Cradlepoint CTR350 Cellular Travel Router User Manual CTR User s Manual
Cradlepoint, Inc. Cellular Travel Router CTR User s Manual
Users Manual
CTR Cellular Travel Router
User’s Manual
1
Contents
Getting Acquainted
2 Compliance Notes
3 Introduction
4 CTR at a Glance
5 Using the Controls
6 Getting on the Internet
Configuring Your Wi reless Network
7 Welcome to the Help and Setup Pages
8 Navigating the Help and Setup Pages
12 The Wizards
16 Factory Default Reset
Tips and Troubleshooting
17 The Error Pages
“Data Service Not Available”
“Phone Not Available”
“Unable to Connect to WAN”
18 “Handset Error”
“DNS Poisoning”
“Maximum Number of Users Connected”
19 Security Notes
20 Care and Maintenance
21 Indicators (LEDs)
22 Glossary and Setup Details
2
Compliance Notes
FCC No tice:
This device complies with part 15 of the FCC rules. Operation is subject to the following two conditions:
(1) This device
may
not cause harmful interference, and (2) this device must accept any interference
received, including interference that may cause undesired operation.
Caution:
The user is cautioned that changes or modifications not expressly approved by the party responsible for
compliance could void the warranty and users’ authority to operate the equipment.
Note:
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant
to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful
interference in a residential installation. This equipment generates, uses and can radiate radio frequency
energy and, if not installed and used in accordance with the instructions, may cause harmful interference
to radio communications. However, there is no guarantee that interference will not occur in a particular
installation. If this equipment does cause harmful interference to radio or television reception, which can be
determined by turning the equipment off and on, the user is encouraged to try to correct the interference
by one or more of the following measures:
• Reorient or relocate the receiving antenna.
• Increase the separation between the equipment and receiver.
• Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
• Consult the dealer or an experienced radio/TV technician for help.
IMPORTANT NOTE:
FCC Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This
equipment should be installed and operated with minimum distance 20cm between the radiator & your
body.
Caution:
To comply with the FCC RF exposure compliance requirements, this device must not be co-located or
operating in conjunction with any other antenna or transmitter.
Industry Canada Notic e:
Operation is subject to the following two conditions: (1) this device may not cause interference, and (2)
this device must accept any interference, including interference that may cause undesired operation of the
device. The term “IC:” before the radio certification number only signifies that Industry Canada technical
specifications were met. This product meets the applicable Industry Canada technical specifications of the
RSS210.
This class B device complies with Canadian ICES-003.
Cet appareil numérique de la classe B est confome à la norme NMB-003 du Canada.
FCC COMPLIANCE STATEMENT
Property of CradlePoint, Inc For Internal Use Only.
Unauthorized reproduction and/or distribution is strictly prohibited.
This product is protected under copyright law and trade secret law
as an unpublished work.
Copyright (C) 2007 CradlePoint, Inc All rights reserved.
3
Introduction
WELCOME
The CradlePoint CTR (Cellular Travel Router) is a high-performance Bro adband Cellular Ga te way
designed to provide fast a nd convenient Internet access while connected to a Cellular modem o r
handset. The CTR provides a straightforward and portable Interne t connection leveragi ng advances
from C radlePoint Technologies, Inc. The CTR includes the following features:
Establishes shared network connection via standard WAN PPP when connecting DSL, Cable Modem, or other
uplink to Ethernet port
Establishes shared network connection via Cellular when connecting Cellular Phone or Cellular Modem to USB
port
Designed to work with all 3G cellular service provider networks
Supports up to 128-bit WEP and WPA encryption for data-security
Supports Virtual Private Network (VPN) pass-through
Supports 1 Wired LAN connection
Rugged but compact design is perfect for fixed or mobile applications
Software algorithms boost efficiency, performance, and improve perceived network speed
Auto-Upgrade Notification helps keep user updated with latest system CTR software revision
GUI-based device management from any standard web Browser
PACKA GE CONTENTS
CradlePoint CTR Cellular Travel Router
Power Adapter (5V/2.5A)
CD-ROM with Manual
Quick Installation Guide
Carrying Case
Note: Using a po wer supp ly wi th a different voltage t han t he one i ncluded w ith your product will ca use damag e and
void the warranty for thi s product.
If any of the above items are missing, please contact your reseller.
OVERVIEW OF FEATURES
Instantly creates a personal WiFi Hotspot anywhere within the Cellular Service Providers' network.
No software to install: Follows simplicity of 802. 11 wireless standards
Supports multiple simultaneous wireless LAN clients
Includes advanced wireless router features:
o NAT/NAPT Firewall
o DHCP Server
o Security - MAC Address Filtering or WPA or WEP Encryption
o Web-based Configuration and User Interface
Automatic firmware upgrades
Bridges from Cellular phone/modem connection to wired Ethernet for a no-software secure Internet connection
Recharges the handset battery and CTR internal battery when connected to an external power source.
Windows, Macintosh and Linux support.
4
A
B
B
C
D
D
E
F
G
H
I
A. LED 0 - USB Status
B. LED 1 - LAN Status
C. LED 2 - WLAN Status
D. LED 3 - Power Status
E. Ventilation Slots
F. CAT 5 (Ethernet) Port
G. Power Connector
H. Factory Reset Button
I. USB Port
CTR at a Glance
Input / Output
Bottom
Rear
Front
Top
5
Using the Controls
A
LED 0 –
USB Status
Green
Connection to USB port is established.
OFF
USB port not in use.
B
LED 1 –
WAN Status
Green
Wide Area Network is ready via the Ethernet port.
OFF
Ethernet port not in use or the connection is not secure. Port not in use.
C
LED 2 –
WLAN Status
OFF
No handset connected, unit is negotiating the connection, or no WLAN available.
D
LED 3 –
Power Status
Green
CTR is connected to external power / on.
OFF
CTR is OFF.
E
Ventilation Slots
These allow excess heat to be removed from the CTR while operating. It is recommended that the unit not be
covered with any material that will block the dispersion of heat away from the unit. The unit should not reach
extreme temperatures.
F
Ethernet Port
The Ethernet port allows you to connect to the unit via CAT5 cable on a LAN.
G
ON / OFF Status
&
External Power
Connection
OFF
The unit is completely OFF when the unit is not connected to external power and the ON / OFF switch is in the
OFF position.
The unit will charge its own battery and the phone battery if switched OFF and connected to external power.
Note: The option to charge the phone’s battery must be selected in the CTR setup pages.
The unit will ONLY charge the phone battery when switched OFF and NOT connected to external power. Note:
The option to charge the phone’s battery must be selected in the CTR setup pages.
* No access to the router or the wireless network can be established while the unit is OFF.
ON
If the unit is ON and not connected to a phone or handset, it’s Setup / Help Pages are still accessible by
associating with its SSID (Network Name) and entering 192.168.0.1 into the URL bar of a web browser. Note:
Login will be required to access the CTR Setup / Help Pages
If the unit is ON and connected to a fully operable data-enabled cell phone or USB modem a wireless network will
be automatically established. The laptop will automatically associated with the network. In some cases the user
will need to selected the wireless network from their laptop’s wireless network list. (Details vary by Operating
System.)
The unit will operate off external power exclusively while connected to an external power source. If there is
sufficient excess power available the unit will also charge the phone.
The power connector is a standard jack size and when connected to the proper cable and an external power
source will power the CTR according to the specifications listed in the ON / OFF switch section of the Controls
list.
H
Factory Default Reset
Button
To return all the User Defined configurations (such as those specified in the Setup / Help Pages) to their original
factory default settings simply turn the unit OFF, press and hold the Factory Default Reset button, and turn the
unit ON. After the LEDs have flashed ON then OFF then ON again, release the button. All setting should be
reset.
I
USB-to-Modem Port
This is a standard USB port that is used to connect either to a USB modem or to a data-enabled cellular phone.
Cables for USB to Data connection vary by phone manufacturer and are not provided with the CTR. Contact your
service provider for further information.
CAUTION: Using a power supply with a different voltage than the one included with
your product will cause damage to the unit and void the warranty.
6
Getting Connected
The CTR supports two methods of connecting to the Internet: 1) a standard wired-WAN connection such as a DSL,
Cable, or Hotel Ethernet, or hosted LAN connection; or 2) a Cellular modem connection using either a data-enabled
handset or USB Modem. In the Wired-WAN case, connect the LAN cable into the Ethernet port of the CTR and it will
establishes a connection to the Internet. In the Cellular case, plug your USB modem or handset into the USB host port
and the CTR will establish a connection to the Internet.
The CTR unit will begin broadcasting signals to create a local Wireless LAN network. If using a cellular phone, be sure
you have configured the phone’s settings to act as a modem and have established a 'data plan' with your
carrier/operator. Note that even though you may have a "Data Plan" for Internet access on the phone, there may be a
separate option to enable 'tethered data'. If you do not have this option activated, you must contact your cellular
carrier to activate this service. From your PC, use the wireless network finder to associate with your new wireless
network. The first time you use the CTR your network will be named:
CTR-xxx
Where ‘xxx’ is the last three digits of the CTR’s 12 character MAC address (the MAC address is individualized and unique
to each unit). This MAC Address is printed on the bottom label of the CTR.
Once your computer has associated with your wireless network, open a standard Internet Browser application on your PC
and you will be prompted to enter a password. The default password is the last six (6) characters of the MAC address
(again, printed on the bottom of the unit). Once logged in, you will be presented with a 'successful logon' screen,
indicating you can begin access the Internet with any of your PC applications. If you want the CTR to automatically
recognize your PC, click the 'Remember Me' option, and your PC will be automatically logged in upon WLAN association.
It is recommended that you change your password after your first login, which is easily accomplished using the CTR
Setup Wizard.
So how does it all work?
The CradlePoint CTR is a 802.11b/g WiFi router that is also able to use a cellular phone–as-
modem. Regardless of the type of Internet Access you have – Wired-WAN, Wired LAN, or
Cellular, the CradlePoint CTR bridges from that Internet access to a local WiFi network. The
result is your own personal, portable wireless network or “hotspot”. Set it up anywhere
within your service provider’s coverage area whenever you want access to the Internet.
7
Configuring Your
Wireless Network
Welcome to the Help and Setup Pages!
To access the Help Pages / CTR Setup Pages:
Be sure that the CTR and Phone/Modem are ON. Select the CTR-xxx wireless network from
your computer’s list of Wireless Networks.
Once your computer has associated with the CTR, open your
Web Browser and enter http://192.168.0.1 into the URL
Address bar. This allows you to access the CTR’s
embedded server pages.
You will be asked to enter your Password. The default
password is set to the last 6 digits of the CTR MAC Address
found on the bottom label of your CTR.
This is the home screen of the CTR Help and Setup Pages.
From here you can configure your network. It is recommended that you
run the Setup Wizard when you first use the CTR. This will allow you to
personalize your network name (SSID) and passwords, and you can change
the security settings to meet your needs.
8
Navigating the Help and Setup Pages
Select the Main Topic tab
you wish to use.
Use the side navigation menu to
access subtopics.
Be sure to save your settings
before leaving each page.
You can abandon all your changes at
anytime by selecting “Don’t Save Settings.”
What you’ll find in these pages
BASIC Topics
Wizard
These wizards are designed to assist you in
configuring your wireless network once you have
completed the steps found in the Getting On The
Internet section of this manual. Use the wizards
to name your network, set your new password,
and set the security levels for your new CTR.
Internet Connection Setup Wizard
Internet Security Setup Wizard
WAN
This page is used to set your Internet connection
type. For most users, the default settings are
appropriate for everyday usage.
Specify DNS Servers
Advanced DNS settings
MTU Settings
Link Drop Delay
WAN Port Speed
Ping Response Settings
MAC Cloning Settings
LAN
Use this page to configure the internal network
settings of your CTR router. The IP Address that is
configured here is the IP Address that you use to
access the Web-based management interface. If
you change the IP Address here, you may need to
adjust your PC’s network settings to access the
network again. The default settings are
appropriate for most everyday users.
Set IP Address
Set Subnet Mask
RIP Settings
Set Router Metric
Default Router set
Enable/Disable IGMP
Enable/Disable DNS Relay
DHCP
This page is used to configure the built in DHCP
Server to assign IP Addresses to the computers
on your network.
Enable/Disable DHCP Server
Specify DHCP IP Address Range
Specify Lease Time
Enable DHCP Broadcast
View DHCP Clients
Add DHCP Reservation
View Reservations List
Wireless
This page is used to configure your basic wireless
settings for your CTR. From here you can set the
visibility of your network to others, your wireless
Enable/Disable Wireless Radio
Set SSID
Set Network Visibility
Auto/Manual Channel Select
9
network name, and security type. Some of these
features may have already been set by you if you
used the Setup wizards on the main screen of the
Help and Setup Pages.
Set Transmission Rate
Set 802.11 Mode
Set “Super G “Mode
ADVANCED Topics
Virtual Server
The Virtual Server option allows you to define a
single public port on your router for redirection to
an internal LAN IP Address and Private LAN port if
required. This feature is useful for hosting online
services such as FTP or Web Servers.
Add Virtual Server
View Virtual Servers List
Special Applications
The Special Applications option is used to open
single or multiple ports on your router when the
router senses data sent to the Internet on a
“trigger” port or port range. Special Applications
rules apply to all computers on your internal
network.
Application Level Gateway (ALG) Configuration
Add Special Applications Rule
View Spec Applications Rules List
Routing
The Routing option allows you to apply fixed
routes to defined destinations.
Add Route
View Added Routes List
View Existing Routes List
Access Control
The Access Control option allows you to control
access in and out if your network. Use this feature
as Access Controls to only grant access to
approved sites, limit web access based on time or
dates, and/or block network access for certain
applications.
This page includes a wizard to assist you in adding
new policies.
Enable/Disable Access Control
Policy Wizard
View Existing Policies
Web Filter
The Web Filter option allows you to set up a list of
allowed Websites that can be used by multiple
users. When the Web Filter is enabled, all other
Websites not listed on this page will be blocked.
To use this feature, you must also select the
“Apply Web Filter” checkbox in the Access Control
Section.
Add Website(s)
View allowed Websites
MAC Address Filter
The MAC Address (Media Access Controller) filter
option is used to control network access based on
the MAC Address of the network adapter. This
feature can be used to ALLOW or DENY specific
machines on your network.
Enable MAC Address Filter
Filter Setting (Allow/Deny clients)
Add MAC Address
View Filters
Firewall
The DMZ (Demilitarized Zone) option provides you
with an option to set a single computer on your
network outside of the CTR router. If you have a
computer that cannot run Internet applications
successfully from behind the router, then you can
place the computer into the DMZ for unrestricted
internet access. This option is recommended to be
a last resort, as it tends to leave the DMZ
computer at a security risk.
Enable DMZ
Set the DMZ IP Address
Inbound Filter
The Inbound Filter option is an advanced method
of controlling data received from the Internet.
With this feature you can configure inbound data
filtering rules that control data based on an IP
address range. You can use this to limit access to
a server on your network to a system(s).
Add Inbound Filter Rule
View Added Inbound Filter Rules
Advanced Wireless
These are more advanced settings for your
wireless network. If you are unfamiliar with the
settings it is recommended that you read the help
section on this subtopic before changing any of
the presets.
Fragmentation Threshold
RTS Threshold
Beacon Period
DTIM Interval
Enable 802.11d
Transmit Power
WDS Enable
(Add WDS AP MAC Address)
Schedules
The Schedules Rules feature is used to manage
parental controls and firewall rules according to a
schedule you define.
Add Schedule Rule
View Added Schedule Rules
10
TOOLS Topics
Admin
The admin option is used to set a password for
access to the Web-based management. By default
there is not an Admin password (the default
password you are familiar with by now is the User
password).
Set Admin Password
Set User Password
Administration and Remote Settings
Enable / Disable UPnP
Save and Restore Configuration
Time
The Time configuration option allows you to
configure, update, and maintain the correct time.
From this section you can set the time zone that
you are in and set the NTP (Network Time Protocol)
Server. Daylight Savings can also be configured to
automatically adjust the time when needed.
Time zone and Daylight savings settings
Enable / Disable and set NTP Server
Set the date and time manually
Allows for you to copy your computer’s current
time settings.
Syslog
This option allows you to log information about your
network. You can send this information to a Syslog
Server.
Enable / Disable Syslog Server
Set Syslog Server IP Address
Email
The Email option can be used to send your Syslog
information to your e-mail account. You can also
select at what intervals you would like to receive
this information about your network.
Enable / Disable E-mail Notification
Set Email Settings
Set Email Notification Schedule
System
The System page allows you to reboot your CTR
router to the factory default settings without using
the hardware Reset button found just inside and
under the battery cover of the unit. Remember,
restoring the Default Factory Settings will erase all
of your configured changes.
Reboot the Device
Restore all Settings to the Factory Defaults
Firmware
The Firmware page allows you to check for and
install the latest version of your CTR software.
Upgrades improve the functionality and
performance of the CTR. You can set the CTR to
notify you by E-Mail when a newer version of the
software is available.
Firmware information and latest version check
Download Firmware Upgrade section
Set Firmware Upgrade notification options
Dynamic DNS
The DDNS feature allows you to host a server (Web,
FTP, etc) using a domain name that you have
purchased (www.yourchoiceofname.com) with your
dynamically assigned IP Address. Most Broadband
Internet Service Providers assign dynamic
(changing) IP Addresses. Using a DDNS service
provider, your friends can enter your host name to
connect to your server no matter what your IP
address is.
Enable / Disable DNS
Dynamic DNS Settings
11
STATUS Topics
Device Info
All of your Internet and network connection details
are displayed on this page. The firmware version
is also displayed here.
View Time and Firmware Version
View WAN Settings
View LAN Settings
View Wireless LAN Settings
View LAN Computers
Wireless
Use this option to view the wireless clients that
are connected to your network.
View Number of Wireless Clients
View Trusted Clients
Routing
This page displays the routing details configured
for your CTR.
View Routing Settings
Logs
This page allows you to view the Syslog
information about your CTR. You can define what
types of events you want to view and the event
levels to view.
Set Syslog Options
View / Edit Syslog Details
Statistics
View all your network’s Traffic Statistics from this
page. Traffic Statistics display Receive and
Transmit packets passing though your CTR router.
LAN Statistics
WAN Statistics
Wireless Statistics
Active Sessions
This page displays the full details of the actives
sessions to your CTR router.
View Active Sessions
HELP Topics
Subtopics
Each of the sections on the Help Topics page
contain a hyperlink for quick and easy location of
the subtopics you would like to view and/or edit.
Simply click the topic page in the side navigation
bar or click the subtopics in each section of the
page you would like to jump to.
Hyperlinks to each main and subtopic of the Help
and Setup Pages.
GLOSSARY Pages
The glossary provides you with definitions to aide your
understanding of the CTR functionality.
Hyperlinks by letter to jump to lexigraphically ordered
sections of the page.
12
The Wizards
To begin, select on the main screen of the Help Pages.
Select to go to
the next step.
You can select at
anytime to return to the main
Help page.
When setting your password, it is more
secure to use a combination of letters
and numbers while using
something that is easy for you to
remember.
You can select at anytime to return to the previous step.
Select the arrow on the pull down menu
to show all available time zones and
chose the zone which applies to your
area.
13
If you are using your cell phone or USB cellular modem.
If you are using Cable/DSL or other Ethernet LAN
connection over Ethernet to connect to the Internet.
Use the pull down menu to select your cellular plan.
Select if your network requires a password.
This information can be obtained by contacting your ISP
(Internet Service Provider). If you are using your cellular
phone, your ISP is your cellular operator such as Verizon,
Sprint, T-Mobile, etc.
14
Select when you are finished.
Abandon all changes and return
to the main Help Page.
Go Back.
Reboot the CTR to save and use your
changes now.
Continue without saving changes
until next reboot.
Allow a few moments for the
CTR to complete its reboot
cycle.
You will be asked to enter your
new password to login.
15
Your Basic Internet settings have now been configured!
After your changes have been saved, log into the CTR using your new password.
Select on the main screen of the Help and Setup page.
Select to go to
the next step.
Select to go back to the main screen
of the Help and Setup Pages at anytime.
This section will rename your wireless
network. It is the name others will see as
well the name shown in your list of available
wireless networks on your computer.
Go Back.
Security is an important aspect of your
online lifestyle. It is recommended that you
select “BETTER” or “BEST” to ensure
minimal attack from malicious Internet
users.
16
After you reboot your CTR be sure to look
for it by the new SSID. (Network Name)
Select Reboot the Device to save your changes. Allow a
few moments for your CTR to reboot and your computer
to re-associate with the network.
When you login you will be asked to enter you password according to your new security settings. If at
anytime you cannot remember your password you can reset the CTR to it’s factory default settings.
Factory Default Reset
The Factory Default reset will clear all your saved settings on the CTR. The user name and password will
revert back to the original “CTR-xxx” SSID and use the last 6 digits of the MAC Address for the password.
To use the factory default reset, simply:
1. Un-plug the CTR from external power.
2. Locate the Factory Reset button at the rear of the unit.
3. Press and hold the Reset button while you plug the CTR back into external power.
4. Release the button after you see the LEDs flash ON, OFF, then ON again.
17
All your settings will return to the factory presets as the CTR reboots.
Tips and Troubleshooting
The Error Pages
DATA SERVICE UNAVAILABLE
The KRT is designed to recognize if your cellular phone is not
enabled with a tethered data plan required to operate as a
modem. If you see this page, first verify that your phone or
modem is correctly connected to the KRT. You may need to
contact your cellular service company for details about your
data plan.
PHONE NOT AVAILABLE
This page may occur for several reasons:
Your cellular phone or USB modem may not be securely
connected to the KRT.
Your phone is not on or in “modem” mode.
UNABLE TO CONNECT TO WAN
If this page appears , confirm that your phone or USB modem is turned
on, properly connected, has sufficient battery, and adequate coverage
and signal strength.
If you still are not able to get a connection, check the following:
Confirm that the cable connecting your phone or modem to the CTR is
good – try an alternative in case there is a poor connection.
The data port on your phone is bad.
The battery power on the KRT is low and needs to be connected to
external power.
Your cellular phone may be malfunctioning and/or your service provider
is having technical problems.
You should double-check your connections, and verify the proper operation of your
handset or modem. In the case of a USB modem, refer to your modem manual to
confirm that you have proper coverage and signal strength by observing its indicator
lights.
18
HANDSET ERROR
If your phone has a bad signal, no service plan, a bad connection
port, a low battery, is OFF, or malfunctioning in some way, you
may get this page.
Try turning your phone OFF, then back ON or contact your service
provider for technical assistance. If you have been successful at
connecting before, try relocating the phone or modem to insure
you have proper coverage.
DNS POISONING
Occasionally after changing settings and rebooting the KRT the
browser’s cache needs to be cleared. If you see this page simply close
completely out of your browser and launch it again.
MAXIMUM NUMBER OF USERS CONNECTED
Appearance of this page indicates the number of users/clients allowed on
your network has been reached.
Either the maximum allowed clients setting is set too low or already at full
capacity.
The number of clients allowed on your network is a setting you can change
in the Help and Setup Pages on your KRT. The setting is by default only
set to 1 for your security and can be adjusted in the Help and Setup Pages.
19
Security Notes
It is highly recommended that you follow the next few suggestions to help ensure your security while using the KRT:
1. Change Admin Password
Changing the password to access your new router is the first step in securing your network. This can be done through the Wizard or on
the Admin Page of the Tools tab. Make sure that the password you choose is not commonly known or something that is easy to guess
such as your last name or your pet’s name. Try using a combination of letters and numbers (alpha-numeric) to deter intruders from
breaking into your network. Your private information should be kept private.
2. Disable DHCP and use Static IP addresses or Use Static DHCP and limit scope to the amount of users on your network.
The KRT comes with the setting for maximum users on your network set to 1. Until you change this setting you will be the only
computer allowed to access the network. Even so, in the event that an intruder manages to gain access to your network, having DHCP
enabled makes it easier for the intruder to access other computers on your network.
There are two methods to prevent this:
One way is to disable DHCP and use static IP addressing on all the devices connected to your network. This would mean that the intruder
would have to know what network your devices are on in order to access them. However, this would make it more difficult to share
access with new or occasional users.
The second way is to change the scope of the DHCP server to only include enough IP addresses (or IP range) for the devices in your
network. You can then use the Static DHCP feature of the router to assign an IP address to each device on your network. Static DHCP still
dynamically assigns an IP address to your network devices but only allows for those defined devices to obtain an IP address.
3. Change the default LAN IP address
Change the default LAN IP address from 192.168.0.1 to an alternate IP address. There are 3 ranges of IP addresses that have been
reserved for use on Private Networks.
10.0.0.0 - 10.255.255.255 (10.0.0.0/8)
172.16.0.0- 172.31.255.255 (172.16.0.0/12)
192.168.0.0 - 192.168.255.255 (192.168.0.0/16)
CradlePoint KRT routers use 192.168.0.1 as their default LAN IP address. Choosing an alternate IP address lessens the probability of an
intruders knowing what IP network your devices are on.
4. Set up MAC Filtering
Each networking device (router, network card, etc) on a network contains a unique hexadecimal number that identifies that specific
product. This number is referred to as a MAC address. MAC filtering allows you to create a list of the MAC address of each device on your
network and only allows these specific devices to associate with your network. With this feature enabled, devices attempting to connect
to your network with a MAC address that is not in the list you created, will be denied access.
THE KRT COMES TO YOU WITH YOUR SECURITY IN MIND:
The Personal HotSpot is equipped with several features designed to maintain security and provide easy setup to with any Cellular data network.
· PCs Hidden by NAT
NAT opens a temporary path to the Internet for requests originating from the local network. Requests originating from outside the LAN
are discarded, preventing users outside the LAN from finding and directly accessing the PCs on the LAN.
· IP Address Sharing by NAT
The Personal HotSpot allows several networked PCs to share an Internet account using only a single IP address, which may be statically
or dynamically assigned by your Internet service provider (ISP). This technique, known as NAT, allows the use of an inexpensive single-
user ISP account.
· Automatic Configuration of Attached PCs by DHCP
The Personal HotSpot dynamically assigns network configuration information, including IP, gateway, and domain name server (DNS)
addresses, to attached PCs on the LAN using the Dynamic Host Configuration Protocol (DHCP). This feature greatly simplifies
configuration of PCs on your local network.
· DNS Proxy
When DHCP is enabled and no DNS addresses are specified, the Personal HotSpot provides its own address as a DNS server to the
attached PCs. The Personal HotSpot obtains actual DNS addresses from the ISP during connection setup and forwards DNS requests
from the LAN.
20
Care and Maintenance
Operating Temper atures
Th e op erating temperatu res should re main between 0°C to +55°C degre es. Temperatu res ou tside
th is range may cause dama ge to your KRT.
Storage Temperatu res
Store your KRT in temp eratures not to exceed th e bounds of -40°C to +85°C. Temperatures
outside this range may cause damag e to your KRT.
Humidity
Exposure to humidity can cause your K RT to malfu nction and/or cause permanent damagg e. To
avoid this, keep your router at hu midity lev els betwe en 0 and 70%.
Shoc k and Vibration
Th e KRT may stop function ing if exposed to too much vibration or electrical shock. It is
rec omm en ded that you place the KRT out of areas that ma y introduce t h ese factors. Contact
th e manufacturer for specific details.
Network Range and
In terfer ance
Placing the KRT near metal cabinets or computer cases, large objects s u ch as refridgerators, or
around windows tinted w ith Metalic-based UV coatings can c ause interference. If you are
experiencing problems with the r ang e or interferenc e be sure that you r KRT is at least placed as
high as pos sible if it cannot be placed in the center of your preffer ed cover age area.
Stable Position
No Shock
Low Vibration
No Water
Mild
Temperature
°F/C°
21
COLOR
STATUS
Green
Connection to USB port is established.
Off
USB port not in use.
COLOR
STATUS
Green
Wide Area Network is ready via the Ethernet port.
Off
Ethernet port not in use or the connection is not
secure. Port not in use.
COLOR
STATUS
Green
WLAN is operating correctly.
Off
No handset connected, unit is negotiating the
connection, or no WLAN available.
COLOR
STATUS
Green
CTR is connected to external power / on.
Off
CTR is OFF.
Indicators (LEDs)
There are three dual LEDS used to display the device status and operation. The LED functions are identified below. The LED location and order are identified on
the PCB reference drawing. The normal operating states are described below. In addition, LED’s flash during power on, power off, reset and factory reset
functions to provide a visual feedback to the user of what is happening.
USB Status
(LED 0)
WAN Status
(LED 1)
WLAN Status
(LED 2)
Power Status
(LED 3)
22
Glossary and Setup Details
A
Access Control L ist
ACL. D atabase of network devices that are allow ed to access resourc es on the network.
Access Point
AP. D evice that allows wireless c lien ts to connect to it and access the network Ad-hoc n etwor k
- Peer-to-Peer n etwork betw een wireless clients
Address Res olution
Protocol
ARP. U sed to map MAC ad dresses t o IP addresses so that conversions c an be made in both
direc tions.
AD SL
Asymmetric Digital Subscriber Line
Advanced En cryption
Stan dard
AES. Government en cryption standard
Alphanumeric
Characters A-Z and 0-9
Antenn a
Used to transmit and rec eive RF signals.
AppleTalk
A set of Local Area Network protocols developed b y Apple for their compu ter systems
AppleTalk Addr es s
Resolution Protocol
AARP. Used t o map the MAC addresses of Apple computers to their AppleTalk network
addr esses, so that c on v ersions can be made in both directions.
Application layer
7th Layer of the OSI model. Provides s ervices to applications to en sur e that they can
communicate prop erly with other applications on a ne twork .
ASCII
Amer ican Standard Code for Information Interchange. This sys tem of ch arac ters is most
commonly u sed for t ext files
Attenuation
Th e loss in strength of digital an analog sign als. The loss is greater when the signal is b eing
transmitted o ver long distances .
Auth en tication
To provide cr ed entials, like a Password, in order to verify that the pers on or device is r eally
who they are claiming to b e
Automatic Pr ivate IP
Addressing
APIPA. An IP address th at a Windows computer will assign its elf when it is configured to obtain
an IP addr ess automatically but no DH CP ser ver is availabl e on the netw ork .
B
Backw ard Compati ble
Th e ability for n ew d evices to communicate and interact with older lega c y devic es to guarantee
inter operability
Bandwidth
Th e maxi mum amou nt of byt es or bits p er second that can be tran smitted to and from a
network devic e
Basic Input/Output System
BIOS. A program that the proc essor of a comput er uses to startu p the system on ce it is turned
on
Baud
Data transmission speed
Bit rate
Th e amount of bits that pass in giv en amount of ti me bit/sec – bits p er sec ond
BOOTP
Bootstrap Pr otocol. Allows for co mputers t o be boot ed up and giv en an IP address with no user
inter ven tion
Bottleneck
A time durin g processes when s om ething causes the proc ess to slowdown or stop all t ogeth er
Br oadband
A wide ban d of frequencies available for trans mitting data
Br oadcast
Tr ansmitting data in all dir ec tions at once
Br owser
A program that allows you to access r esour ces on the web and provides them to you graphically
C
Cable modem
A devic e that allows you to connect a computer up to a coaxial cable a n d r eceive Internet
access from your Cable provider
CardBus
A newer version of the PC Card or P CMCIA int erface. It supports a 32-bit data path, DMA, and
consumes less volta ge
23
Carrier Sense Multiple
Access/Collision Avoidance
CSMA/CA
Carrier Sense Multiple
Access/Collision D etect
CSMA/CD
CAT 5
Category 5. Used f or 10/100 Mbps or 1Gbps Eth ernet connections
Channel
Th e ch annel the w ireles s signal is transmitted on.
Client
A program or user that requests data from a serv er.
Collision
When do two devic es on the s a me Ethernet network try and transmit da ta at the e xact same
time.
Cookie
In formation th at is stor ed on the hard dr ive of your c omputer that hold s your pref er ences to
th e site that gav e your comput er the co okie.
Cracker
A talen t ed and malicious c omputer user w ho gain s unauthorized access to a c omputer or
network of computers with the inten tion of stealin g, malic iously modifying, or des troying
information. Also kn own as a “Black Hat Hacker.” Of ten mistak en ly refer red to as a Hacker.
CSMA/CA
Carrier Sense Multiple Ac cess/ Collision Av oidance C SMA/CD – Carrier Sense Multiple
Access/Collision D etection
D
Data
In formation th at has been trans lated into binary do that i t can be proces sed or move d to
another device
Data En cryption Standard
Uses a randomly selected 56-bit key that must be known by both the sender and the r ec eiver
when infor mation is exchanged
Data-Link layer
Th e second lay er of the OSI model. Controls the movement of data on the ph ys ical link of a
network
Database
Organizes information so that it can be managed updated, as w ell as easily accessed by users
or applications
DB-25
A 25 ping male conn ec tor f or attachin g External modems or R S-232 serial devices D B-9 – A 9
pin connector for RS-232 connections
dBd, dBi, dBm
decibels r elated to dipole antenn a, dec ibels relativ e to isotr opic radiator, decibels r elative to
one milliwatt
Decrypt
To unscramble an encrypted message back into plain tex t
Default
A predetermined value or s etting that is used by a program when no user input h as been
entered for this value or setting
Default Subnet Mask
Th e subn et on your r outer on the local area network
Demilitarized zone - DMZ
A single co mputer or group of computers that can be accessed by both users on the Internet as
well as u sers on th e Local N etwor k, but that is not protected by the sa me s ecu rity as the Local
Network.
DHCP
Dynamic Host C on figuration Protocol. Used to automatically assign I P a ddresses from a
pr edefined pool of addresses to computers or devices that r equests them (See Also D HCP IP
Address Range, Number of DHCP Dynamic Clients, Static DHCP Clients, DHCP L ease Time)
DHCP IP Address Range
Th is option defines the r ange of ad dresses available for the r outer to as sign to your internal
network If you h ave any devices using Static IP addresses, be sure the a ddresses do not fall
with in the range d efined her e.
DHCP L ease Ti me
Th e amount of time a computer may have an IP address b efor e it is r eq u ired to r en ew the lease.
Th e lease function s just as the lease on an apartment wou ld. Th e initial lease designates the
amoun t of ti me befor e the lease expires. If the t enant wishes to retain their address when the
lease is expire d th en th e lease is established. If the lease is no longer needed then the address
is allow ed to b e r eu sed by someone else.
Digital cer tificate
An elec tronic m ethod of providing credentials to a server in order to h ave access to it or a
network
24
Direct Sequence Spread
Spectrum – DSSS
Modu lation techniqu e used by 802.11 b wireless devices
Domain Name Syste m –
DNS
Tr anslates Domain Names to IP addr esses
Data Over Cable Service
In terface Specifications –
DOCSIS
Th e standard inter face for cabl e mode ms
Domain name
A name that is ass oc iated with an IP address
Download
To send a r equest from on e computer to another and have the file trans mitted back to the
requesting computer
DSL – Digital Su bscriber
Line
High badnwidth inter net con nection over telephone lines
Duplex
Sending and recieving data at the s ame time
DDNS – Dynamic DN S
service
Is provided n t com panies to allow users with Dynamic IP Addresses to obtain a Domain Name
th at w ill always be linked to th eir changin g IP Address. The IP Address i s updated either by
client sof tware or b y a rou t er that su ppor ts D DNS, w henever the IP Add r ess c han ges
Dynamic IP Address
IP address that is assigned b y a DHCP server and th at may chan ge. Cabl e Internet providers
usually use this method to assign IP Addr esses to their customer s
E
EAP
Extensible Authentication Protocol
Email
Electronic M ail is a c omputer-stored message that is trans mitted over t h e Internet
Encryption
Converting data into cyphertext so that it c ann ot b e easily r ead
Ethernet
Th e most widely used t echnology f or Local Area N etworks
F
Fiber optic
A way of s en ding data thr ough light impulses over glas s or plas tic wire or f iber
File server
A compu t er on a network that s tores data so that the other computers on the network c an all
access it
File sh aring
Allowing data from computers on a networ k to b e accessed by other computers on th e network
will different lev els of access rights
Firewall
A devic e that protec ts r esou rces of th e Local Area Netw ork from unauthorized users outside of
th e local network
Firmware
Programming that is insert ed into a hardw are device that tells it how to function Fragmentation
– Breaking up data into smaller piec es to make it easier to store
FTP – File Tran sfer Protocol
Easiest way to tran sfer files betw een c omputers on the Internet Full-duplex – Sen ding and
Receiving data at the same ti me
G
Gain
Th e amount an amplifier boosts the w ireless signal
Gatew ay
A devic e that connec ts your networ k to anoth er , like the your computer to th e internet
Gbps – Giga bits per second
Gigabit Ethernet
Tr ansmiss ion tech nology that transfers data at a rate of 1 billion bits per second
GUI – Graphical U ser
In terface
A visual w ay of interacting w ith a comput er using s uch items as w indow s, icons , and menu s.
Graphic al user interfaces are used by most modern operating sys tems
H
H.323
A standard that provides c onsistancy of voice and video transmission s and compatibility for
video con frencing de vices
Hacker
An enthu siastic and skillfull computer programmer or u ser c o mmonly mistak en by th e m edia for
a Cracker or Sc ript K iddie. (See Cr ack er)
25
Half D uplex
Data cannot be transmitted and r ecieved at the same time
Hashing
Tr ansforming a string of ch aracters into a shorter str ing with a predefin ed length
Hexid ecimal
Characters 0- 9 and A-F used to repr esent numbers also k nown as base 16
HomePNA, HomePNF
Networking over t elephone lines, Networking standard that combines 802.11b and DECT(Digital
enhanced cordless comminication) that provides s peeds up t o 1.6 m ega bits per s econ d and a
distance of 150ft using a Frequen cy Hoping transmission method
Hop
Th e action of data packets being tran smitted fro m one to another Host Computer on the
network
HTTP – Hypertext Transfer
Protocol
Used to transfer files from HTTP servers (web servers) to HTTP clients (web browsers)
HTTPS – Hypertext
Tr ansfer P rotocol over SSL
Used to encrypt and decrypt HTTP tran smissions , also know n as Seccure HTTP
Hub
A networking device th at c onnects multiple d evices togeth er
I
ICMP – Internet Control
Message Pr otocol
One of the core protoc ols of the Inter net protocol suite. Used mainly b y a networked
computers’ operating system to send er ror messages for IP datagrams , diagnostics, or r outing
pu rposes
IGMP – Internet Group
Managment Protoc ol
Used to make sure that computers can report their multicast group me mbersh ip to adjacent
router s
IIS – Internet Infor mati on
Server
A Web server and FTP ser ver provid ed b y M icrosoft
IK E – Inter net K ey
Exchange
Used to ensure s ecurity for VP N exch ange
In frastruc ture
In terms of a wireless n etwork this is w hen wirek ess c lien ts use an accress poin t t o fain acceess
to the networ k
In put Port Range
(See Special Application s page) The port range that you want to open t o inter net traffic
In terface
(See Rou ting page ) Specifies the n ex t hop to be taken if the route sp ecified is u sed. Agateway
of 0.0.0.0 implies ther e is no next hop and th e IP address match ed is c onn ected direc tly to the
router on the interfac e specified ( either LAN or WAN)
In ternet
A system of w orldwide netw orks which uses TCP/IP to allow for resources to be accr essed from
computers arou nd the wor ld
In ternet Explorer
One of many we b brows ers available for computers. Se e also M ozzilla. Fir efox, Konqurer, Opera,
Safari
In ternet Pr otocol
Th e method of tr ansfer ing data from one c omputer to an other on the In ternet
ISP – Internet Service
Procvider
Company that provides internet to individuals or companies
In teroperability
Th e ablity for products to interact with eachother without much c onsumer interaction.
Generally seen as an asset to any pr oduct
In tranet
A private n etwork
In tusion D etection
A typ e of security that s cans a n etwork to detect attacks coming f rom inside and outside the
network
IP – Internet Protocol
IP Address
A 32-bit number, w hen talking about Itern et Protocol Version 4, that id en tifies each computer
th at transmits data on the internet or intranet
IP v6 – Intern et Protocol
Version 6
Uses 1 28 bit addresses and was develop ed t o solve the pr oblem that we face running out of IP
version 4 addresses
IP X – Inter netwok Packet
Exchange
A networking protocol d eveloped b y Nov ell to enable th eir Netware clie nts and servers to
communicate
J
Java
A programming lan gu age used to cr eate progra ms and applets for web pages
K
26
Kbps
Kilobits per s econd
Ker beros
A method of securing and authenticating requests for services on a n et wor k
L
LAN – L ocal Area N etwork
A groupp of computers in a building that usually access files from a ser ver
Latancy
Th e amount of time a pack et takes t o travel from on e location to another on a network. Also
reffer ed t o as d elay.
LED
Light Em mitting Diod e
Legac y
Older d evices or technology
M
MB – MegaByte
Mbps
Megabits per s econd
MAC Addr ess
A unique hardware address for d evic es on a LAN. Each n etworking device (router, n etw ork car d,
etc) on a n etwor k contains a uniqu e hexadec imal n umber that id en tifies that specific product.
MAC Filtering
MAC filtering allows you to create a lis t of the M AC address of each dev ice on y our network and
only allows thes e specific devic es to assoc iate with your n etwork. With th is feature enabl ed,
devices attem pting to connec t to your n etw ork with a M AC address that is not in the list you
created, w ill be denied access.
Metric
(See Rou ting page ) Specifies the inter face, LAN or WAN, that the IP Packet must use to transit
out of the r outer w hen the selected route is used
MIB - Managem ent
In fomation Bas e
A set of objects that can be managed by us ing SNMP
MTU – M aximu m
Tr ansmiss ion Unit
Th e largest packet that can be transmitt ed on a packet based n etwork like the internet
Multicast
Sending data fro m one device to many devices on th e ne twork
N
NAT – Network Address
Tr anslation
Allows many private IP addr essses to connec t to the Internet, or anoth ernetwork, through one
IP address
NetBEUI
NetBIOS E xtende d U ser In t erfaceis a L ocal Area Network commincation protocol. Th is is an
updated v ersion of N etBIOS
NetBIOS
Network Basic In put/Output System
NetMask
Determines what portion of an IP ad dress desi gn ates the Network and w hic h art design ates the
Host
NetWare
Server software dev eloped by No vell
NIC – Netw ork Interface
Card
A card installed in a computer or built onto the m otherboard that allow s the computer to
connect to a network
Network Layer
Th e third layer of the OSI model which handles the routing of traffic on the network.
Number of Dynamic DHCP
Clients
In this sec tion, you can see what LAN devices are currently leasing IP addresses. The DHCP
Client tabl e displa ys the n umber of clients that are receiving an IP addr ess from th e router. The
computer nam e, MAC ad dress, and IP addr ess assigned to each computer are displaye d h ere as
well. You can Rev oke IP addr esses in this secti on. The revok e option allows you to take away a
leased IP ad dres s from a client. This feature is u seful for freeing u p add r esses w hen the clien t
table is f ull or nearly full. Be sure to only revoke ad dresses from device s th at are no longer
needed on the n etwork.
NTP – N etwork Time
Protocol
Used to s yn chr onize the time of all the comput er s on the network
O
27
OSI – Open Systems
In tercommun ication
Th e referen ce model for how data should travel b etw een two devices on a network .
OSPF – Open Short est P ath
First
A routin g protocol that is used mor e than RIP in larg er scale n etworks because only c han ges to
th e routin g tabl e are sent to all the o ther routers in the n etwork as opp osed to sending the
entire routin g table at a regu lar interval, w hich is how RIP functions.
P
Passs word
A sequence of ch aracters that is used to authenticate reques ts to resources on a network
Per sonal Area N etwork
Th e intercon nection of n etworking d evices w ithin a range of 10 meter s
Physical L ayer
Th e first layer of the OSI model, pro viding the h ardware a means of tran mittin g elec trical
sign als on a data c arrier
PoE – Power over Ether net
Th e means of transmitting electricity over the un used pairs in a C AT5 cable.
Policy N ame
(See Access Con tol page) The name of the acces control policy you hav e or are creating.
POP 3 – Post Office
Protocol 3
Used for recieving mail
PPP – Point to P oint
Protocol
Used for two compu ter s to comminicate w ith eachother over a serial interface, like a phone line
Preamble
Used to s yn chr onize c ommun ication timing between d evices on a networ k
Private P ort
Th e port th at will be used on your internal network
Public Port
Th e port th at will be accessed fro m th e internet
Q
QOS
Quality of Service
R
RADIUS – Remote
Auth en tication Dial-in U ser
Service
Allows for r emote users to dial into a c entral server and be auth en ticated in order to access
resou rces on a netw ork.
Remo te Managment
Allows you to manage your router from anywhere with an internet con n ection. See Tools
Admin
Remo te Management Port
Th e port th at will be accessed fro m th e internet.
Rendezvou s
Apple’s ver sion of UpnP, which allows f or devices on a network to discover eachother and be
connected w ithout the n eed to configu re any settings.
Repeater
Retransmits the signal of an Access Point in order t o extend its cover age.
RIP – Routing Information
Protocol
Used to s yn chr onize the routin g table of all the r outer s on a n etwor k.
RIP Ann ouncement
Th is option is u sed with multiple routers to broadcast r outing information.
Router Metr ic
Th is option is u sed if you have multiple r out er s.
RJ-1 1, RJ- 45
Th e most com mon ly used connec tion method for tel ephones, The most commonly use d
connection method for Eth ernet.
RS-232C
Th e interface for serial commu nic ation between c ompuuter s and oth er r ealated devices.
RSA Algorithm
Used for encryption and authentication.
S
Samba
A freew are program that allows for resour ces to be shared on a network. Mainly used in Unix
based op erating systems
Server
A compu t er on a network that provides services and resourc es to other computers on th e
network
Session K ey
An Encryption and d ecryption key that is generat ed for ev ery commun ication session between
tw o c omputers
Session L ayer
The fifth lay er of the OSI model w hich coordinates the con nection and commu nication between
applications at both ends
SMTP – Simpl e Mail
Tr ansfer P rotocol
Used for sending and recieving mail
28
SNMP – Simple n etwor k
Management Protocol
Govens the managemen t and monitoring of network devices
Special Applications
Th e Sp ecial Application sec tion is used t o open single or multiple ports on your r outer w hen the
router senses data sent to the Internet on a ‘trigg er’ port or port range. Spec ial Applications
rules apply to all computers on your internal network.
SSH – Secure Shell
A command line interface that allow s for secure connection s to re mote computers
SSID – Service Set
Identifier
A name for a wir eless network
SPI - Stateful Packet
In spec tion
A feature of a firewall th at monitors out going and incoming traffic to make s ure that on ly valid
reponses to ou tgoin g requests ar e allowed to pass through the firewall. When SPI is en abled,
th e extra state information will b e reported on the Status > Active sessions page.
Static DHCP Client
Static DHCP Clients receive th e same IP address all the time. This is almost the sa me as if a
device h as a static IP address exce pt that it must still actually request an IP addres s from the
CradlePoint Router. The CradlePoint Router w ill provide the devic e the same IP a ddress all th e
time. Servers on your network should eith er use a static IP address or this option . To input the
MAC address of your system, enter it in manually or c onnect to the Cr adleP oint Rou ter’s Web-
Management int erface from the syst em and clic k the Copy Your PC’s MAC Address button.
Static DHCP Client L ist
Entries on this list can be en abled/disabled b y toggling the Enable check box. Entries can b e
modified by c licking on the paper and pencil icon. To del ete an entry, click on the trash can
icon. After you’ ve compl eted all modif ications or deletions , you must click the Save Se ttings
button at the top of the pa ge to save your changes. The router must reboot before n ew
settings w ill take effect. You will be prompt ed to Reb oot the Devic e or Continue. If you n eed to
make additional s ettings changes, click Continue. If you are finished with your configur ation
settings, click the Reboot the De vice button.
Static IP Addr ess
An IP address that is enter ed manu ally on the devic e.
Subn et Mask
Determines the portion of an IP address designated to the Network and the portion d edicated
to the Host. ( Se e also D efault Subnet Mas k)
T
TCP – Transmission Con trol
Protocol
Applications on netw orked hosts use TCP t o creat e connec tions to one another, over which
th ey can exc hange data. TCP is the layer a bov e the IP and below th e application.
TCP/ IP – Transmission
control Protocol/ Inter net
Protocol
Also known as the Internet P rotocol Su ite. Implement the protocol stack on w hic h network s run.
Th oughput
Th e amount of data that can be transfer ed in a given time period.
Tr ace r oute
A utility th at dis plays th e routes between your c omputer and a spec ific destination.
Tr ansmiss ion Rate
Speed of data on th e Local Area N etwork
Tr igger Port Range
(See Special Application s page) Enter the outgoing port range used by your application. Selec t
th e outbound pro tocol u sed by your application.
U
UDP – User Datagram
Protocol
Allows programs on ne tworked computer to send short messages called datagrams to one
another.
UNC - Universal Naming
Convention
Allows for s hares on a computer to b e identified without h aving to kn ow what storage device it
is on
Unicast
Communication b etween a single sender and r eciever
UPnP – Universal Plug and
Play
Th e feature which allows devices to id entify each other on a network without requiring set up by
th e user
URL – U niform Resource
Locator
A unique address for fil es accessible on the internet
29
V
VPN – Virtu al Private
Network
A secure tunnel over th e internet to connect r emote offices or users to thier c ompany’s
network
Virtual Sever
Th e Virtual Server op tion gives Int ernet users access to services on your L AN. This feature is
useful for hostin g online services such as FTP, W eb, or Game Servers. For each Virtual Server,
you define a public p ort on your r outer f or r edir ection t o an internal L AN IP Address and port.
Example: You are hosting a Web Server on a Laptop or PC that has Private IP Address of
192.168.0. 50 and you r ISP is block ing Port 80.
1. Name the Vir tual Server Rule ( ex. Web
Server)
2. En ter in the IP Addr ess of the machine
on your LAN 19 2.1 68.1.1
3. En ter the Private Port as [80]
4. En ter the Public P ort as [8888]
5. Select th e Pr otocol - T CP
6. En sur e the schedule is s et t o Always
7. Chec k the Add Ru le to add the settings
8. Repeat these steps for each Virtu al
9. Server Rule you w ish to add. After the
list is c omple te, c lick Save Se ttings at
the top of th e page.
With this Virtual Server Rule all Internet traffic on Port 88 88 will be red irected t o your inter nal
web serv er on port 80 at IP Address 192.168.0.50.
Virtual Servers List
Entries on this list can be en abled/disabled b y toggling the Enable check box. Entries can b e
modified by c licking on the paper and pencil icon. To del ete an entry, click on the trash can
icon. After you’ ve compl eted all modif ications or deletions , you must click the Save Se ttings
button at the top of the pa ge to save your changes. The router must reboot before n ew
settings w ill take effect. You will be prompt ed to Reb oot the Devic e or Continue. Reb oot the
device if you are satisfied w ith you r settin gs.
Virtual Server Rule
Name of the virtual s erver, such as W eb Server
Visibility Statu s
Whether or not the SSID will be visible on th e LAN. If this is set to invisible oth er s will not
beable to see y our network in their list of availabl e networks withou t s pecial configurations. You
will have to conn ect to an invisible n etwork by manually entering the na me into your con nect
utility on you r computer.
VoIP – Voice over Int ernet
Protocol (IP)
Sending voice information over the internet
W
Wake on L AN
Allows you to power up a computer thrrough it’s NIC on a WAN.
Web Browser
A utility th at allows you to view content and interact with all of th e information in the Wor ld
Wide Web. E xamples include: Firefox, Mozzilla, Safari, Opera, and lastly thou gh of ten less
flexible and secure, Internet Explorer.
WEP – Wir ed Equ ivalen t
Privacy
Security for wireless n etwor ks that is supposed t o b e c ompatible t o th a t of a wir ed network.
Wi-Fi
Wireles s Fidelity
WPA – WiFi Protected
Access
An updated version of security for w ireless networks that provides authentication as well as
encryption .
Wide Area N etwor k
A network s panning a lar ge geographical area or consisting of more than one L AN.
Wireles s Network Name
Th e SSID for the router.
WISP - Wireles s ISP
A company that provides a br oadband c onnection o ver w ireless c onnections to the internet.
30
WLAN - Wireless LAN
Conn ecting to a L oacl Area Network over one of the 802.11 wir eless stan dards
X
Y
Yagi An t en na
A diraction al antenna u sed to c oncentrate a w ireless signal on a s paec ific location
Z