McDonald’s HEMS II Wayport Interface Manual
INTRODUCTION The purpose of this document is to provide general guidelines, for Owner/Operators that have installed the McDonald’s AT&T Wayport Connectivity Solution in their restaurants. Wayport will enable them to connect the Honeywell Energy Management System to the Internet.
Typical Wayport Connections Typical Wayport Unit Linksys BEFSR41 Cable/DSL Router with/4-port switch or equal. Furnished by owner/operator or others. This item is not furnished by Honeywell and does not come with the Wayport Unit. The installer must purchase locally. Configure router from Basic Setup as incoming “Obtain an IP Automatically”. Change “Local IP Address” to the following: 192.168.100.1 and leave Subnet Mask at the following: 255.255.255.0. Or change to 255.255.255.252.
SETUP AND OPERATION It is not possible for Honeywell to predict or directly support all of the potential types of computers, DVR’s, CCTV or other hardware devices which may be attached to the Wayport Owner/Operator port. Please refer to the specific manufacturer’s operations and user guides, for the computer or appliance that you would like to connect to the Wayport hardware, for specific information on configuration and setup when linking to Internet facing services.
REMOTELY CONNECTING TO YOUR HEMS II System If you want to remotely connect to your HEMS II System in the restaurant, you will need to use the external IP address for accessing it. In the example above, you would type 65.188.10.15 into the web browser on your computer in your office or home. Your PC will connect across the Internet to the HEMS II System in the restaurant using only this address. This is an example only. Use the individual IP address assigned to your store.
USER GUIDE EtherFast® Cable/DSL Router with 4-Port Switch Model: BEFSR41
Table of Contents Chapter 1: Product Overview 2 Front Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Back Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Chapter 2: Advanced Configuration 3 Setup > Basic Setup . . . . . . . . . . . . . . . . . . . . . . . . .
About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that you should pay special attention to while using the product. WARNING: This exclamation point indicates that there is a caution or warning and it is something that could damage your property or product.
Product Overview Chapter 1 Chapter 1: Product Overview Thank you for choosing the Linksys by Cisco EtherFast Cable/DSL Router with 4-Port Switch. The Router lets you access the Internet through its four switched ports. You can also use the Router to share resources such as computers, printers and files. A variety of security features help to protect your data and your privacy while online. Security features include a Stateful Packet Inspection (SPI) firewall and NAT technology.
Advanced Configuration Chapter 2 Chapter 2: Advanced Configuration After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use. However, if you’d like to change its advanced settings, use the Router’s web-based utility. This chapter describes each web page of the utility and each page’s key functions. You can access the utility via a web browser on a computer connected to the Router.
Advanced Configuration Chapter 2 Static IP If you are required to use a permanent IP address to connect to the Internet, select Static IP. Keep Alive: Redial Period If you select this option, the Router will periodically check your Internet connection. If you are disconnected, then the Router will automatically re-establish your connection. To use this option, select Keep Alive. In the Redial Period field, you specify how often you want the Router to check the Internet connection.
Advanced Configuration Chapter 2 PPTP Point-to-Point Tunneling Protocol (PPTP) is a service that applies to connections in Europe only. Internet Connection Type > Heart Beat Signal User Name and Password Enter the User Name and Password provided by your ISP. Heart Beat Server Enter the IP address of your ISP’s Heart Beat server. This is provided by your ISP. Internet Connection Type > PPTP IP Address Enter the Router’s IP address, as seen from the Internet. This is provided by your ISP.
Advanced Configuration Chapter 2 enter the number of minutes you want to have elapsed before your Internet connection terminates. The default Max Idle Time is 5 minutes. Keep Alive: Redial Period If you select this option, the Router will periodically check your Internet connection. If you are disconnected, then the Router will automatically re-establish your connection. To use this option, select Keep Alive.
Advanced Configuration Chapter 2 Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. TZO.com Setup > DDNS The Router offers a Dynamic Domain Name System (DDNS) feature. DDNS lets you assign a fixed host and domain name to a dynamic Internet IP address. It is useful when you are hosting your own website, FTP server, or other server behind the Router. Before you can use this feature, you need to sign up for DDNS service with a DDNS service provider, www.dyndns.
Advanced Configuration Chapter 2 MAC Clone MAC Clone Service To have the MAC address cloned, select Enable. MAC Address Enter the MAC address registered with your ISP here. the NAT setting is disabled, this feature is available. Select Enable to use the Dynamic Routing feature. Transmit RIP Version To use dynamic routing for transmission of network data, select the protocol you want: RIP1, RIP1-Compatible, or RIP2. Clone Click this button to clone the MAC address of the computer you are using.
Advanced Configuration Chapter 2 Security > Filter Filter MAC Address The Filter screen is used to set up filters to block specific internal users from accessing the Internet and enhance your network’s security. This feature blocks computers with specific MAC addresses from going out to the Internet. Edit MAC Filter Setting To set the MAC filter, click Edit MAC Filter Setting. Filter > MAC Access Control Table Use the MAC Access Control Table to select the MAC addresses you want to filter.
Advanced Configuration Chapter 2 Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Security > VPN Passthrough The VPN Passthrough screen allows you to enable VPN tunnels using IPSec, PPPoE, or PPTP protocols to pass through the Router’s firewall. Security > VPN Passthrough VPN Passthrough appropriate servers (computers). Before using forwarding, you should assign static IP addresses to the designated servers.
Advanced Configuration Chapter 2 Applications and Gaming > Port Triggering Port Triggering Application Enter the application name of the trigger. Triggered Range Start Port and End Port For each application, enter the starting and ending port numbers of the triggered port number range. Check with the Internet application documentation for the port number(s) needed.
Advanced Configuration Chapter 2 Fingering requires entering the full user@domain address. HTTP (HyperText Transport Protocol) - The communications protocol used to connect to servers on the World Wide Web. Its primary function is to establish a connection with a web server and transmit HTML pages to the client web browser. POP3 (Post Office Protocol 3) - A standard mail server commonly used on the Internet. It provides a message store that holds incoming e-mail until users log on and download it.
Advanced Configuration Chapter 2 Incoming Rate Limit This feature limits the incoming bandwidth. To use this feature, select 8M, 4M, 2M, 1M, 512K, 256K, or 128K (M stands for Mbps, while K stands for kbps). If you do not want to use this feature, keep the default, Disable. Application Priority Application Priority QoS manages information as it is transmitted and received.
Advanced Configuration Chapter 2 UPnP If you want to use UPnP, keep the default setting, Enabled. Otherwise, select Disabled. Allow Users to Make Configuration Changes Keep the default, Enabled, if you want to be able to make manual changes to the Router while using the UPnP feature. Otherwise, select Disabled. Allow Users to Disable Internet Access Keep the default, Enabled, if you want to be able to prohibit any and all Internet connections. Otherwise, select Disabled.
Advanced Configuration Chapter 2 Destination URL/IP, and Service/Port Number for each site are listed. Click Refresh to update the log. View Log Click this button to view a log of all activities and to access a drop-down menu of various logs to view. On the All screen, select the log you wish to view: All, System Log, or Access Log. NOTE: Do not restore the factory defaults unless you are having difficulties with the Router and have exhausted all other troubleshooting measures.
Advanced Configuration Chapter 2 Status > Router Local Network The Router screen displays information about the Router and its current settings. Local MAC Address The MAC address of the Router’s local, wired interface is displayed here. IP Address This shows the Router’s IP address, as it appears on your local network. Subnet Mask This shows the subnet mask of the Router. DHCP Server The status of the Router’s DHCP server function is displayed here.
Troubleshooting Appendix A Appendix A: Troubleshooting Your computer cannot connect to the Internet. Follow these instructions until your computer can connect to the Internet: When you double-click the web browser, you are prompted for a username and password. If you want to get rid of the prompt, follow these instructions. Launch the web browser and perform the following steps (these steps are specific to Internet Explorer but are similar for other browsers): 1. Select Tools > Internet Options. 2.
Specifications Appendix B Appendix B: Specifications Model BEFSR41 Standards IEEE 802.3 (10BaseT), IEEE 802.3u (100BaseTX) Ports One 10/100 RJ-45 Port for Broadband Modem Four 10/100 RJ-45 Switched Ports Button Reset Cabling Type Ethernet Category 5 LEDs Power, Ethernet, Internet OS Support Windows 98SE/Me/2000/XP/Vista Network Protocols TCP/IP Environmental Dimensions 7.31" x 6.16" x 1.88" (186 x 154 x 48 mm) Unit Weight 11.40 oz.
Appendix C Appendix C: Warranty Information Limited Warranty Linksys warrants this Linksys hardware product against defects in materials and workmanship under normal use for the Warranty Period, which begins on the date of purchase by the original end-user purchaser and lasts for the period specified below: •• One (1) year for new product •• Ninety (90) days for refurbished product This limited warranty is non-transferable and extends only to the original end-user purchaser.
Appendix C Warranty Information rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge. Customers outside of the United States of America and Canada are responsible for all shipping and handling charges, custom duties, VAT and other associated taxes and charges.
Appendix D Appendix D: Regulatory Information FCC Statement This product has been tested and complies with the specifications for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used according to the instructions, may cause harmful interference to radio communications.
Appendix D User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products.
Appendix D Regulatory Information Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Français (French) - Informations environnementales pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol , keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.
Appendix D Regulatory Information Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Nederlands (Dutch) - Milieu-informatie voor klanten in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių atliekų srauto.
Appendix D Regulatory Information Português (Portuguese) - Informação ambiental para clientes da União Europeia Slovenščina (Slovene) - Okoljske informacije za stranke v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento que exibe este símbolo no produto e/ou na sua embalagem não seja eliminado junto com os resíduos municipais não separados. O símbolo indica que este produto deve ser eliminado separadamente dos resíduos domésticos regulares.
Appendix E Appendix E: Software License Agreement Software in Linksys Products This product from Cisco-Linksys LLC or from one of its affiliates Cisco Systems-Linksys (Asia) Pte Ltd. or CiscoLinksys K.K. (“Linksys”) contains software (including firmware) originating from Linksys and its suppliers and may also contain software from the open source community. Any software originating from Linksys and its suppliers is licensed under the Linksys Software License Agreement contained at Schedule 1 below.
Software License Agreement Appendix E your Linksys product and/or the Software is being used in accordance with the terms of this Agreement; (iii) to provide improvements to the way Linksys delivers technology to you and to other Linksys customers; (iv) to enable Linksys to comply with the terms of any agreements it has with any third parties regarding your Linksys product and/or Software and/or (v) to enable Linksys to comply with all applicable laws and/or regulations, or the requirements of any regulat
Appendix E GNU General Public License is intended to guarantee your freedom to share and change free software–to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation’s software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Lesser General Public License instead.) You can apply it to your programs, too.
Appendix E c. If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License.
Software License Agreement Appendix E 7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License.
Appendix E GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1.
Appendix E freedom and the wherewithal to run that program using a modified version of the Library. The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a “work based on the library” and a “work that uses the library”. The former contains code derived from the library, whereas the latter must be combined with the library in order to run.
Appendix E Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Library. In addition, mere aggregation of another work not based on the Library with the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. 3.
Appendix E Software License Agreement b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run time a copy of the library already present on the user’s computer system, rather than copying library functions into the executable, and (2) will operate properly with a modified version of the library, if the user installs one, as long as the modified version is interface-compatible with the version that the work was made with. 8.
Software License Agreement Appendix E software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 12.
Appendix E Software License Agreement OpenSSL License Original SSLeay License Copyright © 1998-2007 The OpenSSL Project. All rights reserved. Copyright © 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). 1.
Appendix E Software License Agreement DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.