Cheng Uei Precision Industry 20200000 802.11b/g Router User Manual ManualNew

Cheng Uei Precision Industry Co., Ltd. 802.11b/g Router ManualNew

Contents

User Manual Part 2

Download: Cheng Uei Precision Industry 20200000 802.11b/g Router User Manual ManualNew
Mirror Download [FCC.gov]Cheng Uei Precision Industry 20200000 802.11b/g Router User Manual ManualNew
Document ID409928
Application IDWbaLLkZztT8Znt+2d3nkWQ==
Document DescriptionUser Manual Part 2
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize165.59kB (2069845 bits)
Date Submitted2004-03-30 00:00:00
Date Available2004-03-25 00:00:00
Creation Date2004-03-24 15:41:17
Producing SoftwareAcrobat Distiller 5.0.5 (Windows)
Document Lastmod2004-03-24 15:41:31
Document TitleManualNew
Document CreatorAdobe PageMaker 6.52
Document Author: hlai

Configuration Utility
SSID & Channel
• Accept Broadcast SSID
By broadcasting SSID, all wireless devices at
surrounding area can see your wireless router and
easy to associate with it. However, it is a good
security practice not to broadcast SSID, just
configure SSID info to those client devices you want
them to access you network.
Here is where you may modify the SSID and
Channel of your Wireless-G Broadband Router.
• SSID (Service Set ID, or Network Name):
Enter the name you wish to give your Wireless-G
Broadband Router (ex. “JOHN” or “IOGEAR”).
Every Wireless Clients (PC card, USB and PCI
adaptors) in your network must be configured to
accept with the same SSID.
• Channel
It can be left as Default, unless you plan on using
multiple access points. When multiple Wireless
Networks presenting, please ensure they are not
using the same channel, preferably at least 5
channels apart to each other.
34
Configuration Utility
Authentication & Encryption
It allows you to configure the setting of network
authentication and data encryption.
• Network Authentication:
You can specify the authentication type.
- “Both” allows wireless client devices access
your router no matter with shared key or not.
- “Share Key” only allows devices with same
WEP (Wired Equivalent Privacy) key to
access your wireless router.
- “802.1X” and “WPA” require you to type in
Radius server IP and server key. Please
check with your Network Administrator for
related information.
35
- “WPA-PSK” needs a pre-shared key to be set
on your wireless router and all wireless client
devices.
Configuration Utility
• Encryption:
- WEP Configuration
Click the drop-down menu to select WEP to enable
the WEP function and select 64 bits or 128 bits. The
128 bits gives a higher level of security. The
selection must be the same between all connected
network devices. For 64-bit WEP key, it should be
five ASCII characters (a-z and 0-9, for example:
gear56) or ten hexadecimal digits in length (a
through f, and 0 through 9, for example:
2af30bc9d5); for 128 bit WEP key, the length will be
13 characters for ASCII or 26 digits for Hexadecimal.
WEP keys 1-4 enable you to create an encryption
scheme for wireless LAN transmissions.
36
Configuration Utility
WPA and WPA-PSK configuration
- WPA-PSK
Wi-Fi Protected Access (WPA) is a sub-set of the
forthcoming IEEE 802.11i security standard. WPA
addresses those known weakness of WEP and
provides stronger security to wireless network.
IOGEAR Wireless-G Broadband Router supports
three authentication modes:
• 802.11x (need RADIUS server to authenticate
the clients, using WEP keying)
• WPA (same 802.1x, but with TKIP keying
support); WPA-PSK (Pre-Shared Key, no
RADIUS server needed)
37
Configuration Utility
There are two ways to configure WPA Pre-Shared Key:
- WPA
1. PassPhrase Mode: Input a phrase into the field.
The Wireless-G Broadband Router will automatically generate a Pre-Shared Key based on the
phrase you enter. The phrase can be within 8 to 63
characters (we recommend at least 12 characters
to achieve a sufficient level of security).
2. Hex mode: Input 64 hexadecimal digits. Please
write down the key you enter. You will need to enter
same key to your wireless client side.
WPA Group Rekey Interval
This router could change the group key periodically.
Enter the period you want into the WPA Group Rekey
Interval field.
Encryption Type
The current version only supports TKIP encryption.
AES encryption will be available soon.
38
Configuration Utility
RADIUS Server IP
Please enter the IP address of RADIUS server
RADIUS Server Port
This field specifies the port on which RADIUS server
is listening.
RADIUS Server Key
This field carries the shared secret for RADIUS
authentication. Some information need to be
encrypted in a RADIUS packet, this key is used to
encrypt and decrypt this information (such as
password).
Reconfirm RADIUS Server Key
Make sure RADIUS Server Key is correct.
WPA Group Rekey Interval
It is the same as WPA-PSK configuration
Note:
To complete the WPA operation, you also need to enable the
WPA client at the wireless client site (the computer running
wireless client’s devices, such as the GWP511 Cardbus card
GWP512 Cardbus Card or GWU513 USB adaptor).
Microsoft provides a free WPA upgrade for Windows XP
Service Pack 1 (SP1) and later or Windows Server 2003. For
any OS other than Win XP, there is client software available
from third-party suppliers such as Funk Software’s Odyssey
(www.funk.com). IOGEAR’s GWP512 Wireless-G Network PC
Card has it built-in.
The WPA client for Windows XP can be found in the Microsoft
Knowledge Base Article 815485 (http://support.microsoft.com/
default.aspx?scid=kb;en-us;815485) or downloaded directly
from Microsoft http://www.microsoft.com/downloads/
details.aspx?FamilyID=009d8425-ce2b-47a4-abec274845dc9e91&displaylang=en
Encryption Type
It is the same WPA-PSK configuration
39
Configuration Utility
After installed, the Windows WPA Client will update the
wireless network configuration dialog boxes to support new
WPA options.
1. Click Connect To>Wireless Network Connection
to bring up the dialogue window of Wireless
Network Connection Status. Click the
Properties box to bring up next dialogue window.
2. In the Wireless Network Connection Properties
window, under Wireless Networks tab, please
check the box of “Use Windows to configure my
wireless network settings” to turn on the
Wireless Zero Configuration service. Select the
wireless access point you want to associate to,
then click Configure box at the right side to bring
up next dialogue window.
40
Configuration Utility
3. Set up your WPA configuration by selecting the
Network Authentication mode and Data
encryption, and input same Network key as you
input at the Wireless-G Broadband Gateway.
Then, you are served by a more secured wireless
network
41
Configuration Utility
Radio Setting
Here you can configure Wireless radio settings.
Please note that these settings are for advanced users
or network administrators. If you are unfamiliar with
how to configure these parameters, we recommend
that you keep them at their default value.
• Mode: The Wireless-G Broadband Router can be set
at three wireless modes: Auto, 802.11g only and
802.11b only. If both 802.11g and 802.11b clients
presenting at your network, please select “Auto”
mode (This is default mode). “802.11g only” mode
only supports 802.11g clients, and gives better
performance to whole network. However, all 802.11b
clients will not be able to use your network at this
mode setting. In some situation, 802.11b clients with
old drivers cannot work with Auto mode; “802.11b
only” mode can accommodate this problem, but
decrease the performance of 802.11g devices.
42
Configuration Utility
• DTIM Period: Enter a value between 1 and 255 for
the Delivery Traffic Indication Message (DTIM). A
DTIM is a countdown informing clients of the next
window for listening to broadcast and multicast
messages. When the router has buffered broadcast
or multicast messages for associated clients, it
sends the next DTIM with a DTIM Interval value. Its
clients hear the beacons and awaken to receive
• RTS Threshold: The RTS threshold is the packet size
the broadcast and multicast messages. The default
at which packet transmission is governed by the
value for DTIM interval is set to 1.
RTS/CTS transaction. Each station can have a
different RTS threshold. If you encounter inconsistent
data flow, only minor modifications are recommended. The default value for RTS Threshold is set
to 2347.
• Beacon Period: Beacons are packets sent by the
router to synchronize a wireless network. The value
of beacon interval is depending on the environment
where the router is operating. Specify a Beacon
interval value between 1 and 1000(units: ms). The
default value is set to 100 milliseconds, i.e., ten
beacons per second.
• Fragment Threshold: This value should remain at its
default setting of 2346. If you experience a high
packet error rate, you may modify slightly your
“Fragmentation” value within the value range of 800
to 2346. Setting the Fragmentation value too low may
result in poor performance.
43
Configuration Utility
Association Control
To add an association, enter the MAC address in the
address field, specify Allow or Deny attribute and click
Add button.
To delete an association, click Delete button from the
Association Client List.
This page allows you to control which computers
can connect to the Wireless-G Broadband Router.
If you enable this feature, only computers with a
MAC address listed located in Association
Control List can connect to the wireless LAN.
44
Configuration Utility
Associated Client List
It displays information of stations that are
currently associated to your wireless router. You
can check who are linking to your network, for
security and activity monitoring purposes. Click
Refresh button to update the list.
45
Configuration Utility
Internet Page
In Internet Settings, you can configure the way your Wireless-G Broadband Router uses to connect to your ISP.
46
Configuration Utility
Connection Type
It allows you to configure the way you connect to your
ISP. This Wireless Broadband Router can be
connected to your ISP in any of the following ways:
DHCP Client, PPPoE, Static IP and PPTP
• DHCP Client: Enter the Host Name if your
ISP provides it; otherwise, just leave it blank.
47
Configuration Utility
• Dynamic IP - PPPoE: Complete User name,
password, confirm password fields.
• Static IP: Complete the IP address, subnet mask,
ISP gateway and primary DNS fields.
48
Configuration Utility
• Dynamic IP - PPTP: Complete fields on this screen.
Those information can get from your ISP.
49
Configuration Utility
MAC Clone
If your ISP restricts connections to pre-registered
computers only, use the MAC Clone feature to copy
your computer’s Media Access Control (MAC) address
to your wireless broadband router. This procedure will
cause the Wireless-G Broadband Router to appear as
a single computer.
To do MAC Clone: click Clone MAC Automatically.
50
Configuration Utility
Dynamic DNS
This feature enables you to run your domain (ex.
www.mywebsite.com) over a changing IP. Before you
can use this feature, you need to sign up for DDNS
service from one of the Dynamic DNS providers that
this Wireless-G Broadband Router supports and fill in
related fields to make it work. You may follow the
following steps to enable this function.
• Sign up for DDNS service and write down the host
name, user name and password.
• Click the radio button of Enable to enable the
dynamic DNS function.
• Complete the host name, user name and password
fields.
• Click Update Now button to update the information.
Click the radio button of Disable to disable this
function.
51
Configuration Utility
Firewall Page
Your IOGEAR Wireless-G Broadband Router features powerful and flexible firewall protection to keep your
computer and/or network secure.
You can configure the strength of firewall protection at a high or low level. If you are an advanced user, you
can configure firewall policies depending on your needs.
52
Configuration Utility
Basic Setting
Configure the basic settings to enable the firewall to
protect your network from hacker attacks. Choose
High, Low or Disable button will enable its
corresponding settings.
Please be careful on these configurations. Any
incorrect settings might cause the firewall to block all
traffic or make your network vulnerable to outside
hacker attacks.
53
Configuration Utility
Service Filter
You can add custom service filters not listed in the
services tables. Select any added custom service
filters in the Policies section to enable advanced
firewall settings.
Name field: Enter the name you wish to give to any
application.
Protocol: Click the drop-down menu to select TCP or
UDP protocol.
Port range: Check the application’s documentation
and enter the port range.
Descriptions: Describe the application.
54
Configuration Utility
Some of the popular applications and protocol/port numbers settings are defined below:
55
Configuration Utility
Policies
Virtual DMZ
Policies are rules that you define for your firewall
settings. You may define rules, for example, for
inbound and outbound traffic.
If you have a local client computer that cannot run
an Internet application properly from behind the
NAT firewall, you can open the client up to
unrestricted two-way Internet access by defining
a Virtual DMZ.
56
Configuration Utility
NAT Page
Network Address Translation allows multiple computers on your network to access the Internet over a single
user account. NAT can also prevent hacker attacks by mapping local addresses to public addresses for key
services such as Web or FTP.
57
Configuration Utility
Virtual Server
Virtual Server
You can configure the Wireless-G Broadband Router
as a virtual server so that remote users can access
services such as Web or FTP at your local site via
public IP addresses.
Special Applications such as Internet gaming, video
conferencing, and Internet telephony software usually
require multiple connections. The Special Applications
feature allows these applications to work properly.
For example: a FTP server (public port 21) will be
translated into a local site (private 192.168.1.25)
through private port 1502.
58
Configuration Utility
Summary Page
This page includes all the basic configuration of the Broadband Router.
59
Configuration Utility
System Status
Statistic
You can view the status of your Wireless-G
List the data transmission status of the router. Click
Broadband Router from this window. The system
Refresh button to update statistics.
status of the router is divided into four sections:
General information, Internet Settings, LAN Settings
and Wireless Settings. Click Refresh button to update
all information.
60
Configuration Utility
Event Log
You can view any/all system events
sent through your network from this
window. Click Refresh button to
update the list.
61
Specification
62
Specification
63
Technical Support
If you need technical support, please check out our IOGEAR Tech Info Library (T.I.L.) at
www.iogear.com/support for the latest tips, tricks, and troubleshooting. The IOGEAR T.I.L.
was designed to provide you with the latest technical information about our products. Most of
the answers to your questions can be found here, so please try it out before contacting technical
support.
Technical support is available Monday through Friday from 8:00 am to 5:00 pm PST and can be
reached at (949) 453-8782 or by email support@iogear.com.
64
Radio & TV Interference Statement
WARNING!!! This equipment generates, uses and can radiate radio frequency energy and, if
not installed and used in accordance with the instruction manual, may cause interference to
radio communications. This equipment has been tested and found to comply with the limits for
a Class B computing device pursuant to Subpart J of Part 15 of FCC Rules, which are designed
to provide reasonable protection against such interference when operated in a commercial
environment. Operation of this equipment in a residential area is likely to cause interference, in
which case the user at his own expense will be required to take whatever measures may be
required to correct the interference.
65
Limited Warranty
IN NO EVENT SHALL THE DIRECT VENDOR’S LIABILITY FOR DIRECT, INDIRECT,
SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OF
THE PRODUCT, DISK OR ITS DOCUMENTATION EXCEED THE PRICE PAID FOR THE
PRODUCT.
The direct vendor makes no warranty or representation, expressed, implied, or statutory with
respect to the contents or use of this documentation, and especially disclaims its quality,
performance, merchantability, or fitness for any particular purpose.
The direct vendor also reserves the right to revise or update the device or documentation
without obligation to notify any individual or entity of such revisions, or updates. For further
inquires please contact your direct vendor.
66
Regulatory Compliance FCC Warning
This device complies with Part 15 of the FCC Rules.
Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2)
this device must accept any interference received, including interference that may cause undesired operation.
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to
part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful
interference in a residential installation.
This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in
accordance with the instructions, may cause harmful interference to radio communications. However, there is
no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful
interference to radio or television reception, which can be determined by turning the equipment off and on, the
user is encouraged to try to correct the interference by one or more of the following measures:
• Reorient or relocate the receiving antenna.
• Increase the separation between the equipment and receiver.
• Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
• Consult the dealer or an experienced radio/TV technician for help.
Changes or modifications not expressly approved by the party responsible for compliance could void your
authority to operate the equipment.
1) To comply with FCC RF exposure compliance requirements, a separation distance of at least 20 cm must
be maintained between the antenna of this device and all persons.
2) This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.
67
®
Contact info.
23 Hubble
•
Irvine, CA 92618
•
(P) 949.453.8782
•
(F) 949.453.8785
•
www.iogear.com

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.5
Linearized                      : No
Page Count                      : 36
XMP Toolkit                     : XMP toolkit 2.9.1-13, framework 1.6
About                           : uuid:ef9165a6-5ad6-4401-a510-f86ace91d3c5
Modify Date                     : 2004:03:24 15:41:31+01:00
Create Date                     : 2004:03:24 15:41:17+01:00
Metadata Date                   : 2004:03:24 15:41:31+01:00
Document ID                     : uuid:88533400-fb96-46b1-bf55-ef8346c2289b
Format                          : application/pdf
Title                           : ManualNew
Creator                         : Adobe PageMaker 6.52
Author                          : hlai
Subject                         : ManualNew
Producer                        : Acrobat Distiller 5.0.5 (Windows)
EXIF Metadata provided by EXIF.tools
FCC ID Filing: QVZ20200000

Navigation menu