Table of Contents Table of Contents Product Overview......................................................... 4 Package Contents.................................................... 4 Minimum System Requirements............................... 4 Introduction............................................................... 5 Features.................................................................... 7 Wireless Installation Considerations.......................... 8 Three Operational Modes......................
Table of Contents Statistics................................................................. 48 Log.......................................................................... 49 View Log........................................................... 49 Log Settings...................................................... 50 Tool.............................................................................. 51 Administrator Settings............................................. 51 Firmware Upgrade...................
Section 1 - Product Overview Product Overview Package Contents • D-Link DWL-3150 802.11g Wireless Bridge • Install Guide • Manual, Install Guide, and warranty on CD • Ethernet (CAT5-UTP/Straight-Through) Cable • Power Adapter If any of the above items are missing, please contact your reseller. Minimum System Requirements • Computers with Windows®, Macintosh, or Linux-based operating systems with an installed Ethernet Adapter. • Internet Explorer version 6.0 or Mozilla Firefox version 1.5 and above.
Section 1 - Product Overview Introduction At up to fifteen times the speed* of previous wireless devices you can work faster and more efficiently, increasing productivity. With the DWL-3150, bandwidth-intensive applications like graphics or multimedia will benefit significantly because large files are able to move across the network quickly. Inclusion of all three standards (802.11b and 802.11g) means that the DWL-3150 is versatile enough to allow connection to almost any 802.11 network or device.
Section 1 - Product Overview WPA-Enterprise and WPA2-Enterprise is ideal for businesses that have existing security infrastructures in place. Management and security implementation can now be centralized on a server participating on the network. Utilizing 802.1x with a RADIUS (Remote Authentication Dial-in User Service) server, a network administrator can define a list of authorized users who can access the wireless LAN.
Section 1 - Product Overview Features • 3 Different Operation modes - Capable of operating in one of three different operation modes to meet your wireless networking requirements: Wireless Bridge, Wireless Workgroup Bridge, or Wireless WAN. • Faster wireless networking speeds up to 54Mbps*. • Compatible with 802.11b and 802.11g Devices that is fully compatible with the IEEE 802.11b and 802.11g standards, the DWL-3150 can connect with existing 802.11b- or 802.11g-compliant wireless network adapter cards.
Section 2 - Installation Wireless Installation Considerations The D-Link 802.11g Wireless Bridge lets you access your network using a wireless connection from virtually anywhere within the operating range of your wireless network. Keep in mind, however, that the number, thickness and location of walls, ceilings, or other objects that the wireless signals must pass through, may limit the range.
Section 3 - Configuration Three Operational Modes Operation Mode (Only supports one mode at a time) Function Wireless Bridge This enables any device behind the DWL-3150 that connects to the wireless LAN. Wireless Workgroup Bridge Wireless WAN D-Link DWL-3150 User Manual Wirelessly connects multiple networks (using multiple DWL-3150s) The WISP (Wireless Internet Service Provider) subscriber can share the WISP connection without the need of an extra router.
Section 3 - Configuration Using the Configuration Menu To configure the DWL-3150, use a computer which is connected to the DWL-3150 with an Ethernet cable (see the Network Layout diagram). First, disable the Access the Internet using a proxy server function. To disable this function, go to Control Panel > Internet Options > Connections > LAN Settings and uncheck the enable box.
Section 4 - Using the Configuration Menu Home > Basic Settings Wireless Bridge Wireless Mode: Wireless Bridge - Wirelessly connects Ether net devices, and provides immediate connection for Ethernet devices without the need for any drivers. SSID: Service Set Identifier (SSID) is the name designated for a specific wireless local area network (WLAN). The factory default setting is “dlink”. The SSID can be easily changed to connect to an existing wireless network or to establish a new wireless network.
Section 4 - Using the Configuration Menu No Security Authentication: For Open System authentication, only the wireless clients with the same WEP key will be able to communicate on the wireless network. The bridge will remain visible to all devices on the network. Encryption: Select Disabled to disable WEP encryption.
Section 4 - Using the Configuration Menu Open System (64 Bits or 128 Bits) Authentication: For Open System authentication, only the wireless clients with the same WEP key will be able to communicate on the wireless network. The Access Point will remain visible to all devices on the network. Encryption: Select Enabled to enable WEP encryption. Key Type: Select HEX or ASCII. Key Size: Select 64 Bits or 128 Bits. Valid Key: Select the 1st through the 4th key to be the active key.
Section 4 - Using the Configuration Menu Shared Key (64 Bits or 128 Bits) Authentication: For Shared Key authentication, the bridge cannot be seen on the wireless network except to the wireless clients that share the same WEP key. Encryption: Select Enabled to enable WEP encryption. Key Type: Select HEX or ASCII. Key Size: Select 64 Bits or 128 Bits. Valid Key: Select the 1st through the 4th key to be the active key. First through Fourth Input up to four keys for encryption.
Section 4 - Using the Configuration Menu WPA & WPA2 Personal Authentication: Wi-Fi Protected Access authorizes and authenticates users onto the wireless network. WPA and WPA2 uses different algorithm. Auto allows both WPA and WPA2. Cipher Type: Select TKIP or AES from the pull-down menu. PassPhrase: Enter a passphrase.The passphrase is an alpha-numeric password between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces.
Section 4 - Using the Configuration Menu Wireless Workgroup Bridge Wireless Mode: Wireless Workgroup Bridge - Wirelessly connects multiple wireless networks using the DWL-3150. SSID: Service Set Identifier (SSID) is the name designated for a specific wireless local area network (WLAN). The factory default setting is “dlink”. The SSID can be easily changed to connect to an existing wireless network or to establish a new wireless network. Channel: Indicates the channel setting for the DWL-3150.
Section 4 - Using the Configuration Menu No Security Authentication: For Open System authentication, only the wireless clients with the same WEP key will be able to communicate on the wireless network. The bridge will remain visible to all devices on the network. Encryption: Select Disabled to disable WEP encryption.
Section 4 - Using the Configuration Menu Open System (64 Bits or 128 Bits) Authentication: For Open System authentication, only the wireless clients with the same WEP key will be able to communicate on the wireless network. The bridge will remain visible to all devices on the network. Encryption: Select Enabled to enable WEP encryption. Key Type: Select HEX or ASCII. Key Size: Select 64 Bits or 128 Bits. Valid Key: Select the 1st through the 4th key to be the active key.
Section 4 - Using the Configuration Menu Shared Key (64 Bits or 128 Bits) Authentication: For Shared Key authentication, the bridge cannot be seen on the wireless network except to the wireless clients that share the same WEP key. Encryption: Select Enabled to enable WEP encryption. Key Type: Select HEX or ASCII. Key Size: Select 64 Bits or 128 Bits. Valid Key: Select the 1st through the 4th key to be the active key. First through Input up to four keys for encryption.
Section 4 - Using the Configuration Menu Wireless WAN Wireless Mode: Wireless WAN - In this mode, the DWL-3150 will behave just the same as the Wireless Bridge mode for wireless function. However, router functions are added between the wireless WAN side and the Ethernet LAN side. Therefore, the WISP (Wireless Internet Service Provider) subscriber can share the WISP connection without the need for extra router. SSID: Service Set Identifier (SSID) is the name designated for a specific wireless ISP.
Section 4 - Using the Configuration Menu Internet Choose DHCP to obtain an IP Address automatically from a DHCP server in your network. This is allows the DWL-3150 Connection Type: to obtain the DHCP address from WISP. Host Name: The Hostname of the network device you are configuring DHCP Reservation for. MAC Address: Enter the MAC address of the network device you are configuring a DHCP Reservation for. Clone MAC Copy the MAC address of the network device you are configuring a DHCP Reservation for.
Section 4 - Using the Configuration Menu Wireless WAN > DHCP Client No Security Authentication: For added security on a wireless network, data encryption can be enabled. There are several available Authentications type can be selected. Encryption: Select Disable if you choose to not have security.
Section 4 - Using the Configuration Menu Open System (64 Bits or 128 Bits) Authentication: For Open System authentication, only the wireless clients with the same WEP key will be able to communicate on the wireless network. The bridge will remain visible to all devices on the network. Encryption: Select Enabled to enable WEP encryption. Key Type: Select HEX or ASCII. Key Size: Select 64 Bits or 128 Bits. Valid Key: Select the 1st through the 4th key to be the active key.
Section 4 - Using the Configuration Menu Shared Key (64 Bits or 128 Bits) Authentication: For Shared Key authentication, the bridge cannot be seen on the wireless network except to the wireless clients that share the same WEP key. Encryption: Select Enabled to enable WEP encryption. Key Type: Select HEX or ASCII. Key Size: Select 64 Bits or 128 Bits. Valid Key: Select the 1st through the 4th key to be the active key. First through Input up to four keys for encryption.
Section 4 - Using the Configuration Menu WPA & WPA2 Personal Authentication: Wi-Fi Protected Access authorizes and authenticates users onto the wireless network. WPA and WPA2 uses different algorithm. Cipher Type: Select TKIP or AES from the pull-down menu. PassPhrase: Enter a passphrase. The passphrase is an alpha-numeric password between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces. Make sure you enter this key exactly the same on all other wireless clients.
Section 4 - Using the Configuration Menu WPA & WPA2 Enterprise Authentication: Wi-Fi Protected Access authorizes and authenticates users onto the wireless network. WPA uses stronger security than WEP and is based on a key that changes automatically at a regular interval. It requires a RADIUS server in the network. WPA and WPA2 uses different algorithm. WPA-Auto allows both WPA and WPA2. EAP Type: Select TLS, TTLS or PEAP from the pull-down menu. Cipher Type: Select TKIP or AES from the pull-down menu.
Section 4 - Using the Configuration Menu Wireless WAN > Static IP Internet Connection Choose Static IP if you have a static IP Type: subscription from WISP. IP Address: Enter the IP address assigned by WISP. Subnet Mask: Enter the subnet mask. ISP Gateway Enter the gateway IP address, typically Address: a router. MAC Address: Enter the MAC address of the network device you are configuring a DHCP Reservation for.
Section 4 - Using the Configuration Menu No Security Authentication: For added security on a wireless network, data encryption can be enabled. There are several available Authentications type can be selected. Encryption: Select Disable if you choose to not have security.
Section 4 - Using the Configuration Menu Open System (64 Bits or 128 Bits) Authentication: Encryption: For Open System authentication, only the wireless clients with the same WEP key will be able to communicate on the wireless network. The bridge will remain visible to all devices on the network. Select Enabled to enable WEP encryption. Key Type: Select HEX or ASCII. Key Size: Select 64 Bits or 128 Bits. Valid Key: Select the 1st through the 4th key to be the active key.
Section 4 - Using the Configuration Menu Shared Key (64 Bits or 128 Bits) Authentication: For Shared Key authentication, the bridge cannot be seen on the wireless network except to the wireless clients that share the same WEP key. Encryption: Select Enabled to enable WEP encryption. Key Type: Select HEX or ASCII. Key Size: Select 64 Bits or 128 Bits. Valid Key: Select the 1st through the 4th key to be the active key. First through Input up to four keys for encryption.
Section 4 - Using the Configuration Menu WPA & WPA2 Personal Authentication: Wi-Fi Protected Access authorizes and authenticates users onto the wireless network. WPA uses stronger security than WEP and is based on a key that changes automatically at a regular interval. It requires a RADIUS server in the network. WPA and WPA2 uses different algorithm. WPA-Auto allows both WPA and WPA2. Cipher Type: Select TKIP or AES from the pull-down menu. PassPhrase: Enter a passphrase.
Section 4 - Using the Configuration Menu WPA & WPA2 Enterprise Authentication: Wi-Fi Protected Access authorizes and authenticates users onto the wireless network. WPA uses stronger security than WEP and is based on a key that changes automatically at a regular interval. It requires a RADIUS server in the network. WPA and WPA2 uses different algorithm. WPA-Auto allows both WPA and WPA2. EAP Type: Select TLS, TTLS or PEAP from the pull-down menu. Cipher Type: Select TKIP or AES from the pull-down menu.
Section 4 - Using the Configuration Menu IP Address: Assign a static IP address that is within the IP address range of your network. LAN Subnet Mask: Enter the subnet mask. All devices in the network must share the same subnet mask. Enable DHCP DHCP stands for Dynamic Host Control Server: Protocol. The DHCP server assigns IP addresses to devices on the network that request them. These devices must be set to “Obtain the IP address automatically”.
Section 4 - Using the Configuration Menu Enable DHCP DHCP Reservations allow the router to assign the same IP address to a specific device on your network. The specified Reservation: device will get the same DHCP IP address information every time it is turned on or requests an IP address. No other computer on your network will receive the specified static DHCP address. DHCP Reservations are very helpful when used for server computers on your network that are hosting applications such as Web and FTP.
Section 4 - Using the Configuration Menu Home > Advanced Settings Performance Wireless B/G Mode: Select Mixed, 11g Only, or 11b Only. Data Rate (11b/g): A pull-down menu to select the maximum wireless signal rate for the selected device(s). Beacon Interval: Beacons are packets sent by an access point to synchronize a network. Specify the beacon value for the selected device(s) here. The default value of 100 is recommended.
Section 4 - Using the Configuration Menu Left Antenna: The bridge will not switch antenna and the radio will use the left antenna (when facing the bridge) to transmit and receive packets. Right Antenna: bridge won’t switch antenna and the radio will use the right antenna (when facing the bridge) to transmit and receive packets.
Section 4 - Using the Configuration Menu Virtual Server Name: The name for the service being provided by the device on your LAN that uses the ports being opened. IP Address: The server computer on the LAN network that the specified ports will be opened to. Application Name: This contains a list of pre-defined services. Computer Name: This contains a list of the devices on your network, which have obtained an IP Address from the router.
Section 4 - Using the Configuration Menu Port Forwarding Name: The name for the service being provided by the device on your LAN that uses the ports being opened. IP Address: The server computer on the LAN network that the specified ports will be opened to. Application Name: This contains a list of pre-defined services. Computer Name: This contains a list of the devices on your network that have obtained an IP Address from the router.
Section 4 - Using the Configuration Menu Application Rules Name: This is the name referencing the application. Trigger Port: This is the port used to trigger the application. It can be either a single port or a range of ports. Traffic Type: This is the protocol used to trigger the application. Firewall Port: This is the port number on the WAN side that will be used to access the application. You may define a single port or a range of ports. You can use a comma to add multiple ports or port ranges.
Section 4 - Using the Configuration Menu Firewall DMZ: Enter the IP address of that computer as a DMZ (Demilitarized Zone) host with unrestricted Internet access. Adding a client to the DMZ may expose that computer to a variety of security risks; so only use this option as a last resort. VPN Passthrough: The device supports VPN (Virtual Private Network) passthrough for PPTP (Point-to-Point Tunneling Protocol), L2TP (Layer 2 Tunneling Protocol), and IPSec (IP Security).
Section 4 - Using the Configuration Menu Advanced Network UPnP: UPnP is short for Universal Plug and Play, which is a networking architecture that provides compatibility among networking equipment, software, and peripherals. The DWL-3150 is an UPnP enabled device, meaning it will work with other UPnP devices/ software. If you do not want to use the UPnP functionality, it can be disabled by selecting “Disable”.
Section 4 - Using the Configuration Menu Enable DDNS: Dynamic DNS (Domain Name Service) is a method of keeping a domain name linked to a changing (dynamic) IP address. With most Cable and DSL connections, you are assigned a dynamic IP address and that address is used only for the duration of that specific connection. With the DWL-3150, you can setup your DDNS service, in which the DWL-3150 will automatically update your DDNS server every time it receives a new WAN IP address.
Section 4 - Using the Configuration Menu Name: The name of the schedule being defined. Schedule Day(s): Select a day, range of days, or select the All Week checkbox to have this schedule apply every day. All Days - 24 Hrs: Check this box to have the schedule active the entire 24 hours on the days specified. Start Time: Select the time at which you would like the schedule being defined to become active.
Section 4 - Using the Configuration Menu Filters Network Filter Configure MAC Filtering Below: Use MAC Filters to deny computers within the local area network from accessing the Internet. You can either manually add a MAC address or select the MAC address from the list of clients that are currently connected to the unit.
Section 4 - Using the Configuration Menu Website Filter Website Filtering is used to allow or deny computers on your network from accessing specific web sites by keywords or specific Domain Names. Select and Turn Website Filtering ON and ALLOW computers access to ONLY these sites in order only allow computers on your network to access the specified URLs and Domain Names.
Section 4 - Using the Configuration Menu Home > Status Device Information LAN (Local Area Network) - This displays the MAC Address of the Ethernet LAN interface, the IP Address and Subnet Mask of the LAN interface, and whether or not the router’s built-in DHCP server is Enabled or Disabled. WAN (Wide Area Network) - This displays the MAC Address of the WAN interface, as well as the IP Address, Subnet Mask, Default Gateway, and DNS server information that the DWL-3150 has obtained from your ISP.
Section 4 - Using the Configuration Menu Wireless Information This displays the SSID, Channel, and whether or not Encryption is enabled on the Wireless interface.
Section 4 - Using the Configuration Menu Statistics The DWL-3150 keeps statistic of the data traffic that it handles. You are able to view the amount of packets that the device has received and transmitted on the Wireless WAN, LAN, and Wireless interfaces. Refresh: Click this button to update the counters. Reset: Click this button to clear the counters. The traffic counter will reset when the device is rebooted.
Section 4 - Using the Configuration Menu Log View Log The DWL-3150 keeps a running log of events and activities occurring on it at all times. The log will display up to 500 recent logs. Newer log activities will overwrite the older logs. You can save the log files or have them emailed to you by clicking on the Log Settings button. This is recommended as the logs are cleared every time the router is rebooted. First Page: Click this button to go to the first page of the log.
Section 4 - Using the Configuration Menu Log Settings SMTP Server/IP The address of the SMTP (Simple Address: Mail Transfer Protocol) server that will be used to send the logs. SMTP Sender: The email address the logs will be sent from. SMTP Recipient: The email address the logs will be sent to. Click on Send Mail Now to send the email. Save Log File to Click this button to save the log Local Hard Drive: entries to a text file. Log Type: Select the type of information you would like the DWL-3150 to log.
Section 4 - Using the Configuration Menu Tool Administrator Settings Limit Administrator IP: Enter an IP address that will be allowed for the administrator to login. Enter the 2nd IP address that will be allowed for the administrator to login. User Name: You can customize user name as an administrator of DWL-3150. The default username is “admin” with no password configured. Old Password: Enter the old password. New Password: Enter a password in this field. The password is case-sensitive.
Section 4 - Using the Configuration Menu Firmware Upgrade Upload Firmware You can upgrade the firmware of the From File: device using this tool. Make sure that the firmware you want to use is saved on the local hard drive of the computer. Click on Browse to search the local hard drive for the firmware to be used for the update. Upgrading the firmware will not change any of your system settings but it is recommended that you save your system settings before doing a firmware upgrade.
Section 4 - Using the Configuration Menu Configuration File Upload and Download Upload Browse to the saved configuration Configuration File: file you have in local drive and click open and upload to update the configuration. Load Settings to Click download to save the current Local Hard Drive: configuration file to your local disk. Note that if you save one configuration with administrator’s password now, after reset your, and then update to this saved configuration file, the password will be gone.
Section 4 - Using the Configuration Menu NTP Settings NTP Information: Displays the current NTP settings. NTP Server IP: Enter the NTP server IP, or choose from the drop-down menu. NTP Time Zone: Select your time zone from the drop-down menu. Daylight Saving Check the box to enable daylight Time: savings time.
Section 4 - Using the Configuration Menu Configuration Save and Activate Clicking Save and Activate will save and activate all changes made to the configuration and reboot the system. Clicking Discard Changes will discard all changes made to the configuration.
Section 4 - Using the Configuration Menu System System Settings System Restart: Click on to apply settings and restart. Restore to Factory Click on Restore to reset to factory Default Settings: default settings.
Section 4 - Using the Configuration Menu System Information D-Link DWL-3150 User Manual 57
Appendix A - Wireless Basics Wireless Basics D-Link wireless products are based on industry standards to provide easy-to-use and compatible high-speed wireless connectivity within your home, business or public access wireless networks. Strictly adhering to the IEEE standard, the D-Link wireless family of products will allow you to securely access the data you want, when and where you want it. You will be able to enjoy the freedom that wireless networking delivers.
Appendix A - Wireless Basics What is Wireless? Wireless or WiFi technology is another way of connecting your computer to the network without using wires. WiFi uses radio frequency to connect wirelessly, so you have the freedom to connect computers anywhere in your home or office network. Why D-Link Wireless? D-Link is the worldwide leader and award winning designer, developer, and manufacturer of networking products. D-Link delivers the performance you need at a price you can afford.
Appendix A - Wireless Basics Who uses wireless? Wireless technology has become so popular in recent years that almost everyone is using it, whether it’s for home, office, or business, D-Link has a wireless solution for it.
Appendix A - Wireless Basics Using a D-Link Cardbus Adapter with your laptop, you can access the hotspot to connect to the Internet from remote locations like: Airports, Hotels, Coffee Shops, Libraries, Restaurants, and Convention Centers. A wireless network is easy to setup, but if you’re installing it for the first time it could be quite a task not knowing where to start. That’s why we’ve put together a few setup steps and tips to help you through the process of setting up a wireless network.
Appendix A - Wireless Basics Wireless Modes There are basically two modes of networking: • Infrastructure – All wireless clients will connect to an access point or wireless router. • Ad-Hoc – Directly connecting to another computer, for peer-to-peer communication, using wireless network adapters on each computer, such as two or more WNA-1330 wireless network Cardbus adapters. An Infrastructure network contains an Access Point or wireless router.
Appendix B - Networking Basics Networking Basics Check your IP Address After you install your new D-Link adapter, by default, the TCP/IP settings should be set to obtain an IP address from a DHCP server (i.e. wireless router) automatically. To verify your IP address, please follow the steps below. Click on Start > Run. In the run box type cmd and click OK. At the prompt, type ipconfig and press Enter. This will display the IP address, subnet mask, and the default gateway of your adapter.
Appendix B - Networking Basics Statically Assign an IP Address If you are not using a DHCP capable gateway/router, or you need to assign a static IP address, please follow the steps below: Step 1 Windows® XP - Click on Start > Control Panel > Network Connections. Windows® 2000 - From the desktop, right-click My Network Places > Properties. Step 2 Right-click on the Local Area Connection which represents your D-Link network adapter and select Properties.
Appendix C - Technical Support Contacting Technical Support You can find software updates and user documentation on the D-Link website. U.S. and Canadian customers can contact D-Link technical support through our web site, or by phone. Tech Support for customers within the United States: D-Link Technical Support over the Telephone: (877) 354-6555 D-Link Technical Support over the Internet: http://support.dlink.
Appendix D - Warranty Warranty Subject to the terms and conditions set forth herein, D-Link Systems, Inc. (“D-Link”) provides this Limited Warranty: • Only to the person or entity that originally purchased the product from D-Link or its authorized reseller or distributor, and • Only for products purchased and delivered within the fifty states of the United States, the District of Columbia, U.S. Possessions or Protectorates, U.S. Military Installations, or addresses with an APO or FPO.
Appendix D - Warranty Limited Software Warranty: D-Link warrants that the software portion of the product (“Software”) will substantially conform to D-Link’s then current functional specifications for the Software, as set forth in the applicable documentation, from the date of original retail purchase of the Software for a period of ninety (90) days (“Software Warranty Period”), provided that the Software is properly installed on approved hardware and operated as contemplated in its documentation.
Appendix D - Warranty • After an RMA number is issued, the defective product must be packaged securely in the original or other suitable shipping package to ensure that it will not be damaged in transit, and the RMA number must be prominently marked on the outside of the package. Do not include any manuals or accessories in the shipping package. DLink will only replace the defective portion of the product and will not ship back any accessories.
Appendix D - Warranty IF ANY IMPLIED WARRANTY CANNOT BE DISCLAIMED IN ANY TERRITORY WHERE A PRODUCT IS SOLD, THE DURATION OF SUCH IMPLIED WARRANTY SHALL BE LIMITED TO THE DURATION OF THE APPLICABLE WARRANTY PERIOD SET FORTH ABOVE. EXCEPT AS EXPRESSLY COVERED UNDER THE LIMITED WARRANTY PROVIDED HEREIN, THE ENTIRE RISK AS TO THE QUALITY, SELECTION AND PERFORMANCE OF THE PRODUCT IS WITH THE PURCHASER OF THE PRODUCT.
Appendix D - Warranty CE Mark Warning: This is a Class B product. In a domestic environment, this product may cause radio interference, in which case the user may be required to take adequate measures. FCC Statement: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Appendix E - Registration Registration Product registration is entirely voluntary and failure to complete or return this form will not diminish your warranty rights. Version 1.