Arcadyan Technology WG4005DARC OfficeConnect Wireless 11g Cable/DSL Router User Manual DUA0055 4AAA01rev01

Arcadyan Technology Corporation OfficeConnect Wireless 11g Cable/DSL Router DUA0055 4AAA01rev01

Contents

user manual part 2

Internet Settings 61■Use this PC’s MAC address - This field is automatically filled in with the MAC address of the PC you are using to configure the Router. You should use this address only if you were previously using this computer to connect directly to your modem.■Enter a new MAC address manually - Use this option if you want to specify a new MAC address. Enter the new MAC address.5Check all settings and click Apply.PPP over EthernetFigure 43   PPPoE Setup ScreenTo setup the Router for use with a PPP over Ethernet connection, use the following procedure:1Select PPP over Ethernet in the IP Allocation Mode field. (Figure 43)2Enter your Primary DNS Address and Secondary DNS address.Your ISP may provide you with primary and secondary DNS addresses. If they have been provided, enter the addresses in the appropriate text boxes. If not, leave 0.0.0.0 in the boxes.3Enter the Host Name (optional).Some ISPs require a host name. If your ISP has this requirement, enter the host name in the Host Name text box.4Enter your PPP over Ethernet user name in the PPPoE User Name text box.5Enter a password in the PPPoE Password text box.
62 CHAPTER 5: ROUTER CONFIGURATION6Enter your PPP over Ethernet service name in the PPPoE Service Name text box. Not all ISPs require a PPPoE service name. Only enter a service name if your ISP requires this.7Select an idle time from the Maximum Idle Time drop-down list.This value will correspond to the amount of idle time (no Internet activity) that will pass before the Router automatically ends your PPP over Ethernet session.Since the Router contains its own PPPoE client, you no longer need to run PPPoE client software on your computer to access the Internet.PPTPFigure 44   PPTP Setup ScreenTo setup the Router for use with a PPTP connection, use the following procedure:1Select PPTP (used by some European providers) in the IP Allocation Mode field. (Figure 44)2Enter your PPTP server address in the PPTP Server Address text box (this is typically the address of your modem).3Enter your PPTP user name in the PPTP User Name text box.4Enter your password in the PPTP Password text box.
Firewall 635Enter your Primary DNS Address and Secondary DNS address.Your ISP may provide you with primary and secondary DNS addresses. If they have been provided, enter the addresses in the appropriate text boxes. If not, leave 0.0.0.0 in the boxes.6Select an idle time from the Maximum Idle Time drop-down list.This value will correspond to the amount of idle time (no Internet activity) that will pass before the Router automatically ends your PPTP session.7IP settings must be used when establishing a PPTP connection. Fill in the Initial IP Address and the Initial Subnet Mask fields if your ISP has provided you with these settings. Alternatively, if the PPTP server is located in your DSL modem, click Suggest to select an IP address on the same subnet as the PPTP server.Firewall On the main frame of the Firewall setup screen is a menu with five tabs: Virtual Servers, Special Applications, PCs Privileges, URL Filter, and Security.Virtual Servers Selecting the Firewall option on the main menu displays the Virtual Servers setup screen. (Figure 45)Virtual DMZFigure 45   Virtual Servers Screen
64 CHAPTER 5: ROUTER CONFIGURATIONDMZ (De-Militarized Zone) Host is a computer without the protection of the firewall. This feature allows a single computer to be exposed to unrestricted 2-way communication from outside of your network. This feature should be used only if the Virtual Server or Special Applications options do not provide the level of access needed for certain applications.To configure one of your computers as a DMZ host, enter the last digit(s) of the IP address of the computer in the IP Address of DMZ Host text box, and then click Apply.Virtual ServerActivating and configuring a virtual server allows one or more of the computers on your network to function as a public server. For example, one of your computers could be configured as an FTP server, allowing others outside of your office network to download files of your choosing. Or, if you have created a Web site, you can configure one of your computers as a Web server, so that others can view your Web site.To configure a virtual server:1Click New on the right side of the screen to open the Virtual Server Settings dialogue box. (Figure 46)2Enter the last digit(s) of the IP address of the computer in the Server IP Address text box.3Select the Service from the pull-down list. (Figure 46)Figure 46   Virtual Servers Settings Screen
Firewall 65Or select Custom to specify a suitable name for the service and then enter the port numbers required for that service. (Figure 47)Figure 47   Custom Setup Screen4Click Add to save the settings.The port numbers are specified using a comma-separated list, with hyphens to denote port number ranges. So for example, entering 2, 3, 5-7 would cause ports 2, 3, 5, 6, and 7 to be activated.Special Applications Figure 48   Special Applications ScreenSelect Special Applications tab to display Authorized Application setup screen. (Figure 48)Some software applications require special or multiple connections to the Internet and these would normally be blocked by the firewall. For example Internet Telephony or Video conferences require multiple connections.So that these special applications can work properly and are not blocked, the firewall needs to be told about them. In each instance there will be a
66 CHAPTER 5: ROUTER CONFIGURATIONtrigger port and incoming port(s), where traffic on the trigger port tells the firewall to open the incoming ports.Each defined Special Application only supports a single computer user, and up to 10 Special Applications can be defined. Any incoming ports opened by a Special Application trigger will be closed after five minutes of inactivity.To configure special applications:1Click New.2Select the applications from the pull-down list. (Figure 49)Figure 49   Special Application Settings ScreenOr select Other to specify a suitable name for the special application and then enter a value in the Trigger Port and Incoming Ports text boxes (Figure 49). These values correspond to the outbound port numbers issued by the application.The port numbers are specified using a comma-separated list, with hyphens to denote port number ranges. So for example, entering 2, 3, 5-7 would cause ports 2, 3, 5, 6, and 7 to be activated.The Router will automatically allow FTP and NetMeeting sessions. You do not need to configure these as Special Applications.
Firewall 67Figure 50   Other Applications Setup Screen3Click Add to save your settings.Only one computer on your network can use the special application at any one time.PC Privileges Figure 51   PC Privileges ScreenSelect PC Privileges to display the PC Privilege setup screen (Figure 51).Access from the local network to the Internet can be controlled on a computer-by-computer basis. In the default configuration the Router will allow all connected computers unlimited access to the Internet. PC Privileges allows you to assign different access rights for different computers on your network.
68 CHAPTER 5: ROUTER CONFIGURATIONTo use access control for all computers:1Click PCs access authorized services only.2Select All PCs to setup the access rights for all computers connected to the Router.3Select authorized services by clicking in the appropriate check box(es) (Figure 52).Figure 52   All PCs Setup ScreenIn addition to the four authorized services listed, you can choose to allow or block access to other services. You can either:■Allow all other services with exceptions, or■Block all other services with exceptions4To do this, select Allow or Block from the drop down menu and enter the exceptions into the text box.The port numbers are specified using a comma-separated list, with hyphens to denote port number ranges. So for example, entering 2, 3, 5-7 would cause ports 2, 3, 5, 6, and 7 to be activated.For example, to block access to all services except Web (80) and a service that uses ports 2,3,5,6 and 7:1. Tick the Web(80) check box.2. Select ‘Block’ all other services.3. Enter ‘2, 3, 5-7’ in the ‘except (specify ports) box. See Figure 53.
Firewall 69Figure 53   PC Privileges Setup Screen Example5Click Modify to save the settings or Close to discard them.To assign different access rights for different computers:1If not already selected, click PCs access authorized services only.2Click New to display the PC Privileges setting screen.3Enter the last digit(s) of the IP address of the computer in the PC’s IP Address text box.4Select authorized services by clicking in the appropriate check box(es).In addition to the four authorized services listed, you can choose to allow or block access to other services. You can either:■Allow all other services with exceptions, or■Block all other services with exceptionsSee step 4 of the previous section for more details.5Click Add to save the settings.URL Filter Select URL Filter to control your clients’ access to Web sites. The Router’s URL Filter has three settings:■Disabled — Users can browse all Web sites. None will be filtered.■Deny List — Users can browse all Web sites apart from those sites listed in the deny list and those whose URLs contain keywords listed in the deny list. See “Deny List” on page 70.■Allow List — Users are unable to browse any Web sites except of those listed in the allow list and those whose URLs contain keywords listed in the allow list. See “Allow List” on page 71.
70 CHAPTER 5: ROUTER CONFIGURATIONDeny ListTo allow users access to all Web sites except for those you choose to block, choose Deny List in the URL Filter Type drop-down box (Figure 54).Figure 54   URL Filter Screen showing Deny ListTo filter a specific site, enter the URL for that site. For example, to stop your users from browsing a site called www.badsite.com, enter www.badsite.com or badsite.com in one of the fields.If badsite.com has multiple sub-domains, such as this.badsite.com and that.badsite.com then you can either:■Block them individually by entering this.badsite.com in one field and that.badsite.com in another.or■Block them by entering the keyword badsite.com into one of the fields. This will block all URLs containing the string badsite.com. As well as blocking this.badsite.com and that.badsite.com, the keyword badsite.com would block searches that mentioned badsite.com in their domain name, for example www.notabadsite.com.To filter a generic keyword enter it into one of the fields. You should exercise caution when choosing a keyword as many keywords are
Firewall 71contained within other words. For example, filtering the word sex would filter the following example URLs:■www.sussex.com■www.thisexample.comYou can filter up to 30 keywords and URLs.Computers that should not be subject to URL filtering can be excluded by ticking the Bypass URL Filter checkbox in the PC Privileges setup screen. See “PC Privileges” on page 67.Allow ListTo stop users from accessing any Web sites that you have not specifically allowed, choose Allow List in the URL Filter Type drop-down box (Figure 55).Figure 55   URL Filter Screen showing Allow ListTo allow a specific site, enter the URL for that site. For example, to let your users browse a site called www.goodsite.com, enter www.goodsite.com or goodsite.com in one of the fields.If goodsite.com has multiple sub-domains, such as this.goodsite.com and that.goodsite.com then you can either:
72 CHAPTER 5: ROUTER CONFIGURATION■Allow them individually by entering this.goodsite.com in one field and that.goodsite.com in another.or■Allow them by entering the keyword goodsite.com into one of the fields. This will allow all URLs containing the string goodsite.com. As well as allowing this.goodsite.com and that.goodsite.com, the keyword goodsite.com would allow sites that had the string goodsite.com in their URL, for example xxxgoodsite.com.To filter a generic keyword enter it into one of the fields. You should exercise caution when choosing a keyword as sites that you may wish to block may be allowed if you choose too general a keyword.The Router filters all traffic from domains that have been blocked using the URL filter. If need to access an external mail server, FTP server or other named device outside your network, you must list it in one of the allow fields.You can filter up to 30 keywords and URLs.Computers that should not be subject to URL filtering can be excluded by ticking the Bypass URL Filter checkbox in the PC Privileges setup screen. See “PC Privileges” on page 67.
Firewall 73Security Select Security to display the Security screen (Figure 56).Figure 56   Security ScreenThe Internet connects millions of computer users throughout the world. The vast majority of the computer users on the Internet are friendly and have no intention of breaking into, stealing from, or damaging your network. However, there are hackers who may try to break into your network.Enable universal plug and play Universal plug and play allows compatible software to read and change some the Router’s firewall settings. This reduces the configuration required but lessens your control of the Router’s firewall.3Com recommends that you leave this feature disabled for maximum security.Allow PING from the Internet PING is a utility, which is used to determine whether a device is active at the specified IP address. PING is normally used to test the physical connection between two devices, to ensure that everything is working correctly. By default the Router has PING disabled in order to make the device more difficult to find on the Internet and less prone to attack.
74 CHAPTER 5: ROUTER CONFIGURATIONThis feature is enabled by clicking on the check box so that a tick can be seen and then select Apply. 3Com recommends that you leave this disabled. Enabling Remote AdministrationIt is possible to administer the Router remotely. This can be set to one of four different levels using the following options:1Disable Remote Administration - This option is set as default.2Enable administration from a single Internet Host - Only the specified IP address can manage the Router. Any other users will be rejected.3Enable administration from a whole subnet - This option allows a number of users within a subnet to administer the Router.4Enable administration from any Internet Host - This options allows any host to access the administration pages.To remotely administer your Router, enter http://xxx.xxx.xxx.xxx:8000 in the location bar of the browser running on the remote computer, where xxx.xxx.xxx.xxx is the Internet IP address of the Router. You may then login using the administration password.Your Internet IP address can be found at the bottom of the screen. See Figure 56.
System Tools 75System Tools The main frame of the System Tools screen includes four administration items: Restart, Time Zone, Configuration, and Upgrade (Figure 57).Restart Figure 57   Restart ScreenIf your Router is not operating correctly, you can choose to restart the Router by selecting Restart the Router, simulating the effect of power cycling the unit. No configuration information will be lost but the log files will be erased. This function may be of use if you are experiencing problems and you wish to re-establish your Internet connection. Any network users who are currently accessing the Internet will have their access interrupted whilst the restart takes place, and they may need to reboot their computers when the restart has completed and the Router is operational again.
76 CHAPTER 5: ROUTER CONFIGURATIONTime Zone Figure 58   Time Zone ScreenChoose the time zone that is closest to your actual location. The time zone setting is used by the system clock when displaying the correct time in the log files. If you use Daylight saving tick the Enable Daylight savings box, and then click Apply (Figure 58).The Router reads the correct time from NTP servers on the Internet and sets its system clock accordingly. The Daylight Savings option merely advances the system clock by one hour. It does not cause the system clock to be updated for daylight savings time automatically.
System Tools 77Configuration Figure 59   Configuration ScreenSelect the Configuration tab to display the Configuration screen (Figure 59).Backup ConfigurationClick BACKUP to save the current Router configuration. You will be prompted to download and save a file to disk.Restore Configuration DataIf you want to reinstate the configuration settings previously saved to a file, press Browse to locate the backup file on your computer, and then click RESTORE to copy the data into the Router's memory. The password will remain unchanged.Reset to Factory DefaultIf you want to reset the settings on your Router to those that were loaded at the factory, click RESET. You will lose all your configuration changes. The Router LAN IP address will revert to 192.168.1.1, and the DHCP server on the LAN will be enabled. You may need to reconfigure and restart your computer to re-establish communication with the Router.
78 CHAPTER 5: ROUTER CONFIGURATIONUpgrade Figure 60   Upgrade ScreenThe Upgrade facility allows you to install on the Router any new releases of system software that 3Com may make available. To install new software, you first need to download the software from the 3Com support web site to a folder on your computer. Once you have done this, select Browse to tell your web browser where this file is on your computer, and then click Apply. The file will be copied to the Router, and once this has completed, the Router will restart. Although the upgrade process has been designed to preserve your configuration settings, it is recommended that you make a backup of the configuration beforehand, in case the upgrade process fails for any reason (for example, the connection between the computer and the Router is lost while the new software is being copied to the Router).The upgrade procedure can take up to two minutes, and is complete when the Alert LED has stopped flashing and is permanently off. Make sure that you do not interrupt power to the Router during the upgrade procedure; if you do, the software may be corrupted and the Router may not start up properly afterwards. If the Alert LED comes on continuously after a failed upgrade, refer to Chapter 6, “Troubleshooting”.Status and Logs Selecting Status and Logs from the main menu displays the Status, Usage, and Logs screens in your Web browser window. Status The Status screen displays a tabular representation of your network and Internet connection. (Figure 61)
Status and Logs 79Figure 61   Status ScreenUsage Usage displays an approximate count of the traffic since the Router was last reset. (Figure 62)The counts are approximate and should be used as a guide only. Contact your ISP for accurate logging information.
80 CHAPTER 5: ROUTER CONFIGURATIONFigure 62   Usage ScreenLogs Logs will allow you to view both the normal events, and security threats logged by the Router.Figure 63   Logs ScreenYou may be asked to refer to the information on the Status and Logs screens if you contact your supplier for technical support.Support/Feedback Selecting Support/Feedback from the main menu displays the Support and Feedback screens.
Support/Feedback 81Support Figure 64   Support ScreenSelecting the Support option on the main menu displays the support links screen, which contains a list of Internet links that provide information and support concerning the Router (Figure 64).Feedback Figure 65   Feedback Screen
82 CHAPTER 5: ROUTER CONFIGURATIONSelecting the Feedback option displays the Feedback screen and allows you to provide feedback to 3Com on the operation of your Router (Figure 65). This screen should not be used to obtain technical support.
6TROUBLESHOOTINGBasic Connection Checks■Check that the Router is connected to your computers and to the cable/DSL modem, and that all the equipment is powered on. Check that the LAN Status and Cable/DSL Status LEDs on the Router are illuminated, and that any corresponding LEDs on the cable/DSL modem and the NIC are also illuminated.■Ensure that the computers have completed their start-up procedure and are ready for use. Some network interfaces may not be correctly initialized until the start-up procedure has completed.■If the link status LED does not illuminate for a port that is connected, check that you do not have a faulty cable. Try a different cable.Browsing to the Router Configuration ScreensIf you have connected your Router and computers together but cannot browse to the Router configuration screens, check the following:■Confirm that the physical connection between your computer and the Router is OK, and that the LAN Status LEDs on the Router and NIC are illuminated and indicating the same speed (10Mbps or 100Mbps). Some NICs do not have status LEDs, in which case a diagnostic program may be available that can give you this information.■Ensure that you have configured your computer as described in Chapter 3, Setting Up Your Computers. Restart your computer while it is connected to the Router to ensure that your computer receives an IP address.■When entering the address of the Router into your web browser, ensure that you use the full URL including the http:// prefix (e.g. http://192.168.1.1).■Ensure that you do not have a Web proxy enabled on your computer. Go to the Control Panel and click on Internet Options. Select the
84 CHAPTER 6: TROUBLESHOOTINGConnections tab and click on the LAN Settings button at the bottom. Make sure that the Proxy Server option is unchecked.■If you cannot browse to the Router, use the winipcfg utility in Windows 95/98/ME to verify that your computer has received the correct address information from the Router. From the Start menu, choose Run and then enter winipcfg. Check that the computer has an IP address of the form 192.168.1.xxx (where xxx is in the range 2-254), the subnet mask is 255.255.255.0, and the default Router is 192.168.1.1 (the address of the Router). If these are not correct, use the Release and Renew functions to obtain a new IP address from the Router. Under Windows 2000, use the ipconfig command-line utility to perform the same functions.■If you still cannot browse to the Router, then use the Discovery program on the accompanying CD-ROM as described in Appendix A.Connecting to the InternetIf you can browse to the Router configuration screens but cannot access sites on the Internet, check the following:■Confirm that the physical connection between the Router and the cable/DSL modem is OK, and that the link status LEDs on both Router and modem are illuminated.■Confirm that the connection between the modem and the cable/DSL interface is OK.■Ensure that you have entered the correct information into the Router configuration screens as required by your Internet Service Provider. Use the “Internet Settings” screen to verify this.■For DSL users, check that the PPPoE or PPTP user name, password and service name are correct, if these are required. Only enter a PPPoE service name if your ISP requires one.■For cable users, check whether your ISP requires a fixed MAC (Ethernet) address. If so, use the Clone MAC Address feature in the Router to ensure that the correct MAC address is presented, as described on page 60.■For cable users, check whether your ISP requires a fixed Host Name. If so, enter the required Host Name in the Internet Settings screen.■Ensure that your computers are not configured to use a Web proxy. On Windows computers, this can be found under Control Panel > Internet Options > Connections.
Forgotten Password and Reset to Factory Defaults 85Forgotten Password and Reset to Factory DefaultsIf you can browse to the Router configuration screen but cannot log on because you do not know or have forgotten the password, follow the steps below to reset the Router to it’s factory default configuration. CAUTION: All your configuration changes will be lost, and you will need to run the configuration wizard again before you can re-establish your Router connection to the Internet. Also, other computer users will lose their network connections whilst this process is taking place, so choose a time when this would be convenient.1Remove power from the Router.2Disconnect all your computers and the cable/DSL modem from the Router.3Using a straight through Ethernet cable, connect the Ethernet Cable/DSL port on the rear of the Router to any one of the LAN ports.4Re-apply power to the Router. The Alert LED will flash as the Router starts up, and after approximately 30 seconds will start to flash more slowly (typically 2 seconds on, 2 seconds off). Once the Alert LED has started to flash slowly, remove power from the Router.5Remove the cable connecting the Cable/DSL port to the LAN port, and reconnect one of your computers to one of the Router LAN ports.6Re-apply power to the Router, and when the start-up sequence has completed, browse to: http://192.168.1.1 and run the configuration wizard. You may need to restart your computer before you attempt this.7When the configuration wizard has completed, you may reconnect your network as it was before.Wireless Networking■Ensure that you have an 802.11b or 802.11g wireless adapter for each wireless computer, and that it is correctly installed and configured. Verify that each Wireless computer has either Windows 95 or higher or MAC OS 8.5 or higher.■Verify that your wireless computers are configured to work in Infrastructure mode and not Ad Hoc mode. The Router contains an Access Point that is designed to operate in Infrastructure mode. Ad Hoc mode is not supported by the Router.
86 CHAPTER 6: TROUBLESHOOTING■If you have a wired and a wireless NIC in the same computer, ensure that the wired NIC is disabled.■Check the status of the Router Wireless LED, it should be lit if wireless is enabled and will flash when there is wireless activity. If not lit go to “Wireless Settings” on page 47 and enable wireless networking.■Ensure that the TCP/IP settings for all devices are correct.■Ensure that the Wireless Clients are using the same SSID or Service Area Name as the Router. The SSID is case-sensitive■Ensure that the encryption method and level that you use on your clients are the same as those configured on the Router. The Router can simultaneously support WPA and WEP encryption, but can only support one configuration of each.■Ensure that you have the Wireless computer enabled in the list of allowed MAC addresses if you are using Wireless Connection control on the Router. ■If you are having difficulty connecting or are operating at a low speed try changing the antenna positions on the rear of the Router. For more effective coverage you can try reorientating your antennae. Place one antenna vertically and one horizontally to improve coverage. Additionally consider moving the wireless computer closer to the Router to confirm that the building structure or fittings are not adversely affecting the connectivity. If this resolves the problem consider relocating the Wireless computer or the Router, or trying a different channel on the Router.■Sources of interference: The 2.4Ghz ISM band is used for 802.11b and 802.11g. This is generally a licence free band for low power applications, and you may have other devices at your location that operate in this frequency band. You should take care to ensure that there are no devices like microwave ovens for example close to the Router or wireless computers as this could affect receiver sensitivity and reduce the performance of your network. If you are unsure try relocating both the wireless computers and the Router to establish whether this problem exists.■Most wireless computer Adapters will scan the channels for the wireless Router. If a wireless computer has not located the Router then try initiating a search manually if the client software supports this feature or manually set the channel on your wireless computer to correspond to the Router channel number. Please refer to your Wireless computer adapter documentation and vendor to do this.
Power LED or Power Adapter OK LED Not Lit 87■Speed of connection: The 802.11b and 802.11g standards will automatically choose the best speed depending on the quality of your connection. As the signal quality weakens then the speed falls back to a lower speed. The speeds supported by 802.11g are 54 Mbps, 48 Mbps, 36 Mbps, 24 Mbps, 18 Mbps, 12 Mbps, and 6 Mbps. The speeds supported by 802.11b are 11 Mbps, 5.5 Mbps, 2 Mbps and 1 Mbps. In general the closer you are to the Router the better the speed. If you are not achieving the speed you had anticipated then try moving the antenna on the Router or moving the Wireless computer closer to the Router. In an ideal network the Router should be located in the centre of the network with Wireless computers distributed around it. Applications are generally available with the computer wireless card to carry out a site survey. Use this application to find the optimal siting for your wireless computer. Consult your Computer Card documentation and vendor for more details.Power LED or Power Adapter OK LED Not Lit■Check that your Router is receiving power by looking at the status of the Power LED on the front panel and the Power Adapter OK LED on the rear panel:■If both LEDs are lit green then the unit is receiving power.■If both LEDs are unlit then no power is being supplied to the unit. Check that the power adapter is plugged into a working mains outlet and that the mains outlet is supplying power. If the mains socket is supplying power then the power adapter or power adapter connection may be faulty. See “Replacement Power Adapters” below.■If the Power Adapter OK LED is lit but the Power LED is unlit then there may be a fault with your unit. Contact 3Com Technical Support.■Check that you are using the correct power adapter for your Router. You should only use the power adapter supplied with your Router.Replacement PowerAdaptersIf both the Power Adapter OK LED and Power LED are off, check your power adapter connection. If the mains outlet is working and is capable of supplying power to other devices, contact 3Com Technical Support and ask for a replacement power adapter. Please quote the power adapter part number shown on the OfficeConnect power adapter you are using.
88 CHAPTER 6: TROUBLESHOOTINGAlternatively, quote the part number for your region:Table 3   Power Adapter Part NumbersAlert LED The Alert LED will flash when the Router unit is first powered up while the system software checks the hardware for proper operation. Once the Router has started normal operation, the Alert LED will go out.■If the Alert LED does not go out following start up, but illuminates continuously, this indicates that the software has detected a possible fault with the hardware. Remove power from the Router, wait 10 seconds and then re-apply power. If the Alert LED comes on continuously again, then a fault has been detected. Locate the copy of the Router software on the accompanying CD-ROM or 3Com web site (http://www.3com.com) and upload it to the Router to see if this clears the fault (refer to “Recovering from Corrupted Software” below). If this does not fix the problem, contact your supplier for further advice.■During normal operation, you may notice the Alert LED lighting briefly from time to time. This indicates that the Router has detected a hacker attack from the Internet and has prevented it from harming your network. You need take no specific action on this, unless you decide that these attacks are happening frequently in which case you may wish to discuss this with your ISP. The Router logs such attacks, and this information is available through the Status and Logs screens.Recovering from Corrupted SoftwareIf the Alert LED remains permanently on following power-up, it is possible that the system software has become corrupted. In this condition, the Router will enter a “recovery” state; DHCP is disabled, and the LAN IP Part Number Region3C16740A US and Canada3C16741A UK3C16742A Europe and Middle East3C16743A Japan3C16744A Australasia (except Japan and Korea)3C16745A South Africa3C16747A Korea3C16748A Argentina
Frequently Asked Questions 89address is set to 192.168.1.1. Follow the instructions below to upload a new copy of the system software to a Router unit in this state.Ensure that one of your computers has a copy of the new software image file stored on its hard disk or available on CD-ROM.The latest software is available on 3Com’s Web site at:www.3com.com.1Remove power from the Router and disconnect the Cable/DSL modem and all your computers, except for the one computer with the software image.2You will need to reconfigure this computer with the following static IP address information:■IP address: 192.168.1.2■Subnet mask: 255.255.255.0■Default Router address: 192.168.1.13Restart the computer, and re-apply power to the Router.4Using the Web browser on the computer, enter the following URL in the location bar: http://192.168.1.1. This will connect you to the Microcode Recovery utility in the Router.5Follow the on-screen instructions. Enter the path and filename of the software image file.6When the upload has completed, the Router will restart, run the self-test and, if successful, resume normal operation. The Alert LED will go out.7Refer to the Installation Guide to reconnect your Router to the Cable/DSL modem and the computers in your network. Do not forget to reconfigure the computer you used for the software upload.If the Router does not resume normal operation following the upload, it may be faulty. Contact your supplier for advice.Frequently Asked QuestionsHow do I reset the Router to Factory Defaults?See “Forgotten Password and Reset to Factory Defaults” on page 85.
90 CHAPTER 6: TROUBLESHOOTINGHow many computers on the LAN does the Router support?A maximum of 253 computers on the LAN are supported.How many wireless clients does the Cable/DSL Router support?A maximum of 128 wireless clients are supported.There are only 4 LAN ports on the Router. How are additional computers connected?You can expand the number of connections available on your LAN by using hubs, switches and wireless access points connected to the Router. 3Com wireless access points and OfficeConnect hubs and switches provide a simple, reliable means of expanding your network; contact your supplier for more information, or visit:http://www.3com.com/Does the Router support virtual private networks (VPNs)?The Router supports VPN passthrough, which allows VPN clients on the LAN to communicate with VPN hosts on the Internet. It is also possible to set up VPN hosts on your LAN that clients elsewhere on the Internet can connect to, but this is not a recommended configuration.Where can I download software updates for the Router?Updates to the Router software are posted on the 3Com support web site, accessible by visiting:http://www.3com.comWhat other online resources are there?The 3Com Knowledgebase at:http://knowledgebase.3com.com is a database of technical information covering all 3Com products. It is updated daily with information from 3Com technical support services, and it is available 24 hours a day, 7 days a week.
AUSING DISCOVERYRunning the Discovery Application3Com provides a user friendly Discovery application for detecting the Router on the network.Windows Installation(95/98/2000/Me/NT)1Insert the Router CD-ROM in the CD-ROM drive on your computer. A menu will appear; select Router Discovery.Discovery will find the Router even if it is unconfigured or misconfigured.Figure 66   Discovery Welcome Screen2When the Welcome screen is displayed click on Next and wait until the application discovers the Routers connected to your LAN.
92 APPENDIX A: USING DISCOVERYFigure 67   Discovered Router Screen3Figure 68 shows an example Discovered Devices screen. Highlight the Cable/DSL Router by clicking on it, and press Next.Figure 68   Discovery Finish Screen4Click on Finish to launch a web browser and display the login page for the Router.
BIP ADDRESSINGThe Internet Protocol SuiteThe Internet protocol suite consists of a well-defined set of communications protocols and several standard application protocols. Transmission Control Protocol/Internet Protocol (TCP/IP) is probably the most widely known and is a combination of two of the protocols (IP and TCP) working together. TCP/IP is an internationally adopted and supported networking standard that provides connectivity between equipment from many vendors over a wide variety of networking technologies.Managing the Router over the NetworkTo manage a device over the network, the Router must be correctly configured with the following IP information:■An IP address■A Subnet MaskIP Addresses andSubnet MasksEach device on your network must have a unique IP address to operate correctly. An IP address identifies the address of the device to which data is being sent and the address of the destination network. IP addresses have the format n.n.n.x where n is a decimal number between 0 and 255 and x is a number between 1 and 254 inclusive.However, an IP Address alone is not enough to make your device operate. In addition to the IP address, you need to set a subnet mask. All networks are divided into smaller sub-networks and a subnet mask is a number that enables a device to identify the sub-network to which it is connected.
94 APPENDIX B: IP ADDRESSINGFor your network to work correctly, all devices on the network must have:■The same sub-network address.■The same subnet mask.The only value that will be different is the specific host device number. This value must always be unique.An example IP address is ‘192.168.100.8’. However, the size of the network determines the structure of this IP Address. In using the Router, you will probably only encounter two types of IP Address and subnet mask structures.Type O neIn a small network, the IP address of ‘192.168.100.8’ is split into two parts:■Part one (‘192.168.100’) identifies the network on which the device resides.■Part two (‘.8’) identifies the device within the network.This type of IP Address operates on a subnet mask of ‘255.255.255.0’.See Ta ble 4  for an example about how a network with three computers and a Router might be configured.Table 4   IP Addressing and Subnet MaskingType Tw oIn larger networks, where there are more devices, the IP address of ‘192.168.100.8’ is, again, split into two parts but is structured differently:■Part one (‘192.168’) identifies the network on which the device resides.■Part two (‘.100.8’) identifies the device within the network.Device IP Address Subnet MaskPC 1 192.168.100.8 255.255.255.0PC 2 192.168.100.33 255.255.255.0PC 3 192.168.100.188 255.255.255.0Router 192.168.100.72 255.255.255.0
How does a Device Obtain an IP Address and Subnet Mask? 95This type of IP Address operates on a subnet mask of ‘255.255.0.0’.See Ta ble 5  for an example about how a network (only four computers represented) and a Router might be configured.Table 5   IP Addressing and Subnet MaskingHow does a Device Obtain an IP Address and Subnet Mask?There are three different ways to obtain an IP address and the subnet mask. These are:■Dynamic Host Configuration Protocol (DHCP) Addressing■Static Addressing■Automatic Addressing (Auto-IP Addressing)DHCP Addressing The Router contains a DHCP server, which allows computers on your network to obtain an IP address and subnet mask automatically. DHCP assigns a temporary IP address and subnet mask which gets reallocated once you disconnect from the network.DHCP will work on any client Operating System such as Windows® 95, Windows 98 or Windows NT 4.0. Also, using DHCP means that the same IP address and subnet mask will never be duplicated for devices on the network. DHCP is particularly useful for networks with large numbers of users on them.Static Addressing You must enter an IP Address and the subnet mask manually on every device. Using a static IP and subnet mask means the address is permanently fixed.Auto-IP Addressing Network devices use automatic IP addressing if they are configured to acquire an address using DHCP but are unable to contact a DHCP server. Automatic IP addressing is a scheme where devices allocate themselves Device IP Address Subnet MaskPC 1 192.168.100.8 255.255.0.0PC 2 192.168.201.30 255.255.0.0PC 3 192.168.113.155 255.255.0.0PC 4 192.168.002.230 255.255.0.0Router 192.168.002.72 255.255.0.0
96 APPENDIX B: IP ADDRESSINGan IP address at random from the industry standard subnet of 169.254.x.x (with a subnet mask of 255.255.0.0). If two devices allocate themselves the same address, the conflict is detected and one of the devices allocates itself a new address. Automatic IP addressing support was introduced by Microsoft in the Windows 98 operating system and is also supported in Windows 2000.
CTECHNICAL SPECIFICATIONSThis section lists the technical specifications for the OfficeConnect 11g Cable/DSL Router.11g Cable/DSL RouterInterfacesCable/DSL modem connection — 10Mbps/100Mbps dual speed Ethernet port (10BASE-T/100BASE-TX)LAN connection — four 10Mbps/100Mbps dual speed Ethernet ports (10BASE-T/100BASE-TX)WLAN InterfacesStandard IEEE 802.11g, Direct Sequence Spread Spectrum (DSSS)Transmission rate: 54Mbps, automatic fallback to 48, 36, 24, 18, 12, or 6MbpsMaximum channels: 14Range up to 304.8m (1000ft)Frequency: (US/Canada/Europe) 2.400-2.4835 GHzSensitivity:  6, 12, 18, 24, 36, 48 Mbps: -85 dBm;54 Mbps -66 dBm typicalModulation: CCK, BPSK, QPSK, OFDMEncryption: 40/64 bit WEP, 128 bit WEP, WPAMaximum clients: 128O/P Power: 18dBmStandard IEEE 802.11b, Direct Sequence Spread Spectrum (DSSS)Transmission rate: 11bps, automatic fallback to 5.5, 2, or 1 MbpsMaximum channels: 14Range up to 304.8m (1000ft)Frequency: (US/Canada/Europe) 2.400-2.4835 GHzSensitivity: 1, 2, 5.5 Mbps: -85 dBm; 11 Mbps -82 dBm typicalModulation: CCK, BPSK, QPSK, OFDM
98 APPENDIX C: TECHNICAL SPECIFICATIONSEncryption: 40/64 bit WEP, 128 bit WEP, WPAMaximum clients: 128O/P Power 18dBmOperating Temperature0 °C to 40 °C (32 °F to 105 °F)Power 7VA, 23.9 BThU/hrHumidity0 % to 90 % (non-condensing) humidityDimensions■Width = 220 mm (8.7 in.)■Depth = 135 mm (5.3 in.)■Height = 24 mm (1 in.)WeightApproximately 500 g (1.1 lbs) Standards Functional: ISO 8802/3IEEE 802.3IEEE 802.11b, 802.11g, Wi-Fi Safety: UL60950CSA 22.2 #60950IEC 60950EN 60950EMC: EN 55022 Class BEN 55024CISPR 22FCC Part 15 Class B*ICES-003 Class BCNS 13438 Class AETSI EN 301 489–17Radio CFR 47 FCC Part 15.207, 15.209, 15.247 and 15.249. ETS 300 328 (2.4 GHz ISM band wide band transmission
99systems.RSS-210Environmental: EN 60068 (IEC 68)*See “FCC Statement” on page 119 for conditions of operation.System Requirements Operating SystemsThe Router will support the following Operating Systems:■Windows 95/98■Windows NT 4.0■Windows ME■Windows 2000■Windows XP■Mac OS 8.5 or higher■UnixEthernet Performance The Router complies to the IEEE 802.3i, u and x specifications.Wireless Performance The Router has been designed to conform to the Wi-Fi interoperability test standard.Cable Specifications The Router supports the following cable types and maximum lengths:■Category 3 (Ethernet) or Category 5 (Fast Ethernet or Dual Speed Ethernet) Twisted Pair — shielded and unshielded cable types.■Maximum cable length of 100m (327.86 ft).
100 APPENDIX C: TECHNICAL SPECIFICATIONS
DSAFETY INFORMATIONImportant Safety InformationWARNING: Warnings contain directions that you must follow for your personal safety. Follow all directions carefully.You must read the following safety information carefully before you install or remove the unit:WARNING: The Router generates and uses radio frequency (rf) energy. In some environments, the use of rf energy is not permitted. The user should seek local advice on whether or not rf energy is permitted within the area of intended use.WARNING: Exceptional care must be taken during installation and removal of the unit.WARNING: Only stack the Router with other OfficeConnect units.WARNING: To ensure compliance with international safety standards, only use the power adapter that is supplied with the unit.WARNING: The socket outlet must be near to the unit and easily accessible. You can only remove power from the unit by disconnecting the power cord from the outlet. WARNING: This unit operates under SELV (Safety Extra Low Voltage) conditions according to IEC 60950. The conditions are only maintained if the equipment to which it is connected also operates under SELV conditions.WARNING: There are no user-replaceable fuses or user-serviceable parts inside the Router. If you have a physical problem with the unit that cannot be solved with problem solving actions in this guide, contact your supplier.
102 APPENDIX D: SAFETY INFORMATIONWARNING: Disconnect the power adapter before moving the unit.WARNING: RJ-45 ports. These are shielded RJ-45 data sockets. They cannot be used as telephone sockets. Only connect RJ-45 data connectors to these sockets.Wichtige SicherheitshinweiseVORSICHT: Warnhinweise enthalten Anweisungen, die Sie zu Ihrer eigenen Sicherheit befolgen müssen. Alle Anweisungen sind sorgfältig zu befolgen. Sie müssen die folgenden Sicherheitsinformationen sorgfältig durchlesen, bevor Sie das Geräts installieren oder ausbauen:VORSICHT: Der Router erzeugt und verwendet Funkfrequenz (RF). In manchen Umgebungen ist die Verwendung von Funkfrequenz nicht gestattet. Erkundigen Sie sich bei den zuständigen Stellen, ob die Verwendung von Funkfrequenz in dem Bereich, in dem der Bluetooth Access Point eingesetzt werden soll, erlaubt ist.VORSICHT: Bei der Installation und beim Ausbau des Geräts ist mit höchster Vorsicht vorzugehen.VORTSICHT: Stapeln Sie das Geräts nur mit anderen OfficeConnect Gerätes zusammen.VORSICHT: Aufgrund von internationalen Sicherheitsnormen darf das Gerät nur mit dem mitgelieferten Netzadapter verwendet werden.VORSICHT: Die Netzsteckdose muß in der Nähe des Geräts und leicht zugänglich sein. Die Stromversorgung des Geräts kann nur durch Herausziehen des Gerätenetzkabels aus der Netzsteckdose unterbrochen werden.VORSICHT: Der Betrieb dieses Geräts erfolgt unter den SELV-Bedingungen (Sicherheitskleinstspannung) gemäß IEC 60950. Diese Bedingungen sind nur gegeben, wenn auch die an das Gerät angeschlossenen Geräte unter SELV-Bedingungen betrieben werden.
103VORSICHT: Es sind keine von dem Benutzer zu ersetzende oder zu wartende Teile in dem Gerät vorhanden. Wenn Sie ein Problem mit dem Router haben, das nicht mittels der Fehleranalyse in dieser Anleitung behoben werden kann, setzen Sie sich mit Ihrem Lieferanten in Verbindung.VORSICHT: Vor dem Ausbau des Geräts das Netzadapterkabel herausziehen.VORSICHT: RJ-45-Anschlüsse. Dies sind abgeschirmte RJ-45-Datenbuchsen. Sie können nicht als Telefonanschlußbuchsen verwendet werden. An diesen Buchsen dürfen nur RJ-45-Datenstecker angeschlossen werden.Consignes importantes de sécurité AVERTISSEMENT: Les avertissements présentent des consignes que vous devez respecter pour garantir votre sécurité personnelle. Vous devez respecter attentivement toutes les consignes.Nous vous demandons de lire attentivement les consignes suivantes de sécurité avant d’installer ou de retirer l’appareil:AVERTISSEMENT: La Router fournit et utilise de l'énergie radioélectrique (radio fréquence -rf). L'utilisation de l'énergie radioélectrique est interdite dans certains environnements. L'utilisateur devra se renseigner sur l'autorisation de cette énergie dans la zone prévue.AVERTISSEMENT: Faites très attention lors de l'installation et de la dépose du groupe.AVERTISSEMENT: Seulement entasser le moyer avec les autres moyeux OfficeConnects.AVERTISSEMENT: Pour garantir le respect des normes internationales de sécurité, utilisez uniquement l'adaptateur électrique remis avec cet appareil.AVERTISSEMENT: La prise secteur doit se trouver à proximité de l’appareil et son accès doit être facile. Vous ne pouvez mettre l’appareil hors circuit qu'en débranchant son cordon électrique au niveau de cette prise.
104 APPENDIX D: SAFETY INFORMATIONAVERTISSEMENT: L’appareil fonctionne à une tension extrêmement basse de sécurité qui est conforme à la norme CEI 60950. Ces conditions ne sont maintenues que si l'équipement auquel il est raccordé fonctionne dans les mêmes conditions.AVERTISSEMENT: Il n’y a pas de parties remplaceables par les utilisateurs ou entretenues par les utilisateurs à l’intérieur du moyeu. Si vous avez un problème physique avec le moyeu qui ne peut pas être résolu avec les actions de la résolution des problèmes dans ce guide, contacter votre fournisseur.AVERTISSEMENT: Débranchez l'adaptateur électrique avant de retirer cet appareil.AVERTISSEMENT: Ports RJ-45. Il s'agit de prises femelles blindées de données RJ-45. Vous ne pouvez pas les utiliser comme prise de téléphone. Branchez uniquement des connecteurs de données RJ-45 sur ces prises femelles.
EEND USER SOFTWARE LICENSE AGREEMENT3Com CorporationEND USER SOFTWARE LICENSE AGREEMENTYOU SHOULD CAREFULLY READ THE FOLLOWING TERMS AND CONDITIONS BEFORE DOWNLOADING, INSTALLING AND USING THIS PRODUCT, THE USE OF WHICH IS LICENSED BY 3COM CORPORATION ("3COM") TO ITS CUSTOMERS FOR THEIR USE ONLY AS SET FORTH BELOW. DOWNLOADING, INSTALLING OR OTHERWISE USING ANY PART OF THE SOFTWARE OR DOCUMENTATION INDICATES THAT YOU ACCEPT THESE TERMS AND CONDITIONS. IF YOU DO NOT AGREE TO THE TERMS AND CONDITIONS OF THIS AGREEMENT, DO NOT DOWNLOAD, INSTALL OR OTHERWISE USE THE SOFTWARE OR DOCUMENTATION, DO NOT CLICK ON THE "I AGREE" OR SIMILAR BUTTON. AND IF YOU HAVE RECEIVED THE SOFTWARE AND DOCUMENTATION ON PHYSICAL MEDIA, RETURN THE ENTIRE PRODUCT WITH THE SOFTWARE AND DOCUMENTATION UNUSED TO THE SUPPLIER WHERE YOU OBTAINED IT.LICENSE: 3Com grants you a nonexclusive, nontransferable (except as specified herein) license to use the accompanying software program(s) in executable form (the "Software") and accompanying documentation (the "Documentation"), subject to the terms and restrictions set forth in this Agreement. You are not permitted to lease, rent, distribute or sublicense (except as specified herein) the Software or Documentation or to use the Software or Documentation in a time-sharing arrangement or in any other unauthorized manner. Further, no license is granted to you in the human readable code of the Software (source code). Except as provided below, this Agreement does not grant you any rights to patents, copyrights, trade secrets, trademarks, or any other rights with respect to the Software or Documentation.Subject to the restrictions set forth herein, the Software is licensed to be used on any workstation or any network server owned by or leased to you, for your internal use, provided that the Software is used only in connection with this 3Com product. You may reproduce and provide one (1) copy of the Software and Documentation for each such workstation or network server on which the Software is used as permitted hereunder. Otherwise, the Software and Documentation may be copied only as essential for backup or archive purposes in support of your use of the Software as permitted hereunder. Each copy of the Software and Documentation must contain 3Com's and its licensors' proprietary rights and copyright notices in the same form as on the original. You agree not to remove or deface any portion of any legend provided on any licensed program or documentation delivered to you under this Agreement.ASSIGNMENT; NO REVERSE ENGINEERING: You may transfer the Software, Documentation and the licenses granted herein to another party in the same country in which you obtained the Software and Documentation if the other party agrees in writing to accept and be bound by the terms and conditions of this Agreement. If you transfer the Software and Documentation, you must at the same time either transfer all copies of the Software and Documentation to the party or you must destroy any copies not transferred. Except as set forth above, you may not assign or transfer your rights under this Agreement.Modification, reverse engineering, reverse compiling, or disassembly of the Software is expressly prohibited. However, if you are a European Union ("EU") resident, information necessary to achieve interoperability of the Software with other programs within the meaning of the EU Directive on the Legal Protection of Computer Programs is available to you from 3Com upon written request.EXPORT RESTRICTIONS: The Software, including the Documentation and all related technical data (and any copies thereof) (collectively "Technical Data"), is subject to United States Export control laws and may be subject to export or import regulations in other countries. In addition, the Technical Data covered by this Agreement may contain data encryption code which is unlawful to export or transfer from the United States or country where you legally obtained it without an approved U.S. Department of Commerce export license and appropriate foreign export or import license, as required. You agree that you will not export or re-export the Technical Data (or any copies thereof) or any products utilizing the Technical Data in violation of any applicable laws or regulations of the United States or the country where you legally obtained it. You are responsible for obtaining any licenses to export, re-export or import the Technical Data. In addition to the above, the Product may not be used, exported or re-exported (i) into or to a national or resident of any country to which the U.S. has embargoed; or (ii) to any one on the U.S. Commerce Department's Table of Denial Orders or the U.S. Treasury Department's list of Specially Designated Nationals.TRADE SECRETS; TITLE: You acknowledge and agree that the structure, sequence and organization of the Software are the valuable trade secrets of 3Com and its suppliers. You agree to hold such trade secrets in confidence. You further acknowledge and agree that ownership of, and title to, the Software and Documentation and all subsequent copies thereof regardless of the form or media are held by 3Com and its suppliers.UNITED STATES GOVERNMENT LEGENDS: The Software, Documentation and any other technical data provided hereunder is commercial in nature
106 APPENDIX E: END USER SOFTWARE LICENSE AGREEMENTand developed solely at private expense. The Software is delivered as "Commercial Computer Software" as defined in DFARS 252.227-7014 (June 1995) or as a commercial item as defined in FAR 2.101(a) and as such is provided with only such rights as are provided in this Agreement, which is 3Com's standard commercial license for the Software. Technical data is provided with limited rights only as provided in DFAR 252.227-7015 (Nov. 1995) or FAR 52.227-14 (June 1987), whichever is applicable.TERM AND TERMINATION: The licenses granted hereunder are perpetual unless terminated earlier as specified below. You may terminate the licenses and this Agreement at any time by destroying the Software and Documentation together with all copies and merged portions in any form. The licenses and this Agreement will also terminate immediately if you fail to comply with any term or condition of this Agreement. Upon such termination you agree to destroy the Software and Documentation, together with all copies and merged portions in any form.LIMITED WARRANTIES AND LIMITATION OF LIABILITY: All warranties and limitations of liability applicable to the Software are as stated on the Limited Warranty Card or in the product manual, whether in paper or electronic form, accompanying the Software.   Such warranties and limitations of liability are incorporated herein in their entirety by this reference. GOVERNING LAW:   This Agreement shall be governed by the laws of the State of California, U.S.A. excluding its conflicts of laws principles and excluding the United Nations Convention on Contracts for the International Sale of Goods.SEVERABILITY: In the event any provision of this Agreement is found to be invalid, illegal or unenforceable, the validity, legality and enforceability of any of the remaining provisions shall not in any way be affected or impaired and a valid, legal and enforceable provision of similar intent and economic impact shall be substituted therefor.ENTIRE AGREEMENT: This Agreement sets forth the entire understanding and agreement between you and 3Com and supersedes all prior agreements, whether written or oral, with respect to the Software and Documentation, and may be amended only in a writing signed by both parties.Should you have any questions concerning this Agreement or if you desire to contact 3Com for any reason, please contact the 3Com subsidiary serving your country, or write: 3Com Corporation, 5500 Great America Parkway, P.O. Box 58145, Santa Clara, CA 95052-8145 (408) 326-5000
FISP INFORMATIONInformation Regarding Popular ISPs WAN Types Characteristics Popular ISPsDynamic IP(Clone MAC)Cable modem ISP, non-hostname based. Need to clone the MAC address in the Advanced tab of the Internet Settings page.MediaOne, RoadRunner, Optimum Online, Time Warner, Charter, Adelphia, Metrocast.Dynamic IP(Hostname)Cable ISP, Requires Hostname to authenticate ie. cx213818-B. Need to enter the hostname in the Internet Settings page.@Home Network, Cogoco, ComCast, Cox, Excite, Rogers, Shaw, Insight, VideotronPPPoE(DSL)Usually special software installed on PC, MacPOET/WinPOET, EnterNet 300. The Router has this software built in and you can remove it from your PC. You will need to enter the user name and password that your ISP provided to you in the PPPoE page of the Router. Leave the service name blank unless your ISP requires it.Bell*, Century Tel, Citizens, Primus, Prodigy, Snet, Sprint FC, Verizon, First World, Brightnet, Earthlink, Ameritech, Covad, Mindspring, Sympatico DSL, USwest, Owest, SNetPPTP Cable or DSL, always on. Some European ISPs require a PPTP tunnel to authenticate their network.KPN (Netherlands), Austria Telecom
108 APPENDIX F: ISP INFORMATION*Bell includes Bell Advantage, Bell Canada, Bell South, PacBell and Southwestern Bell.Static(DSL)DSL Modem, always on. Need to enter ALL IP information from ISP in the Static IP address section of the Internet Settings page.CableSpeed, Cnet, Direct Link, Drizzle, DSL Extreme, Earthlink Wireless, Fast Point, Flashcom, GTE-WhirlWind, Heavenet, HSA Corp, I-55, InterAccess, LinkLine, Mission, Nauticom, NAS, Omitel, Onterra, Phatpipe, Rhythms, Speakeasy, Sterling, XO, ZyanStatic(Cable)Cable Modem, Always on, ISP assigns specific IP information which needs to be entered on the “Fixed IP” page of the Router.Cox Cable, Sprint, US Cable, Cable-Cable
GLOSSARY802.11b The IEEE specification for wireless Ethernet which allows speeds of up to 11 Mbps. The standard provides for 1, 2, 5.5 and 11 Mbps data rates. The rates will switch automatically depending on range and environment.802.11g The IEEE specification for wireless Ethernet which allows speeds of up to 54 Mbps. The standard provides for 6, 12, 24, 36, 48 and 54 Mbps data rates. The rates will switch automatically depending on range and environment.10BASE-T The IEEE specification for 10 Mbps Ethernet over Category 3, 4 or 5 twisted pair cable.100BASE-TX The IEEE specification for 100 Mbps Fast Ethernet over Category 5 twisted-pair cable. Access Point An Access Point is a device through which wireless clients connect to other wireless clients and which acts as a bridge between wireless clients and a wired network, such as Ethernet. Wireless clients can be moved anywhere within the coverage area of the access point and still connect with each other. If connected to an Ethernet network, the access point monitors Ethernet traffic and forwards appropriate Ethernet messages to the wireless network, while also monitoring wireless client radio traffic and forwarding wireless client messages to the Ethernet LAN.Ad Hoc mode Ad Hoc mode is a configuration supported by most wireless clients. It is used to connect a peer to peer network together without the use of an access point. It offers lower performance than infrastructure mode, which is the mode the Router uses. (see also Infrastructure mode.)Auto-negotiation Some devices in the OfficeConnect range support auto-negotiation. Auto-negotiation is where two devices sharing a link, automatically
110 GLOSSARYconfigure to use the best common speed. The order of preference (best first) is: 100BASE-TX full duplex, 100BASE-TX half duplex, 10BASE-T full duplex, and 10BASE-T half duplex. Auto-negotiation is defined in the IEEE 802.3 standard for Ethernet and is an operation that takes place in a few milliseconds.Bandwidth The information capacity, measured in bits per second, that a channel can transmit. The bandwidth of Ethernet is 10 Mbps, the bandwidth of Fast Ethernet is 100 Mbps. The bandwidth for 802.11b wireless is 11Mbps.Category 3 Cables One of five grades of Twisted Pair (TP) cabling defined by the EIA/TIA-586 standard. Category 3 is voice grade cable and can only be used in Ethernet networks (10BASE-T) to transmit data at speeds of up to 10 Mbps. Category 5 Cables One of five grades of Twisted Pair (TP) cabling defined by the EIA/TIA-586 standard. Category 5 can be used in Ethernet (10BASE-T) and Fast Ethernet networks (100BASE-TX) and can transmit data up to speeds of 100 Mbps. Category 5 cabling is better to use for network cabling than Category 3, because it supports both Ethernet (10 Mbps) and Fast Ethernet (100 Mbps) speeds.Channel Similar to any radio device, the OfficeConnect Cable/DSL Router allows you to choose different radio channels in the wireless spectrum. A channel is a particular frequency within the 2.4GHz spectrum within which the Router operates.Client The term used to described the desktop PC that is connected to your network. DHCP Dynamic Host Configuration Protocol. This protocol automatically assigns an IP address for every computer on your network. Windows 95, Windows 98 and Windows NT 4.0 contain software that assigns IP addresses to workstations on a network. These assignments are made by the DHCP server software that runs on Windows NT Server, and Windows 95 and Windows 98 will call the server to obtain the address. Windows 98 will allocate itself an address if no DHCP server can be found.DNS Server Address DNS stands for Domain Name System, which allows Internet host computers to have a domain name (such as 3com.com) and one or more
GLOSSARY 111IP addresses (such as 192.34.45.8). A DNS server keeps a database of host computers and their respective domain names and IP addresses, so that when a domain name is requested (as in typing “3com.com” into your Internet browser), the user is sent to the proper IP address. The DNS server address used by the computers on your home network is the location of the DNS server your ISP has assigned.DSL modem DSL stands for digital subscriber line. A DSL modem uses your existing phone lines to send and receive data at high speeds.Encryption A method for providing a level of security to wireless data transmissions. The OfficeConnect Cable/DSL Router and Cable/DSL Router uses two levels of encryption; 40/64 bit and 128 bit. 128 bit is a more powerful level of encryption than 40/64 bit.ESSID Extended Service Set Identifier. The ESSID is a unique identifier for your wireless network. You must have the same ESSID entered into the Router and each of it's wireless clients.Ethernet A LAN specification developed jointly by Xerox, Intel and Digital Equipment Corporation. Ethernet networks use CSMA/CD to transmit packets at a rate of 10 Mbps over a variety of cables.Ethernet Address See MAC address.Fast Ethernet An Ethernet system that is designed to operate at 100 Mbps.Firewall Electronic protection that prevents anyone outside of your network from seeing your files or damaging your computers.Full Duplex A system that allows packets to be transmitted and received at the same time and, in effect, doubles the potential throughput of a link.Router A device that acts as a central hub by connecting to each computer's network interface card and managing the data traffic between the local network and the Internet.Half Duplex A system that allows packets to transmitted and received, but not at the same time. Contrast with full duplex.
112 GLOSSARYHub A device that regenerates LAN traffic so that the transmission distance of that signal can be extended. Hubs are similar to repeaters, in that they connect LANs of the same type; however they connect more LANs than a repeater and are generally more sophisticated.IEEE Institute of Electrical and Electronics Engineers. This American organization was founded in 1963 and sets standards for computers and communications.IETF Internet Engineering Task Force. An organization responsible for providing engineering solutions for TCP/IP networks. In the network management area, this group is responsible for the development of the SNMP protocol.Infrastructure mode Infrastructure mode is the wireless configuration supported by the Router. You will need to ensure all of your clients are set up to use infrastructure mode in order for them to communicate with the Access Point built into your Router. (see also Ad Hoc mode)IP Internet Protocol. IP is a layer 3 network protocol that is the standard for sending data through a network. IP is part of the TCP/IP set of protocols that describe the routing of packets to addressed devices. An IP address consists of 32 bits divided into two or three fields: a network number and a host number or a network number, a subnet number, and a host number.IP Address Internet Protocol Address. A unique identifier for a device attached to a network using TCP/IP. The address is written as four octets separated with periods (full-stops), and is made up of a network section, an optional subnet section and a host section.ISP Internet Service Provider. An ISP is a business that provides connectivity to the Internet for individuals and other businesses or organizations.LAN Local Area Network. A network of end stations (such as PCs, printers, servers) and network devices (hubs and switches) that cover a relatively small geographic area (usually not larger than a floor or building). LANs are characterized by high transmission speeds over short distances (up to 1000 metres).
GLOSSARY 113MAC Media Access Control. A protocol specified by the IEEE for determining which devices have access to a network at any one time.MAC Address Media Access Control Address. Also called the hardware or physical address. A layer 2 address associated with a particular network device. Most devices that connect to a LAN have a MAC address assigned to them as they are used to identify other devices in a network. MAC addresses are 6 bytes long. NAT Network Address Translation. NAT enables all the computers on your network to share one IP address. The NAT capability of the Router allows you to access the Internet from any computer on your home network without having to purchase more IP addresses from your ISP.Network A Network is a collection of computers and other computer equipment that are connected for the purpose of exchanging information or sharing resources. Networks vary in size, some are within a single room, others span continents.Network InterfaceCard (NIC)A circuit board installed into a piece of computing equipment, for example, a computer, that enables you to connect it to the network. A NIC is also known as an adapter or adapter card.Protocol A set of rules for communication between devices on a network. The rules dictate format, timing, sequencing and error control.PPPoE Point-to-Point Protocol over Ethernet. Point-to-Point Protocol is a method of data transmission originally created for dial-up connections; PPPoE is for Ethernet connections.PPTP Point-to-Point Tunneling Protocol is a method of secure data transmission between two remote sites over the internet.RJ-45 A standard connector used to connect Ethernet networks. The “RJ” stands for “registered jack”.Server A computer in a network that is shared by multiple end stations. Servers provide end stations with access to shared network services such as computer files and printer queues.
114 GLOSSARYSSID Service Set Identifier. Some vendors of wireless products use SSID interchangeably with ESSID.Subnet Address An extension of the IP addressing scheme that allows a site to use a single IP network address for multiple physical networks. Subnet mask A subnet mask, which may be a part of the TCP/IP information provided by your ISP, is a set of four numbers configured like an IP address. It is used to create IP address numbers used only within a particular network (as opposed to valid IP address numbers recognized by the Internet, which must assigned by InterNIC).Subnets A network that is a component of a larger network. Switch A device that interconnects several LANs to form a single logical LAN that comprises of several LAN segments. Switches are similar to bridges, in that they connect LANs of a different type; however they connect more LANs than a bridge and are generally more sophisticated.TCP/IP Transmission Control Protocol/Internet Protocol. This is the name for two of the most well-known protocols developed for the interconnection of networks. Originally a UNIX standard, TCP/IP is now supported on almost all platforms, and is the protocol of the Internet.TCP relates to the content of the data travelling through a network — ensuring that the information sent arrives in one piece when it reaches its destination. IP relates to the address of the end station to which data is being sent, as well as the address of the destination network. Traffic The movement of data packets on a network. universal plug andplayUniversal plug and play is a system which allows compatible applications to read some of their settings from the Router. This allows them to automatically configure some, or all, of their settings and need less user configuration.URL Filter A URL Filter is a feature of a firewall that allows it to stop its clients form browsing inappropriate Web sites.
GLOSSARY 115WAN Wide Area Network. A network that connects computers located in geographically separate areas (for example, different buildings, cities, or countries). The Internet is an example of a wide area network. WECA Wireless Ethernet Compatibility Alliance. An industry group formed to certify cross vendor interoperability and compatibility of 802.11b and 802.11g wireless networking products and to promote the standard for enterprise, small business and home environments. (see also 802.11b, 802.11g, Wi-Fi)WEP Wired Equivalent Privacy. A shared key encryption mechanism for wireless networking. Encryption strength is 40/64 bit or 128 bit.Wi-Fi Wireless Fidelity. This is the certification granted by WECA to products that meet their interoperability criteria. (see also 802.11b, WECA)Wireless Client The term used to describe a desktop or mobile PC that is wirelessly connected to your wireless networkWireless LAN ServiceAreaAnother term for ESSID (Extended Service Set Identifier)Wizard A Windows application that automates a procedure such as installation or configuration.WLAN Wireless Local Area Network. A WLAN is a group of computers and devices connected together by wireless in a relatively small area (such as a house or office).WPA Wi-Fi Protected Access. A dynamically changing encryption mechanism for wireless networking. Encryption strength is 256 bit.
116 GLOSSARY
INDEXAAccess Rights 69AddressesIP 93Administration Password 32, 43Automatic Addressing 95CCable Specifications 99Channels 119Clone MAC address 60Configurationbackup 77restore 77Conventionsnotice icons, About This Guide 8text, About This Guide 8Country Selection 30DDHCP 35, 38, 45, 95DHCP Server 27Discovery Application 91DMZ 63DNS 26, 36, 37, 60, 61, 63primary 36, 37, 59secondary 36, 37, 59Dynamic 57Dynamic IP Address 35, 57, 63FFirewall 63Forgotten Password 85IInternetaddresses 93Internet Addressing Mode 33Internet Settings 57dynamic IP address 57PPPoE 57PPTP 57static IP address 57IP Address 21, 36, 38, 45, 93IP Allocation 58ISP Connection 58ISP Gateway Address 36LLAN 38, 44LED 14Login 92Logs 80MMAC Address 35, 46deleting 54modifying 54NNetworkaddresses 93Networkingwireless 85NICwireless 14PPassword 29, 43PC Privileges 67PING 73PPPoE 21, 28, 34, 57, 61PPTP 21, 57, 62Profile 55RRemote Administration 74Reset to Factory Defaults 77, 85
118 INDEXRestart 75SSafety Information 19Security 73Setup Wizard 29, 44Special Applications 65Specificationstechnical 97Static Addressing 95Static IP Address 57, 59Status 78Subnet Mask 36, 38, 93Summary 40Support Information 80Support Links 81TTCP/IP 25, 27, 38, 93Technicalspecifications 97standards 97Time Zone 32, 76UUnit Configuration 44Upgrade 78URL Filter 69VVirtual Servers 63, 64WWAN 33Web Proxy 28Wirelessauthorized PCs 53channel selection 47client list 55configuration 47connection control 53encryption 49LED 15networking 85NIC 14service area name 48settings 39, 47
REGULATORY NOTICES FOR THE 11G CABLE/DSL ROUTERChannels Use of the Cable/DSL Router is only authorized for the channels approved by each country. For proper installation, login to the management interface and select your country from the drop down list. Ta ble 5  below details the channels permitted by the local regulatory agencies:Table 5   Channels* The channels available for use in France depend on the region in which you are located.FCC Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules, and the Canadian Department of Communications Equipment Standards entitled, “Digital Apparatus,” ICES-003. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the Channels Country1 - 13 Australia, Austria, Bahrain, Belarus, Belgium, Chile, China, Costa Rica, Croatia, Cyprus, Czech Republic, Denmark, Finland, France*, Germany, Greece, Hong Kong, Hungary, Iceland, India, Indonesia, Ireland, Italy, Liechtenstein, Lithuania, Luxembourg, Malaysia, Netherlands, New Zealand, Norway, Paraguay, Peru, Philippines, Poland, Portugal, Russia, Saudi Arabia, Singapore, Slovenia, South Africa, South Korea, Spain, Sweden, Switzerland, Thailand, Turkey, United Kingdom, Uruguay, Venezuela.1 - 11 Argentina, Brazil, Canada, Columbia, Mexico, Taiwan, United States10 - 13 France*, Jordan5 - 7 Israel1-14 Japan
120instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. Information to the UserIf this equipment does cause interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:■Reorient the receiving antenna.■Relocate the equipment with respect to the receiver.■Move the equipment away from the receiver.■Plug the equipment into a different outlet so that equipment and receiver are on different branch circuits.■Consult the dealer or an experienced radio/television technician for help.The user may find the following booklet prepared by the Federal Communications Commission helpful:How to Identify and Resolve Radio-TV Interference ProblemsThis booklet is available from the U.S. Government Printing Office, Washington, DC 20402, Stock No. 004-000-00345-4. In order to meet FCC emissions limits, this equipment must be used only with cables which comply with IEEE 802.3.FCC Declaration of ConformityWe declare under our sole responsibility that theModel:Description:3CRWE554G72 11g Cable/DSL Routerto which this declaration relates, is in conformity with the following standards or other normative documents:■ANSI C63.4-1992 Methods of Measurement■Federal Communications Commission 47 CFR Part 15, subpart B15.107 (a)Class B Conducted Limits15.109 (a)Class B Radiated Emissions Limits
121■15.107 (e)Class B Conducted Limits15.109 (g)Class B Radiated Emissions LimitsExposure to Radio Frequency Radiation: The radiated output power of the 3Com OfficeConnect Cable/DSL Router is far below the FCC radio frequency exposure limits. Nevertheless, the 3Com OfficeConnect Cable/DSL Router shall be used in such manner that the potential for human contact during normal operation is minimized. The distance between the antennas and the user should not be less than 20 cm.CE Statement (Europe)This product complies with the European Low Voltage Directive 73/23/EEC, EMC Directive 89/336/EEC as amended by European Directive 93/68/EEC and the Radio and Telecommunications Terminal Equipment Directive 99/5/EC.CSA Statement This Class B digital apparatus meets all requirements of the Canadian Interference-Causing Equipment Regulations.Cet appareil numérique de la classe B respecte toutes les exigences du Règlement sur le matériel brouilleur du Canada.BSMI StatementFCC CAUTION: To assure continued compliance, any changes or modifications not expressly approved by the party responsible for compliance could void the user’s authority to operate this equipment.RF Exposure Compliance Statement (U.S.)CAUTION: The 3Com OfficeConnect Cable/DSL Router has been certified as a mobile computing device as per FCC Section 2.1091. In order to comply with the FCC RF exposure requirements, the 3Com OfficeConnect
122Cable/DSL Router must only be installed with approved antennas and a minimum separation distance of 20 cm (8 in) must be maintained from the antenna to any nearby persons.Potential RF Interference (Canada)CAUTION: To prevent radio interference to the licensed service, this device is intended to be operated indoors and away from windows to provide maximum shielding. Equipment (or it's transmit antenna) that is installed outdoors is subject to licensing.
Federal Communication Commission Interference StatementThis equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules.  These limits are designed to provide reasonable protection against harmful interference in a residential installation.  This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.  However, there is no guarantee that interference will not occur in a particular installation.  If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:-Reorient or relocate the receiving antenna.-Increase the separation between the equipment and receiver.-Connect the equipment into an outlet on a circuit different from thatto which the receiver is connected.-Consult the dealer or an experienced radio/TV technician for help.This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment.IMPORTANT NOTE:FCC Radiation Exposure Statement:This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body.This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.3Com declared that 3CRWE554G72T is limited in CH1~11 by specified firmware controlled in USA.
3Com Corporation, Corporate Headquarters,5500 Great America Parkway, Santa Clara,CA  95052-8145, USA.To learn more about 3Com products and services, visit our World Wide Web site at www.3com.comAll specifications are subject to change without notice.Copyright © 2003 3Com Corporation. All rights reserved. 3Com and OfficeConnect are registered trademarks of 3Com Corporation. All other company and product names may be trademarks of their respective companies. DUA0554-TAAA01Rev. 01

Navigation menu