Cradlepoint CTR350 Cellular Travel Router User Manual CTR User s Manual

Cradlepoint, Inc. Cellular Travel Router CTR User s Manual

Users Manual

Download: Cradlepoint CTR350 Cellular Travel Router User Manual CTR User s Manual
Mirror Download [FCC.gov]Cradlepoint CTR350 Cellular Travel Router User Manual CTR User s Manual
Document ID754995
Application IDoD+55X3g49AapwilCiurcw==
Document DescriptionUsers Manual
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize103.93kB (1299115 bits)
Date Submitted2007-02-06 00:00:00
Date Available2007-02-06 00:00:00
Creation Date2007-01-31 15:38:16
Producing SoftwareMac OS X 10.4.8 Quartz PDFContext
Document Lastmod2007-02-02 14:28:40
Document TitleMicrosoft Word - CTR User's Manual.doc
Document CreatorWord
Document Author: misskniss

CTR Cellular Travel Router
User’s Manual
Contents
Getting Acquainted
Compliance Notes
Introduction
CTR at a Glance
Using the Controls
Getting on the Internet
Configuring Your Wi reless Netwo rk
12
16
Welcome to the Help and Setup Pages
Navigating the Help and Setup Pages
The Wizards
Factory Default Reset
Tips and Troubleshooting
17
18
19
The Error Pages
“Data Service Not Available”
“Phone Not Available”
“Unable to Connect to WAN”
“Handset Error”
“DNS Poisoning”
“Maximum Number of Users Connected”
Security Notes
20
Care a nd Mainten ance
21
Indicators (LE Ds)
22
Glossary and Setup De tails
Com pliance Not es
FCC No tic e:
This device complies with part 15 of the FCC rules. Operation is subject to the following two conditions:
(1) This device may not cause harmful interference, and (2) this device must accept any interference
received, including interference that may cause undesired operation.
Caution:
The user is cautioned that changes or modifications not expressly approved by the party responsible for
compliance could void the warranty and users’ authority to operate the equipment.
Note:
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant
to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful
interference in a residential installation. This equipment generates, uses and can radiate radio frequency
energy and, if not installed and used in accordance with the instructions, may cause harmful interference
to radio communications. However, there is no guarantee that interference will not occur in a particular
installation. If this equipment does cause harmful interference to radio or television reception, which can be
determined by turning the equipment off and on, the user is encouraged to try to correct the interference
by one or more of the following measures:
•
•
•
•
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
Consult the dealer or an experienced radio/TV technician for help.
IMP ORTA NT N OT E:
FCC Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This
equipment should be installed and operated with minimum distance 20cm between the radiator & your
body.
Caution:
To comply with the FCC RF exposure compliance requirements, this device must not be co-located or
operating in conjunction with any other antenna or transmitter.
Indus try Cana da No tic e:
Operation is subject to the following two conditions: (1) this device may not cause interference, and (2)
this device must accept any interference, including interference that may cause undesired operation of the
device. The term “IC:” before the radio certification number only signifies that Industry Canada technical
specifications were met. This product meets the applicable Industry Canada technical specifications of the
RSS210.
This class B device complies with Canadian ICES-003.
Cet appareil numérique de la classe B est confome à la norme NMB-003 du Canada.
FCC COMPLIANCE STATEMENT
Property of CradlePoint, Inc For Internal Use Only.
Unauthorized reproduction and/or distribution is strictly prohibited.
This product is protected under copyright law and trade secret law
as an unpublished work.
Copyright (C) 2007 CradlePoint, Inc All rights reserved.
Introduction
WEL C OM E
The CradlePoint CTR (Cellular Tra vel Router) is a high-performance Bro adband Cellular Ga te way
designed to pro vide fast a nd con venient Inte rne t access while connected to a Cellular mode m o r
handset. The CTR pro vides a straightforwa rd and porta ble Interne t connection leve raging adva nces
from C radlePoint Tech nologies, Inc. The CTR includes the following featu res:










Establishes shared network connection via standard WAN PPP when connecting DSL, Cable Modem, or other
uplink to Ethernet port
Establishes shared network connection via Cellular when connecting Cellular Phone or Cellular Modem to USB
port
Designed to work with all 3G cellular service provider networks
Supports up to 128-bit WEP and WPA encryption for data-security
Supports Virtual Private Network (VPN) pass-through
Supports 1 Wired LAN connection
Rugged but compact design is perfect for fixed or mobile applications
Software algorithms boost efficiency, performance, and improve perceived network speed
Auto-Upgrade Notification helps keep user updated with latest system CTR software revision
GUI-based device management from any standard web Browser
PACKA GE CO NT ENTS





CradlePoint CTR Cellular Travel Router
Power Adapter (5V/2.5A)
CD-ROM with Manual
Quick Installation Guide
Carrying Case
Note: Us ing a po wer supp ly wi th a differe nt vol tage t han t he one i ncl uded w ith your produ ct w ill cause d am ag e and
void the warranty for thi s produc t.
If any of the above items are missing, please contact your reseller.
OV ERVI EW OF F EA TURES








Instantly creates a personal WiFi Hotspot anywhere within the Cellular Service Providers' network.
No software to install: Follows simplicity of 802. 11 wireless standards
Supports multiple simultaneous wireless LAN clients
Includes advanced wireless router features:
NAT/NAPT Firewall
DHCP Server
Security - MAC Address Filtering or WPA or WEP Encryption
Web-based Configuration and User Interface
Automatic firmware upgrades
Bridges from Cellular phone/modem connection to wired Ethernet for a no-software secure Internet connection
Recharges the handset battery and CTR internal battery when connected to an external power source.
Windows, Macintosh and Linux support.
A
CTR at a Glance
A. LED 0 - USB Status
B. LED 1 - LAN Status
C. LED 2 - WLAN Status
D. LED 3 - Power Status
E. Ventilation Slots
F. CAT 5 (Ethernet) Port
G. Power Connector
H. Factory Reset Button
I. USB Port
Top
Bottom
Rear
Front
Input / Output
Using the Controls
LED 0 –
USB Status
LED 1 –
WAN Status
Green
OFF
LED 2 –
WLAN Status
OFF
LED 3 –
Power Status
Ventilation Slots
Ethernet Port
Green
OFF
Green
OFF
Connection to USB port is established.
USB port not in use.
Wide Area Network is ready via the Ethernet port.
Ethernet port not in use or the connection is not secure. Port not in use.
No handset connected, unit is negotiating the connection, or no WLAN available.
CTR is connected to external power / on.
CTR is OFF.
These allow excess heat to be removed from the CTR while operating. It is recommended that the unit not be
covered with any material that will block the dispersion of heat away from the unit. The unit should not reach
extreme temperatures.
The Ethernet port allows you to connect to the unit via CAT5 cable on a LAN.
OFF
The unit is completely OFF when the unit is not connected to external power and the ON / OFF switch is in the
OFF position.
The unit will charge its own battery and the phone battery if switched OFF and connected to external power.
Note: The option to charge the phone’s battery must be selected in the CTR setup pages.
The unit will ONLY charge the phone battery when switched OFF and NOT connected to external power. Note:
The option to charge the phone’s battery must be selected in the CTR setup pages.
* No access to the router or the wireless network can be established while the unit is OFF.
ON / OFF Status
External Power
Connection
CA UTION: Using a power supply with a different voltage than the one included with
your product will cause damage to the unit and void the warranty.
ON
If the unit is ON and not connected to a phone or handset, it’s Setup / Help Pages are still accessible by
associating with its SSID (Network Name) and entering 192.168.0.1 into the URL bar of a web browser. Note:
Login will be required to access the CTR Setup / Help Pages
If the unit is ON and connected to a fully operable data-enabled cell phone or USB modem a wireless network will
be automatically established. The laptop will automatically associated with the network. In some cases the user
will need to selected the wireless network from their laptop’s wireless network list. (Details vary by Operating
System.)
The unit will operate off external power exclusively while connected to an external power source. If there is
sufficient excess power available the unit will also charge the phone.
The power connector is a standard jack size and when connected to the proper cable and an external power
source will power the CTR according to the specifications listed in the ON / OFF switch section of the Controls
list.
Factory Default Reset
Button
To return all the User Defined configurations (such as those specified in the Setup / Help Pages) to their original
factory default settings simply turn the unit OFF, press and hold the Factory Default Reset button, and turn the
unit ON. After the LEDs have flashed ON then OFF then ON again, release the button. All setting should be
reset.
USB-to-Modem Port
This is a standard USB port that is used to connect either to a USB modem or to a data-enabled cellular phone.
Cables for USB to Data connection vary by phone manufacturer and are not provided with the CTR. Contact your
service provider for further information.
Getting Connected
The CTR supports two methods of connecting to the Internet: 1) a standard wired-WAN connection such as a DSL,
Cable, or Hotel Ethernet, or hosted LAN connection; or 2) a Cellular modem connection using either a data-enabled
handset or USB Modem. In the Wired-WAN case, connect the LAN cable into the Ethernet port of the CTR and it will
establishes a connection to the Internet. In the Cellular case, plug your USB modem or handset into the USB host port
and the CTR will establish a connection to the Internet.
The CTR unit will begin broadcasting signals to create a local Wireless LAN network. If using a cellular phone, be sure
you have configured the phone’s settings to act as a modem and have established a 'data plan' with your
carrier/operator. Note that even though you may have a "Data Plan" for Internet access on the phone, there may be a
separate option to enable 'tethered data'. If you do not have this option activated, you must contact your cellular
carrier to activate this service.
From your PC, use the wireless network finder to associate with your new wireless
network. The first time you use the CTR your network will be named:
CTR-xxx
Where ‘xxx’ is the last three digits of the CTR’s 12 character MAC address (the MAC address is individualized and unique
to each unit). This MAC Address is printed on the bottom label of the CTR.
Once your computer has associated with your wireless network, open a standard Internet Browser application on your PC
and you will be prompted to enter a password. The default password is the last six (6) characters of the MAC address
(again, printed on the bottom of the unit).
Once logged in, you will be presented with a 'successful logon' screen,
indicating you can begin access the Internet with any of your PC applications. If you want the CTR to automatically
recognize your PC, click the 'Remember Me' option, and your PC will be automatically logged in upon WLAN association.
It is recommended that you change your password after your first login, which is easily accomplished using the CTR
Setup Wizard.
So how does it all work?
The CradlePoint CTR is a 802.11b/g WiFi router that is also able to use a cellular phone–asmodem. Regardless of the type of Internet Access you have – Wired-WAN, Wired LAN, or
Cellular, the CradlePoint CTR bridges from that Internet access to a local WiFi network. The
result is your own personal, portable wireless network or “hotspot”. Set it up anywhere
within your service provider’s coverage area whenever you want access to the Internet.
Configuring Your
Wireless Network
Welcom e t o the Help and Set up Pag es!
To access the Help Pages / CTR Setup Pages:
Be sure that the CTR and Phone/Modem are ON. Select the CTR-xxx wireless network from
your computer’s list of Wireless Networks.
Once your computer has associated with the CTR, open
your
Web Browser and enter http://192.168.0.1 into the URL
Address bar. This allows you to access the CTR’s
embedded server pages.
You will be asked to enter your Password. The
default
password is set to the last 6 digits of the CTR MAC
Address
found on the bottom label of your CTR.
This is the home screen of the CTR Help and Setup Pages.
From here you can configure your network. It is recommended that you
run the Setup Wizard when you first use the CTR. This will allow you to
personalize your network name (SSID) and passwords, and you can change
the security settings to meet your needs.
Navigating the Help and Setup Pages
Select the Main Topic tab
you wish to use.
Use the side navigation menu to
access subtopics.
Be sure to save your settings
before leaving each page.
You can abandon all your changes at
anytime by selecting “Don’t Save Settings.”
What you’ll find in these pages
BASIC Topics
These wizards are designed to assist you in
configuring your wireless network once you have
completed the steps found in the Getting On The
Internet section of this manual. Use the wizards
to name your network, set your new password,
and set the security levels for your new CTR.
Internet Connection Setup Wizard
Internet Security Setup Wizard
WAN
This page is used to set your Internet connection
type. For most users, the default settings are
appropriate for everyday usage.
Specify DNS Servers
Advanced DNS settings
MTU Settings
Link Drop Delay
WAN Port Speed
Ping Response Settings
MAC Cloning Settings
LAN
Use this page to configure the internal network
settings of your CTR router. The IP Address that is
configured here is the IP Address that you use to
access the Web-based management interface. If
you change the IP Address here, you may need to
adjust your PC’s network settings to access the
network again. The default settings are
appropriate for most everyday users.
Set IP Address
Set Subnet Mask
RIP Settings
Set Router Metric
Default Router set
Enable/Disable IGMP
Enable/Disable DNS Relay
Wizard
DHCP
Wireless
This page is used to configure the built in DHCP
Server to assign IP Addresses to the computers
on your network.
This page is used to configure your basic wireless
settings for your CTR. From here you can set the
visibility of your network to others, your wireless
Enable/Disable DHCP Server
Specify DHCP IP Address Range
Specify Lease Time
Enable DHCP Broadcast
View DHCP Clients
Add DHCP Reservation
View Reservations List
Enable/Disable Wireless Radio
Set SSID
Set Network Visibility
Auto/Manual Channel Select
network name, and security type. Some of these
features may have already been set by you if you
used the Setup wizards on the main screen of the
Help and Setup Pages.
Set Transmission Rate
Set 802.11 Mode
Set “Super G “Mode
ADVANCED Topics
Virtual Server
Special Applications
Routing
Access Control
Web Filter
MAC Address Filter
Firewall
Inbound Filter
The Virtual Server option allows you to define a
single public port on your router for redirection to
an internal LAN IP Address and Private LAN port if
required. This feature is useful for hosting online
services such as FTP or Web Servers.
The Special Applications option is used to open
single or multiple ports on your router when the
router senses data sent to the Internet on a
“trigger” port or port range. Special Applications
rules apply to all computers on your internal
network.
The Routing option allows you to apply fixed
routes to defined destinations.
The Access Control option allows you to control
access in and out if your network. Use this feature
as Access Controls to only grant access to
approved sites, limit web access based on time or
dates, and/or block network access for certain
applications.
This page includes a wizard to assist you in adding
new policies.
The Web Filter option allows you to set up a list of
allowed Websites that can be used by multiple
users. When the Web Filter is enabled, all other
Websites not listed on this page will be blocked.
To use this feature, you must also select the
“Apply Web Filter” checkbox in the Access Control
Section.
The MAC Address (Media Access Controller) filter
option is used to control network access based on
the MAC Address of the network adapter. This
feature can be used to ALLOW or DENY specific
machines on your network.
The DMZ (Demilitarized Zone) option provides you
with an option to set a single computer on your
network outside of the CTR router. If you have a
computer that cannot run Internet applications
successfully from behind the router, then you can
place the computer into the DMZ for unrestricted
internet access. This option is recommended to be
a last resort, as it tends to leave the DMZ
computer at a security risk.
The Inbound Filter option is an advanced method
of controlling data received from the Internet.
With this feature you can configure inbound data
filtering rules that control data based on an IP
address range. You can use this to limit access to
a server on your network to a system(s).
Advanced Wireless
These are more advanced settings for your
wireless network. If you are unfamiliar with the
settings it is recommended that you read the help
section on this subtopic before changing any of
the presets.
Schedules
The Schedules Rules feature is used to manage
parental controls and firewall rules according to a
schedule you define.
Add Virtual Server
View Virtual Servers List
Application Level Gateway (ALG) Configuration
Add Special Applications Rule
View Spec Applications Rules List
Add Route
View Added Routes List
View Existing Routes List
Enable/Disable Access Control
Policy Wizard
View Existing Policies
Add Website(s)
View allowed Websites
Enable MAC Address Filter
Filter Setting (Allow/Deny clients)
Add MAC Address
View Filters
Enable DMZ
Set the DMZ IP Address
Add Inbound Filter Rule
View Added Inbound Filter Rules
Fragmentation Threshold
RTS Threshold
Beacon Period
DTIM Interval
Enable 802.11d
Transmit Power
WDS Enable
(Add WDS AP MAC Address)
Add Schedule Rule
View Added Schedule Rules
TOOLS Topics
Set Admin Password
Set User Password
Administration and Remote Settings
Enable / Disable UPnP
Save and Restore Configuration
Admin
The admin option is used to set a password for
access to the Web-based management. By default
there is not an Admin password (the default
password you are familiar with by now is the User
password).
Time
The Time configuration option allows you to
configure, update, and maintain the correct time.
From this section you can set the time zone that
you are in and set the NTP (Network Time Protocol)
Server. Daylight Savings can also be configured to
automatically adjust the time when needed.
Time zone and Daylight savings settings
Enable / Disable and set NTP Server
Set the date and time manually
Allows for you to copy your computer’s current
time settings.
Syslog
This option allows you to log information about your
network. You can send this information to a Syslog
Server.
Enable / Disable Syslog Server
Set Syslog Server IP Address
The Email option can be used to send your Syslog
information to your e-mail account. You can also
select at what intervals you would like to receive
this information about your network.
Enable / Disable E-mail Notification
Set Email Settings
Set Email Notification Schedule
The System page allows you to reboot your CTR
router to the factory default settings without using
the hardware Reset button found just inside and
under the battery cover of the unit. Remember,
restoring the Default Factory Settings will erase all
of your configured changes.
Reboot the Device
Restore all Settings to the Factory Defaults
The Firmware page allows you to check for and
install the latest version of your CTR software.
Upgrades improve the functionality and
performance of the CTR. You can set the CTR to
notify you by E-Mail when a newer version of the
software is available.
Firmware information and latest version check
Download Firmware Upgrade section
Set Firmware Upgrade notification options
The DDNS feature allows you to host a server (Web,
FTP, etc) using a domain name that you have
purchased (www.yourchoiceofname.com) with your
dynamically assigned IP Address. Most Broadband
Internet Service Providers assign dynamic
(changing) IP Addresses. Using a DDNS service
provider, your friends can enter your host name to
connect to your server no matter what your IP
address is.
Enable / Disable DNS
Dynamic DNS Settings
Email
System
Firmware
Dynamic DNS
10
STATUS Topics
All of your Internet and network connection details
are displayed on this page. The firmware version
is also displayed here.
View
View
View
View
View
Wireless
Use this option to view the wireless clients that
are connected to your network.
View Number of Wireless Clients
View Trusted Clients
Routing
This page displays the routing details configured
for your CTR.
View Routing Settings
Logs
This page allows you to view the Syslog
information about your CTR. You can define what
types of events you want to view and the event
levels to view.
Set Syslog Options
View / Edit Syslog Details
Statistics
View all your network’s Traffic Statistics from this
page. Traffic Statistics display Receive and
Transmit packets passing though your CTR router.
LAN Statistics
WAN Statistics
Wireless Statistics
This page displays the full details of the actives
sessions to your CTR router.
View Active Sessions
Device Info
Active Sessions
Time and Firmware Version
WAN Settings
LAN Settings
Wireless LAN Settings
LAN Computers
HELP Topics
Subtopics
Each of the sections on the Help Topics page
contain a hyperlink for quick and easy location of
the subtopics you would like to view and/or edit.
Simply click the topic page in the side navigation
bar or click the subtopics in each section of the
page you would like to jump to.
Hyperlinks to each main and subtopic of the Help
and Setup Pages.
GLOSSARY Pages
The glossary provides you with definitions to aide your
understanding of the CTR functionality.
11
Hyperlinks by letter to jump to lexigraphically ordered
sections of the page.
The Wizards
To begin, select
Select
on the main screen of the Help Pages.
to go to
the next step.
You can select
at
anytime to return to the
main
Help page.
When setting your password, it is
more
secure to use a combination of
letters
and numbers while using
something that is easy for you to
remember.
You can select
at anytime to return to the previous step.
Select the arrow on the pull down menu
to show all available
time zones and
chose the zone which applies to your
area.
12
If you are using your cell phone or USB cellular modem.
If you are using Cable/DSL or other Ethernet LAN
connection over Ethernet to connect to the Internet.
Use the pull down menu to select your cellular plan.
Select if your network requires a password.
This information can be obtained by contacting your ISP
(Internet Service Provider). If you are using your cellular
phone, your ISP is your cellular operator such as Verizon,
Sprint, T-Mobile, etc.
13
Select when you are finished.
Abandon all changes and return
to the main Help Page.
Go Back.
Reboot the CTR to save and use your
changes now.
Continue without saving
until next reboot.
Allow a few moments for the
CTR to complete its reboot
cycle.
You will be asked to enter your
new password to login.
14
changes
Your Basic Internet settings have now been configured!
After your changes have been saved, log into the CTR using your new password.
Select
on the main screen of the Help and Setup page.
Select to go to
the next step.
Select to go back to the main screen
of the Help and Setup Pages at anytime.
This section will rename your wireless
network. It is the name others will see as
well the name shown in your list of available
wireless networks on your computer.
Go Back.
Security is an important aspect of your
online lifestyle. It is recommended that you
select “BETTER” or “BEST” to ensure
minimal attack from malicious Internet
users.
15
After you reboot your CTR be sure to look
for it by the new SSID. (Network Name)
Select Reboot the Device to save your changes. Allow a
few moments for your CTR to reboot and your computer
to re-associate with the network.
When you login you will be asked to enter you password according to your new security settings. If at
anytime you cannot remember your password you can reset the CTR to it’s factory default settings.
Fact ory D efault Reset
The Factory Default reset will clear all your saved settings on the CTR. The user name and password will
revert back to the original “CTR-xxx” SSID and use the last 6 digits of the MAC Address for the password.
To use the factory default reset, simply:
1. Un-plug the CTR from external power.
2. Locate the Factory Reset button at the rear of the unit.
3. Press and hold the Reset button while you plug the CTR back into external power.
4. Release the button after you see the LEDs flash ON, OFF, then ON again.
16
All your settings will return to the factory presets as the CTR reboots.
Tips and Troubleshooting
The Error Pages
DATA SERVICE UNAVAILABLE
The KRT is designed to recognize if your cellular phone is not
enabled with a tethered data plan required to operate as a
modem. If you see this page, first verify that your phone or
modem is correctly connected to the KRT. You may need to
contact your cellular service company for details about your
data plan.
PHONE NOT AVAILABLE
This page may occur for several reasons:
Your cellular phone or USB modem may not be securely
connected to the KRT.
Your phone is not on or in “modem” mode.
You should double-check your connections, and verify the proper operation of your
handset or modem. In the case of a USB modem, refer to your modem manual to
confirm that you have proper coverage and signal strength by observing its indicator
lights.
UNABLE TO CONNECT TO WAN
If this page appears , confirm that your phone or USB modem is turned
on, properly connected, has sufficient battery, and adequate coverage
and signal strength.
If you still are not able to get a connection, check the following:
Confirm that the cable connecting your phone or modem to the CTR is
good – try an alternative in case there is a poor connection.
The data port on your phone is bad.
The battery power on the KRT is low and needs to be connected to
external power.
Your cellular phone may be malfunctioning and/or your service provider
is having technical problems.
17
HANDSET ERROR
If your phone has a bad signal, no service plan, a bad connection
port, a low battery, is OFF, or malfunctioning in some way, you
may get this page.
Try turning your phone OFF, then back ON or contact your service
provider for technical assistance. If you have been successful at
connecting before, try relocating the phone or modem to insure
you have proper coverage.
DNS POISONING
Occasionally after changing settings and rebooting the KRT the
browser’s cache needs to be cleared. If you see this page simply close
completely out of your browser and launch it again.
MAXIMUM NUMBER OF USERS CONNECTED
Appearance of this page indicates the number of users/clients allowed on
your network has been reached.
Either the maximum allowed clients setting is set too low or already at full
capacity.
The number of clients allowed on your network is a setting you can change
in the Help and Setup Pages on your KRT. The setting is by default only
set to 1 for your security and can be adjusted in the Help and Setup Pages.
18
Securit y Not es
It is highly recommended that you follow the next few suggestions to help ensure your security while using the KRT:
1.
Change Admin Password
Changing the password to access your new router is the first step in securing your network. This can be done through the Wizard or on
the Admin Page of the Tools tab. Make sure that the password you choose is not commonly known or something that is easy to guess
such as your last name or your pet’s name. Try using a combination of letters and numbers (alpha-numeric) to deter intruders from
breaking into your network. Your private information should be kept private.
2.
Disable DHCP and use Static IP addresses or Use Static DHCP and limit scope to the amount of users on your network.
The KRT comes with the setting for maximum users on your network set to 1. Until you change this setting you will be the only
computer allowed to access the network. Even so, in the event that an intruder manages to gain access to your network, having DHCP
enabled makes it easier for the intruder to access other computers on your network.
There are two methods to prevent this:
One way is to disable DHCP and use static IP addressing on all the devices connected to your network. This would mean that the intruder
would have to know what network your devices are on in order to access them. However, this would make it more difficult to share
access with new or occasional users.
The second way is to change the scope of the DHCP server to only include enough IP addresses (or IP range) for the devices in your
network. You can then use the Static DHCP feature of the router to assign an IP address to each device on your network. Static DHCP still
dynamically assigns an IP address to your network devices but only allows for those defined devices to obtain an IP address.
3.
Change the default LAN IP address
Change the default LAN IP address from 192.168.0.1 to an alternate IP address. There are 3 ranges of IP addresses that have been
reserved for use on Private Networks.
10.0.0.0 - 10.255.255.255 (10.0.0.0/8)
172.16.0.0- 172.31.255.255 (172.16.0.0/12)
192.168.0.0 - 192.168.255.255 (192.168.0.0/16)
CradlePoint KRT routers use 192.168.0.1 as their default LAN IP address. Choosing an alternate IP address lessens the probability of an
intruders knowing what IP network your devices are on.
4.
Set up MAC Filtering
Each networking device (router, network card, etc) on a network contains a unique hexadecimal number that identifies that specific
product. This number is referred to as a MAC address. MAC filtering allows you to create a list of the MAC address of each device on your
network and only allows these specific devices to associate with your network. With this feature enabled, devices attempting to connect
to your network with a MAC address that is not in the list you created, will be denied access.
THE KRT COMES TO YOU WITH YOUR SECURITY IN MIND:
The Personal HotSpot is equipped with several features designed to maintain security and provide easy setup to with any Cellular data network.
· PCs Hidden by NAT
NAT opens a temporary path to the Internet for requests originating from the local network. Requests originating from outside the LAN
are discarded, preventing users outside the LAN from finding and directly accessing the PCs on the LAN.
· IP Address Sharing by NAT
The Personal HotSpot allows several networked PCs to share an Internet account using only a single IP address, which may be statically
or dynamically assigned by your Internet service provider (ISP). This technique, known as NAT, allows the use of an inexpensive singleuser ISP account.
· Automatic Configuration of Attached PCs by DHCP
The Personal HotSpot dynamically assigns network configuration information, including IP, gateway, and domain name server (DNS)
addresses, to attached PCs on the LAN using the Dynamic Host Configuration Protocol (DHCP). This feature greatly simplifies
configuration of PCs on your local network.
· DNS Proxy
When DHCP is enabled and no DNS addresses are specified, the Personal HotSpot provides its own address as a DNS server to the
attached PCs. The Personal HotSpot obtains actual DNS addresses from the ISP during connection setup and forwards DNS requests
from the LAN.
19
Care and Maintenance
Operating T emp eratures
Storage Te mperatures
Humidity
The op erating te mperatures should re main b etw een 0°C to +55°C degre es. Te mperatures outsid e
this range may cause dama ge to your KRT.
Store your KRT in t emp eratures not to exce ed th e b ounds of - 40°C to + 85°C. Temperatures
outside this range may cause damag e t o your KRT.
Exposure t o humidit y can cause your KRT to malfunction and/ or cause permanent dama gg e. To
avoid this, k eep your router at humidity lev els b etw e en 0 and 70%.
The KRT may sto p functioning if exp osed to too much vibration or elect rical shock.
Shock and Vibration
It is
recomm ended that you place the KRT out of areas that ma y introduce t hese factors. Contact
the manufacturer for specific details.
Placing the KRT near m etal cabine ts or co mputer cases, larg e o bjects s uch as refridgerators, or
Netw ork Range and
Interferance
around w indow s tinted w ith Metalic- based UV coatings can cause interfe rence. If you are
experi encing proble ms with the rang e or int erference be sure that y our KRT is at l east placed as
high as possible if it cannot b e place d in the center of y our preffered coverage area.
Stable Position
No Shock
Low Vibration
No Water
Mild
Temperature
°F/C°
20
Indicators (LEDs)
There are three dual LEDS used to display the device status and operation. The LED functions are identified below. The LED location and order are identified on
the PCB reference drawing. The normal operating states are described below. In addition, LED’s flash during power on, power off, reset and factory reset
functions to provide a visual feedback to the user of what is happening.
COLOR
STATUS
Green
Connection to USB port is established.
Off
USB port not in use.
USB Status
(LED 0)
COLOR
STATUS
Green
Wide Area Network is ready via the Ethernet port.
Off
Ethernet port not in use or the connection is not
secure. Port not in use.
COLOR
STATUS
Green
WLAN is operating correctly.
Off
No handset connected, unit is negotiating the
connection, or no WLAN available.
WAN Status
(LED 1)
WLAN Status
(LED 2)
Power Status
(LED 3)
COLOR
Green
Off
STATUS
CTR is connected to external power / on.
CTR is OFF.
21
Glossary and Setup Details
Access Control List
ACL. Database of n etw ork devices that are allow ed t o access resources on the netw ork .
Access Point
AP. Device that allow s wireless clients to connect to it and access th e netw ork Ad- hoc netw ork
- Peer- to- Peer netw ork betw een w ireless clients
Address R esolution
Protocol
ARP. Used to map MAC ad dresses t o IP addr esses so that conversions c an be made in both
directions.
ADSL
Asymm etric Digital Subscriber Line
Advanced Encryption
AES. Gov ernment encryption standard
Standard
Alphanumeric
Characters A- Z and 0- 9
Antenna
Used to transmit and receiv e RF signals.
AppleTalk
A set of Local Area Network protocols dev elop ed b y A pple for their co mputer syst ems
AppleTalk Addr ess
AARP. Used t o map the MAC ad dresses of Appl e com puters to their A pp leTalk netw ork
Resolution Protocol
addresses, so that conv ersions can be made in both directions.
Application layer
ASCII
Attenuation
Authentication
7th Layer of the O SI model. Provid es services to applications to ensure that they can
communicate prop erly with other applications on a ne twork .
American Standard C ode for Information Int erchange. This system of ch aracters is most
commonly use d for t ext files
The loss in strength of digital an analog signals. The l oss is grea ter w he n the signal is b eing
transmitted o ver long distances.
To provid e cred entials, lik e a Passw ord, in order to verify that the pers on or de vice is r eally
w ho they are claiming to b e
Automatic Private IP
APIPA. An IP address that a Window s computer will assign its elf w hen it is configured to o btain
Addressing
an IP address automatically but no DH CP serv er is availabl e on th e netw ork .
Back ward Compati ble
The ability for new d evices to co mmunicate and interact w ith ol der l ega cy devices to guarantee
interoperability
Bandwidth
The maxi mum a mount of byt es or bits p er second that can be transmitt ed to and from a
netw ork device
Basic Input/ Output System
BIOS. A program that the processor of a comput er uses to startup the system once it is turned
on
Baud
Data transmission speed
Bit rate
The amount of bits that pass in giv en am ount of ti me bit/ sec – bits p er second
BOOTP
Bootstrap Protocol. Allow s for co mputers t o b e boot ed up and giv en an IP address with no user
intervention
Bottleneck
A tim e during processes w hen som ething causes the proc ess to slowdo w n or stop all t ogeth er
Broadband
A w ide band of frequ encies available for transmitting data
Broadcast
Transmitting data in all dir ections at once
Brow ser
A program that allows you to access r esources on the web and provides them to you graphically
Cable mod em
CardBus
A devic e that allow s you to connect a co mputer up to a coaxial cabl e a nd receive Internet
access from your Ca ble provider
A new er v ersion of the PC Card or PCMC IA int erface. It supports a 32- bit data path, DMA, and
consumes less volta ge
22
Carrier Sense Multipl e
Access/ Collision Avoidance
Carrier Sense Multipl e
Access/ Collision Detect
CSMA/ CA
CSMA/ CD
CAT 5
Categor y 5. Used f or 10/ 100 Mbps or 1Gbps Etherne t connections
Channel
The channel the w ireless signal is transmitted on.
Client
A program or user that requests data from a serv er.
Collision
When do tw o d evices on the sa me Ethernet netw ork try and transmit da ta at the e xact same
time.
Cook ie
Information that is store d on th e hard drive of your comput er that hold s your prefer ences to
the site that gav e your comput er the co ok ie.
Crack er
A talent ed and malicious computer user w ho gains unauthorized access to a co mputer or
netw ork of computers with the intention of stealing, maliciously modifyi ng, or destroying
information. Also k now n as a “Black Hat Hack er.” Often mistak enly refer red to as a Hack er.
CSMA/ CA
Carrier Sense Multipl e Access/ Collision Av oidance C SMA/ CD – Carrier S e nse Multiple
Access/ Collision Detection
Data
Data Encryption Standard
Information that has be en translated into binary d o that i t can be proce ssed or move d to
another device
Uses a randomly select ed 56- bit k ey that must b e k now n by both the se nder and the r eceiver
w hen information is exchanged
Data- Link layer
The second lay er of the OSI mod el. Controls the mov ement of data on t he physical link of a
netw ork
Database
Organizes information so that it can b e managed updated, as w ell as easily accessed b y users
or applications
DB- 25
A 25 ping male connector for attaching Ex ternal mo dems or R S- 232 serial devices DB- 9 – A 9
pin connector for RS- 232 connections
dBd, dBi, dBm
decibels r elated to dipole antenna, decibels relativ e to isotropic radiato r, decibels relati ve to
one milliwatt
Decrypt
To unscramble an encrypt ed messag e back into plain tex t
Default
Default Subnet Mask
Demilitarized zone - DMZ
DHCP
A pred etermin ed value or se tting that is used by a program when no user input has be en
entered for this value or set ting
The subnet on your router on the local area ne twork
A single co mputer or group of comput ers that can be accessed by both users on the Interne t as
w ell as users on the Local Network , but that is not prot ected by the sa me s ecurity as the Local
Netw ork .
Dynamic Host C onfiguration Protocol. Used to automatically assign I P a ddresses from a
predefined pool of addresses to computers or de vices that r equests the m (S ee Also DH CP IP
Address Range, Number of DHCP Dynamic Clients, Static DH CP Cli ents, DHCP Lease Tim e)
DHCP IP Address Range
This option defines the range of ad dresses availabl e for the router to as sign to y our internal
netw ork If you have any d evices using S tatic IP addresses, be sure the a ddresses do not fall
w ith in the range d efined her e.
DHCP Lease Ti me
The amount of tim e a co mputer may have an IP address b efore it is r eq uired to ren ew the l ease.
The lease functions just as the leas e on an apart ment would. The initial lease designates the
amount of ti me befor e the lease e xpires. If th e t enant wishes to retain their address w hen the
lease is expire d then the l ease is established. If the lease is no l onger needed then th e address
is allow ed to b e reused by som eone else.
Digital certificate
An electronic m ethod of providing credentials t o a s erver in order to have access to it or a
netw ork
23
Direct Sequence Spread
Spectrum – DSS S
Domain Name Syste m –
DNS
Modulation technique used b y 802.11 b wireless d evices
Translates Domain Names to IP addr esses
Data Over Cable S ervice
Interface Specifications –
The standard interface for cabl e m ode ms
DOCSIS
Domain name
Download
DSL – Digital Subscriber
Line
A name that is associated with an IP address
To send a request from on e com puter to another and hav e the file transmitted back to the
requesting comput er
High badnw idth internet connection over tel ephone lines
Duplex
Sending and recie ving data at the same tim e
DDNS – Dynamic DNS
Is provided nt com panies to allow users with Dynamic IP Addr esses to o btain a Domain Nam e
service
that w ill alw ays be link ed to their changing IP Addr ess. The IP Address i s updated either by
client softw are or b y a rout er that supports DDNS, w henever the IP Add ress changes
Dynamic IP Address
IP address that is assigned b y a DH CP server and that ma y change. Ca bl e Internet provid ers
usually use this method to assign IP Addr esses to their custom ers
EAP
Extensibl e Authentication Protocol
Email
Electronic Mail is a co mputer- stored messag e that is transmitted over t he Internet
Encryption
Converting data into cyph ertex t so that it cannot b e easily r ead
Ethernet
The most w idely used t echnology f or Local Area N etwork s
Fiber optic
File server
File sharing
Firew all
A w ay of s ending data through light impulses ov er glass or plastic wire or fiber
A comput er on a n etw ork that stores data so that the other com puters on the netw ork can all
access it
Allow ing data from computers on a network to b e accessed by other co mputers on th e netw ork
w ill different lev els of access rights
A devic e that protects r esources of the Local Area N etwork from unauthorized users outside of
the local netw ork
Firmw are
Programming that is insert ed into a hardware de vice that tells it how to function Fragmentation
– Break ing up data into smaller pieces to mak e it easier to stor e
FTP – File Transfer Protocol
Easiest w ay to transfer files betw een com puters on th e Internet Full- duplex – Sending and
Receiving data at the sam e ti me
Gain
The amount an a mplifier b oosts the w ireless signal
Gateway
A devic e that connects your netw ork to anoth er, lik e the your comput er to th e internet
Gbps – Giga bits per second
Gigabit Ethernet
Transmission technology that transfers data at a rate of 1 billion bi ts p er second
GUI – Graphical User
A visual w ay of int eracting w ith a comput er using such items as w indow s, icons, and menus.
Interface
Graphical user interfaces are used b y m ost m odern o perating syst ems
H.323
Hack er
A standard that provides consistancy of voice and vide o transmissions and compatibility for
video confrencing de vices
An enthusiastic and sk illfull computer programmer or user co mmonly mi stak en by the m edia for
a Crack er or Script Kiddie. (S ee Crack er)
24
Half Duplex
Data cannot be transmitt ed and r ecieved at the sam e ti me
Hashing
Transforming a string of characters into a shorter string w ith a predefin ed leng th
Hexid ecimal
Characters 0- 9 and A- F used to repr esent numb ers also k now n as base 16
Netw ork ing over t elephone lines, Netw ork ing standard that com bines 802.11b and DECT(Digital
HomePNA, Hom ePNF
enhanced cordless comminication) that provides spe eds up t o 1.6 m ega bits per s econd and a
distance of 150ft using a Frequency Hoping transmission method
Hop
HTTP – H ypert ext Transfer
Protocol
HTTPS – Hyp ertext
Transfer Protocol over S SL
Hub
The action of data pack ets b eing transmitt ed fro m one to another Host Computer on the
netw ork
Used to transfer files from HTTP serv ers (w eb servers) to HTTP clients (w eb browsers)
Used to encrypt and d ecrypt HTTP transmissions, also k now n as Seccure HTTP
A netw ork ing device that connects multiple d evices tog ether
ICMP – Internet Control
Message Protocol
One of the core protocols of the Internet protocol suite. Used mainly b y a netw ork ed
computers’ operating syste m to send error m essages for IP datagrams, diagnostics, or routing
purposes
IGMP – Internet Group
Used to mak e sure that comput ers can report their multicast group me mbership to adjacent
Managment Protocol
routers
IIS – Int ernet Informati on
Server
IKE – Int ernet Ke y
Exchange
Infrastructure
Input Port Range
Interface
A Web server and FTP server provid ed b y Microsoft
Used to ensure security for VPN exchange
In terms of a w ireless n etwork this is when w irek ess clients use an accress point t o fain acceess
to the netw ork
(See Sp ecial Applications pag e) The p ort range that you w ant to o pen t o internet traffic
(See Routing page ) Sp ecifies the nex t hop to be tak en if the route sp ec ified is used. A gateway
of 0.0.0.0 implies ther e is no next hop and th e IP addr ess matched is c onnected directl y to the
router on the interface specified ( either LAN or WAN)
Internet
A syste m of w orldw ide network s which uses TCP/ IP to allow for resources to be accressed from
computers around the world
Internet E xplorer
Internet Protocol
ISP – Internet S ervice
Procvider
Interoperability
Intranet
Intusion Detection
One of many w e b brow sers available for computers. Se e also M ozzilla. Firefox, Konqurer, Opera,
Safari
The m ethod of transfering data from one co mputer to another on the In ternet
Company that provid es internet to individuals or companies
The ablity for products to interact w ith eachother w ithout much consumer interaction.
Generally se en as an asset to any product
A private netw ork
A typ e of security that scans a netw ork to de tect a ttack s coming from inside and outside the
netw ork
IP – Internet Protocol
IP Address
A 32- bit number, w hen talk ing about Iternet Protocol V ersion 4, that id entifies each com puter
that transmits data on the internet or intranet
IPv6 – Internet Protocol
Uses 128 bit addresses and w as dev elop ed t o solv e the probl em that w e face running out of IP
Version 6
version 4 addresses
IPX – Internetw ok Pack et
A netw ork ing protocol d ev elope d b y Nov ell t o enabl e th eir Netware clie nts and servers to
Exchange
communicate
Java
A program ming language used t o creat e progra ms and appl ets for we b p ages
25
Kbps
Kilobits per s econd
Kerberos
A m ethod of securing and authenticating requests for services on a net w ork
LAN – Local Area N etw ork
Latancy
A groupp of comput ers in a building that usually access files from a ser ver
The amount of tim e a pack et tak es t o trav el from one l ocation to anoth er on a ne tw ork . Also
reffered t o as d elay.
LED
Light Em mitting Diod e
Legacy
Older d evices or technolog y
MB – MegaBy te
Mbps
MAC Addr ess
Megabits per s econd
A unique hardw are address for d evices on a LAN. Each network ing de vice (router, ne tw ork card,
etc) on a netw ork contains a unique hexad ecimal numb er that id entifies that specific product.
MAC Filtering
MAC filtering allow s you to create a list of the MAC a ddress of each dev ice on y our network and
only allow s these specific devic es to associate with y our network . With this feature enabl ed,
devices att em pting to connect to your ne tw ork w ith a MAC address that is not in the list you
created, w ill be deni ed access.
Metric
(See Routing page ) Sp ecifies the interface, LAN or WAN, that the IP Pack et must use to transit
out of the router w hen the select ed rout e is used
MIB - Managem ent
Infomation Base
MTU – Maximum
Transmission Unit
Multicast
A set of o bjects that can be managed b y using SNMP
The largest pack et that can b e transmitt ed on a pack et based n etw ork lik e the internet
Sending data fro m on e d evice t o many d evices on the ne tw ork
NAT – Netw ork Addr ess
Allow s many privat e IP ad dressses to connect to the Internet, or anoth e rnetwork , through one
Translation
IP address
NetBIOS E xtende d User Int erfaceis a Local Area Netw ork commincation protocol. This is an
NetBEUI
updated v ersion of Ne tBIOS
NetBIOS
Netw ork Basic Input/ Output System
NetMask
Determines what portion of an IP ad dress desi gnates the Netw ork and w hich art designates the
Host
NetWare
Server softw are dev elop ed b y No vell
NIC – Ne tw ork Interface
A card installed in a co mputer or built onto the m otherboard that allows the co mputer t o
Card
connect to a ne tw ork
Netw ork Layer
The third layer of the O SI model which handles the routing of traffic on the netw ork .
In this section, you can se e w hat LAN d evices are currently leasing IP a ddresses. The DHCP
Client tabl e displa ys the number of clients that ar e receiving an IP addr ess from th e router. The
Number of Dynamic DH CP
Clients
computer nam e, MAC ad dress, and IP address assigne d to each com pute r are displaye d here as
w ell. You can Rev ok e IP addr esses in this secti on. The rev ok e op tion all ows you to tak e aw ay a
leased IP ad dress from a client. This feature is useful for freeing up add resses w hen the client
table is full or nearly full. Be sure to only r evok e ad dresses from de vice s that are no l onger
needed on the netw ork .
NTP – Netw ork Time
Protocol
Used to s ynchronize the tim e of all the comput ers on the network
26
OSI – Op en Syst ems
Intercommunication
OSPF – Open Short est Path
First
The reference mo del for how data should travel b etw een tw o d evices on a netw ork .
A routing protocol that is used mor e than RIP in larg er scale n etw ork s because only changes t o
the routing tabl e are sent to all the o ther routers in th e network as opp osed to sending the
entire routing ta ble at a re gular interval, w hich is how RIP functions.
Passsw ord
A sequence of characters that is used to authenticate requests to reso urces on a netw ork
Personal Area Netw ork
The interconnection of network ing d evices w ithin a range of 10 m eters
Physical Layer
The first layer of the OS I m odel, pro viding the hardware a m eans of tran mitting electrical
signals on a data carrier
PoE – Pow er over Ethernet
The m eans of transmitting electricity over the unused pairs in a C AT5 cable.
Policy Name
(See Access C ontol pa ge) The nam e of the acces control policy you hav e or are creating.
POP3 – Post Office
Protocol 3
PPP – Point to Point
Protocol
Used for recieving mail
Used for tw o co mputers to com minicate with eachother over a serial int erface, lik e a phone line
Preamble
Used to s ynchronize communication timing betwe en d evices on a netwo rk
Private Port
The port that w ill be used on your internal netw ork
Public Port
The port that w ill be accessed fro m the internet
QOS
Quality of Service
RADIUS – R emo te
Authentication Dial- in User
Service
Remo te Manag ment
Remo te Manag ement Port
Rendezvous
Repeat er
RIP – Routing Information
Protocol
Allow s for remo te users to dial into a c entral server and be authenticated in ord er to access
resources on a netw ork .
Allow s you to manag e y our router from anyw here w ith an internet conn ection. Se e T ools
Admin
The port that w ill be accessed fro m the internet.
Apple’s v ersion of UpnP, w hich allow s for devices on a ne tw ork to disco ver eachother and be
connected w ithout the ne ed to configure any settings.
Retransmits the signal of an Access Point in order t o ext end its cov erag e.
Used to s ynchronize the routing tabl e of all the routers on a netw ork .
RIP Announcement
This option is used w ith multiple routers to broadcast routing informati on.
Router Metric
This option is used if you hav e multiple rout ers.
RJ- 11, RJ- 45
The most com monly used connection m ethod for tel ephones, The most commonly use d
connection method f or Eth ernet.
RS- 232C
The interface for s erial communication b etw een co mpuuters and oth er r ealated devices.
RSA Al gorithm
Used for encryption and authentication.
Samba
Server
Session Key
Session Layer
SMTP – Simpl e Mail
Transfer Protocol
A freew are program that allow s for resources to be shared on a ne twork . Mainly used in Unix
based op erating syst ems
A comput er on a n etw ork that provides services and r esources to other computers on the
netw ork
An Encryption and d ecryption k e y that is generat ed for ev ery co mmunication session be tw een
tw o computers
The fifth lay er of the OSI mod el which coordinates the connection and communication betw e en
applications at both ends
Used for sending and r ecieving mail
27
SNMP – Simple netw ork
Management Protocol
Govens the manage ment and monitoring of network de vices
Special Applications
The Sp ecial Application section is used t o op en single or multipl e p orts on your router w hen the
router senses data sent to the Internet on a ‘trigg er’ port or port range . Special Applications
rules apply to all co mputers on your internal netw ork .
SSH – Secure Shell
A com mand line interface that allow s for secure connections t o re mote computers
SSID – S ervice S et
Identifier
A name for a w ireless n etwork
A feature of a firew all that monitors out going and incoming traffic to m ak e sure that only valid
SPI - Stateful Pack et
reponses to outgoing requests ar e allowed to pass through the firewall. When SPI is enabled,
Inspection
the e xtra state information w ill b e re ported on the Status > Active sessions page.
Static DHCP Cli ents receiv e th e sam e IP ad dress all the tim e. This is alm ost the sa me as if a
device has a static IP address exce pt that it must still actually request an IP address from the
CradlePoint Rout er. The Cradl ePoint Rout er w ill provide the devic e the s ame IP a ddress all th e
Static DHCP Cli ent
time. S ervers on your network should eith er use a static IP address or t his option. To input the
MAC address of your syst em, enter i t in manually or connect to the CradlePoint Router’s We bManagement int erface from the syst em and click the Co py Your PC’s MA C Addr ess button.
Entries on this list can b e enabled/ disable d b y t oggling the Enable check box. Entries can b e
modified by click ing on the pap er and p encil icon. To del et e an entry, cli ck on the trash can
icon. After you’ve compl eted all m odifications or d eletions, y ou must cli ck the Save Se ttings
Static DHCP Cli ent List
button at the top of the pa ge to sav e y our changes. The router must re boot before new
settings w ill tak e effect. You w ill be prompt ed to Reb oot the Devic e or Continue. If you n eed to
mak e additional s ettings changes, click Continue. If you are finished w it h your configuration
settings, click the Re boot the De vice button.
Static IP Addr ess
An IP address that is enter ed manually on the devic e.
Subnet Mask
Determines th e portion of an IP addr ess designat ed t o the Network and the portion d edicated
to the Host. ( Se e also Default Subnet Mask )
TCP – Transmission Control
Applications on network ed hosts use TCP t o creat e connections to one another, over w hich
Protocol
they can e xchange data. T CP is the layer a bov e the IP and below th e ap plication.
TCP/ IP – Transmission
control Protocol/ Internet
Also k now n as the Internet Protocol Suit e. Impl em ent the protocol stack on w hich netw ork s run.
Protocol
Thoughput
The amount of data that can be transfered in a given time perio d.
Trace route
A utility that displays th e routes be tw een your computer and a sp ecific destination.
Transmission Rate
Speed of data on th e Local Area Netw ork
Trigger Port Range
(See Sp ecial Applications pag e) Enter the outgoing p ort range used b y your application. Select
the outbound pro tocol used by your application.
UDP – User Datagram
Allow s programs on ne tw ork ed comput er to send short messages called datagrams to one
Protocol
another.
UNC - Universal Naming
Allow s for shares on a com puter to b e id entified without having to k no w w hat storage d evice it
Convention
is on
Unicast
Communication b etween a single s ender and r eciever
UPnP – Universal Plug and
The feature w hich allow s devices to id entify eachother on a netw ork without requiring set up by
Play
the user
URL – Uniform Resource
Locator
A unique address for fil es accessible on the internet
28
V
VPN – Virtual Private
A secure tunnel ov er the internet to connect remo te offices or users t o thier company’s
Netw ork
netw ork
The Virtual Serv er op tion giv es Int ernet users access to services on you r LAN. This feature is
useful for hosting online services such as FTP, Web, or Game S ervers. F or each Virtual Serv er,
you define a public p ort on your router for r edirection t o an internal LA N IP Address and port.
Exampl e: You ar e hosting a Web Serv er on a Laptop or PC that has Private IP Address of
192.168.0.50 and your ISP is block ing Port 80.
1. Name the Virtual Serv er Rule ( ex. We b
Server)
2. Enter in the IP Addr ess of the machine
on your LAN 192.168.1.1
Virtual Sever
3. Enter the Private Port as [80]
4. Enter the Public Port as [8888]
5. Select th e Protocol - T CP
6. Ensure the schedule is s et t o Alw ays
7. Check the Add Rule to ad d the settings
8. Repeat these steps for each Virtual
9. Server Rule you w ish to add. After the
list is comple te, click Save Se ttings at
the t op of the page.
With this Virtual Server Rule all Internet traffic on Port 8888 will be red irected t o y our internal
w eb serv er on port 80 at IP Address 192.168.0.50.
Entries on this list can b e enabled/ disable d b y t oggling the Enable check box. Entries can b e
modified by click ing on the pap er and p encil icon. To del et e an entry, cli ck on the trash can
Virtual Servers List
icon. After you’ve compl eted all m odifications or d eletions, y ou must cli ck the Save Se ttings
button at the top of the pa ge to sav e y our changes. The router must re boot before new
settings w ill tak e effect. You w ill be prompt ed to Reb oot the Devic e or Continue. Reb oot the
device if you are satisfied w ith your settings.
Virtual Server Rule
Name of the virtual s erver, such as Web Server
Whether or not th e SS ID w ill be visible on th e LAN. If this is set to invisible oth ers will not
Visibility S tatus
beable to se e y our network in their list of availabl e network s without sp ecial configurations. You
w ill have to connect to an invisibl e network b y manually entering th e na me into your connect
utility on y our computer.
VoIP – V oice o ver Int ernet
Protocol (IP)
Sending voice information o ver th e internet
Wak e on LAN
Allow s you to pow er up a comput er thrrough it’s NIC on a WAN.
A utility that allow s you t o vi ew content and int eract with all of th e information in the World
Web Browser
Wide Web. E xampl es include: Firefox, Mozzilla, Safari, Op era, and lastly though often less
flexible and secure, Internet E xplorer.
WEP – Wired Equivalent
Privacy
Security for w ireless ne tw ork s that is supposed t o b e co mpatibl e t o tha t of a w ired network .
Wi- Fi
Wireless Fidelity
WPA – WiFi Protected
An updated version of s ecurity for w ireless ne tw ork s that provides auth entication as w ell as
Access
encryption.
Wide Area Netw ork
A netw ork spanning a large geo graphical area or consisting of more than one LAN.
Wireless Netw ork Name
The SSID for the rout er.
WISP - Wireless ISP
A company that provid es a broadband connection o ver w ireless connections to the internet.
29
WLAN - Wireless LAN
Connecting to a Loacl Area Network over one of the 802.11 wireless standards
Yagi Ant enna
A diractional antenna used to concentrate a wirel ess signal on a spa ecific location
30

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.6
Linearized                      : No
Encryption                      : Standard V2.3 (128-bit)
User Access                     : Print, Extract, Print high-res
XMP Toolkit                     : 3.1-701
Create Date                     : 2007:01:31 15:38:16-07:00
Creator Tool                    : Word
Modify Date                     : 2007:02:02 14:28:40+08:00
Metadata Date                   : 2007:02:02 14:28:40+08:00
Format                          : application/pdf
Creator                         : misskniss
Title                           : Microsoft Word - CTR User's Manual.doc
Producer                        : Mac OS X 10.4.8 Quartz PDFContext
Document ID                     : uuid:7663f277-d1c7-41b3-9118-8ecf93459e85
Instance ID                     : uuid:c548cafb-6a68-4d52-8c62-5f67e835063b
Has XFA                         : No
Page Count                      : 31
Author                          : misskniss
EXIF Metadata provided by EXIF.tools
FCC ID Filing: UXX-CTR350

Navigation menu