Accton Technology SMC7901WBRA1 WIRELESS ADSL 2/2+ ROUTER User Manual

Accton Technology Corp WIRELESS ADSL 2/2+ ROUTER Users Manual

Users Manual

Download: Accton Technology SMC7901WBRA1 WIRELESS ADSL 2/2+ ROUTER User Manual
Mirror Download [FCC.gov]Accton Technology SMC7901WBRA1 WIRELESS ADSL 2/2+ ROUTER User Manual
Document ID1059969
Application IDNTHtrrqcF2973GLuqcUyIg==
Document DescriptionUsers Manual
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize231kB (2887553 bits)
Date Submitted2009-01-21 00:00:00
Date Available2009-01-22 00:00:00
Creation Date2009-01-12 19:09:32
Producing SoftwarepdfFactory Pro 2.46 (Windows XP Home Chinese)
Document Lastmod0000-00-00 00:00:00
Document TitleUsers Manual.doc
Document CreatorpdfFactory Pro www.fineprint.cn
Document Author: Owner

SMC7901WBRA1
User Manual
Contents
1. Introduction .................................................................................................................................................................. 1
1.1 Package List........................................................................................................................................................ 1
1.2 Safety Cautions ................................................................................................................................................... 1
1.3 Description of LED and Interface ........................................................................................................................ 2
1.4 System Requirements .......................................................................................................................................... 3
1.5 Features .............................................................................................................................................................. 3
2. Hardware Installation.................................................................................................................................................... 5
3. Introducing Web Configuration..................................................................................................................................... 7
3.1 How to access Router .......................................................................................................................................... 7
3.2 Status .................................................................................................................................................................. 8
3.2.1 System...................................................................................................................................................... 8
3.2.2 LAN ......................................................................................................................................................... 8
3.2.3 WLAN ..................................................................................................................................................... 9
3.2.4 WAN...................................................................................................................................................... 10
3.2.5 Port Mapping.......................................................................................................................................... 10
3.2.6 Statistic................................................................................................................................................... 11
3.2.6.1 Traffic Statistic .................................................................................................................................... 11
3.2.6.2 DSL Statistic........................................................................................................................................ 11
3.2.7 ARP Table.............................................................................................................................................. 12
3.3 Wizard .............................................................................................................................................................. 12
3.3.1 Wizard.................................................................................................................................................... 13
3.4 LAN.................................................................................................................................................................. 19
3.4.1 LAN Settings.......................................................................................................................................... 19
3.4.2 DHCP Settings........................................................................................................................................ 20
3.5 WLAN .............................................................................................................................................................. 24
3.5.1 Basic Settings ......................................................................................................................................... 24
3.5.2 Security .................................................................................................................................................. 26
3.5.3 Advance Settings .................................................................................................................................... 28
3.5.4 Access Control........................................................................................................................................ 29
3.5.5 WDS Settings ......................................................................................................................................... 30
3.6 WAN ................................................................................................................................................................ 31
3.6.1 WAN Interface ....................................................................................................................................... 31
ii
3.6.2 ADSL Settings........................................................................................................................................ 34
3.7 Advance............................................................................................................................................................ 35
3.7.1 DNS ....................................................................................................................................................... 35
3.7.1.1 DNS Server.......................................................................................................................................... 35
3.7.1.2 DDNS.................................................................................................................................................. 36
3.7.2 Firewall .................................................................................................................................................. 36
3.7.2.1 IP\Port Filter ........................................................................................................................................ 36
3.7.2.2 MAC Filter .......................................................................................................................................... 37
3.7.2.3 URL Blocking...................................................................................................................................... 38
3.7.3 Virtual Server ......................................................................................................................................... 38
3.7.3.1 Services ............................................................................................................................................... 38
3.7.3.2 DMZ Settings ...................................................................................................................................... 39
3.7.4 Routing................................................................................................................................................... 39
3.7.4.1 RIP ...................................................................................................................................................... 40
3.7.4.2 Static Route ......................................................................................................................................... 40
3.7.5 IP QoS.................................................................................................................................................... 41
3.7.6 Anti-dos.................................................................................................................................................. 41
3.6.7 Port Mapping.......................................................................................................................................... 42
3.7.8 Other ...................................................................................................................................................... 43
3.7.8.1 IGMP Proxy......................................................................................................................................... 43
3.7.8.2 UPNP .................................................................................................................................................. 44
3.7.8.3 Bridge.................................................................................................................................................. 44
3.7.7.4 IP PassThrough.................................................................................................................................... 45
3.8 Admin............................................................................................................................................................... 46
3.8.1 Remote Access ....................................................................................................................................... 46
3.8.2 Commit/Reboot ...................................................................................................................................... 46
3.8.3 Password ................................................................................................................................................ 47
3.8.4 Backup/Restore....................................................................................................................................... 48
3.8.5 Upgrade Fireware ................................................................................................................................... 48
3.8.6 Time Zone .............................................................................................................................................. 49
3.8.7 System Log............................................................................................................................................. 50
3.8.8 SNMP..................................................................................................................................................... 51
3.8.9 TR069 .................................................................................................................................................... 52
3.8.10 ACL ..................................................................................................................................................... 53
3.9 Diagnostic......................................................................................................................................................... 53
iii
3.9.1 Ping........................................................................................................................................................ 53
3.9.2 ATM Loopback ...................................................................................................................................... 54
3.9.3 ADSL..................................................................................................................................................... 54
3.9.4 Diagnostic .............................................................................................................................................. 55
4. FCC Information......................................................................................................................................................... 56
iv
1. Introduction
The ADSL access device supports multiple line modes. It provides one 10/100Base-T Ethernet interface at
the user end. Utilizing the high-speed ADSL connection, the device provide users with broadband
connectivity to the Internet or the Intranet for high-end users as net bars, office users, etc. can provide a
downlink speed up to 24 Mbit/s and uplink speed up to 1 Mbit/s.
The device supports WLAN access, as WLAN AP or WLAN router, to internet. It is compliance with IEEE
802.11,802.11b/g specifications, and complies with WEP, WPA and WPA2 security specifications.
1.1 Package List
l One one port wifi router
l One external splitter
l One power adapter
l Two pieces of telephone lines(RJ-11)
l One piece of Ethernet cable(RJ-45)
l One copy of QIG
l One copy of driver and utility software CD
1.2 Safety Cautions
Follow these announcements below to pretect the device from risks and damage caused by fire or electric
power.
4 Use volume labels to mark the type of power.
4 Use the power adapter packed within the device package.
4 Pay attention to the power load of the outlet or prolonged lines. An overburden power outlet or
damaged lines and plugs may cause electric shock or fire accident. Check the power cords regularly. If
you find any damage, replace it at once.
4 Proper space left for heat radiation is necessary to avoid any damage caused by overheating to the
device. The long and thin holes on the Access Point are designed for heat radiation to make sure the
device works normally. Don’t cover these heat radiant holes.
4 Do not put this device close to a place where a heat source exits or high temperature occurs. Avoid the
device from direct sunshine.
4 Do not put this device close to a place where is over damp or watery. Do not spill any fluid on this
device.
4 Do not connect this device to any PC or electronic product, unless our customer engineer or your
broadband provider instructs you to do this, because any wrong connection may cause any power or fire
risk.
4 Do not place this device on an unstable surface or support.
1.3 Description of LED and Interface
Front panel
Fig 1.3-1 Front panel
LED
POWER
Color
Green/Red
Status
Descriptions
OFF
No power
GREEN
Device init OK
Device init
Fireware upgrade
RED
RED
BLINK
DSL
Green
ON
Initial self-test failed
Device is detecting itself
Initial self-test of the unit is OK and ready
OFF
Internet connection failed
BLINK
Internet data transiting
ON
Internet connection OK
OFF
No LAN link
BLINK
LAN data transiting
ON
LAN link established and active
OFF
Inactive
BLINK
WLAN data transiting
ON
Active
OFF
BLINK
Internet
LAN
WLAN
Green
Green
Green
Rear panel
Fig 1.3-2 Rear panel
Items
DSL
Reset
Ethernet
Usage
Line RJ-11 port
Resets to factory defaults. To restore factory defaults, keep
the device powered on and push a paper clip in to the hole.
Press down the button over 5 seconds and then release.
Ethernet RJ-45 port
Power On/Off.
PWR
Power connector. DC 12 Voltage/1000mA,female pole is
positive.
1.4 System Requirements
Make sure first that you have prepared these following items to guarantee the Router can work normally.
4 Services subscriptions
4 An 10BaseT/100BaseT Ethernet card installed on your PC
4 HUB or Switch. (Attached to several PCs through one of Ethernet interfaces on the device)
4 Operation system: Windows 98SE, Windows 2000, Windows ME, or Windows XP
4 Internet Explorer V5.0 or higher, or Netscape V4.0 or higher, or firefox 1.5 or higher.
1.5 Features
4 Supports various line modes
4 Supports external PPPoE dial-up access
4 Supports internal PPPoE/PPPoA dial-up access
4 Supports leased line mode
4 Supports ZIPB (Zero Installation PPP Bridge Mode)
4 Supports 1483B/1483R/MER access
4 Supports multiple PVCs(eight at most) and these PVCs can be isolated from each other
4 Support a single PVC with multiple sessions
4 Support multiple PVCs with multiple sessions
4 Supports the binding of the ports and the PVCs
4 Supports the 802.1Q and 802.1P protocol
4 Supports DHCP server
4 Supports NAT/NAPT
4 Supports static route
4 Supports firmware upgrade:WEB/tftp/ftp
4 Supports reset to factory default:reset, WEB
4 Supports DNS relay
4 Supports Virtual server
4 Supports DMZ functions
4 Supports two-level passwords and usernames
4 Supports WEB interface
4 Supports telnet CLI
4 Supports System status display
4 Supports PPP session PAP/CHAP
4 Supports IP filter function
4 Supports IP QoS function
4 Supports remote access control
4 Supports line connection status test
4 Supports remote management(Telnet; HTTP)
4 Supports configuration file backup and restoration function
4 Ethernet supported such as Crossover Detection & Auto-Correction and polarity correction
4 Supports UPnP
2. Hardware Installation
1、Refer to the figure below: Connect the DSL port of the device and the ROUTER port of the splitter with
a telephone cable; connect the phone to the Phone port of the splitter through a cable; connect the incoming
line to the Line port of the splitter.
The splitter has three ports:
LINE: Connects to a wall phone jack (RJ-11 jack)
ROUTER: Connects to the DSL jack of the device
PHONE: Connects to a telephone set
2、Connect the LAN port of the device to the network card of the PC via an Ethernet line (MDI/MDIX).
Note: Use twisted-pair cables to connect with the HUB/Switch.
3、Plug the power adapter to the wall outlet and then connect the other end of it to the PWR port of the
device.
Connection 1: Fig. 2-1 displays the application diagram for the connection of the Router, PC, splitter and
telephone set。
Fig 2-1 Connection Diagram(Without connecting telephone sets before the splitter)
Connection 2:As illustrated in the following figure, the splitter is installed close to the device.
Fig 2-2 Connection Diagram(Connecting a telephone set before the splitter)
It is recommended to follow the Connection 1 in an actual connection!
Note: When Connection 2 is used, the filter must be installed close to the telephone lines. (See Fig.
2-2. Do not use the splitter instead of the filter).
Installing a telephone directly before the splitter may lead to a failure of connection between the device and
the device of LAN side, or cannot access into the Internet, or slow the connection speed if you really need to
add a telephone set before the splitter, you have to add a MicroFilter before connecting to a telephone set.
Do not connect several telephones before the splitter. Moreover, do not connect several telephones with
MicroFilters.
3. Introducing Web Configuration
3.1 How to access Router
The following introductions are prepared for the first time users, it is a detail “How-To” user guide.
1、 Open IE browser,then enter http://192.168.1.1 in address bar.
2、 You are required to enter user name and password. See the Fig 3.2-1.
The super user name and password is admin/admin
The common user name and password is user/user
Fig 3.1-1
3、 If you enter as super user, the below screen will be displayed when you enter successfully.
Fig 3.1-2
After you enter router as super user, you can check, config and modify all the options. You can use the
system diagnostic function also.
If you enter as common user, you can check the status of ROUTER, but can’t change the most of options.
3.2 Status
Click Status in the menu to open the sub-menu which contains 7 items: System, LAN, WLAN, WAN,
Port Mapping, Statistic and ARP Table.
3.2.1 System
Click System in the sub-menu to open the screen of Fig 3.2.1. In this page, you can view the current status
and some basic settings of this router, for example, Software Version, DSL mode, Upstream Speed,
Downstream Speed, Uptime and so on.
Fig 3.2.1
3.2.2 LAN
Click LAN in the sub-menu to open the screen of Fig 3.2.2. In this page, you can view the LAN IP, DHCP
Server status, MAC Address and DHCP Client Table. If you want to config the LAN network, refer to
chapter 3.4.1 “LAN Settings”.
Fig 3.2.2
3.2.3 WLAN
Click LAN in the sub-menu to open the screen of Fig 3.2.3. In this page, you can view the parameters of the
WLAN.
Fig 3.2.3
3.2.4 WAN
Click WAN in the sub-menu to open the screen of Fig 3.2.4. In this page, you can view basic status of WAN,
Default Gateway, DNS Server, etc. If you want to config the WAN network, refer to chapter 3.6.1 “WAN
Interface”.
Fig 3.2.4
3.2.5 Port Mapping
Click Port Mapping in the sub-menu to open the screen of Fig 3.2.5. In this page, you can
view the mapping relation and the status of port mapping.
Fig 3.2.5
10
3.2.6 Statistic
Click Statistic in the sub-menu to open the menu in the left bar, whick contains two items:Traffic Statistic
and DSL Statistic.
3.2.6.1 Traffic Statistic
Click Traffic Statistic in the left bar to open the screen of Fig 3.2.6.1. In this page, you can view the
statistics of each network port.
Fig 3.2.6.1
3.2.6.2 DSL Statistic
Click DSL Statistic in the left bar to open the screen of Fig 3.2.6.2. In this page, you can view the ADSL
line statistics, downstream rate, upstream rate, etc.
11
Fig 3.2.6.2
3.2.7 ARP Table
Click ARP Table in the sub-menu to open the screen of Fig 3.2.7. In this page, you can view the talbe
which shows a list of learned MAC addresses.
Fig 3.2.7
3.3 Wizard
Click Wizard in the menu to open the sub-menu which contains one item: Wizard.
12
3.3.1 Wizard
Wizard enables speedy and accurate configuration of your Internet connection and other important
parameters. The following sections describe these various configuration parameters. Whether you configure
these parameters or use the default ones, click 'Next' to enable your Internet connection.
When subscribing to a broadband service, you should be aware of the method by which you are connected
to the Internet. Your physical WAN device can be either Ethernet, DSL, or both. Technical information
regarding the properties of your Internet connection should be provided by your Internet Service Provider
(ISP). For example, your ISP should inform you whether you are connected to the Internet using a static or
dynamic IP address, or what protocols, such as PPPOA or PPPoE, you will be using to communicate over
the Internet.
Click Wizard in the sub-menu to open the screen of Fig 3.3.1-1. In this page, you can config the VPI/VCI
number.
Fig 3.3.1-1
Be sure to use the correct Virtual Path Identifier(VPI) and Virtual Channel Identifier(VCI) numbers
assigned to you. The valid range for VPI is 0 to 255 and for VCI is 32 to 65535(0 to 31 is reserved for local
management of ATM traffic).
Then press Next, the Fig 3.3.1-2 screen will appear. In this page, you can select the WAN Connect Type and
the encapsulation method.
13
Fig 3.3.1-2
The following table describes the fields in this screen.
Label
Description
WAN Connection Type
Select the WAN Connection Type here, you can select PPPoA, PPPoE,
1483 MER, 1483 Routed or 1483 Bridged.
Select the method of encapsulation used by your ISP from the drop-down
list box. Choises are LLC/SNAP or VC-Mux.
Click < Back to return to the previous screen
Click Next > to go to the next screen
Encapsulation Mode
< Back
Next >
If you select PPPoA or PPPoE in WAN Connection Type, click Next, the screen of Fig 3.3.1-3 appears as
shown next.
Fig 3.3.1-3
The following table describes the fields of this screen.
Label
Description
Obtain an IP address
The dynamic IP is not fixed; your ISP assigns you the different one each
14
automatically
Use the following IP
address
WAN IP Address
Enable NAT
< Back
Next >
time.
A static IP is a fixed IP that your ISP gives you.
Input the IP address of the WAN interface provided by your ISP
Select it to enable the NAT functions of the MODEM. If you are not to
enable NAT and intend the user of the MODEM to access the Internet
normally, you must add a route on the uplink equipment; otherwise the
access to the Internet will fail. Normally, it is required to enable NAT.
Click < Back to return to the previous screen
Click Next > to go to the next screen
Then click Next, the screen of Fig3.3.1-4 appears as shown next.
Fig 3.3.1-4
The following table describes the fields of this screen.
Label
Description
PPP Username
PPP Password
PPP Connection Type
< Back
Next >
The username and password apply to PPPoE and PPPoA encapsulation
only. Make sure that you have entered the correct username and password.
Choices are Continuous, Connect on Demand and Manual.
Click < Back to return to the previous screen
Click Next > to go to the next screen
Then click Next, the screen of Fig3.3.1-5 appears as shown next.
15
Fig 3.3.1-5
The following table describes the fields of this screen.
Label
Description
LAN IP
Enter the IP address of your ROUTER in dotted decimal notation, for
example, 192.168.1.1(factory default)
Type the subnet mask of LAN IP.
Select this check box to enable the secondary LAN IP
Enter the secondary IP address of your ROUTER in dotted decimal
notation, for example, 192.168.100.1(factory default)
Type the subnet mask of the secondary LAN IP
Select this check box to enable the DHCP Server
This field specifies the first of the contiguous addresses in the IP address
pool.
This field specifies the last of the contiguous addresses in the IP address
pool.
Click < Back to return to the previous screen
Click Next > to go to the next screen
LAN Netmask
Enable Secondary IP
Secondary LAN IP
Secondary LAN Netmask
Enable DHCP Server
Start IP
End IP
< Back
Next >
If you finish the settings of this page, click Next, the screen appears as shown next.
16
Fig 3.3.1-7
If you select 1483 MER in Fig 3.3.1-2, the screen appears as shown next.
Fig 3.3.1-8
The following table describes the fields of this screen.
17
Label
Description
Obtain an IP address
automatically
The MODEM will obtain a (WAN) IP address automatically and at this
time it will enable DHCP Client functions. The WAN IP address is
obtained from the uplink equipment like BAS and the uplink equipment is
required to enable the DHCP Server functions.
If you want to input the WAN ip address by yourself. Check this entry and
then input related data in the field.
Input the IP address of the WAN interface provided by your ISP
Input the subnet mask concerned to the IP address of the WAN interface
provided by your ISP.
You can input the IP address of the default gateway by yourself, click this
entry and then input related data in the fields.
To obtain the IP address of the DNS server assigned by the uplink
equipment such as BAS.
If you want to input the IP address of the DNS server by yourself, click
this entry and then input related data in the fields.
Input the IP address of the primary DNS server here.
Input the IP address of the secondary DNS server provided by your ISP
here.
Select it to enable the NAT functions of the MODEM. If you are not to
enable NAT and intend the user of the MODEM to access the Internet
normally, you must add a route on the uplink equipment; otherwise the
access to the Internet will fail. Normally, it is required to enable NAT.
Click < Back to return to the previous screen
Click Next > to go to the next screen
Use the following IP
address
WAN IP Address
WAN Subnet Mask
Default Gateway
Obtain DNS server
addresses automatically
Use the following DNS
server addresses
Primary DNS server
Secondary DNS server
Enable NAT
< Back
Next >
If you finish the settings of this page, click Next, the screen of Fig 3.3.1-6 appears. The settings of this
screen, see above paragraphs.
If you select 1483 Routed in Fig 3.3.1-2, the screen of Fig 3.3.1-9 appears as shown next.
Fig 3.3.1-9
18
The following table describes the fields of this screen.
Label
None
Obtain an IP address
automatically
Use the following IP
address
WAN IP Address
WAN Subnet Mask
Obtain DNS server
addresses automatically
Use the following DNS
server addresses
Primary DNS server
Secondary DNS server
Enable NAT
< Back
Next >
Description
The dynamic IP is not fixed; your ISP assigns you the different one each
time.
A static IP is a fixed IP that your ISP gives you.
Input the IP address of the WAN interface provided by your ISP
Input the subnet mask concerned to the IP address of the WAN interface
provided by your ISP.
To obtain the IP address of the DNS server assigned by the uplink
equipment such as BAS.
If you want to input the IP address of the DNS server by yourself, click
this entry and then input related data in the fields.
Input the IP address of the primary DNS server here.
Input the IP address of the secondary DNS server provided by your ISP
here.
Select it to enable the NAT functions of the MODEM. If you are not to
enable NAT and intend the user of the MODEM to access the Internet
normally, you must add a route on the uplink equipment; otherwise the
access to the Internet will fail. Normally, it is required to enable NAT.
Click < Back to return to the previous screen
Click Next > to go to the next screen
3.4 LAN
Click LAN in the menu to open the sub-menu which contains 2 items: LAN Settings and DHCP Settings.
You can use the LAN configuration to define an IP address for the DSL Router and configure the DHCP
server.
3.4.1 LAN Settings
On this screen you can change the device's IP address. The preset IP address is 192.168.1.1. This is the
Private IP address of the DSL Router. This is the address under which the device can be reached in the local
network. It can be freely assigned from the block of available addresses.
Click LAN Settings in the sub-menu to open the screen of Fig 3.4.1. In this page you can config the LAN
network.
19
Fig 3.4.1
The following table describes the fields of this screen.
Label
Description
IP Address
Subnet Mask
Input the IP of Local area network interface here.
We recommend that you use an address from a block that is reserved for
private use. This address block is 192.168.1.1- 192.168.255.254
Select this checkbox to enable the secondary LAN IP. The two LAN IP
must be in the different network.
Click this button to save the settings of this page.
Secondary IP
Apply Changes
3.4.2 DHCP Settings
DHCP(Dynamic Host Configuration Protocol) allows the individual client(computers) to obain the TCP/IP
configuration at start-up from the centralize DHCP server. You can configure this router as a DHCP server
or disable it. DHCP server can assign IP address, an IP default gateway and DNS server to DHCP clients.
This router can also act as a surrogate DHCP server(DHCP Proxy) where it relays IP address assignment
from a actual real DHCP server to clients.
If the DHCP was disabled, the screen of Fig 3.4.2-1 appears. You can enable/disable DHCP Server or
DHCP Proxy.
20
Fig 3.4.2-1
If you set to DHCP Proxy, the screen of Fig 3.4.2-2 appears.
Fig 3.4.2-2
The following table describes the fields of this screen.
Label
Description
DHCP Proxy
If set to DHCP Proxy, your ROUTER acts a surrogate DHCP Server and
relays the DHCP requests and reponses between the remote server and the
client.
Enter the IP address of the actual, remote DHCP server in this field.
Click this button to save the changes of this page.
DHCP Server Address
Apply Changes
If you set to DHCP Server, the screen of Fig3.4.2-3 appears as shown next.
21
Fig 3.4.2-3
The following table describes the fields in this screen.
Label
Description
DHCP Server
If set to DHCP Server, your ROUTER can assign IP addresses, an IP
default gateway and DNS Servers to Windows95, Windows NT and other
systems that support the DHCP client.
This field specifies the first and the last of contiguous IP address of the IP
address pool.
Click this button, the screen of Fig 3.5.2-4 appears, which shows the
assigned IP address of the clients.
The Lease time determines the period for which the PCs retain the IP
addresses assigned to them without changing them.
Input the domain name here if you know. If you leave this blank, the
domain name obtained by DHCP from the ISP is used. While you must
enter host name(System Name) on each individual computer, the domain
name can be assigned from this router via DHCP server.
Enter the IP default gateway of the IP address pool.
Click this button, the screen of Fig3.5.2-5 appears. This function allows
you assign IP addresses on the LAN to specific individual computers
based on their MAC address.
Click this button to save the changes of this page.
IP Pool Range
Show Client
Max Lease Time
Domain Name
Gateway Address
MAC-Base Assignment
Apply Changes
Click Show Client, the following window appears. In this window, you can view the IP address assigned to
each DHCP client.
22
Fig 3.4.2-4
The following table describes the fields in this screen.
Label
Description
IP Address
MAC Address
This field displays the IP address relative to the MAC address.
This field displays the MAC(Media Access Control) address of the
computer.
Every Ethernet device has a unique MAC address. The MAC address is
assigned at the factory and consists of six pairs of hexadecimal character,
for example, 00-A0-C5-00-02-12.
Here shows the lease time. The Lease time determines the period for
which the PCs retain the IP addresses assigned to them without changing
them.
Click this button to refresh the Active DHCP Client Table.
Click this button to close this window.
Time Expired(s)
Refresh
Close
Click MAC-Base Assignment button, the below window appears. In this page, you can assign IP
addresses on the LAN to specific individual computers based on their MAC address.
Fig 3.4.2-5
23
The following table describes the fields of this screen.
Label
Description
Host MAC Address
Assigned IP Address
Assign IP
Type the MAC address of a computer on your LAN
This field specifics the IP of the IP address pool.
Click this button after entered Host MAC Address and Assigned IP
Address, a row will be added in MAC-Base Assignment Table.
Select a row in MAC-Base Assignment Table, the MAC address and IP
address will appears Host MAC Address and Assigned IP Address.
After modified the MAC Address and IP Address, click this button to save
the changes.
Select a row in MAC-Base Assignment Table, then click this button, this
row will be deleted.
Click this button to close this window.
This table shows the assigned IP address based on the MAC address.
Modify Assigned IP
Delete Assigned IP
Close
MAC-Base Assignment
Table
3.5 WLAN
Click WLAN in the menu to open the sub-menu which contains 5 items: Basic Settings, Security,
Advance Settings, Access Control and WDS Settings.
This session introduces the wireless LAN and some basic configurations. Wireless LANs can be as simple
as tow computers with wireless LAN cards communicating in a pear-to-pear network or as complex as a
number of computers with wireless LAN cards communicating through Access Points which bridge
network traffic to wired LAN.
3.5.1 Basic Settings
Click Basic Settings in the sub-menu to open the screen of Fig 3.5.1-1. This page is used to configure the
parameters for wireless LAN clients which may connect to your Access Point.
24
Fig 3.5.1-1
The following table describes the fields of this screen.
Label
Description
Disable Wireless LAN
Interface
(Root)SSID
The wireless LAN is turned on by default. Select the check box
to disable the wireless LAN.
The SSID(Service Set Identification) is a unique name to
identify the ROUTER in the wireless LAN. Wireless stations
associating to ROUTER must have the same SSID.
Enter a desciptive name.
You can enable 4 SSID at most. Click Set VSSID, the screen of
Fig3.6.1-2 appears.
You can enable or disable this SSID.
Select the region where you are.
A channel is the radio frequency(ies) used by 802.11b/g wireless
device. Channels available depend on your geographical area. You
may have a choice of channels(for your region) so you should use
a different channel than an adjacent AP(Access Point) to reduce
interference. Interference occurs when radio signal from
diffirent access point overlap causing interference and
degrading performance.
Select a channel from the drop-down list box.
Click this button to save the changes of this page.
Virtual SSID
Set VSSID
SSID
Country/Area
Channel Number
Apply Changes
25
Fig 3.5.1-2
The following table describes the fields of this screen.
Label
Description
SSID
The SSID(Service Set Identification) is a unique name to identify the
ROUTER in the wireless LAN
Click this button to save the changes of this page.
Click this button to begin configuring this screen afresh.
Apply Changes
Undo
3.5.2 Security
Click Security in the sub-menu to open the screen of Fig 3.5.2-1. Wireless security is vital to your network
to pretect wireless communication between wireless stations, access points and wired network.
26
Fig 3.5.2-1
The following table describes the fields of this screen.
Label
Description
SSID Type
Encryption
Select the SSID here.
Choices are None, WEP, WPA(TKIP), WPA2(AES) and WPA2 Mixed.
WEP(Wired Equivalent Privacy) entrypts data frames before transmitting
over the wireless network.
WPA(Wi-Fi Protected Access) is a subset of the IEEE802.11i security
specification draft. Key differences between WPA and WEP are user
authentication and improved data encryption.
This button is available when you set to WEP. Click this button, the
screen of Fig3.6.2-2 appears.
RADIUS is based on a client-server model that supports authentication,
authorization and accounting. The access point is client and the server is
RADIUS server. RADIUS is a simple package exchange in which your
ROUTER acts as a message relay between wireless station and the
network RADIUS server.
The default port of the RADIUS server for authentication is 1812. You
need not change this value unless your network administrator instructs you
to do so with additional information.
Enter the IP address of the RADIUS server.
Enter a password as the key to be shared between the external
authentication server and the access point. The key is not send over the
network. This key must be the same on the external authentication server
and your ROUTER.
Click this button to save the the changes of this page.
Set WEP Key
Authentication RADIUS
Server
Port
IP Address
Password
Apply Changes
27
Fig 3.5.2-2
The following table describes the fields of this screen.
Label
Description
SSID Type
Key Length
Key Format
Select the SSID here.
Select 64-bit or 128-bit to use data encryption.
If you chose 64-bit, you can choose ASCII(5 characters) or Hex(10
characters).
If you chose 128-bit, you can choose ASCII(13 characters) or Hex(26
characters).
Select the default Encryption Key here.
The Encryption keys are used to encrypt data. Both ROUTER and wireless
stations must use the same Encryption Key for data transmission.
If you chose 64-bit and ASCII(5 characters), then enter any 5 ASCII
characters.
If you chose 64-bit and Hex(10 characters), then enter any 10
hexadecimal characters.
If you chose 128-bit and ASCII(13 characters), then enter any 13 ASCII
characters.
If you chose 128-bit and Hex(26 characters), then enter any 26
hexadecimal characters.
Click this button to save the changes of this page.
Click this button to close this window.
Click this button to begin configuring this screen afresh.
Default Tx Key
Encryption Key 1 to 4
Apply Changes
Close
Undo
3.5.3 Advance Settings
Click Advance Settings in the sub-menu to open the screen of Fig 3.5.3. These settings are only for more
technically advanced users who have a sufficient knowledge about wireless LAN. These settings should not
be changed unless you know what effect the changes will have on your Access Point.
28
Fig 3.5.3
The following table describes the fields of this screen.
Label
Description
Fragment Threshold
This is the maximum data fragment size(between 256 and 2346bytes) that
can be sent in the wireless network before the ROUTER will fragment the
packet into smaller data frames.
RTS(Request To Send) is designed to prevent collisions due to hidden
node. A RTS defines the biggest size data frame you can send before a
RTS(Request To Send) handshake invoked. The RTS Threshold value is
between 0 and 2347.
If the RTS Threshold value is greater than Fragment Threshold value,
then the RTS hankshake will never occur as the data frames will be
fragmented before they reach RTS size.
Click this button to save the changes of this page.
RTS Threshold
Apply Changes
3.5.4 Access Control
Click Access Control in the sub-menu to open the screen of Fig 3.5.4. In this page, you can configure the
Wireless Access Control.
29
Fig 3.5.4
The following table describes the fields of this screen.
Label
Description
Select Access Control
Mode
Choises are Disable, Allow Listed and Deny Listed. Select Allow Listed
to block access to the router, MAC addresses not listed will be allowed to
access your router. Select Deny Listed to permit access to the router,
MAC addresses not listed will be denied to access your router.
Click this button to save the change of Select Access Control Mode.
Enter the MAC address(in XX-XX-XX-XX-XX-XX format) of the
wireless station that are allowed or denied access to your router in this
address field.
Click this button, the MAC Addr will be added to Current Access
Control List.
Click this button to begin configuring the MAC Addr afresh.
The MAC address in this table will be allowed or denied access to the
router.
Click this button to delete the row you select in the Current Access
Control List.
Click this button to delete all rows in the Current Access Control List.
Click this button to begin configuring the Current Access Control List
afresh.
Apply Changes
MAC Addr
Apply Changes
Reset
Current Access Control
List
Delete
Delete All
Reset
3.5.5 WDS Settings
Click WDS Settings in the sub-menu to open the screen of Fig 3.5.5. Wireless Distribution System is
commonly used in areas requiring multiple APs, where wiring is not possible or costly and for providing
back-up paths between APs.
30
Notice: You must select the “AP+WDS” option in chapter 3.6.1 before you configure this page.
Fig 3.5.5
The following table describes the fields of this screen.
Label
Description
Enable WDS
Select this check box to enable the WDS function, or you can’t configure
this page.
Enter the MAC address(in XX-XX-XX-XX-XX-XX format) of the AP.
Enter the comment to describe the AP of the MAC Addr.
Click this button to add the MAC Addr with the Comment to Current
WDS AP List.
Click this button to begin configuring the MAC Addr and Comment
afresh.
This table shows all APs of the WDS.
Click this button to delete the row of the Current WDS AP List.
Click this button to delete all rows of the Current WDS AP List.
MAC Addr
Comment
Apply Change
Reset
Current WDS AP List
Delete
Delete All
3.6 WAN
Click WAN Interface in the menu to open the sub-menu which contains 2 items: WAN Interface and
ADSL Settings.
3.6.1 WAN Interface
Click WAN Interface in the sub-menu to open the screen of Fig 3.6.1-1. In this page, you can configure
WAN Interface of your router.
31
Fig 3.6.1-1
Label
Description
Current ATM VC Table
This table shows the PVCs already existed. It shows the Interface name,
Channel Mode, VPI/VCI, Encapsulation mode, local IP Address, Remote
IP address, etc. The maximum item of this table is eight.
(Virtual Path Identifier) The virtual path between two points in an ATM
network, and its valid value is from 0 to 255
The virtual channel between two points in an ATM network, ranging from
32 to 65535 (1 to 31 are reserved for known protocols)
Choices are LLC and VC-Mux.
There are five choices: 1483 Bridged, 1483 MER, PPPoE, PPPoA and
1483 Routed.
If select Disable, this PVC will be unusable.
Select it to enable the NAPT functions of the MODEM. If you are not to
enable NAPT and intend the user of the MODEM to access the Internet
normally, you must add a route on the uplink equipment; otherwise the
access to the Internet will fail. Normally, it is required to enable NAPT.
VPI
VCI
Encapsulation
Channel Mode
Admin Status
Enable NAPT
PPP Settings
Login Name
Password
Connection Type
Idle Time(min)
WAN IP Settings
Type
The correct user name that your ISP has provided to you.
The correct password that your ISP has provided to you
The choices are Continuous, Connect on Demand and Manual.
If select Connect on Demand, you need to input the idle timeout time.
Within the preset minutes, if the MODEM doesn’t detect the flow of the
user continuously, the MODEM will automatically disconnect the PPPOE
connection.
The choices are Fixed IP and Use DHCP. If set Fixed IP, you should
32
Local IP Address
Remote IP Address
Subnet Mask
Unnumbered
Default Route
Add
Modify
Delete
Undo
ATM Setting
enter the Local IP Address, Remote IP Address and Subnet Mask. If set
Use DHCP, your MODEM will be a DHCP client, the WAN IP will be
assigned by the remote DHCP server.
This is the IP of WAN interface which is provided by your ISP.
This is the gateway IP which is provided by your ISP.
This is the Subnet Mask of the Local IP Address.
Select this checkbox to enable IP Unnumbered function.
After configuring the parameters of this page, click this button then a new
PVC will be added into Current ATM VC Table.
Select a PVC in the Current ATM VC Table, then modify the parameters
of this PVC. When you finish, click this button to apply the change of this
PVC.
Select a PVC in the Current ATM VC Table, then click this button to
delete this PVC.
Click this button to begin configuring this screen afresh.
Click this button, the Fig 3.6.1-3 will appear. In this page, you can
configure ATM PVCs’QoS mode. The details, please see the following
pages.
Click this button, the following screens will appear. In these pages, you
can modify the PVCs’ parameters.
If the PVC uses PPPoE mode, click
, the Fig 3.6.1-2 will appear. In this page, you can configure this
PPPoE PVC’s parameters.
Fig 3.6.1-2
33
ATM Setting :Click ATM Setting button in Fig3.6.1-1, the screen of Fig 3.6.1-3 will appear. In this page, you
can configure the parameters of the ATM for your ADSL router, include QoS type, PCR,
CDVT, SCR and MBS.
Fig 3.6.1-3
3.6.2 ADSL Settings
Click ADSL Interface in the sub-menu to open the screen of Fig 3.6.2. In this page, you can select the DSL
modulation. Mostly, the user just need to remain this factory default setting. Our modem support these
modulations: G.Dmt, G.lite, T1.413, ADSL2, ADSL2+, AnnexL and AnnexM. The router will negotiate
the modulation mode with the DSLAM.
Fig 3.6.2
34
3.7 Advance
Click Advance in the menu to open the sub-menu which contains 8 items: DNS, Firewall, Virtual Server,
Routing, IP QOS, Anti-dos, Port Mapping and Others.
3.7.1 DNS
Click DNS in the sub-menu to open the menu in the left bar, whick contains two items:DNS Server and
DDNS.
3.7.1.1 DNS Server
Short for Domain Name System (or Service or Server), an Internet service that translates domain names
into IP addresses. Because domain names are alphabetic, they're easier to remember. The Internet however,
is really based on IP addresses. Every time you use a domain name, therefore, a DNS service must translate
the name into the corresponding IP address. For example, the domain name www.example.com might
translate to 198.105.232.4.
The DNS system is, in fact, its own network. If one DNS server doesn't know how to translate a particular
domain name, it asks another one, and so on, until the correct IP address is returned.
Click DNS in the sub-menu to open the screen of Fig 3.7.1.1.
Fig 3.7.1.1
Label
Description
Attain DNS Automatically
When this checkbox is selected, this router will accept the first received
DNS assignment from one of the PPPoA, PPPoE or MER enabled PVC(s)
during the connection establishment.
When this checkbox is selected, please enter the primary and optional
secondary DNS server IP addresses.
Click this button to save the settings of this page.
Click this button to begin configuring this screen afresh.
Set DNS Manually
Apply Changes
Reset Selected
35
3.7.1.2 DDNS
Click DDNS in the left bar to open the screen of Fig 3.7.1.2.
Fig 3.7.1.2
3.7.2 Firewall
Click Firewall in the sub-menu to open the menu in the left bar, whick contains three items:IP\Port Fileter,
MAC Filter and URL Blocking.
3.7.2.1 IP\Port Filter
Click IP\Port Filter in the left bar to open the screen of Fig 3.7.2.1. Entries in this table are used to restrict
certain types of data packets through the Gateway. Use of such filters can be helpful in securing or
restricting your local network.
Click the button Apply Changes to save the settings of this page.
Click the button Add Rule to add a new rule of the IP\Port Filter.
36
Fig 3.7.2.1
3.7.2.2 MAC Filter
Click MAC Filter in the left bar to open the screen of Fig 3.7.2.2. Entries in this table are used to restrict
certain types of data packets from your local network to Internet through the Gateway. Use of such filters
can be helpful in securing or restricting your local network.
Click the button Apply Changes to save the settings of this page.
Click the button Add Rule to add a new rule of the MAC Filter.
Fig 3.7.2.2
37
3.7.2.3 URL Blocking
Click URL Blocking in the left bar to open the screen of Fig 3.7.2.3. This page is used to configure the
Blocked FQDN(Such as tw.yahoo.com) and filtered keyword. Here you can add/delete FQDN and filtered
keyword.
Fig 3.7.2.3
3.7.3 Virtual Server
Click Virtual Server in the sub-menu to open the menu in the left bar,whick contains two items:Services
and DMZ Settings.
3.7.3.1 Services
Click Services in the left bar to open the screen of Fig 3.7.3.1. This page is used to enable the servers in the
local network.
Click the button Add to add a virtual server.
38
Fig 3.7.3.1
3.7.3.2 DMZ Settings
Click DMZ Settings in the left bar to open the screen of Fig 3.7.3.2. A Demilitarized Zone is used to
provide Internet services without sacrificing unauthorized access to its local private network. Typically, the
DMZ host contains devices accessible to Internet traffic, such as Web (HTTP ) servers, FTP servers, SMTP
(e-mail) servers and DNS servers.
Select the checkbox Enable DMZ to enable this function. Then input a IP Address of the DMZ host.
Click the button Apply Changes to save the settings of this page.
Fig 3.7.3.2
3.7.4 Routing
Click Routing in the sub-menu to open the menu in the left bar, whick contains two items:RIP and Static
Route.
39
3.7.4.1 RIP
Click RIP in the left bar to open the screen of Fig 3.7.4.1. Enable the RIP if you are using this device as a
RIP-enabled router to communicate with others using the Routing Information Protocol. This page is used
to select the interfaces on your deviceis that use RIP, and the version of the protocol used.
Fig 3.7.4.1
3.7.4.2 Static Route
Click Static Route in the left bar to open the screen of Fig 3.7.4.2-1. This page is used to configure the
routing information. Here you can add/delete IP routes.
Fig 3.7.4.2-1
40
Click the button Show Routes, the below window will appear. The table shows a list of destination routes
commonly accessed by your network.
Fig 3.7.4.2-2
3.7.5 IP QoS
Click Anti-dos in the sub-menu to open the screen of Fig 3.7.5. Entries in this table are used to assign the
precedence for each incoming packet based on physical LAN port, TCP/UDP port number, and
source/destination IP address/subnet masks.
Fig 3.7.5
3.7.6 Anti-dos
Click Anti-dos in the sub-menu to open the screen of Fig 3.7.6. "denial-of-service attack" (DoS Attack) a
type of attack on a network that is designed to bring the network to its knees by flooding it with useless
traffic. In this page, you can configure to prevent DOS attacks.
Click the button Apply Changes to save the settings of this page.
41
Fig 3.7.6
3.6.7 Port Mapping
Click Port Mapping in the sub-menu to open the screen of Fig 3.6.7. In this page, you can bind the
WAN interface and the LAN interface to the same group.
To manipulate a mapping group:
1. Select a group from the table.
2. Select interfaces from the WAN and LAN interface list and add them to the grouped interface list using
the arrow buttons to manipulate the required mapping of the ports.
3. Click "Apply Changes" button to save the changes.
42
Fig 3.6.7
3.7.8 Other
Click Others in the sub-menu to open the menu in the left bar,whick contains four items:IGMP Proxy,
UPNP,
Bridge and IP PassThrough.
3.7.8.1 IGMP Proxy
Click IGMP Proxy in the left bar to open the screen of Fig 3.7.8.1. IGMP proxy enables the system to issue
IGMP host messages on behalf of hosts that the system discovered through standard IGMP interfaces. The
system acts as a proxy for its hosts after you enable it.
Click Apply Changes to save the settings of this page.
43
Fig 3.7.8.1
3.7.8.2 UPNP
Click UPNP in the left bar to open the screen of Fig 3.7.8.2. This page is used to configure UPnP. The
system acts as a daemon after you enable it.
Click Apply Changes to save the settings of this page.
Fig 3.7.8.2
3.7.8.3 Bridge
Click Bridge in the left bar to open the screen of Fig 3.7.8.3-1. This page is used to configure the bridge
parameters. Here you can change the settings or view some information on the bridge and its attached ports.
44
Fig 3.7.8.3-1
Click Show MACs button in Fig 3.7.8.3-1, the below window will appear. This table shows a list of learned
MAC addresses for this bridge.
Fig 3.7.8.3-2
3.7.7.4 IP PassThrough
Click IP PassThrough in the left bar to open the screen of Fig 3.7.8.4. The IP PassThrough has the other
name ZIPB or IP Extension. In this page, you can enable and configure IP PassThrough function.
45
Fig 3.7.8.4
3.8 Admin
Click Admin in the menu to open the sub-menu which contains 11 items: Remote Access, Commit/Reboot,
Password, Backup/Restore, Upgrade Fireware, Time Zone, System Log, SNMP, TR069, ACL and
Logout.
3.8.1 Remote Access
Click Remote Access in the sub-menu to open the screen of Fig 3.8.1. In this page, you can enable or
disable the services which will be used by remote host. For example, if TELNET service is enabled and port
is 23, the remote host can access this router by telnet through port 23.
Fig 3.8.1
3.8.2 Commit/Reboot
Click Commit/Reboot in the sub-menu to open the screen of Fig 3.8.2. In this page, you can set the router
reboot to default settings or set the router save the current settings then reboot.
46
Fig 3.8.2
Label
Description
Reset to default settings
Commit current settings
Reboot
Select this checkbox to reset router to default settings.
Select this checkbox to save the current settings and reboot router.
Click this button to reboot the router according to the above option.
3.8.3 Password
Click Login Password in the sub-menu to open the screen of Fig 3.8.3. In this page, you can change the
password of the user, include admin and user. The super user name and password are admin/admin as
default, and the The common user name and password are user/user.
Fig 3.8.3
Label
Description
User Name
Select the user name in the drop-down list box. The choices are admin
47
Old Password
New Password
Confirmed Password
Apply Changes
Reset
and user.
After selected the user name, input the old password of the user here.
Input the new password what you want to set of the user.
Input the new password again.
Click this button to save the settings of this page.
Click this button to begin configuring the password afresh.
3.8.4 Backup/Restore
Click Backup/Restore in the sub-menu to open the screen of Fig 3.8.4. In this page, you can backup the
current settings to a file and restore the settings from the file which was saved previously.
IMPORTANT! Do not turn off your router or press the Reset button while these procedures are in
progress.
Fig 3.8.4
Label
Description
Save Settings to File
Click the Save button, then select the path and save the configuration file
of your router.
Click the Browse button to select the configuration file.
Selected the configuration file of router, click Upload button to begin
restore the router configuration.
Load Settings from File
Upload
3.8.5 Upgrade Fireware
Click Upgrade Fireware in the sub-menu to open the screen of Fig 3.8.5. In this page, you can upgrade the
fireware of this router.
IMPORTANT! Do not turn off your router or press the Reset button while this procedure is in progress.
48
Fig 3.8.5
Label
Description
Select File
Upload
Click the Browse button to select the Fireware file.
Selected the Fireware file, click Upload button to begin upgrading the
Fireware.
Click this button to begin selecting the Fireware file afresh.
Reset
3.8.6 Time Zone
Click Time Zone in the sub-menu to open the screen of Fig 3.8.6. In this page, you can set the system time
manually or get the system time from the time server.
49
Fig 3.8.6
Label
Description
Refresh
Time Mode
Click this button to refresh the system shown in the page.
If select Time Server, the router will get the system time from the time
server. If select Manual, you should configure the system time manually.
If select this checkbox, you can choose the correct SNTP Server which
you want.
Choose the SNTP Server here.
Select the Time Zone of in which area you are.
Click this button to save the settings of this page.
Enable SNTP Client
Update
SNTP Server
Time Zone
Apply Changes
3.8.7 System Log
Click System Log in the sub-menu to open the screen of Fig 3.8.7. In this page, you can enable or disabled
the System log function, view the system log.
50
Fig 3.8.7
Label
Description
System Log
Apply Changes
Refresh
You can enable or disable the System Log function.
Click this button to save the settings of this page.
Click this button to refresh the system log shown in the textfield.
3.8.8 SNMP
Click SNMP in the sub-menu to open the screen of Fig 3.8.8. In this page, you can set the SNMP
parameters.
Fig 3.8.8
51
Label
Description
Trap IP Address
Input the Trap Host’s IP here. The trap information will be sent to this
host.
The network administrators must use this password to read the
information of this router.
The network administrators must use this password to configure
the information of this router.
Click this button to save the settings of this page.
Click this button to begin configuring this screen afresh.
Community name(read-only)
Community name(write-only)
Apply Changes
Reset
3.8.9 TR069
Click ACL in the sub-menu to open the screen of Fig 3.8.9. In this page, you can configure the TR-069
CPE.
Fig 3.8.9
52
3.8.10 ACL
Click ACL in the sub-menu to open the screen of Fig 3.8.10. In this page, you can configure the IP Address
for Access Control List. If ACL enabled, only the effective IP in ACL can access ADSL Router.
Step 1: If you want to enable ACL, please choose "Enable" then press "Apply Changes";
Step 2: Config Access Control List;
Step 3: Press "take effect" to effect the configuration.
Note: If you check "Enable" in ACL Capability, please make sure that your host IP is in ACL List before it
takes effect
Fig 3.8.10
3.9 Diagnostic
Click Diagnostic in the menu to open the sub-menu which contains 4 items: Ping, ATM Loopback, ADSL
and Diagnostic.
3.9.1 Ping
Click Ping in the sub-menu to open the screen of Fig 3.9.1.
53
Fig 3.9.1
Label
Description
Host Address
Go!
Enter the IP Address here.
Click this button to begin to Ping the Host Address.
3.9.2 ATM Loopback
Click ATM Loopback in the sub-menu to open the screen of Fig 3.9.2. In this page, you can use VCC
loopback function to check the connectivity of the VCC.
Fig 3.9.2
Go!: Click this button to begin testing.
3.9.3 ADSL
Click ADSL in the sub-menu to open the screen of Fig 3.9.3. This page is used for ADSL Tone Diagnostics.
54
Fig 3.9.3
Go!: Click this button to begin ADSL Tone Diagnostics.
3.9.4 Diagnostic
Click Diagnostic in the sub-menu to open the screen of Fig 3.9.4. This page is used for testing your DSL
connection.
Fig 3.9.4
Run Diagnostic Test:Click this button to begin testing.
55
4. FCC Information
FCC Information
This equipment complies with CFR 47, Part 15.19 of the FCC rules. Operation of the equipment is subject to the
following conditions: (1) this device may not cause harmful interference, and (2) this device must accept any
interference received; including interference that may cause undesired operation.
This device must not be co-located or operating in conjunction with any other antenna or transmitter
NOTE: THE MANUFACTURER IS NOT RESPONSIBLE FOR ANY RADIO OR TV INTERFERENCE CAUSED BY
UNAUTHORIZED MODIFICATIONS TO THIS EQUIPMENT. SUCH MODIFICATIONS COULD VOID THE USER’S
AUTHORITY TO OPERATE THE EQUIPMENT.
Federal Communications Commission (FCC) Requirements, Part 15
This equipment has been tested and found to comply with the limits for a class B digital device, pursuant to part
15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a
residential installation.
This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in
accordance with the instructions, may cause harmful interference to radio communications. However, there is no
guarantee that interference will not occur in a particular installation. If this equipment does cause harmful
interference to radio or television reception, which can be determined by turning the equipment off and on, the
user is encouraged to try to correct the interference by one or more of the following measures:
---Reorient or relocate the receiving antenna.
---Increase the separation between the equipment and receiver.
---Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
---Consult the dealer or an experienced radio/TV technician for help.
Regulatory information / Disclaimers
Installation and use of this Wireless LAN device must be in strict accordance with the instructions included in
the user documentation provided with the product. Any changes or modifications (including the antennas) made
to this device that are not expressly approved by the manufacturer may void the user’s authority to operate the
equipment. The manufacturer is not responsible for any radio or television interference caused by unauthorized
modification of this device, or the substitution of the connecting cables and equipment other than manufacturer
specified. It is the responsibility of the user to correct any interference caused by such unauthorized modification,
substitution or attachment. Manufacturer and its authorized resellers or distributors will assume no liability for
any damage or violation of government
CAUTION: To maintain compliance with FCC’s RF exposure guidelines, this equipment should be installed and operated
with minimum distance 20cm between the radiator and your body. Use on the supplied antenna. Unauthorized antenna,
modification, or attachments could damage the transmitter and may violate FCC regulations.
MPE Statement (Safety Information)
Your device contains a low power transmitter. When device is transmitted it sends out Radio Frequency (RF)
signal.
Safety Information
In order to maintain compliance with the FCC RF exposure guidelines, this equipment should be installed and
operated with minimum distance 20cm between the radiator and your body. Use only with supplied antenna.
Unauthorized antenna, modification, or attachments could damage the transmitter and may violate FCC
regulations.
56

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.2
Linearized                      : No
Encryption                      : Standard V1.2 (40-bit)
User Access                     : Print, Fill forms, Extract, Assemble, Print high-res
Title                           : Users Manual.doc
Author                          : Owner
Creator                         : pdfFactory Pro www.fineprint.cn
Producer                        : pdfFactory Pro 2.46 (Windows XP Home Chinese)
Create Date                     : 2009:01:12 19:09:32+08:00
Page Count                      : 60
EXIF Metadata provided by EXIF.tools
FCC ID Filing: HEDSMC7901WBRA1

Navigation menu