Cheng Uei Precision Industry 20200000 802.11b/g Router User Manual ManualNew
Cheng Uei Precision Industry Co., Ltd. 802.11b/g Router ManualNew
Contents
- 1. User Manual Part 1
- 2. User Manual Part 2
User Manual Part 2
Configuration Utility SSID & Channel • Accept Broadcast SSID By broadcasting SSID, all wireless devices at surrounding area can see your wireless router and easy to associate with it. However, it is a good security practice not to broadcast SSID, just configure SSID info to those client devices you want them to access you network. Here is where you may modify the SSID and Channel of your Wireless-G Broadband Router. • SSID (Service Set ID, or Network Name): Enter the name you wish to give your Wireless-G Broadband Router (ex. “JOHN” or “IOGEAR”). Every Wireless Clients (PC card, USB and PCI adaptors) in your network must be configured to accept with the same SSID. • Channel It can be left as Default, unless you plan on using multiple access points. When multiple Wireless Networks presenting, please ensure they are not using the same channel, preferably at least 5 channels apart to each other. 34 Configuration Utility Authentication & Encryption It allows you to configure the setting of network authentication and data encryption. • Network Authentication: You can specify the authentication type. - “Both” allows wireless client devices access your router no matter with shared key or not. - “Share Key” only allows devices with same WEP (Wired Equivalent Privacy) key to access your wireless router. - “802.1X” and “WPA” require you to type in Radius server IP and server key. Please check with your Network Administrator for related information. 35 - “WPA-PSK” needs a pre-shared key to be set on your wireless router and all wireless client devices. Configuration Utility • Encryption: - WEP Configuration Click the drop-down menu to select WEP to enable the WEP function and select 64 bits or 128 bits. The 128 bits gives a higher level of security. The selection must be the same between all connected network devices. For 64-bit WEP key, it should be five ASCII characters (a-z and 0-9, for example: gear56) or ten hexadecimal digits in length (a through f, and 0 through 9, for example: 2af30bc9d5); for 128 bit WEP key, the length will be 13 characters for ASCII or 26 digits for Hexadecimal. WEP keys 1-4 enable you to create an encryption scheme for wireless LAN transmissions. 36 Configuration Utility WPA and WPA-PSK configuration - WPA-PSK Wi-Fi Protected Access (WPA) is a sub-set of the forthcoming IEEE 802.11i security standard. WPA addresses those known weakness of WEP and provides stronger security to wireless network. IOGEAR Wireless-G Broadband Router supports three authentication modes: • 802.11x (need RADIUS server to authenticate the clients, using WEP keying) • WPA (same 802.1x, but with TKIP keying support); WPA-PSK (Pre-Shared Key, no RADIUS server needed) 37 Configuration Utility There are two ways to configure WPA Pre-Shared Key: - WPA 1. PassPhrase Mode: Input a phrase into the field. The Wireless-G Broadband Router will automatically generate a Pre-Shared Key based on the phrase you enter. The phrase can be within 8 to 63 characters (we recommend at least 12 characters to achieve a sufficient level of security). 2. Hex mode: Input 64 hexadecimal digits. Please write down the key you enter. You will need to enter same key to your wireless client side. WPA Group Rekey Interval This router could change the group key periodically. Enter the period you want into the WPA Group Rekey Interval field. Encryption Type The current version only supports TKIP encryption. AES encryption will be available soon. 38 Configuration Utility RADIUS Server IP Please enter the IP address of RADIUS server RADIUS Server Port This field specifies the port on which RADIUS server is listening. RADIUS Server Key This field carries the shared secret for RADIUS authentication. Some information need to be encrypted in a RADIUS packet, this key is used to encrypt and decrypt this information (such as password). Reconfirm RADIUS Server Key Make sure RADIUS Server Key is correct. WPA Group Rekey Interval It is the same as WPA-PSK configuration Note: To complete the WPA operation, you also need to enable the WPA client at the wireless client site (the computer running wireless client’s devices, such as the GWP511 Cardbus card GWP512 Cardbus Card or GWU513 USB adaptor). Microsoft provides a free WPA upgrade for Windows XP Service Pack 1 (SP1) and later or Windows Server 2003. For any OS other than Win XP, there is client software available from third-party suppliers such as Funk Software’s Odyssey (www.funk.com). IOGEAR’s GWP512 Wireless-G Network PC Card has it built-in. The WPA client for Windows XP can be found in the Microsoft Knowledge Base Article 815485 (http://support.microsoft.com/ default.aspx?scid=kb;en-us;815485) or downloaded directly from Microsoft http://www.microsoft.com/downloads/ details.aspx?FamilyID=009d8425-ce2b-47a4-abec274845dc9e91&displaylang=en Encryption Type It is the same WPA-PSK configuration 39 Configuration Utility After installed, the Windows WPA Client will update the wireless network configuration dialog boxes to support new WPA options. 1. Click Connect To>Wireless Network Connection to bring up the dialogue window of Wireless Network Connection Status. Click the Properties box to bring up next dialogue window. 2. In the Wireless Network Connection Properties window, under Wireless Networks tab, please check the box of “Use Windows to configure my wireless network settings” to turn on the Wireless Zero Configuration service. Select the wireless access point you want to associate to, then click Configure box at the right side to bring up next dialogue window. 40 Configuration Utility 3. Set up your WPA configuration by selecting the Network Authentication mode and Data encryption, and input same Network key as you input at the Wireless-G Broadband Gateway. Then, you are served by a more secured wireless network 41 Configuration Utility Radio Setting Here you can configure Wireless radio settings. Please note that these settings are for advanced users or network administrators. If you are unfamiliar with how to configure these parameters, we recommend that you keep them at their default value. • Mode: The Wireless-G Broadband Router can be set at three wireless modes: Auto, 802.11g only and 802.11b only. If both 802.11g and 802.11b clients presenting at your network, please select “Auto” mode (This is default mode). “802.11g only” mode only supports 802.11g clients, and gives better performance to whole network. However, all 802.11b clients will not be able to use your network at this mode setting. In some situation, 802.11b clients with old drivers cannot work with Auto mode; “802.11b only” mode can accommodate this problem, but decrease the performance of 802.11g devices. 42 Configuration Utility • DTIM Period: Enter a value between 1 and 255 for the Delivery Traffic Indication Message (DTIM). A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages. When the router has buffered broadcast or multicast messages for associated clients, it sends the next DTIM with a DTIM Interval value. Its clients hear the beacons and awaken to receive • RTS Threshold: The RTS threshold is the packet size the broadcast and multicast messages. The default at which packet transmission is governed by the value for DTIM interval is set to 1. RTS/CTS transaction. Each station can have a different RTS threshold. If you encounter inconsistent data flow, only minor modifications are recommended. The default value for RTS Threshold is set to 2347. • Beacon Period: Beacons are packets sent by the router to synchronize a wireless network. The value of beacon interval is depending on the environment where the router is operating. Specify a Beacon interval value between 1 and 1000(units: ms). The default value is set to 100 milliseconds, i.e., ten beacons per second. • Fragment Threshold: This value should remain at its default setting of 2346. If you experience a high packet error rate, you may modify slightly your “Fragmentation” value within the value range of 800 to 2346. Setting the Fragmentation value too low may result in poor performance. 43 Configuration Utility Association Control To add an association, enter the MAC address in the address field, specify Allow or Deny attribute and click Add button. To delete an association, click Delete button from the Association Client List. This page allows you to control which computers can connect to the Wireless-G Broadband Router. If you enable this feature, only computers with a MAC address listed located in Association Control List can connect to the wireless LAN. 44 Configuration Utility Associated Client List It displays information of stations that are currently associated to your wireless router. You can check who are linking to your network, for security and activity monitoring purposes. Click Refresh button to update the list. 45 Configuration Utility Internet Page In Internet Settings, you can configure the way your Wireless-G Broadband Router uses to connect to your ISP. 46 Configuration Utility Connection Type It allows you to configure the way you connect to your ISP. This Wireless Broadband Router can be connected to your ISP in any of the following ways: DHCP Client, PPPoE, Static IP and PPTP • DHCP Client: Enter the Host Name if your ISP provides it; otherwise, just leave it blank. 47 Configuration Utility • Dynamic IP - PPPoE: Complete User name, password, confirm password fields. • Static IP: Complete the IP address, subnet mask, ISP gateway and primary DNS fields. 48 Configuration Utility • Dynamic IP - PPTP: Complete fields on this screen. Those information can get from your ISP. 49 Configuration Utility MAC Clone If your ISP restricts connections to pre-registered computers only, use the MAC Clone feature to copy your computer’s Media Access Control (MAC) address to your wireless broadband router. This procedure will cause the Wireless-G Broadband Router to appear as a single computer. To do MAC Clone: click Clone MAC Automatically. 50 Configuration Utility Dynamic DNS This feature enables you to run your domain (ex. www.mywebsite.com) over a changing IP. Before you can use this feature, you need to sign up for DDNS service from one of the Dynamic DNS providers that this Wireless-G Broadband Router supports and fill in related fields to make it work. You may follow the following steps to enable this function. • Sign up for DDNS service and write down the host name, user name and password. • Click the radio button of Enable to enable the dynamic DNS function. • Complete the host name, user name and password fields. • Click Update Now button to update the information. Click the radio button of Disable to disable this function. 51 Configuration Utility Firewall Page Your IOGEAR Wireless-G Broadband Router features powerful and flexible firewall protection to keep your computer and/or network secure. You can configure the strength of firewall protection at a high or low level. If you are an advanced user, you can configure firewall policies depending on your needs. 52 Configuration Utility Basic Setting Configure the basic settings to enable the firewall to protect your network from hacker attacks. Choose High, Low or Disable button will enable its corresponding settings. Please be careful on these configurations. Any incorrect settings might cause the firewall to block all traffic or make your network vulnerable to outside hacker attacks. 53 Configuration Utility Service Filter You can add custom service filters not listed in the services tables. Select any added custom service filters in the Policies section to enable advanced firewall settings. Name field: Enter the name you wish to give to any application. Protocol: Click the drop-down menu to select TCP or UDP protocol. Port range: Check the application’s documentation and enter the port range. Descriptions: Describe the application. 54 Configuration Utility Some of the popular applications and protocol/port numbers settings are defined below: 55 Configuration Utility Policies Virtual DMZ Policies are rules that you define for your firewall settings. You may define rules, for example, for inbound and outbound traffic. If you have a local client computer that cannot run an Internet application properly from behind the NAT firewall, you can open the client up to unrestricted two-way Internet access by defining a Virtual DMZ. 56 Configuration Utility NAT Page Network Address Translation allows multiple computers on your network to access the Internet over a single user account. NAT can also prevent hacker attacks by mapping local addresses to public addresses for key services such as Web or FTP. 57 Configuration Utility Virtual Server Virtual Server You can configure the Wireless-G Broadband Router as a virtual server so that remote users can access services such as Web or FTP at your local site via public IP addresses. Special Applications such as Internet gaming, video conferencing, and Internet telephony software usually require multiple connections. The Special Applications feature allows these applications to work properly. For example: a FTP server (public port 21) will be translated into a local site (private 192.168.1.25) through private port 1502. 58 Configuration Utility Summary Page This page includes all the basic configuration of the Broadband Router. 59 Configuration Utility System Status Statistic You can view the status of your Wireless-G List the data transmission status of the router. Click Broadband Router from this window. The system Refresh button to update statistics. status of the router is divided into four sections: General information, Internet Settings, LAN Settings and Wireless Settings. Click Refresh button to update all information. 60 Configuration Utility Event Log You can view any/all system events sent through your network from this window. Click Refresh button to update the list. 61 Specification 62 Specification 63 Technical Support If you need technical support, please check out our IOGEAR Tech Info Library (T.I.L.) at www.iogear.com/support for the latest tips, tricks, and troubleshooting. The IOGEAR T.I.L. was designed to provide you with the latest technical information about our products. Most of the answers to your questions can be found here, so please try it out before contacting technical support. Technical support is available Monday through Friday from 8:00 am to 5:00 pm PST and can be reached at (949) 453-8782 or by email support@iogear.com. 64 Radio & TV Interference Statement WARNING!!! This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause interference to radio communications. This equipment has been tested and found to comply with the limits for a Class B computing device pursuant to Subpart J of Part 15 of FCC Rules, which are designed to provide reasonable protection against such interference when operated in a commercial environment. Operation of this equipment in a residential area is likely to cause interference, in which case the user at his own expense will be required to take whatever measures may be required to correct the interference. 65 Limited Warranty IN NO EVENT SHALL THE DIRECT VENDOR’S LIABILITY FOR DIRECT, INDIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OF THE PRODUCT, DISK OR ITS DOCUMENTATION EXCEED THE PRICE PAID FOR THE PRODUCT. The direct vendor makes no warranty or representation, expressed, implied, or statutory with respect to the contents or use of this documentation, and especially disclaims its quality, performance, merchantability, or fitness for any particular purpose. The direct vendor also reserves the right to revise or update the device or documentation without obligation to notify any individual or entity of such revisions, or updates. For further inquires please contact your direct vendor. 66 Regulatory Compliance FCC Warning This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: • Reorient or relocate the receiving antenna. • Increase the separation between the equipment and receiver. • Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. • Consult the dealer or an experienced radio/TV technician for help. Changes or modifications not expressly approved by the party responsible for compliance could void your authority to operate the equipment. 1) To comply with FCC RF exposure compliance requirements, a separation distance of at least 20 cm must be maintained between the antenna of this device and all persons. 2) This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. 67 ® Contact info. 23 Hubble • Irvine, CA 92618 • (P) 949.453.8782 • (F) 949.453.8785 • www.iogear.com
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.5 Linearized : No Page Count : 36 XMP Toolkit : XMP toolkit 2.9.1-13, framework 1.6 About : uuid:ef9165a6-5ad6-4401-a510-f86ace91d3c5 Modify Date : 2004:03:24 15:41:31+01:00 Create Date : 2004:03:24 15:41:17+01:00 Metadata Date : 2004:03:24 15:41:31+01:00 Document ID : uuid:88533400-fb96-46b1-bf55-ef8346c2289b Format : application/pdf Title : ManualNew Creator : Adobe PageMaker 6.52 Author : hlai Subject : ManualNew Producer : Acrobat Distiller 5.0.5 (Windows)EXIF Metadata provided by EXIF.tools