UF)........................................................................................................................... 56
3.3.11. URL Keyword Filter(KF).............................................................................................................. 61
3.3.12. Application Guard(APG).............................................................................................................. 64
3.3.13. Security Log................................................................................................................................. 65
3.3.14. Mail Notification............................................................................................................................ 66
3.3.15. PATLITE ...................................................................................................................................... 72
3.3.16. Statistics ..................................................................................................................................... 73
3.3.17. Threat Detection .......................................................................................................................... 74
3.3.18. Device Manager............................................................................................................................ 75
3.3.19. Device Map .................................................................................................................................. 76
3.3.20. Simple RADIUS Function ............................................................................................................... 77
3.4. Maintenance Function........................................................................................................................... 78
3.4.1. Firmware update operation.............................................................................................................. 78
3.4.2. Initialization of Setting Values .......................................................................................................... 80
3.4.3. Saving Information on a Computer ................................................................................................... 81
3.4.4. Restart.......................................................................................................................................... 82
3.4.5. Time Function................................................................................................................................ 82
3.4.6. HTTP Proxy Server ......................................................................................................................... 84
3.4.7. Checking Network Reachability by Ping Transmission .......................................................................... 84
3.4.8. Network Route Confirmation by Sending Traceroute ........................................................................... 84
3.4.9. Self-Diagnosis Function ................................................................................................................... 84
3.4.10. Packet Dump Function................................................................................................................... 84
3.4.11. Event Log .................................................................................................................................... 85
3.4.12. Logout Function ........................................................................................................................... 86
3.4.13. SNMP .......................................................................................................................................... 87
3.4.14. Home IP Location Function ............................................................................................................ 89
3.5. Bridge Mode Function ........................................................................................................................... 90
3.5.1. Physical Interface Specification ........................................................................................................ 90
3.5.2. IP Address..................................................................................................................................... 91
3.5.3. IPv4 Static Routing Function ............................................................................................................ 91
3.5.4. IPv4 Packet Filtering ....................................................................................................................... 92
3.5.5. MAC Address Filtering ..................................................................................................................... 93
3.5.6. Ethernet Port Setting ...................................................................................................................... 93
3.5.7. DNS Resolver................................................................................................................................. 94
3.6. Router Mode Function........................................................................................................................... 95
3.6.1. Physical Interface Specification ........................................................................................................ 95
3.6.2. IP Address..................................................................................................................................... 95
3.6.3. IPv4 Static Routing Function ............................................................................................................ 96
3.6.4. IPv4 Packet Filtering ....................................................................................................................... 96
3.6.5. MAC Address Filtering ..................................................................................................................... 96
3.6.6. Ethernet Port Setting ...................................................................................................................... 96
3.6.7. MTU.............................................................................................................................................. 96

4Contents|
3.6.8. NAPT ............................................................................................................................................ 97
3.6.9. PPPoE ........................................................................................................................................... 98
3.6.10. DHCP Client ................................................................................................................................. 99
3.6.11. DHCP Server .............................................................................................................................. 101
3.6.12. Proxy DNSv4.............................................................................................................................. 102
3.6.13. Cloud Service Connection ............................................................................................................ 103
3.6.14. IPsec......................................................................................................................................... 104
3.7. Wireless LAN Function ........................................................................................................................ 111
3.7.1. Wireless LAN ............................................................................................................................... 111
3.7.2. WPS ........................................................................................................................................... 114
3.8. USB Device Function .......................................................................................................................... 115
3.8.1. Save Setting Values ...................................................................................................................... 116
3.8.2. Restore Setting Values .................................................................................................................. 117
3.9. Other Functions ................................................................................................................................. 118
3.9.1. Traffic Forwarding Restrictions ....................................................................................................... 118
3.9.2. MAC Learning .............................................................................................................................. 118
3.9.3. PAUSE Function............................................................................................................................ 118
4. Installation.............................................................................................................................................. 119
4.1. Installation ........................................................................................................................................ 119
4.1.1. Environmental Condition ............................................................................................................... 119
4.1.2. Installation Place .......................................................................................................................... 119
4.1.3. Installation Procedure ................................................................................................................... 120
4.2. Using the Anti-theft Hook.................................................................................................................... 121
4.3. Connection of Cables .......................................................................................................................... 122
5. Setting/Setting Confirmation..................................................................................................................... 123
5.1. Account ............................................................................................................................................ 124
5.2. Setting Flow at Initial Startup .............................................................................................................. 125
5.2.1. Bridge Mode Operation.................................................................................................................. 125
5.2.2. Router Mode Operation ................................................................................................................. 131
5.2.3. Activation .................................................................................................................................... 136
5.3. Setup Screen Configuration ................................................................................................................. 138
5.4. Login................................................................................................................................................ 139
5.5. Save Settings .................................................................................................................................... 141
5.6. Maintenance Setting (Bridge Mode)...................................................................................................... 143
5.6.1. Maintenance Screen Structure ....................................................................................................... 144
5.6.2. Product IP Address Setting ............................................................................................................ 146
5.6.3. Wireless LAN Setup ...................................................................................................................... 148
5.6.4. WPS Setup .................................................................................................................................. 148
5.6.5. IPv4 Static Routing ....................................................................................................................... 149
5.6.6. Packet Filter Entry Setup ............................................................................................................... 150
5.6.7. MAC Address Filtering Setup .......................................................................................................... 152
5.6.8. Ethernet Port Setting .................................................................................................................... 156
5.6.9. SNMP Agent Setting...................................................................................................................... 157

|Contents 5
5.6.10. Access Web Setting..................................................................................................................... 158
5.6.11. Time Setting .............................................................................................................................. 160
5.6.12. Save and Restore Settings ........................................................................................................... 162
5.6.13. Factory Default........................................................................................................................... 163
5.6.14. Firmware Update........................................................................................................................ 164
5.6.15. Restart ...................................................................................................................................... 168
5.6.16. Maintenance Mode...................................................................................................................... 169
5.6.17. Switch to Router Mode ................................................................................................................ 170
5.7. Maintenance Setting (Router Mode) ..................................................................................................... 171
5.7.1. Maintenance Screen Structure ....................................................................................................... 172
5.7.2. IPv4 LAN Interface Setting ............................................................................................................ 174
5.7.3. IPv4 WAN Interface Setting ........................................................................................................... 175
5.7.4. PPP/PPPoE Setup.......................................................................................................................... 179
5.7.5. DHCP Client Setting ...................................................................................................................... 182
5.7.6. MTU Setting................................................................................................................................. 183
5.7.7. DHCP Server................................................................................................................................ 184
5.7.8. Wireless LAN Setting .................................................................................................................... 186
5.7.9. WPS Setting ................................................................................................................................ 191
5.7.10. Port Forwarding Setting............................................................................................................... 192
5.7.11. DNS Server Setting..................................................................................................................... 194
5.7.12. IPv4 Statistic Routing Setting ....................................................................................................... 196
5.7.13. Ethernet Port Setting .................................................................................................................. 198
5.7.14. ICMP Redirect Message Setting .................................................................................................... 198
5.7.15. Cloud Service Setting .................................................................................................................. 199
5.7.16. IPsec Setting.............................................................................................................................. 208
5.7.17. Packet Filter Entry Setting ........................................................................................................... 236
5.7.18. MAC Address Filtering Setup ........................................................................................................ 238
5.7.19. SNMP Agent Setting.................................................................................................................... 238
5.7.20. Access Web Setting Management ................................................................................................. 241
5.7.21. Time Setting .............................................................................................................................. 241
5.7.22. Save and Restore Setting............................................................................................................. 241
5.7.23. Factory Default........................................................................................................................... 241
5.7.24. Firmware Update........................................................................................................................ 241
5.7.25. Home IP Location Setting ............................................................................................................ 242
5.7.26. Restart ...................................................................................................................................... 243
5.7.27. Maintenance Function ................................................................................................................. 243
5.7.28. Switching to Bridge Mode ............................................................................................................ 243
5.8. Security/Scan Function Setting ............................................................................................................ 244
5.8.1. Setting Screen Structure ............................................................................................................... 245
5.8.2. Basic Setting................................................................................................................................ 247
5.8.3. Firewall (FW) ............................................................................................................................... 248
5.8.4. Antivirus (AV) .............................................................................................................................. 251
5.8.5. Intrusion Prevention System (IPS).................................................................................................. 254

6Contents|
5.8.6. Web Guard (WG).......................................................................................................................... 256
5.8.7. URL Filter (UF)............................................................................................................................. 259
5.8.8. URL Keyword Filter (KF)................................................................................................................ 265
5.8.9. Application Guard (APG)................................................................................................................ 267
5.8.10. Mail Notification.......................................................................................................................... 270
5.8.11. Advanced Settings ...................................................................................................................... 275
5.8.12. Basic RADIUS Function................................................................................................................ 277
5.9. Network Topology Function Setting ...................................................................................................... 283
5.9.1. Setting Screen Structure ............................................................................................................... 284
5.9.2. Device Map.................................................................................................................................. 285
5.9.3. Device Manager ........................................................................................................................... 290
5.9.4. External Device ............................................................................................................................ 293
5.10. Switch Operation.............................................................................................................................. 295
5.10.1. Factory Default........................................................................................................................... 295
5.10.2. Activation .................................................................................................................................. 296
5.10.3. Clear Threat Detection State ........................................................................................................ 296
5.10.4. Firmware Update by Switch Operation .......................................................................................... 296
5.10.5. Automatic Setting of Wi-Fi by WPS Switch ..................................................................................... 297
6. Device Information Confirmation ............................................................................................................... 298
6.1. Device Information Confirmation.......................................................................................................... 298
6.1.1. Confirmation of Firmware Version and Network Information (Bridge Mode)......................................... 299
6.1.2. Confirmation of Firmware Version and Network Information (Router Mode)......................................... 301
6.1.3. Security/Scan Function Status........................................................................................................ 304
6.1.4. Routing Table............................................................................................................................... 306
6.1.5. BGP Peer Status ........................................................................................................................... 308
6.1.6. DHCP Leased Address, Wi-Fi and ARP Table Information ................................................................... 311
6.1.7. IPsec SA Information .................................................................................................................... 313
6.1.8. Statistical Information of IPsec Tunnel Traffic ................................................................................... 316
6.1.9. SNMP MIB Information.................................................................................................................. 318
6.1.10. Event Log .................................................................................................................................. 320
6.1.11. Security Log............................................................................................................................... 322
6.1.12. Statistics ................................................................................................................................... 328
6.1.13. Network Connection Confirmation by Ping Transmission .................................................................. 335
6.1.14. Network Route Confirmation by Traceroute.................................................................................... 336
6.1.15. Self Diagnosis Function ............................................................................................................... 337
6.1.16. Packet Dump Function................................................................................................................. 338
7. Troubleshooting....................................................................................................................................... 340
7.1. Troubleshooting ................................................................................................................................. 340
7.1.1. Multiple Routes Exists in the Network where this Product is Installed .................................................. 340
7.1.2. Cannot Log in to Web Setting ........................................................................................................ 342
7.1.3. Forgot Login Password of Web Setting ............................................................................................ 342
7.1.4. Cannot Activate............................................................................................................................ 342
7.1.5. Cannot Access Internet ................................................................................................................. 343

|Contents 7
7.1.6. Security/Scan Function Not Working ............................................................................................... 344
7.1.7. Firmware Cannot Be Updated ........................................................................................................ 344
7.1.8. Stop Security/Scan Functions......................................................................................................... 345
7.1.9. Operation to be Done When Setting Values are Changed................................................................... 345
7.1.10. Operation to be Done before Turning Off this Product ..................................................................... 345
7.1.11. Statistics are Not Displayed Correctly ............................................................................................ 346
7.1.12. Is there an Error Log Display for Network Communication? ............................................................. 346
7.1.13. Cannot Connect with IPsec .......................................................................................................... 346
7.1.14. No Wi-Fi Connection ................................................................................................................... 347
7.1.15. PPPoE Session Not Connected ...................................................................................................... 347
7.1.16. Checking [Device ID] and [Serial Number] in Web Setting ............................................................... 347
7.1.17. Cannot Connect to the Internet in Router Mode.............................................................................. 348
7.1.18. Route Information of RIP is Not Transferred in Bridge Mode............................................................. 348
7.1.19. Cannot Connect to Remote Desktop.............................................................................................. 348
7.1.20. To Access the Web Setting of this Product from a Remote PC........................................................... 350
7.1.21. Cannot Access a Specific Site ....................................................................................................... 351
7.1.22. Specific Application Cannot Communicate...................................................................................... 351
7.1.23. Unknown Log is Outputted to Security Log .................................................................................... 351
7.1.24. Attachment of Received Email Cannot be Opened........................................................................... 351
7.1.25. Device Authentication with MAC Address ....................................................................................... 351
7.1.26. Cannot Communicate or Slow when Setting up Microsoft Azure (Route Based) .................................. 351
7.1.27. Recommended actions before power off when product failure occurs................................................ 351
8. Setting Examples..................................................................................................................................... 352
8.1. Use in this Network ............................................................................................................................ 353
8.1.1. Operating PPPoE on WAN Side of the Router.................................................................................... 353
8.1.2. Using VPN ................................................................................................................................... 353
8.1.3. Using VLAN ................................................................................................................................. 354
8.1.4. IEEE802.1X Authentication Terminal ............................................................................................... 355
9. Glossary ................................................................................................................................................. 356
9.1. Glossary............................................................................................................................................ 356
9.2. ASCII Code Table ............................................................................................................................... 357
10. Contact Information ............................................................................................................................... 358

8Introduction|
1. Introduction
Thank you for using SA3500G.
1. This document explains the functions, installation, and the setting of SA3500G.
2. This document is composed of the following sections.
1. Introduction
2. About the Product
3. Function Specification
4. Installation
5. Setting/Setting Confirmation
6. Device Information Confirmation
7. Troubleshooting
8. Setting Examples
9. Glossary
10. Contact Information
3. NEC Platforms, Ltd. assumes no responsibility whatsoever for call charges and provider connection charge losses,
etc. generated due to the use of this product and setting mistakes.
1.1. Limitations and Disclaimer
(1)
All rights reserved. No part of this manual may be copied or reproduced without prior permission.
(2)
Contents of this manual may change without prior notice.
(3)
We take every possible precaution to ensure the accuracy of this manual, but if anything is unclear or erroneous
in the content, contact us.
(4)
We assume no responsibility whatsoever for pure economic losses such as damage incurred from
miscommunication resulting from external causes such as malfunction of this product, user mishandling, natural
disasters, faults, and power outages.
(5)
Note that we shall not be responsible for any damage resulting from security problems if no security measures
are in place or the specification is not secure.
(6)
If this product is damaged accidentally through inappropriate use or unpredictable circumstances (e.g.,
thunderstorms or electric current leakage), it may not operate properly. Read this document and follow the
instructions carefully.
(7)
For ease of use of this product, we recommend connections on the 1000BASE-T, 1000 Mbps or the 100BASE-
TX, 100 Mbps standard.
(8)
This product reduces the risk of threats on the network, but it does not guarantee to remove the threat
completely upon installation.
(9)
Internet connection is necessary to use the security/scan functions of this product.
(10)
When the license agreement period is exceeded, all security/scan functions of this product will be suspended.

|Introduction 9
NOTES ON WIRELESS LAN
The standard values of wireless LAN are the maximum theoretical values when communication is carried out with
other devices with the same configuration as this product. The standard values may not indicate the actual data
transfer rate.
The interconnectivity of this product with third-party products is not guaranteed.
Wireless LAN transmission distance and speed varies greatly depending on objects such as walls and furniture.

10 Introduction|
1.2. Notes Concerning Radio Waves
This product has received technical standards conformity certification.
When using the IEEE802.11b, IEEE802.11g and IEEE802.11n (2.4GHz) communication, the 2.4GHz frequency
band is used. In this frequency band, industrial equipment such as microwave ovens, scientific, and other medical
equipment, other homogenous wireless stations, local wireless stations for mobile identification that requires
license used in factory production lines, specific low powered wireless stations and amateur wireless stations
(assumed hereafter as “Other wireless stations“), etc., that do not require licensing are operated.
(1)
Confirm that “Other wireless stations” are not being used within the vicinity before using this product.
(2)
If, by any chance, interference occurs between this product and the “Other wireless stations“, change the
channel being used by this product, change the location of the device or stop using the device.
(3)
In addition, contact us when interference is generated and problem occurs.
It is not possible to communicate with a Bluetooth device using the 2.4GHz band.
When using the IEEE802.11b, IEEE802.11g and IEEE802.11n communication, wireless devices use all 2.4GHz
bands, and the band of mobile identification device can be avoided. The DS-SS and the OFDM methods are
adapted, and the interference distance is 40 meters.
2.4 : Wireless device uses 2.4GHz band.
DS/OF : DS-SS and OFDM methods.
4 : Assumed interference distance of 40m or less.
■■■ : It means all bandwidth can be used and the bandwidth of mobile
identification device can be avoided.
When this product is used with 2.4GHz band and the channel is set manually, the following content is
recommended by the ARIB standard of Association of Radio Industries and Businesses.
“When using this equipment with 2.4GHz band, it is recommended to make either ch1, ch6, or ch11 as the
channel setting in order to decrease the interference and for the improvement of frequency utilization efficiency.“
However, in order to avoid interference with systems other than wireless LAN, it is not limited if it is necessary to
use other than the recommended 1,6,11 channels.
When using a dual channel, there is a possibility of causing interference to other wireless stations that use the
same frequency band.
・When dual channel is “Enable“, confirm that no interference is caused to the radio signal condition of the
surrounding of other confirmed wireless stations.
・Change the setting to “Disable“ immediately when interference is generated in other wireless stations.
1.3. Notes on Export
This product (including software) is Philippine specification and it does not conform to foreign country standards. Our
company does not assume responsibility when this product is used outside the Philippines. Moreover, our company
does not perform maintenance service, as well as technical support for this product on foreign countries. Before
exporting this product, take the necessary procedures after confirming the foreign exchange and foreign trade laws,
and related export control laws.

|Introduction 11
1.4. About the Software Used in this Product
This product includes software licensed under the GNU General Public License (GPL), GNU Lesser General Public
License (LGPL), or other licenses.
Upon acquiring the said software's source code, you can copy, redistribute, and/or modify it under the terms of the
GPL, LGPL, or Sleepycat License.
We will provide copies of the source code to which GPL/LGPL/Sleepycat License will be applied subject to payment of
actual expenses required for distribution. For details, refer to the following URL.
http://www.synetcom.asia/
1.5. License for Maintenance Upgrade Function
Maintenance version upgrade function automatically updates through the Internet when there is an important change
in the software of this product.
“Important Update” means that NEC Platforms, Ltd. (Hereinafter assumed as “Our company“) will provide the
software version upgrade to provide functions of this product (for example, to improve security problems, etc.) when
it is determined to be required. When there is an important update, the customer will be informed through
"Important Notice" from the distributor.
If the maintenance version upgrade function starts to operate during communication, this product restarts, so the
communication that was connected will be disconnected. In addition, for metered billing contracts, communication
cost may be incurred due to software downloads and speed limit may occur due to packet transmission excess.
Communication costs incurred will be charged to the customer.
In this function, among the information related to this product, we notify the server of the minimum required device
and network information for this function to operate. This information is used only for the implementation of this
function and the improvement and enhancement of this product and function. Moreover, we will properly manage this
information in accordance with our company's handling procedures. When we use this function in cooperation with a
third party, we will properly manage it similar to our handling procedure.
This function is initially enabled. If the license cannot be acquired, disable the function according to the following
procedures. However, if this function is disabled, update is not done automatically even if there are critical software
updates that address security issues. When continuously using the software before it is improved, there is danger of
unauthorized access from a malicious third party.
How to deactivate this function
1. Access the Web setting. (Refer to Section 5.4)
2. Open the Maintenance screen from [TOP] - [Maintenance].
3. Remove the check on [Enable] in “Maintenance Update“.
4. Click the “Apply” button.
5. Click the “Save” button. (Refer to Section 5.5)

12 Introduction|
1.6. License concerning the Security/Scan Function
Check before using this product.
When this product is used, it is assumed that the license for this function has been acquired.
To detect a threat, the security/scan function is processed through the Internet as follows.
Automatic update of signature (file definition of virus information, etc.) used by security/scan function
Confirmation of URL that accesses the Internet
For metered billing contracts, communication cost may be incurred due to the downloading of the information file, and
speed may be limited due to excess packet transmission. With this function, we notify the server of the minimum
required device and network information for this function to operate. This information is used only for the
implementation of this function and it is not used for any other purpose. Moreover, this information follows the
handling procedure of our company, and appropriately managed. In cooperation with a third party, we properly
manage similar to our handling procedures of this function.
1.7. Terms of Use of Home IP Location Function
In this section, the terms of use of the Home IP Location function are described.
When the Home IP Location function is to be used, check the terms of use before enabling it. If the function is
enabled, it is assumed that the customer has agreed with the terms of use.
Home IP location function is a function to enable the customer to access this product more conveniently from the
Internet by Home IP Location name.
This function is enabled in the following cases:
Set to router mode (Initial value: Bridge mode)
Global IP address is assigned to the WAN
Maintenance upgrade function is "ON" (Initial value: ON)
Home IP Location function is "ON" (Initial value: OFF)
Furthermore, even if the function is enabled, it may take about one hour until this product becomes accessible.
In addition, the Home IP Location name will be unique to this product and cannot be changed.
1. Right to use
This feature is offered to the customer using this product.
Moreover, when this product is resold, this feature can be used by the new customer of this product.
2. Prohibited activities
This function cannot be used when illegal acts or the following illegal acts are done.
If we deem that the function use is unsuitable, we will stop the function without prior notice.
(1)
Act against public order and morals
(2)
Used for commercial purposes
(3)
Act that violates third-party rights or the act of raising fear
(4)
Act that prevents the operation of this function or the act of raising fear
(5)
Act of transferring the right of using this function to a third party
(6)
Act of disguising this product
3. Disclaimer
In providing this function, we make an effort in providing maintenance and stability of the function, our support will be
the following:

|Introduction 13
(1)
Damages of this function
We, under any circumstance, do not assume any responsibility on the damages that may be incurred by this
function.
(2)
Scope of Warranty
For this function, we verified the functional operation of this product and our server, and this is guaranteed. We do
not assume any responsibility on the warranty of equipment, customer's data, guaranteed performance of
operation, and the function due to the operating environment of the customer when this function is used.
(3)
Interruption and suspension of this function
Due to unavoidable reasons or company circumstances, interruption and suspension of this function may be
performed without prior notification.
(4)
Change in terms
Terms may be revised without prior notice.
4. Handling of device information
Our server will be notified of this product's device information necessary for this function.
(1) Notified device information
・This product's device information used by the customer.
・This product's network information used by the customer.
(2) Purpose of available information
Customer's device information will be used in order to improve this product, this function and the implementation of
this function. Customer's device information is used to implement this function and maintenance upgrade function
and will not be used for any other purpose.
(3) Information management
We will properly manage customer information in accordance with our handling procedures. We will properly
manage as with our handling procedure when this function is used in cooperation with a third party.

14 Introduction|
1.8. Software License Agreement
NEC Platforms Ltd. (hereinafter referred as “the Company“) allows the customer to use the software (hereinafter
referred as “this software“) installed in our SA3500G (hereinafter assumed as “this product“) and the related
document (hereinafter assumed as “this document“) (Collectively, software and this document is referred to as the
“licensed product“) based on the software license agreement (hereinafter assumed as “this contract“). Before using
this product, please read this contract carefully. When the customer has started using this product, it is assumed that
the customer has agreed to this contract. Refrain from using this product if the customer does not agree with this
contract and immediately return the purchased product with all the bundled items and proof of payment to the seller.
In this case, the paid amount will be returned.
1. Right to use
(1)
The Company allows the customer with limited, non-exclusive, and non-transferable right to use this software
only in this product, in accordance with this document.
(2)
The above-mentioned right of use does include the right to execute the following:
(i) Duplication, modification, translation, creating a quotation or a secondary article of the entire or part of the
licensed items. (ii) Offering whole or a part of this product as well as this document by sales, lease, loan,
distribution, re-use license or other methods. (iii) Trying to obtain the entire or part of the source code of the
licensed products by reverse engineering, or other methods to disassemble, the whole or part of this
software. (iv) Erase, modify or conceal the copyright display, trademark notice or other property right displays
that are written or embedded in the licensed products. (v) Use all or a part of this software other than this
product. (vi) Provide all or part of this software separately from this product. (vii) Use this software to develop
software application for customer's business. (viii) Using the licensed product in other usage, such as life-
support systems, implants, nuclear facilities and systems, or any othe application in which a failure can lead to
death or cause catastrophic property damage. (ix) Make a third party execute any of the above-mentioned or
allow a third party to execute any of the above-mentioned.
(3)
The Company has the right to audit the use and usage status of the licensed product for the purpose of
confirming the compliance of the customer to the terms and conditions of this contract with prior written
notice to the customer. However, the audit will be carried out during business hours as long as it does not
disturb the customer's business.
2. Attribution of Intellectual Property Rights
No provision of this contract will transfer the intellectual property rights and any update program of the licensed
product to the customer (It does not matter whether or not the Company created the program update) is not
transferred to the customer. All rights on the licensed products belong to the Company or the suppliers of the
Company
3. No Warranty
(1)
The Company does not guarantee the customer any kind relating to the licensed product.
(2)
Based on the software maintenance agreement to be concluded separately with the customer, if there are
licensed product updates, function addition, changes or bug fixes (collectively referred to as “updates”), the
Company will provide the customer a program or update program, provided, however, that the program or
the necessity of providing such information, the timing, the method, etc. shall be decided based on the
judgement of the Company. The update program to be provided constitutes part of the licensed product.
4. Contract period and termination
(1)
The customer can terminate this contract by written notice to the Company at least 30 days before the

|Introduction 15
contract termination.
(2)
The Company can terminate this contract any time if the customer fails to comply with any provision of this
contract
(3)
After termination of this contract, the customer cannot use this product and this document for any purpose.
After this contract is terminated, Article 1 Section 2, Article 1 Section 3, Article 2, Article 3, Article 5, Article 6,
Article 7, and Article 8 are assumed to continue to take effect.
5. Export
The customer must not export this product, as well as the whole or a part of this document directly or indirectly
without getting permission from the Philippines Government, US Government, and the associated foreign
government. Also, it cannot be used outside Philippines because it does not conform to foreign regulations, etc.
6. Limitation of Liability
The Company or our partner shall not be responsible for the procurement cost, profit losses, indirect losses,
extraordinary losses, consequential losses, incidental losses, or punitive damages (including cases where the
Company has foreseen or predicted the occurrence of damage) arising out of the use of this contract, using
alternate goods or alternate services resulting from using or unavailability of the licensed product. Also, when the
Company or our partner is liable for the damages, regardless of its legal structure, the upper limit shall be the
amount equivalent to the price of the licensed product considering the Product paid by the customer.
7. Third-party Software
This software includes software components licensed from third-parties.The provisions of this contract are not
applicable to these software components, and their respective license conditions shall apply. For the details of
these software and their terms of use, please refer to the instruction manual.
8. General Provisions
(1)
This contract is governed by Philippines law and interpreted in accordance with the country's law.
(2)
For the resolution of all disputes related to this contract, it shall be settled at the Tokyo District Court as the
exclusive jurisdiction court of the first instance.
(3)
The customer, regardless of any operation of law other modes, may not succeed, transfer or entrust this
contract or contract rights in this document without prior written consent.
(4)
This contract governs the full agreement between the Company and the customer regarding the subject
matter of this contract, and will replace all previous consent, agreement, and declaration of intention or
memorandum of understanding.
(5)
The Software is a “commercial item” as that term is defined in 48 C.F.R. 2.101, consisting of “commercial
computer software” and “commercial computer software documentation“ as such terms are used in 48 C.F.R.
12.212. Consistent with 48 C.F.R. 12.212 and 48 C.F.R. 227.7202-1 through 227.7202-4, NEC Platforms
provides the Software to U.S. Government End Users only pursuant to the terms and conditions therein.

16 Introduction|
1.9. Environmental of this Product
RoHS Directive Compliance: RoHS (Restriction of Hazardous Substances) The directive is a European
Parliament and Council Directive about the restriction of the use of hazardous substances [Lead, Mercury,
Cadmium, Hexavalent chromium, Polybrominated biphenyls (PBB), and Polybrominated diphenyl ethers (PBDE)]
of electrical and electronic devices.
Consideration of packaging material: Recycled paper is used.
1.10. Trademarks
Windows is a registered trademark of Microsoft Corporation in the United States and other countries.
Microsoft Azure is a registered trademark of Microsoft Corporation in the United States and other countries.
OSX and Safari are trademarks of Apple Inc. registered in the United States and other countries.
Internet Explorer is a registered trademark of Microsoft Corporation in the United States and other countries.
Bluetooth is a registered trademark of Bluetooth SIG, Inc.
AWS, Amazon Web Services is a trademark of Amazon.com, Inc. or its affiliates in the United States and other
countries.
Company, product and service names mentioned in this manual and in this product are registered trademarks or
trademarks of their respective company.

|Introduction 17
1.11. Safety Instructions
This Safety Instructions show items that must be followed to prevent danger to the customer or any person and
damage to property. The meaning of the display and symbols are as follows. Read the contents to understand it well.
EXPLANATION OF ALERT SYMBOLS IN THIS MANUAL
The meaning of the display and symbols used are as follows. Read the contents to understand it well.
Warning: Indicates a hazardous situation which could result in death or serious injury (*1).
Caution: Indicates a situation which could result in minor injury (*2), as well as damage to this product
and/or owner’s property (*3).
(*1) Serious injuries that include blindness, injury, burns (high temperature, low temperature, chemical), electric
shock, fracture, poisoning, and those that require hospitalization or long-term visits for treatment.
(*2) Minor injuries, such as burns, electric shock, etc. that do not require hospitalization or long-term visits for
treatment.
(*3) Property damage refers to the extensive damage related to houses, household goods, livestock, pets and the like.
POWER SUPPLY
Do not use power supply other than AC 220V in the Philippines. Doing so may cause fire or electric shock or
malfunction. When plugging this product in a wall outlet where other products are already plugged in, be careful
not to exceed the maximum current rating of the outlet. Otherwise, a fire, electric shock or malfunction may
occur.
Do not scratch, damage, or modify the power cord. Also, do not forcibly bend, pull, twist or tie the cord.
Otherwise, a fire or electric shock may occur. If the power cord is excessively pressed or heated up, the cord may
be damaged and a fire and electric shock may occur.
Do not use an overloaded multi-plug adapter. Otherwise, the multi-plug adapter may heat up and be degraded,
and then a fire may occur.
Use only the AC adapter and power cord supplied for this product. Do not use the AC adapter and power cord
with other products. Otherwise, a fire, electric shock or malfunction may occur.
The AC adapter and power cord supplied for this product must be used together. Never combine the AC adapter
of a different product with the power cord. Otherwise, a fire, electric shock or malfunction may occur.
Do not put anything on the AC adapter or cover it with cloth. Otherwise, the adapter may heat up, the case and
power cord may melt, and then a fire or electric shock may occur.
Do not place the AC adapter in a poorly ventilated or confined area such as in storage rack or behind a bookshelf.
The AC adapter may overheat and may cause a fire or damage. Also, place the AC adapter near the power outlet
and ensure that it can be easily plugged in and can be removed the AC power cord.
The AC adapter of this product is for indoor use only. Do not use the AC adapter outdoors. Otherwise, this
product gets rainwater, and electric shock or malfunction may occur.
Make sure that the AC adapter is not hanging in the air when installing it. Failing to do so can create a gap
Warning

18 Introduction|
between the power plug and the outlet, and dust accumulation can cause fire.
IN THESE CASES
Do not use this product if it gives off smoke or has an abnormal odor. Otherwise, a fire or electric shock may
occur. Remove the AC power cord from the outlet immediately. Contact us after making sure that this product
stops giving off smoke. The user must never try to repair this product.
Do not wet this product or expose it to water or seawater. If water enters this product or if this product gets wet,
remove the AC power cord from the outlet immediately and contact us. If the user continues using this product
without having it repaired, a fire, electric shock or malfunction may occur.
Do not insert or drop metals or combustible materials into the ventilation slots. If those objects get inside this
product, remove the AC power cord from the outlet immediately and contact us. If the users continue using this
product without having it repaired, a fire, electric shock or malfunction may occur.
Do not use this product with the power cord damaged, for example, with the core exposed or cut. Otherwise, a
fire or electric shock may occur. Remove the AC power cord from the outlet immediately and contact us.
If this product is dropped or damaged, remove the AC power cord from the outlet immediately and contact us. If
the users continue using this product without having it repaired, a fire or electric shock may occur.
Do not use this product in life-supporting medical devices or in any other system requiring extremely high
reliability (trunk-line communications devices, calculation systems, etc.). Otherwise, this may cause death or
serious injury, and panic may also occur.
Do not disassemble or convert this product. Otherwise, a fire, electric shock or malfunction may occur.
Do not operate or connect this product with wet hands. Otherwise, an electric shock may occur.
Do not use flammable gases such as an air duster or dust spray inside or around this product. The gases may ignite,
causing a fire or explosion.
OTHER WARNINGS
Turn off this product in any place where use of a wireless device is prohibited, for example, in an airplane or hospital.
Otherwise, it may influence electronics and medical devices, causing an incident.
Do not place or use this product near high-precision electronics, devices which handle weak signals, or pacemakers,
etc. Otherwise, electronics or pacemakers may malfunction. Do not use this product near medical electronics, or in
any place where using this product is prohibited, for example, in a hospital.
Do not place this product near vases, pots, cups, cosmetics, vessels with chemicals or water, or near any small
metal objects. If a spill occurs or objects get inside, it may cause a fire, electric shock, or malfunction.
Do not place or use this product in a humid location such as a bathroom or near a water heater or a humidifier.
Otherwise, a fire, electric shock or malfunction may occur.
Do not use this product in places with high salinity such as coasts, or places that generates hydrogen sulfide such
as hot springs. The life span of this product may be shortened.
During or after using this product, protruding objects such as this product's body and connector may become very
hot. In particular, this product is covered with a metal case, be aware that there is a risk of burns.

|Introduction 19
INSTALLATION LOCATION
Do not place this product in an area exposed to direct sunlight, or in a very hot place, for example near a heat
generating appliance such as a stove or a heater. Otherwise, the internal parts of this product may heat up, and a
fire may occur.
Do not place this product in a location where the temperature changes dramatically, for example near an air
conditioner or a heater. Otherwise, the internal parts of this product may become wet by condensation, and a fire,
electric shock or malfunction may occur.
Use this product in the environment with temperature of 0-40°C and humidity of 10-90% without condensation.
Do not place this product in a location exposed to cooking oil or steam, for example near a cooker. Also, do not
place this product in a dusty place. Otherwise, a fire, electric shock or malfunction may occur.
Do not place this product in an unstable location such as on an unstable table or inclined surface. Do not place any
heavy object on this product. Otherwise, this product may lose balance and collapse, or the heavy object may drop
and an injury may occur.
Do not block the ventilation slots of this product. This product may heat up, and then a fire may occur. Avoid the
following:
Placing this product in narrow, poorly-ventilated spaces such as storage racks, bookshelves, and boxes.
Placing this product on a carpet and a mat.
Covering this product with a tablecloth, etc.
Do not stack this product. Stacking this product may cause a fire because of overheating inside this product. When
using in the vertical position, always use the stand provided, and ensure that there is enough space at either side
of this product.
POWER SUPPLY
When using this product, ensure that the power plug is securely inserted into the outlet. Remove the power plug
from the outlet by pulling on the plug. Do not pull the power cord. Otherwise, fire or electric shock may occur.
Periodically (once every six months) remove dust that has accumulated between the power plug and outlet.
Otherwise, a fire may occur.
Before cleaning this product, remove the AC power cord from the outlet for safety reasons. Otherwise, an electric
shock may occur.
Before moving this product, remove the AC power cord from the outlet and disconnect all cords. Otherwise, the
cords may be damaged, and a fire or electric shock may occur.
If this product will not be used for a long time, remove the AC power cord from the outlet for safety reasons.
When or after using this product, the AC adapter can reach high temperatures. Be careful of burn injuries.
RESTRICTIONS
During thunderstorms, do not touch the power cord or connect to any surrounding device. Otherwise, an electric
shock caused by a thunderbolt may occur.
Do not step on this product. It may break and cause injury.
Caution

20 Introduction|
1.12. Preventing Damage to this Product
Follow these instructions to retain performance and prevent malfunction of this product.
INSTAL LATION PLACE
Do not place this product in any of the following locations:
A place affected by vibration;
A place where volatile chemicals are filled or where chemicals are close by;
A place affected by magnetism from an electric product, audio/video device, or office automated device, or a
place where electromagnetic waves are emitted (microwave ovens, speakers, TV sets, radios, fluorescent
lamps, air conditioners, electric cooking equipment, etc.); or
A place near a high-frequency noise generating sewing machine or welding machine.
Noises might be heard if this product is used near a cordless phone or a radio. If used near a TV set, noises might
be heard and the screen may be unclear. Also, there will be poor reception. Keep this product a few meters away
from those devices.
Data communication error may occur if this product and the wireless LAN terminal are very close to each other.
Keep this product at least a meter away from other devices.
RESTRICTIONS
Do not drop or hit this product. Otherwise, it may malfunction.
Do not leave this product in a cold place such as an ice warehouse. Otherwise, this product may operate
abnormally.
Disconnect all cords before moving this product. Otherwise, it may malfunction.
This product may operate abnormally if the cords are disconnected during operation, or if the connection is
unstable. When this product is on, do not touch the cords.
Do not turn on this product immediately after it is turned off. Wait at least 10 seconds to restart. It may not turn
on if attempted to turn it back on immediately.
REGULAR CARE
Do not wipe with benzene, paint thinner, alcohol or other chemical agents. It may change the color or shape of
this product. If this product is very dirty, soak the cloth in mild detergent and wring well. Wipe off this product
with the damp cloth and then dry it with a soft cloth. Never wipe the connector with a damp cloth.
If water droplets are found on this product, wipe off with a dry cloth.
Table of contents
Other NEC Network Router manuals
Popular Network Router manuals by other brands

Cisco
Cisco Linksys WET610N Quick installation guide

Edge-Core
Edge-Core ECS3610-28T installation guide

Trolex
Trolex TX2124 user manual

MikroTik
MikroTik RouterBOARD 751U-2HnD Quick setup guide and warranty information

Planet Networking & Communication
Planet Networking & Communication pl-201v2-eu user manual

NetComm
NetComm RTA1030W manual