Billion Electric BIL-8200NX (3G) 802.11n VDSL (VPN) Firewall Router User Manual Users manual 03

Billion Electric Co., Ltd. (3G) 802.11n VDSL (VPN) Firewall Router Users manual 03

Contents

Users manual-03

QoS - Quality of ServiceQoS  helps  you  to  control  the  data  upload  trafc  of  each  application  from  LAN  (Ethernet  and/ or  Wireless)  to  WAN  (Internet).  It  facilitates  you  the  features  to  control  the  quality  and  speed  of throughput for each application when the system is running with full upstream load.After clicking the QoS item, you can Add/Edit/Delete a QoS policy. This page will show the brief information for policies you have added or edited. This page will also display the total available (Non-assigned) bandwidth, in percentage, can be assigned.Application: Assign a name that identies the new QoS application rule.Direction: The trafc ow direction to be controlled by the QoS policy. There are two settings to be provided in the Router:LAN to WAN: Control the trafc ow from the local network to the outside world. For example, when you have a FTP server inside the local network and want to have a limited trafc rate controlled by the QoS policy, you need to add a policy with LAN to WAN direction setting. WAN to LAN: Control Trafc ow from the WAN to LAN. (The connection maybe either issued from LAN to WAN or WAN to LAN.)Protocol: Select the supported protocol from the drop down list. For GRE protocol, there is no need to specify the IP addresses or Application ports in this page. For other protocols, at least one value shall be given.Any: No protocol type is specied.TCP UDPICMPGRE: For PPTP VPN Connections.98
99DSCP Marking: Differentiated Services Code Point (DSCP), it is the rst 6 bits in the ToS byte. DSCP Marking allows users to classify the trafc of the application to be executed according to  the DSCP value.  See DSCP Mapping Table.Note: Make sure that the router(s) in the network backbone are capable to execute and check the DSCP throughout the QoS network.  DSCP Mapping TableDSCP Mapping Table(Wireless) VDSL Router Standard DSCPDisabled NoneBest Effort Best Effort (000000)Premium Express Forwarding (101110)Gold service (L) Class 1, Gold (001010)Gold service (M) Class 1, Silver (001100)Gold service (H) Class 1, Bronze (001110)Silver service (L) Class 2, Gold (010010)Silver service (M) Class 2, Silver (010100)Silver service (H) Class 2, Bronze (010110)Bronze service (L) Class 3, Gold (011010)Bronze service (M) Class 3, Silver (011100)Bronze service (H) Class 3, Bronze (011110)Rate Type: Two types are provided: Limited (Maximum): Specify a limited data rate for this policy. It is the maximal rate for this policy. As above FTP server example shows, if you want to “throttle” the outgoing FTP speed to 20% of 100M and limit to it, please choose this type.Guaranteed (Minimum): Specify a minimal data rate for this policy. For example, if you want to provide a guaranteed data rate for your outside customers to access your internal FTP server with, say at least, 20% of your total bandwidthm, please choose this type. Then, if the available bandwidth is not used, it will be given to this policy by following priority assignment.Ratio: Assign the data ratio for this policy to be controlled.  For examples, when we want to allow only 20% of the total data transfer rate for the LAN-to-WAN direction to be used for FTP server, we can specify here with data ratio = 20. If you have VDSL LINE with 100M/bps.rate, the estimated data rate, in kbps, for this rule is 20%*100*0.9 = 20Mbps. (For 0.9 is an estimated factor for the effective data transfer rate for a VDSL LINE from LAN to WAN. For WAN-to-LAN, it is 0.85 to 0.8).Priority: The priority given to each policy/application. You may adjust this setting to t your policy / application. For examples, you are allowed to specify two different QoS policies for different applications. Both applications need minimal or higher bandwidth, besides the assigned one, if there is any available/non-used one available, you can specify which application can have higher priority by acquiring the non-used bandwidth.HighNormal: The default is set to normal.LowFor the sample priority assignment for different policies, it is served in a First-In-First-Out  way.
Internal IP Address: The IP address values for Local LAN machines you want to control. (For IP packets from LAN to WAN, it is the source IP address. For IP packages from WAN to LAN, it is the destination IP address.)Internal Port: The Application port values for local LAN machines you want to control. (For TCP/UDP packets from LAN to WAN, it is the source port value. For TCP/UDP packets from WAN to LAN, it is the destination port value.)External IP Address: The IP address values for Remote WAN machines you want to control. (For IP packets from LAN to WAN, it is the destination IP address. For IP packages from WAN to LAN, it is the source IP address.)External Ports: The Application port values for remote machines you want to control. (For TCP/UDP packets from LAN to WAN, it is the destination port value. For TCP/UDP packets from WAN to LAN, it is the source port value.)  Time Schedule: Scheduling your prioritization policy. Remember clicking Add to save your settings.100
Example: QoS for your NetworkConnection DiagramApplication IP / Ports Control Flow Data Rate Time ScheduleVoIP user 192.168.0.1 Outgoing Minimal 20% with high priority for non-used bandwidth with DSCP marking Class 1 Gold Service.AlwaysFTP Server 192.168.0.100 Incoming & OutgoingOutgoing :minimal 30% data rate.Incoming :minimal 30% data rate.Both with low priority for non-used bandwidth.Only during working hours 9:00 to 17:00 Monday to FridayHTTP Web user 80 Incoming & OutgoingOutgoing : limited 20% data rate.Incoming : limited 30% data rate.Always101 Restricted PC Normal PCs VoIP
102Example: QoS SetupVoIP applicationVoice is latency-sensitive application. Most VoIP devices are used SIP protocol and the port number will be assigned by SIP module automatically. Better to use xed IP address for catching VoIP packets as high priority.
103Virtual ServerVirtual Server allows you to direct incoming trafc from WAN side (identied by Protocol and External port) to the Internal server with private IP address on the LAN side. The Internal port is required only if the external port needs to be converted to a different port number used by the server on the LAN side.The device can be congured as a virtual server so that remote users accessing services such as Web or FTP services via the public (WAN) IP address can be automatically redirected to local servers in the LAN network. Depending on the requested service (TCP/UDP port number), the device redirects the external service request to the appropriate server within the LAN network.In TCP and UDP networks a port is a 16-bit number used to identify which application program (usually a server) incoming connections should be delivered to. Some ports have numbers that are pre-assigned to them by the IANA (the Internet Assigned Numbers Authority), and these are referred to as “well-known ports”. Servers follow the well-known port assignments so clients can locate them.If you wish to run a server on your network that can be accessed from the WAN (i.e. from other machines on the Internet that are outside your local network), or any application that can accept incoming connections (e.g. Peer-to-peer/P2P software such as instant messaging applications and P2P le-sharing applications) and are using NAT (Network Address Translation), then you need to congure your router to forward these incoming connection attempts using specic ports to the PC on your network running the application. You also need to use port forwarding if you wish to host an online game server.
Example: List of some well-known and registered port numbers. The Internet Assigned Numbers Authority (IANA) is the central coordinator for the assignment of unique parameter values for Internet protocols. Port numbers range from 0 to 65535, but only ports numbers 0 to 1023 are reserved for privileged services and are designated as “well-known ports” (Please refer to Table below).   The registered ports are numbered from 1024 through 49151. The remaining ports, referred to as dynamic or private ports, are numbered from 49152 through 65535.Examples of well-known and registered port numbers are shown below, for further information, please see IANA’s website at: http://www.iana.org/assignments/port-numbers.For help on determining which private port numbers are used by common applications on this list, please see the FAQs (Frequently Asked Questions) at http://www.billion.com.Well-known and Registered PortsPort Number Protocol Description20 TCP FTP Data21 TCP FTP Control22 TCP & UDP SSH Remote Login Protocol23 TCP Telnet25 TCP SMTP (simple Mail Transfer Protocol)53 TCP & UDP DNS (Domain Name Server)69 UDP TFTP (Trivial File Transfer Protocol)80 TCP World Wide Web HTTP110 TCP POP3 (Post Ofce Protocol version 3)119 TCP NEWS (Network News Transfer Protocol)123 UDP NTP (Network Time Protocol)161 TCP SNMP443 TCP & UDP HTTPS1503 TCP T.1201720 TCP H.3234000 TCP ICQ7070 UDP Real Audio104
105Port MappingSince NAT acts as a “natural” Internet rewall, your router protects your network from accessed by outside users, as all incoming connection attempts point to your router unless you specically create Virtual Server entries to forward those ports to a PC on your network. When your router needs to allow outside users to access internal servers, e.g. a web server, FTP server, Email server or game server, the router can act as a “virtual server”. You can set up a local server with a specic port number for the service to use, e.g. web/HTTP (port 80), FTP (port 21), Telnet (port 23), SMTP (port 25), or POP3 (port 110). When an incoming access request the router for a specied port is received, it is forwarded to the corresponding internal server. For example, if you set the port number 80 (Web/HTTP) to be mapped to the IP Address 192.168.1.2, then all incoming HTTP requests from outside users are forwarded to the local server (PC) with the IP address of 192.168.1.2. If the port is not listed as a predened application, you need to add it manually.In addition to specifying the port number used, you also need to specify the protocol used. The protocol is determined by a particular application. Most applications use TCP or UDP, however you may also specify other protocols using the drop-down Protocol menu. Setting the protocol to “all” causes all incoming connection attempts using all protocols on all port numbers to be forwarded to the specied IP address.Application: Select the service you wish to congure.Protocol: A protocol is automatically applied when an Application is selected from the listbox or you may select a protocol type which you want. The protocol used to be determined by a particular application. Most applications will use TCP or UDP.External Port & Internal Port: Enter the public port number & range you wish to congure.Internal IP Address: Enter the IP address of a specic internal server to which requests from the specied port is forwarded.Time Schedule: Scheduling your prioritization policy.Add: Click to add a new virtual server rule. Click again and the next gure appears.
Edit: Check the Edit radio button to display the parameter of the selected application, then after changing the parameters click the Edit/Delete button to apply the changes.Delete: To remove a port mapping application, check the Delete box of the selected application then click the Edit/Delete button.106
107DMZThe DMZ Host is a local computer exposed to the Internet. When setting a particular internal IP address as the DMZ Host, all incoming packets that do not use a port number which is already used by any other Virtual Server entries will rst be checked by the Firewall and NAT algorithms before it is passed to the DMZ host.Cautious: This Local computer exposing to the Internet may face various security risks. Time Schedule: Scheduling your prioritization policy.Click Apply to conrm the settings.
108Wake on LANWOL allows the router to set a command to turn on a particular computer that can support this feature.Click Add to save the setting.Edit: Check the Edit radio button to display the parameter of the selected entry, then after changing the parameters click the "Edit/Delete" button to apply the changes.Delete: To remove a static route entry, check the Delete box of the selected entry then click the "Edit/Delete" button.
Time ScheduleThe Time Schedule supports up to 16 time slots which helps you to manage your Internet connection. In each time prole, you may schedule specic day(s) i.e. Monday through Sunday to restrict or allowing the usage of the Internet by users or applications.This Time Schedule correlates closely with router’s time, since router does not have a real time clock on board; it uses the Simple Network Time Protocol (SNTP) to get the current time from an SNTP server from the Internet. Refer to Time Zone for details.  You router time should correspond with your local time.  If the time is not set correctly, your Time Schedule will not function properly. Name: A user-dene description to identify this time portfolio.Day in a week: The default is set from Sunday through Saturday. You may specify the days for the schedule to be applied.Start Time: The default is set at 8:00 AM.  You may specify the start time of the schedule.End Time: The default is set at 18:00 (6:00PM). You may specify the end time of the schedule. Click the Edit/Clear button to save your changes.109
110AdvancedConguration options within the Advanced section are for users who wish to take advantage of the more advanced features of the router. Users who do not understand the features should not attempt to recongure their router, unless advised to do so by support staff.Here are the items within the Advanced section: Static Route, Static ARP, Dynamic DNS, VLAN, Device Management, IGMP, SNMP Access Control and Remote Access.Static RouteWith static route feature, you are equipped with the capability to control the routing of the all the trafc across your network. With each routing rule created, you can specically assign the destination where the trafc will be routed to.Destination: Enter the destination IP where the trafc is to be forwarded.Netmask: Enter the netmask of the destination.Gateway: Enter the gateway address for the trafc.Interface: Select an appropriate interface for the new routing rule from the drop down menu.Cost: This is the same meaning as Hop and represents the cost of transmission for routing purposes. The number need not be precise, but it must between 0 and 65535; usually be left at 1.Click Add to conrm the settings.Edit: Check the Edit radio button to display the parameter of the selected rule, then after changing the parameters click the "Edit/Delete" button to apply the changes.Delete: To remove a static route entry, check the Delete box of the selected rule then click the "Edit/Delete" button.
Static ARPThis feature allows you to map the layer-2 MAC (Media Access Control) address that corresponds to the layer-3 IP address of the device.IP Address: Enter the IP of the device that the corresponding MAC address will be mapped to.MAC Address: Enter the MAC address that corresponds to the IP address of the device.Click Add to conrm the settings.Edit: Check the Edit radio button to display the parameter of the selected application, then after changing the parameters click the "Edit/Delete" button to apply the changes.Delete: To remove a static ARP entry, check the Delete box of the selected entry then click the "Edit/Delete" button.111
Dynamic DNSThe Dynamic DNS function lets you alias a dynamic IP address to a static hostname, so if your ISP does not assign you a static IP address you can still use a domain name. This is especially useful when hosting servers via your WAN connection, so that anyone wishing to connect to you may use your domain name, rather than the dynamic IP address which is assigned to you by ISP. You need to rst register and establish an account with the Dynamic DNS provider using their website, for example http://www.dyndns.org/.Dynamic DNS: Default  is disabled. Check  Enable to enable the Dynamic  DNS  function and the following elds will be activated and required.Dynamic DNS Server: Select the DDNS service you have registered an account with.Wildcard: When enabled, you allow the system to lookup on domain names that do not exist to have MX records synthesized for them.Domain Name, Username and Password: Enter your registered domain name and your username and password for this service.Period: Enter the length of the period in the blank, you can set the period unit in day, hour or minute.Click Apply to conrm the settings.112
113VLANVLAN (Virtual Local Area Network) is a group of devices on different physical LAN segments that can communicate with each other as if they were all on the same physical LAN segment.VLAN Group Name: Please input VLAN name of this rule.VLAN ID: Please input VLAN ID that will be used for Tagged member port(s).Ethernet Port(s): Please check the interface that you would like to use in this VLAN ID group.WAN Tag: Select the WAN Tag from the drop-down menu to associate the VLAN Group with it.Click Apply to conrm the settings.
114Device Management The Device Management advanced conguration settings allows you to control your router’s security options and device monitoring features. Device Host NameHost Name: Assign it a name.(The Host Name cannot be used with one word only. There are two words should be connected with a ‘.’ at least.  Example: Host Name: homegateway ==> Incorrect Host Name: home.gateway or my.home.gateway ==> Correct)Embedded Web Server ( 2 Management IP Accounts)HTTP Port: This is the port number the router’s embedded web server (for web-based conguration) will use. The default value is the standard HTTP port, 80. Users may specify an alternative if, for example, they are running a web server on a PC within their LAN.Expire to auto-logout: Specify a time length for the system to auto-logout user from the conguration session.Example: User A enters 100 for HTTP port number, species 192.168.1.55 for his/hser own IP address, and sets the logout time to 100 minutes. The router will allow User A to access only from the IP address 192.168.1.55 to logon to the Web GUI by typing: http://192.168.1.254:100 in their web browser. After 100 minutes, User A is logged out by the device automatically.
Universal Plug and Play (UPnP)UPnP offers peer-to-peer network connectivity for PCs and other network devices, along with the feature to control data transfer between devices. UPnP offers many advantages for users running NAT routers through UPnP NAT Traversal, and on supported systems. By letting the application control the required settings and removing the need for the user to control the advanced conguration of their device will make tasks such as port forwarding become easier.Both user’s Operating System and its relevant applications must support UPnP in addition to the router. Windows XP and Windows Me have a native built-in support for UPnP (when the component is  installed).  Windows  98  users  may  have  to  install  the  Internet  Connection  Sharing  client  from Windows XP in order to support UpnP feature. Windows 2000 does not support UPnP.Disable: Check to inactive the router’s UPnP functionality.Enable: Check to active the router’s UPnP functionality.UPnP Port: Default setting is 2800. It is highly recommended for users to use this port value. If this value conicts with other ports that have been used, you are allowed to change the port number.Click Apply to conrm the settings. 115
116Installing UPnP in Windows ExampleFollow the steps below to install the UPnP in Windows Me.Step 1: Click Start and Control Panel. Double-click Add/Remove Programs.Step 2: Click on the Windows Setup tab and select Communication in the Components selection box. Click Details.Step 3: In the Communications window, select the Universal Plug and Play check box in the Components selection box.
117Step 4: Click OK to go back to the Add/Remove Programs Properties window. Click Next.Step 5: Restart the computer when prompted.Follow the steps below to install the UPnP in Windows XP.Step 1: Click Start and Control Panel.Step 2: Double-click Network Connections.Step 3: In the Network Connections window, click Advanced in the main menu and select Optional Networking Components ….Step 4: When the Windows Optional Networking Components Wizard window appears, select Networking Service in the Components selection box and click Details.Step 5: In the Networking Services window, select the Universal Plug and Play check box.
118Step 6: Click OK to go back to the Windows Optional Networking Component Wizard window and click Next.Auto-discover Your UPnP-enabled Network DeviceStep 1: Click start and Control Panel. Double-click Network Connections. An icon displays under Internet Gateway.Step 2: Right-click the icon and select Properties.Step 3: In the Internet Connection Properties window, click Settings to see the port mappings that were automatically created.
119Step 4: You may edit or delete the port mappings or click Add to manually add port mappings.Step 5: Select Show icon in notication area when connected option and click OK. An icon displays in the system tray.
120Step 6: Double-click on the icon to display your current Internet connection status.Web Congurator Easy AccessWith UPnP, you can access web-based conguration for the BiPAC 8200N without rst nding out the IP address of the router. This helps if you do not know the router’s IP address.Follow the steps below to access web conguration.Step 1: Click Start and then Control Panel.Step 2: Double-click Network Connections.Step 3: Select My Network Places under Other Places.Step 4: An icon describing each UPnP-enabled device shows under Local Network.Step 5: Right-click on the icon of your BiPAC 8200N and select Invoke. The web conguration login screen displays. Step 6: Right-click on the icon of your BiPAC 8200N and select Properties. A properties window displays basic information about the BiPAC 8200N.
121IGMPIGMP, known as Internet Group Management Protocol, is used to manage hosts from multicast group.IGMP Proxy: IGMP proxy enables the system to issue IGMP host messages on behalf of the hosts that the system has discovered through standard IGMP interfaces. The system acts as a proxy for its hosts.IGMP Snooping: Allows a layer 2 switch to manage the transmission of any incoming IGMP multicast packet groups between the host and the router. Default is set to Disable.Click Apply to conrm the changes.Example:When IGMP snooping is enabled, the feature will analyze all incoming IGMP packets between the hosts that are connected to the switch and the multicast routers in the network. When the layer 2 switch receives an IGMP report from a host requesting for a given multicast group, the switch will add the host’s port number to the multicast list for that multicast group to be forwarded to. And, when the layer 2 switch has detected that an IGMP has left, it will remove the host’s port from the table entry.
SNMP Access ControlSoftware on a PC within the LAN is required in order to utilize this function – Simple Network Management Protocol.ParametersSNMP: Select Enable / Disable to activate / inactivate this function.SNMP V1 and V2Read Community: Specify a name to be identied as the Read Community, and an IP address.  This community string will be checked against the string entered in the conguration le. Once the string name is matched, user obtains this IP address will be able to view the data.Write Community: Specify a name to be identied as the Write Community, and an IP address. This community string will be checked against the string entered in the conguration le. Once the string name is matched, users from this IP address will be able to view and modify the data.SNMP V3Specify a name and password for authentication. And dene the access right from identied IP address. Once the authentication has succeeded, users from this IP address will be able to view and modify the data.Click Apply to conrm the settings.122
123Remote AccessRemote Access Control: Enable:  Select  Enable  to  allow  management  access  from  remote  side  (mostly  from internet).Duration: Set how many minutes to allow management access  from  remote  side. Zero(0) means always on.Click Apply to conrm the settings.Allowed Access IP Address Range:Valid: Select Valid to allow remote management from these IP ranges. IP  Address  Range:  Specify  the  remote  IP  address  which  will  be  allowed  access  device.  Clink Add to insert management IP address(es) to the list.Click Add to conrm the settings.
Save Conguration to FlashAfter changing the router’s conguration settings, you must save all of the conguration parameters to FLASH to avoid losing them after turning off or resetting your router. Click “Save Cong“ and click “Apply” to write your new conguration to FLASH.124
RestartClick “Restart” with option Current Settings to reboot your router (and restore your last saved conguration).If you wish to restart the router using the factory default settings (for example, after a rmware upgrade or if you have saved an incorrect conguration), select Factory Default Settings to reset to factory default settings125
LogoutTo exit the router web interface, click “Logout”. Please save your conguration setting before logging out of the system. A Warning screen will appear as below.Click OK and a message displays. Click Yes to close the window.Be aware that the router conguration interface can only be accessed by one PC at a time. Therefore when a PC has logged into the system interface, the other users cannot access the system interface until the current user has logged out of the system. If the previous user forgets to logout, the second PC can only access the router web interface after a user-dened auto logout period which is by default 3 minutes. You can however modify the value of the auto logout period using the Advanced > Device Management section of the router web interface. Please see the Advanced section of this manual for more information.126
Chapter 5: TroubleshootingIf your router is not functioning properly, please refer to the suggested solutions provided in this chapter. If your problems persist or the suggested solutions do not meet your needs, please kindly contact your service provider or Billion for support.Problems with the routerProblem Suggested ActionNone of the LEDs lit when the router is turned onCheck the connection between the router and the adapter. If the problem persists, most likely it is due to the malfunction of your hardware. Please contact your service provider or Billion for technical support.You have forgotten your login username or passwordTry the default username & password (Please refer to Chapter 3). If this fails, restore your router to its default setting by pressing the reset button for more than 6 seconds.Problem with LAN interfaceProblem Suggested ActionCannot PING any PC on LAN Check the Ethernet LEDs on the front panel. The LED should be on for the port that has a PC connected. If it does not lit, check to see if the cable between your router and the PC is properly connected. Make sure you have rst uninstalled your rewall program before troubleshooting.127
128Appendix: Product Support & ContactIf you come across any problems please contact the dealer from where you purchased your prod-uct.Contact BillionMAC OS is a registered Trademark of Apple Computer, Inc.Windows 98, Windows NT, Windows 2000, Windows Me, Windows XP and Windows Vista are registered Trademarks of Microsoft Corporation.Worldwide:http://www.billion.com
 Regulatory Approvals  FCC Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules.  These limits are designed to provide reasonable protection against harmful interference in a residential installation.  This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communica-tions. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:  Reorient or relocate the receiving antenna.  Increase the separation between the equipment and receiver.  Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.  Consult the dealer or an experienced radio/TV technician for help. To assure continued compliance, any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. (Example - use only shielded interface cables when connecting to computer or peripheral devices). FCC Radiation Exposure Statement This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with a minimum distance of 20 centimeters between the radiator and your body. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:  (1) This device may not cause harmful interference, and  (2) This device must accept any interference received, including interference that may cause undesired operation. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. The antennas used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter.       Channel            The Wireless Channel sets the radio frequency used for communication.  •Access Points use a fixed Channel. You can select the Channel used. This allows you to         choose a Channel which provides the least interference and best performance.  In the USA        and Canada, 11 channel are available. If using multiple Access Points,  it is better if adjacent        Access Points use different Channels to reduce interference.  • In "Infrastructure" mode, Wireless Stations normally scan all Channels, looking for an         Access Point. If more than one Access Point can be used, the one with the strongest         signal is used. (This can only happen within an ESS.)  • If using "Ad-hoc" mode (no Access Point), all Wireless stations should be set to use the        same Channel. However, most Wireless stations will still scan all Channels to see if there       is an existing "Ad-hoc" group they can join.Note:This equipment marketed in USA is restricted by firmware to only operate on 2.4G channel 1-11.

Navigation menu