Cradlepoint CTR350 Cellular Travel Router User Manual CTR User s Manual
Cradlepoint, Inc. Cellular Travel Router CTR User s Manual
Users Manual
CTR Cellular Travel Router User’s Manual Contents Getting Acquainted Compliance Notes Introduction CTR at a Glance Using the Controls Getting on the Internet Configuring Your Wi reless Netwo rk 12 16 Welcome to the Help and Setup Pages Navigating the Help and Setup Pages The Wizards Factory Default Reset Tips and Troubleshooting 17 18 19 The Error Pages “Data Service Not Available” “Phone Not Available” “Unable to Connect to WAN” “Handset Error” “DNS Poisoning” “Maximum Number of Users Connected” Security Notes 20 Care a nd Mainten ance 21 Indicators (LE Ds) 22 Glossary and Setup De tails Com pliance Not es FCC No tic e: This device complies with part 15 of the FCC rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. Caution: The user is cautioned that changes or modifications not expressly approved by the party responsible for compliance could void the warranty and users’ authority to operate the equipment. Note: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: • • • • Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help. IMP ORTA NT N OT E: FCC Radiation Exposure Statement: This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body. Caution: To comply with the FCC RF exposure compliance requirements, this device must not be co-located or operating in conjunction with any other antenna or transmitter. Indus try Cana da No tic e: Operation is subject to the following two conditions: (1) this device may not cause interference, and (2) this device must accept any interference, including interference that may cause undesired operation of the device. The term “IC:” before the radio certification number only signifies that Industry Canada technical specifications were met. This product meets the applicable Industry Canada technical specifications of the RSS210. This class B device complies with Canadian ICES-003. Cet appareil numérique de la classe B est confome à la norme NMB-003 du Canada. FCC COMPLIANCE STATEMENT Property of CradlePoint, Inc For Internal Use Only. Unauthorized reproduction and/or distribution is strictly prohibited. This product is protected under copyright law and trade secret law as an unpublished work. Copyright (C) 2007 CradlePoint, Inc All rights reserved. Introduction WEL C OM E The CradlePoint CTR (Cellular Tra vel Router) is a high-performance Bro adband Cellular Ga te way designed to pro vide fast a nd con venient Inte rne t access while connected to a Cellular mode m o r handset. The CTR pro vides a straightforwa rd and porta ble Interne t connection leve raging adva nces from C radlePoint Tech nologies, Inc. The CTR includes the following featu res: Establishes shared network connection via standard WAN PPP when connecting DSL, Cable Modem, or other uplink to Ethernet port Establishes shared network connection via Cellular when connecting Cellular Phone or Cellular Modem to USB port Designed to work with all 3G cellular service provider networks Supports up to 128-bit WEP and WPA encryption for data-security Supports Virtual Private Network (VPN) pass-through Supports 1 Wired LAN connection Rugged but compact design is perfect for fixed or mobile applications Software algorithms boost efficiency, performance, and improve perceived network speed Auto-Upgrade Notification helps keep user updated with latest system CTR software revision GUI-based device management from any standard web Browser PACKA GE CO NT ENTS CradlePoint CTR Cellular Travel Router Power Adapter (5V/2.5A) CD-ROM with Manual Quick Installation Guide Carrying Case Note: Us ing a po wer supp ly wi th a differe nt vol tage t han t he one i ncl uded w ith your produ ct w ill cause d am ag e and void the warranty for thi s produc t. If any of the above items are missing, please contact your reseller. OV ERVI EW OF F EA TURES Instantly creates a personal WiFi Hotspot anywhere within the Cellular Service Providers' network. No software to install: Follows simplicity of 802. 11 wireless standards Supports multiple simultaneous wireless LAN clients Includes advanced wireless router features: NAT/NAPT Firewall DHCP Server Security - MAC Address Filtering or WPA or WEP Encryption Web-based Configuration and User Interface Automatic firmware upgrades Bridges from Cellular phone/modem connection to wired Ethernet for a no-software secure Internet connection Recharges the handset battery and CTR internal battery when connected to an external power source. Windows, Macintosh and Linux support. A CTR at a Glance A. LED 0 - USB Status B. LED 1 - LAN Status C. LED 2 - WLAN Status D. LED 3 - Power Status E. Ventilation Slots F. CAT 5 (Ethernet) Port G. Power Connector H. Factory Reset Button I. USB Port Top Bottom Rear Front Input / Output Using the Controls LED 0 – USB Status LED 1 – WAN Status Green OFF LED 2 – WLAN Status OFF LED 3 – Power Status Ventilation Slots Ethernet Port Green OFF Green OFF Connection to USB port is established. USB port not in use. Wide Area Network is ready via the Ethernet port. Ethernet port not in use or the connection is not secure. Port not in use. No handset connected, unit is negotiating the connection, or no WLAN available. CTR is connected to external power / on. CTR is OFF. These allow excess heat to be removed from the CTR while operating. It is recommended that the unit not be covered with any material that will block the dispersion of heat away from the unit. The unit should not reach extreme temperatures. The Ethernet port allows you to connect to the unit via CAT5 cable on a LAN. OFF The unit is completely OFF when the unit is not connected to external power and the ON / OFF switch is in the OFF position. The unit will charge its own battery and the phone battery if switched OFF and connected to external power. Note: The option to charge the phone’s battery must be selected in the CTR setup pages. The unit will ONLY charge the phone battery when switched OFF and NOT connected to external power. Note: The option to charge the phone’s battery must be selected in the CTR setup pages. * No access to the router or the wireless network can be established while the unit is OFF. ON / OFF Status External Power Connection CA UTION: Using a power supply with a different voltage than the one included with your product will cause damage to the unit and void the warranty. ON If the unit is ON and not connected to a phone or handset, it’s Setup / Help Pages are still accessible by associating with its SSID (Network Name) and entering 192.168.0.1 into the URL bar of a web browser. Note: Login will be required to access the CTR Setup / Help Pages If the unit is ON and connected to a fully operable data-enabled cell phone or USB modem a wireless network will be automatically established. The laptop will automatically associated with the network. In some cases the user will need to selected the wireless network from their laptop’s wireless network list. (Details vary by Operating System.) The unit will operate off external power exclusively while connected to an external power source. If there is sufficient excess power available the unit will also charge the phone. The power connector is a standard jack size and when connected to the proper cable and an external power source will power the CTR according to the specifications listed in the ON / OFF switch section of the Controls list. Factory Default Reset Button To return all the User Defined configurations (such as those specified in the Setup / Help Pages) to their original factory default settings simply turn the unit OFF, press and hold the Factory Default Reset button, and turn the unit ON. After the LEDs have flashed ON then OFF then ON again, release the button. All setting should be reset. USB-to-Modem Port This is a standard USB port that is used to connect either to a USB modem or to a data-enabled cellular phone. Cables for USB to Data connection vary by phone manufacturer and are not provided with the CTR. Contact your service provider for further information. Getting Connected The CTR supports two methods of connecting to the Internet: 1) a standard wired-WAN connection such as a DSL, Cable, or Hotel Ethernet, or hosted LAN connection; or 2) a Cellular modem connection using either a data-enabled handset or USB Modem. In the Wired-WAN case, connect the LAN cable into the Ethernet port of the CTR and it will establishes a connection to the Internet. In the Cellular case, plug your USB modem or handset into the USB host port and the CTR will establish a connection to the Internet. The CTR unit will begin broadcasting signals to create a local Wireless LAN network. If using a cellular phone, be sure you have configured the phone’s settings to act as a modem and have established a 'data plan' with your carrier/operator. Note that even though you may have a "Data Plan" for Internet access on the phone, there may be a separate option to enable 'tethered data'. If you do not have this option activated, you must contact your cellular carrier to activate this service. From your PC, use the wireless network finder to associate with your new wireless network. The first time you use the CTR your network will be named: CTR-xxx Where ‘xxx’ is the last three digits of the CTR’s 12 character MAC address (the MAC address is individualized and unique to each unit). This MAC Address is printed on the bottom label of the CTR. Once your computer has associated with your wireless network, open a standard Internet Browser application on your PC and you will be prompted to enter a password. The default password is the last six (6) characters of the MAC address (again, printed on the bottom of the unit). Once logged in, you will be presented with a 'successful logon' screen, indicating you can begin access the Internet with any of your PC applications. If you want the CTR to automatically recognize your PC, click the 'Remember Me' option, and your PC will be automatically logged in upon WLAN association. It is recommended that you change your password after your first login, which is easily accomplished using the CTR Setup Wizard. So how does it all work? The CradlePoint CTR is a 802.11b/g WiFi router that is also able to use a cellular phone–asmodem. Regardless of the type of Internet Access you have – Wired-WAN, Wired LAN, or Cellular, the CradlePoint CTR bridges from that Internet access to a local WiFi network. The result is your own personal, portable wireless network or “hotspot”. Set it up anywhere within your service provider’s coverage area whenever you want access to the Internet. Configuring Your Wireless Network Welcom e t o the Help and Set up Pag es! To access the Help Pages / CTR Setup Pages: Be sure that the CTR and Phone/Modem are ON. Select the CTR-xxx wireless network from your computer’s list of Wireless Networks. Once your computer has associated with the CTR, open your Web Browser and enter http://192.168.0.1 into the URL Address bar. This allows you to access the CTR’s embedded server pages. You will be asked to enter your Password. The default password is set to the last 6 digits of the CTR MAC Address found on the bottom label of your CTR. This is the home screen of the CTR Help and Setup Pages. From here you can configure your network. It is recommended that you run the Setup Wizard when you first use the CTR. This will allow you to personalize your network name (SSID) and passwords, and you can change the security settings to meet your needs. Navigating the Help and Setup Pages Select the Main Topic tab you wish to use. Use the side navigation menu to access subtopics. Be sure to save your settings before leaving each page. You can abandon all your changes at anytime by selecting “Don’t Save Settings.” What you’ll find in these pages BASIC Topics These wizards are designed to assist you in configuring your wireless network once you have completed the steps found in the Getting On The Internet section of this manual. Use the wizards to name your network, set your new password, and set the security levels for your new CTR. Internet Connection Setup Wizard Internet Security Setup Wizard WAN This page is used to set your Internet connection type. For most users, the default settings are appropriate for everyday usage. Specify DNS Servers Advanced DNS settings MTU Settings Link Drop Delay WAN Port Speed Ping Response Settings MAC Cloning Settings LAN Use this page to configure the internal network settings of your CTR router. The IP Address that is configured here is the IP Address that you use to access the Web-based management interface. If you change the IP Address here, you may need to adjust your PC’s network settings to access the network again. The default settings are appropriate for most everyday users. Set IP Address Set Subnet Mask RIP Settings Set Router Metric Default Router set Enable/Disable IGMP Enable/Disable DNS Relay Wizard DHCP Wireless This page is used to configure the built in DHCP Server to assign IP Addresses to the computers on your network. This page is used to configure your basic wireless settings for your CTR. From here you can set the visibility of your network to others, your wireless Enable/Disable DHCP Server Specify DHCP IP Address Range Specify Lease Time Enable DHCP Broadcast View DHCP Clients Add DHCP Reservation View Reservations List Enable/Disable Wireless Radio Set SSID Set Network Visibility Auto/Manual Channel Select network name, and security type. Some of these features may have already been set by you if you used the Setup wizards on the main screen of the Help and Setup Pages. Set Transmission Rate Set 802.11 Mode Set “Super G “Mode ADVANCED Topics Virtual Server Special Applications Routing Access Control Web Filter MAC Address Filter Firewall Inbound Filter The Virtual Server option allows you to define a single public port on your router for redirection to an internal LAN IP Address and Private LAN port if required. This feature is useful for hosting online services such as FTP or Web Servers. The Special Applications option is used to open single or multiple ports on your router when the router senses data sent to the Internet on a “trigger” port or port range. Special Applications rules apply to all computers on your internal network. The Routing option allows you to apply fixed routes to defined destinations. The Access Control option allows you to control access in and out if your network. Use this feature as Access Controls to only grant access to approved sites, limit web access based on time or dates, and/or block network access for certain applications. This page includes a wizard to assist you in adding new policies. The Web Filter option allows you to set up a list of allowed Websites that can be used by multiple users. When the Web Filter is enabled, all other Websites not listed on this page will be blocked. To use this feature, you must also select the “Apply Web Filter” checkbox in the Access Control Section. The MAC Address (Media Access Controller) filter option is used to control network access based on the MAC Address of the network adapter. This feature can be used to ALLOW or DENY specific machines on your network. The DMZ (Demilitarized Zone) option provides you with an option to set a single computer on your network outside of the CTR router. If you have a computer that cannot run Internet applications successfully from behind the router, then you can place the computer into the DMZ for unrestricted internet access. This option is recommended to be a last resort, as it tends to leave the DMZ computer at a security risk. The Inbound Filter option is an advanced method of controlling data received from the Internet. With this feature you can configure inbound data filtering rules that control data based on an IP address range. You can use this to limit access to a server on your network to a system(s). Advanced Wireless These are more advanced settings for your wireless network. If you are unfamiliar with the settings it is recommended that you read the help section on this subtopic before changing any of the presets. Schedules The Schedules Rules feature is used to manage parental controls and firewall rules according to a schedule you define. Add Virtual Server View Virtual Servers List Application Level Gateway (ALG) Configuration Add Special Applications Rule View Spec Applications Rules List Add Route View Added Routes List View Existing Routes List Enable/Disable Access Control Policy Wizard View Existing Policies Add Website(s) View allowed Websites Enable MAC Address Filter Filter Setting (Allow/Deny clients) Add MAC Address View Filters Enable DMZ Set the DMZ IP Address Add Inbound Filter Rule View Added Inbound Filter Rules Fragmentation Threshold RTS Threshold Beacon Period DTIM Interval Enable 802.11d Transmit Power WDS Enable (Add WDS AP MAC Address) Add Schedule Rule View Added Schedule Rules TOOLS Topics Set Admin Password Set User Password Administration and Remote Settings Enable / Disable UPnP Save and Restore Configuration Admin The admin option is used to set a password for access to the Web-based management. By default there is not an Admin password (the default password you are familiar with by now is the User password). Time The Time configuration option allows you to configure, update, and maintain the correct time. From this section you can set the time zone that you are in and set the NTP (Network Time Protocol) Server. Daylight Savings can also be configured to automatically adjust the time when needed. Time zone and Daylight savings settings Enable / Disable and set NTP Server Set the date and time manually Allows for you to copy your computer’s current time settings. Syslog This option allows you to log information about your network. You can send this information to a Syslog Server. Enable / Disable Syslog Server Set Syslog Server IP Address The Email option can be used to send your Syslog information to your e-mail account. You can also select at what intervals you would like to receive this information about your network. Enable / Disable E-mail Notification Set Email Settings Set Email Notification Schedule The System page allows you to reboot your CTR router to the factory default settings without using the hardware Reset button found just inside and under the battery cover of the unit. Remember, restoring the Default Factory Settings will erase all of your configured changes. Reboot the Device Restore all Settings to the Factory Defaults The Firmware page allows you to check for and install the latest version of your CTR software. Upgrades improve the functionality and performance of the CTR. You can set the CTR to notify you by E-Mail when a newer version of the software is available. Firmware information and latest version check Download Firmware Upgrade section Set Firmware Upgrade notification options The DDNS feature allows you to host a server (Web, FTP, etc) using a domain name that you have purchased (www.yourchoiceofname.com) with your dynamically assigned IP Address. Most Broadband Internet Service Providers assign dynamic (changing) IP Addresses. Using a DDNS service provider, your friends can enter your host name to connect to your server no matter what your IP address is. Enable / Disable DNS Dynamic DNS Settings Email System Firmware Dynamic DNS 10 STATUS Topics All of your Internet and network connection details are displayed on this page. The firmware version is also displayed here. View View View View View Wireless Use this option to view the wireless clients that are connected to your network. View Number of Wireless Clients View Trusted Clients Routing This page displays the routing details configured for your CTR. View Routing Settings Logs This page allows you to view the Syslog information about your CTR. You can define what types of events you want to view and the event levels to view. Set Syslog Options View / Edit Syslog Details Statistics View all your network’s Traffic Statistics from this page. Traffic Statistics display Receive and Transmit packets passing though your CTR router. LAN Statistics WAN Statistics Wireless Statistics This page displays the full details of the actives sessions to your CTR router. View Active Sessions Device Info Active Sessions Time and Firmware Version WAN Settings LAN Settings Wireless LAN Settings LAN Computers HELP Topics Subtopics Each of the sections on the Help Topics page contain a hyperlink for quick and easy location of the subtopics you would like to view and/or edit. Simply click the topic page in the side navigation bar or click the subtopics in each section of the page you would like to jump to. Hyperlinks to each main and subtopic of the Help and Setup Pages. GLOSSARY Pages The glossary provides you with definitions to aide your understanding of the CTR functionality. 11 Hyperlinks by letter to jump to lexigraphically ordered sections of the page. The Wizards To begin, select Select on the main screen of the Help Pages. to go to the next step. You can select at anytime to return to the main Help page. When setting your password, it is more secure to use a combination of letters and numbers while using something that is easy for you to remember. You can select at anytime to return to the previous step. Select the arrow on the pull down menu to show all available time zones and chose the zone which applies to your area. 12 If you are using your cell phone or USB cellular modem. If you are using Cable/DSL or other Ethernet LAN connection over Ethernet to connect to the Internet. Use the pull down menu to select your cellular plan. Select if your network requires a password. This information can be obtained by contacting your ISP (Internet Service Provider). If you are using your cellular phone, your ISP is your cellular operator such as Verizon, Sprint, T-Mobile, etc. 13 Select when you are finished. Abandon all changes and return to the main Help Page. Go Back. Reboot the CTR to save and use your changes now. Continue without saving until next reboot. Allow a few moments for the CTR to complete its reboot cycle. You will be asked to enter your new password to login. 14 changes Your Basic Internet settings have now been configured! After your changes have been saved, log into the CTR using your new password. Select on the main screen of the Help and Setup page. Select to go to the next step. Select to go back to the main screen of the Help and Setup Pages at anytime. This section will rename your wireless network. It is the name others will see as well the name shown in your list of available wireless networks on your computer. Go Back. Security is an important aspect of your online lifestyle. It is recommended that you select “BETTER” or “BEST” to ensure minimal attack from malicious Internet users. 15 After you reboot your CTR be sure to look for it by the new SSID. (Network Name) Select Reboot the Device to save your changes. Allow a few moments for your CTR to reboot and your computer to re-associate with the network. When you login you will be asked to enter you password according to your new security settings. If at anytime you cannot remember your password you can reset the CTR to it’s factory default settings. Fact ory D efault Reset The Factory Default reset will clear all your saved settings on the CTR. The user name and password will revert back to the original “CTR-xxx” SSID and use the last 6 digits of the MAC Address for the password. To use the factory default reset, simply: 1. Un-plug the CTR from external power. 2. Locate the Factory Reset button at the rear of the unit. 3. Press and hold the Reset button while you plug the CTR back into external power. 4. Release the button after you see the LEDs flash ON, OFF, then ON again. 16 All your settings will return to the factory presets as the CTR reboots. Tips and Troubleshooting The Error Pages DATA SERVICE UNAVAILABLE The KRT is designed to recognize if your cellular phone is not enabled with a tethered data plan required to operate as a modem. If you see this page, first verify that your phone or modem is correctly connected to the KRT. You may need to contact your cellular service company for details about your data plan. PHONE NOT AVAILABLE This page may occur for several reasons: Your cellular phone or USB modem may not be securely connected to the KRT. Your phone is not on or in “modem” mode. You should double-check your connections, and verify the proper operation of your handset or modem. In the case of a USB modem, refer to your modem manual to confirm that you have proper coverage and signal strength by observing its indicator lights. UNABLE TO CONNECT TO WAN If this page appears , confirm that your phone or USB modem is turned on, properly connected, has sufficient battery, and adequate coverage and signal strength. If you still are not able to get a connection, check the following: Confirm that the cable connecting your phone or modem to the CTR is good – try an alternative in case there is a poor connection. The data port on your phone is bad. The battery power on the KRT is low and needs to be connected to external power. Your cellular phone may be malfunctioning and/or your service provider is having technical problems. 17 HANDSET ERROR If your phone has a bad signal, no service plan, a bad connection port, a low battery, is OFF, or malfunctioning in some way, you may get this page. Try turning your phone OFF, then back ON or contact your service provider for technical assistance. If you have been successful at connecting before, try relocating the phone or modem to insure you have proper coverage. DNS POISONING Occasionally after changing settings and rebooting the KRT the browser’s cache needs to be cleared. If you see this page simply close completely out of your browser and launch it again. MAXIMUM NUMBER OF USERS CONNECTED Appearance of this page indicates the number of users/clients allowed on your network has been reached. Either the maximum allowed clients setting is set too low or already at full capacity. The number of clients allowed on your network is a setting you can change in the Help and Setup Pages on your KRT. The setting is by default only set to 1 for your security and can be adjusted in the Help and Setup Pages. 18 Securit y Not es It is highly recommended that you follow the next few suggestions to help ensure your security while using the KRT: 1. Change Admin Password Changing the password to access your new router is the first step in securing your network. This can be done through the Wizard or on the Admin Page of the Tools tab. Make sure that the password you choose is not commonly known or something that is easy to guess such as your last name or your pet’s name. Try using a combination of letters and numbers (alpha-numeric) to deter intruders from breaking into your network. Your private information should be kept private. 2. Disable DHCP and use Static IP addresses or Use Static DHCP and limit scope to the amount of users on your network. The KRT comes with the setting for maximum users on your network set to 1. Until you change this setting you will be the only computer allowed to access the network. Even so, in the event that an intruder manages to gain access to your network, having DHCP enabled makes it easier for the intruder to access other computers on your network. There are two methods to prevent this: One way is to disable DHCP and use static IP addressing on all the devices connected to your network. This would mean that the intruder would have to know what network your devices are on in order to access them. However, this would make it more difficult to share access with new or occasional users. The second way is to change the scope of the DHCP server to only include enough IP addresses (or IP range) for the devices in your network. You can then use the Static DHCP feature of the router to assign an IP address to each device on your network. Static DHCP still dynamically assigns an IP address to your network devices but only allows for those defined devices to obtain an IP address. 3. Change the default LAN IP address Change the default LAN IP address from 192.168.0.1 to an alternate IP address. There are 3 ranges of IP addresses that have been reserved for use on Private Networks. 10.0.0.0 - 10.255.255.255 (10.0.0.0/8) 172.16.0.0- 172.31.255.255 (172.16.0.0/12) 192.168.0.0 - 192.168.255.255 (192.168.0.0/16) CradlePoint KRT routers use 192.168.0.1 as their default LAN IP address. Choosing an alternate IP address lessens the probability of an intruders knowing what IP network your devices are on. 4. Set up MAC Filtering Each networking device (router, network card, etc) on a network contains a unique hexadecimal number that identifies that specific product. This number is referred to as a MAC address. MAC filtering allows you to create a list of the MAC address of each device on your network and only allows these specific devices to associate with your network. With this feature enabled, devices attempting to connect to your network with a MAC address that is not in the list you created, will be denied access. THE KRT COMES TO YOU WITH YOUR SECURITY IN MIND: The Personal HotSpot is equipped with several features designed to maintain security and provide easy setup to with any Cellular data network. · PCs Hidden by NAT NAT opens a temporary path to the Internet for requests originating from the local network. Requests originating from outside the LAN are discarded, preventing users outside the LAN from finding and directly accessing the PCs on the LAN. · IP Address Sharing by NAT The Personal HotSpot allows several networked PCs to share an Internet account using only a single IP address, which may be statically or dynamically assigned by your Internet service provider (ISP). This technique, known as NAT, allows the use of an inexpensive singleuser ISP account. · Automatic Configuration of Attached PCs by DHCP The Personal HotSpot dynamically assigns network configuration information, including IP, gateway, and domain name server (DNS) addresses, to attached PCs on the LAN using the Dynamic Host Configuration Protocol (DHCP). This feature greatly simplifies configuration of PCs on your local network. · DNS Proxy When DHCP is enabled and no DNS addresses are specified, the Personal HotSpot provides its own address as a DNS server to the attached PCs. The Personal HotSpot obtains actual DNS addresses from the ISP during connection setup and forwards DNS requests from the LAN. 19 Care and Maintenance Operating T emp eratures Storage Te mperatures Humidity The op erating te mperatures should re main b etw een 0°C to +55°C degre es. Te mperatures outsid e this range may cause dama ge to your KRT. Store your KRT in t emp eratures not to exce ed th e b ounds of - 40°C to + 85°C. Temperatures outside this range may cause damag e t o your KRT. Exposure t o humidit y can cause your KRT to malfunction and/ or cause permanent dama gg e. To avoid this, k eep your router at humidity lev els b etw e en 0 and 70%. The KRT may sto p functioning if exp osed to too much vibration or elect rical shock. Shock and Vibration It is recomm ended that you place the KRT out of areas that ma y introduce t hese factors. Contact the manufacturer for specific details. Placing the KRT near m etal cabine ts or co mputer cases, larg e o bjects s uch as refridgerators, or Netw ork Range and Interferance around w indow s tinted w ith Metalic- based UV coatings can cause interfe rence. If you are experi encing proble ms with the rang e or int erference be sure that y our KRT is at l east placed as high as possible if it cannot b e place d in the center of y our preffered coverage area. Stable Position No Shock Low Vibration No Water Mild Temperature °F/C° 20 Indicators (LEDs) There are three dual LEDS used to display the device status and operation. The LED functions are identified below. The LED location and order are identified on the PCB reference drawing. The normal operating states are described below. In addition, LED’s flash during power on, power off, reset and factory reset functions to provide a visual feedback to the user of what is happening. COLOR STATUS Green Connection to USB port is established. Off USB port not in use. USB Status (LED 0) COLOR STATUS Green Wide Area Network is ready via the Ethernet port. Off Ethernet port not in use or the connection is not secure. Port not in use. COLOR STATUS Green WLAN is operating correctly. Off No handset connected, unit is negotiating the connection, or no WLAN available. WAN Status (LED 1) WLAN Status (LED 2) Power Status (LED 3) COLOR Green Off STATUS CTR is connected to external power / on. CTR is OFF. 21 Glossary and Setup Details Access Control List ACL. Database of n etw ork devices that are allow ed t o access resources on the netw ork . Access Point AP. Device that allow s wireless clients to connect to it and access th e netw ork Ad- hoc netw ork - Peer- to- Peer netw ork betw een w ireless clients Address R esolution Protocol ARP. Used to map MAC ad dresses t o IP addr esses so that conversions c an be made in both directions. ADSL Asymm etric Digital Subscriber Line Advanced Encryption AES. Gov ernment encryption standard Standard Alphanumeric Characters A- Z and 0- 9 Antenna Used to transmit and receiv e RF signals. AppleTalk A set of Local Area Network protocols dev elop ed b y A pple for their co mputer syst ems AppleTalk Addr ess AARP. Used t o map the MAC ad dresses of Appl e com puters to their A pp leTalk netw ork Resolution Protocol addresses, so that conv ersions can be made in both directions. Application layer ASCII Attenuation Authentication 7th Layer of the O SI model. Provid es services to applications to ensure that they can communicate prop erly with other applications on a ne twork . American Standard C ode for Information Int erchange. This system of ch aracters is most commonly use d for t ext files The loss in strength of digital an analog signals. The l oss is grea ter w he n the signal is b eing transmitted o ver long distances. To provid e cred entials, lik e a Passw ord, in order to verify that the pers on or de vice is r eally w ho they are claiming to b e Automatic Private IP APIPA. An IP address that a Window s computer will assign its elf w hen it is configured to o btain Addressing an IP address automatically but no DH CP serv er is availabl e on th e netw ork . Back ward Compati ble The ability for new d evices to co mmunicate and interact w ith ol der l ega cy devices to guarantee interoperability Bandwidth The maxi mum a mount of byt es or bits p er second that can be transmitt ed to and from a netw ork device Basic Input/ Output System BIOS. A program that the processor of a comput er uses to startup the system once it is turned on Baud Data transmission speed Bit rate The amount of bits that pass in giv en am ount of ti me bit/ sec – bits p er second BOOTP Bootstrap Protocol. Allow s for co mputers t o b e boot ed up and giv en an IP address with no user intervention Bottleneck A tim e during processes w hen som ething causes the proc ess to slowdo w n or stop all t ogeth er Broadband A w ide band of frequ encies available for transmitting data Broadcast Transmitting data in all dir ections at once Brow ser A program that allows you to access r esources on the web and provides them to you graphically Cable mod em CardBus A devic e that allow s you to connect a co mputer up to a coaxial cabl e a nd receive Internet access from your Ca ble provider A new er v ersion of the PC Card or PCMC IA int erface. It supports a 32- bit data path, DMA, and consumes less volta ge 22 Carrier Sense Multipl e Access/ Collision Avoidance Carrier Sense Multipl e Access/ Collision Detect CSMA/ CA CSMA/ CD CAT 5 Categor y 5. Used f or 10/ 100 Mbps or 1Gbps Etherne t connections Channel The channel the w ireless signal is transmitted on. Client A program or user that requests data from a serv er. Collision When do tw o d evices on the sa me Ethernet netw ork try and transmit da ta at the e xact same time. Cook ie Information that is store d on th e hard drive of your comput er that hold s your prefer ences to the site that gav e your comput er the co ok ie. Crack er A talent ed and malicious computer user w ho gains unauthorized access to a co mputer or netw ork of computers with the intention of stealing, maliciously modifyi ng, or destroying information. Also k now n as a “Black Hat Hack er.” Often mistak enly refer red to as a Hack er. CSMA/ CA Carrier Sense Multipl e Access/ Collision Av oidance C SMA/ CD – Carrier S e nse Multiple Access/ Collision Detection Data Data Encryption Standard Information that has be en translated into binary d o that i t can be proce ssed or move d to another device Uses a randomly select ed 56- bit k ey that must b e k now n by both the se nder and the r eceiver w hen information is exchanged Data- Link layer The second lay er of the OSI mod el. Controls the mov ement of data on t he physical link of a netw ork Database Organizes information so that it can b e managed updated, as w ell as easily accessed b y users or applications DB- 25 A 25 ping male connector for attaching Ex ternal mo dems or R S- 232 serial devices DB- 9 – A 9 pin connector for RS- 232 connections dBd, dBi, dBm decibels r elated to dipole antenna, decibels relativ e to isotropic radiato r, decibels relati ve to one milliwatt Decrypt To unscramble an encrypt ed messag e back into plain tex t Default Default Subnet Mask Demilitarized zone - DMZ DHCP A pred etermin ed value or se tting that is used by a program when no user input has be en entered for this value or set ting The subnet on your router on the local area ne twork A single co mputer or group of comput ers that can be accessed by both users on the Interne t as w ell as users on the Local Network , but that is not prot ected by the sa me s ecurity as the Local Netw ork . Dynamic Host C onfiguration Protocol. Used to automatically assign I P a ddresses from a predefined pool of addresses to computers or de vices that r equests the m (S ee Also DH CP IP Address Range, Number of DHCP Dynamic Clients, Static DH CP Cli ents, DHCP Lease Tim e) DHCP IP Address Range This option defines the range of ad dresses availabl e for the router to as sign to y our internal netw ork If you have any d evices using S tatic IP addresses, be sure the a ddresses do not fall w ith in the range d efined her e. DHCP Lease Ti me The amount of tim e a co mputer may have an IP address b efore it is r eq uired to ren ew the l ease. The lease functions just as the leas e on an apart ment would. The initial lease designates the amount of ti me befor e the lease e xpires. If th e t enant wishes to retain their address w hen the lease is expire d then the l ease is established. If the lease is no l onger needed then th e address is allow ed to b e reused by som eone else. Digital certificate An electronic m ethod of providing credentials t o a s erver in order to have access to it or a netw ork 23 Direct Sequence Spread Spectrum – DSS S Domain Name Syste m – DNS Modulation technique used b y 802.11 b wireless d evices Translates Domain Names to IP addr esses Data Over Cable S ervice Interface Specifications – The standard interface for cabl e m ode ms DOCSIS Domain name Download DSL – Digital Subscriber Line A name that is associated with an IP address To send a request from on e com puter to another and hav e the file transmitted back to the requesting comput er High badnw idth internet connection over tel ephone lines Duplex Sending and recie ving data at the same tim e DDNS – Dynamic DNS Is provided nt com panies to allow users with Dynamic IP Addr esses to o btain a Domain Nam e service that w ill alw ays be link ed to their changing IP Addr ess. The IP Address i s updated either by client softw are or b y a rout er that supports DDNS, w henever the IP Add ress changes Dynamic IP Address IP address that is assigned b y a DH CP server and that ma y change. Ca bl e Internet provid ers usually use this method to assign IP Addr esses to their custom ers EAP Extensibl e Authentication Protocol Email Electronic Mail is a co mputer- stored messag e that is transmitted over t he Internet Encryption Converting data into cyph ertex t so that it cannot b e easily r ead Ethernet The most w idely used t echnology f or Local Area N etwork s Fiber optic File server File sharing Firew all A w ay of s ending data through light impulses ov er glass or plastic wire or fiber A comput er on a n etw ork that stores data so that the other com puters on the netw ork can all access it Allow ing data from computers on a network to b e accessed by other co mputers on th e netw ork w ill different lev els of access rights A devic e that protects r esources of the Local Area N etwork from unauthorized users outside of the local netw ork Firmw are Programming that is insert ed into a hardware de vice that tells it how to function Fragmentation – Break ing up data into smaller pieces to mak e it easier to stor e FTP – File Transfer Protocol Easiest w ay to transfer files betw een com puters on th e Internet Full- duplex – Sending and Receiving data at the sam e ti me Gain The amount an a mplifier b oosts the w ireless signal Gateway A devic e that connects your netw ork to anoth er, lik e the your comput er to th e internet Gbps – Giga bits per second Gigabit Ethernet Transmission technology that transfers data at a rate of 1 billion bi ts p er second GUI – Graphical User A visual w ay of int eracting w ith a comput er using such items as w indow s, icons, and menus. Interface Graphical user interfaces are used b y m ost m odern o perating syst ems H.323 Hack er A standard that provides consistancy of voice and vide o transmissions and compatibility for video confrencing de vices An enthusiastic and sk illfull computer programmer or user co mmonly mi stak en by the m edia for a Crack er or Script Kiddie. (S ee Crack er) 24 Half Duplex Data cannot be transmitt ed and r ecieved at the sam e ti me Hashing Transforming a string of characters into a shorter string w ith a predefin ed leng th Hexid ecimal Characters 0- 9 and A- F used to repr esent numb ers also k now n as base 16 Netw ork ing over t elephone lines, Netw ork ing standard that com bines 802.11b and DECT(Digital HomePNA, Hom ePNF enhanced cordless comminication) that provides spe eds up t o 1.6 m ega bits per s econd and a distance of 150ft using a Frequency Hoping transmission method Hop HTTP – H ypert ext Transfer Protocol HTTPS – Hyp ertext Transfer Protocol over S SL Hub The action of data pack ets b eing transmitt ed fro m one to another Host Computer on the netw ork Used to transfer files from HTTP serv ers (w eb servers) to HTTP clients (w eb browsers) Used to encrypt and d ecrypt HTTP transmissions, also k now n as Seccure HTTP A netw ork ing device that connects multiple d evices tog ether ICMP – Internet Control Message Protocol One of the core protocols of the Internet protocol suite. Used mainly b y a netw ork ed computers’ operating syste m to send error m essages for IP datagrams, diagnostics, or routing purposes IGMP – Internet Group Used to mak e sure that comput ers can report their multicast group me mbership to adjacent Managment Protocol routers IIS – Int ernet Informati on Server IKE – Int ernet Ke y Exchange Infrastructure Input Port Range Interface A Web server and FTP server provid ed b y Microsoft Used to ensure security for VPN exchange In terms of a w ireless n etwork this is when w irek ess clients use an accress point t o fain acceess to the netw ork (See Sp ecial Applications pag e) The p ort range that you w ant to o pen t o internet traffic (See Routing page ) Sp ecifies the nex t hop to be tak en if the route sp ec ified is used. A gateway of 0.0.0.0 implies ther e is no next hop and th e IP addr ess matched is c onnected directl y to the router on the interface specified ( either LAN or WAN) Internet A syste m of w orldw ide network s which uses TCP/ IP to allow for resources to be accressed from computers around the world Internet E xplorer Internet Protocol ISP – Internet S ervice Procvider Interoperability Intranet Intusion Detection One of many w e b brow sers available for computers. Se e also M ozzilla. Firefox, Konqurer, Opera, Safari The m ethod of transfering data from one co mputer to another on the In ternet Company that provid es internet to individuals or companies The ablity for products to interact w ith eachother w ithout much consumer interaction. Generally se en as an asset to any product A private netw ork A typ e of security that scans a netw ork to de tect a ttack s coming from inside and outside the netw ork IP – Internet Protocol IP Address A 32- bit number, w hen talk ing about Iternet Protocol V ersion 4, that id entifies each com puter that transmits data on the internet or intranet IPv6 – Internet Protocol Uses 128 bit addresses and w as dev elop ed t o solv e the probl em that w e face running out of IP Version 6 version 4 addresses IPX – Internetw ok Pack et A netw ork ing protocol d ev elope d b y Nov ell t o enabl e th eir Netware clie nts and servers to Exchange communicate Java A program ming language used t o creat e progra ms and appl ets for we b p ages 25 Kbps Kilobits per s econd Kerberos A m ethod of securing and authenticating requests for services on a net w ork LAN – Local Area N etw ork Latancy A groupp of comput ers in a building that usually access files from a ser ver The amount of tim e a pack et tak es t o trav el from one l ocation to anoth er on a ne tw ork . Also reffered t o as d elay. LED Light Em mitting Diod e Legacy Older d evices or technolog y MB – MegaBy te Mbps MAC Addr ess Megabits per s econd A unique hardw are address for d evices on a LAN. Each network ing de vice (router, ne tw ork card, etc) on a netw ork contains a unique hexad ecimal numb er that id entifies that specific product. MAC Filtering MAC filtering allow s you to create a list of the MAC a ddress of each dev ice on y our network and only allow s these specific devic es to associate with y our network . With this feature enabl ed, devices att em pting to connect to your ne tw ork w ith a MAC address that is not in the list you created, w ill be deni ed access. Metric (See Routing page ) Sp ecifies the interface, LAN or WAN, that the IP Pack et must use to transit out of the router w hen the select ed rout e is used MIB - Managem ent Infomation Base MTU – Maximum Transmission Unit Multicast A set of o bjects that can be managed b y using SNMP The largest pack et that can b e transmitt ed on a pack et based n etw ork lik e the internet Sending data fro m on e d evice t o many d evices on the ne tw ork NAT – Netw ork Addr ess Allow s many privat e IP ad dressses to connect to the Internet, or anoth e rnetwork , through one Translation IP address NetBIOS E xtende d User Int erfaceis a Local Area Netw ork commincation protocol. This is an NetBEUI updated v ersion of Ne tBIOS NetBIOS Netw ork Basic Input/ Output System NetMask Determines what portion of an IP ad dress desi gnates the Netw ork and w hich art designates the Host NetWare Server softw are dev elop ed b y No vell NIC – Ne tw ork Interface A card installed in a co mputer or built onto the m otherboard that allows the co mputer t o Card connect to a ne tw ork Netw ork Layer The third layer of the O SI model which handles the routing of traffic on the netw ork . In this section, you can se e w hat LAN d evices are currently leasing IP a ddresses. The DHCP Client tabl e displa ys the number of clients that ar e receiving an IP addr ess from th e router. The Number of Dynamic DH CP Clients computer nam e, MAC ad dress, and IP address assigne d to each com pute r are displaye d here as w ell. You can Rev ok e IP addr esses in this secti on. The rev ok e op tion all ows you to tak e aw ay a leased IP ad dress from a client. This feature is useful for freeing up add resses w hen the client table is full or nearly full. Be sure to only r evok e ad dresses from de vice s that are no l onger needed on the netw ork . NTP – Netw ork Time Protocol Used to s ynchronize the tim e of all the comput ers on the network 26 OSI – Op en Syst ems Intercommunication OSPF – Open Short est Path First The reference mo del for how data should travel b etw een tw o d evices on a netw ork . A routing protocol that is used mor e than RIP in larg er scale n etw ork s because only changes t o the routing tabl e are sent to all the o ther routers in th e network as opp osed to sending the entire routing ta ble at a re gular interval, w hich is how RIP functions. Passsw ord A sequence of characters that is used to authenticate requests to reso urces on a netw ork Personal Area Netw ork The interconnection of network ing d evices w ithin a range of 10 m eters Physical Layer The first layer of the OS I m odel, pro viding the hardware a m eans of tran mitting electrical signals on a data carrier PoE – Pow er over Ethernet The m eans of transmitting electricity over the unused pairs in a C AT5 cable. Policy Name (See Access C ontol pa ge) The nam e of the acces control policy you hav e or are creating. POP3 – Post Office Protocol 3 PPP – Point to Point Protocol Used for recieving mail Used for tw o co mputers to com minicate with eachother over a serial int erface, lik e a phone line Preamble Used to s ynchronize communication timing betwe en d evices on a netwo rk Private Port The port that w ill be used on your internal netw ork Public Port The port that w ill be accessed fro m the internet QOS Quality of Service RADIUS – R emo te Authentication Dial- in User Service Remo te Manag ment Remo te Manag ement Port Rendezvous Repeat er RIP – Routing Information Protocol Allow s for remo te users to dial into a c entral server and be authenticated in ord er to access resources on a netw ork . Allow s you to manag e y our router from anyw here w ith an internet conn ection. Se e T ools Admin The port that w ill be accessed fro m the internet. Apple’s v ersion of UpnP, w hich allow s for devices on a ne tw ork to disco ver eachother and be connected w ithout the ne ed to configure any settings. Retransmits the signal of an Access Point in order t o ext end its cov erag e. Used to s ynchronize the routing tabl e of all the routers on a netw ork . RIP Announcement This option is used w ith multiple routers to broadcast routing informati on. Router Metric This option is used if you hav e multiple rout ers. RJ- 11, RJ- 45 The most com monly used connection m ethod for tel ephones, The most commonly use d connection method f or Eth ernet. RS- 232C The interface for s erial communication b etw een co mpuuters and oth er r ealated devices. RSA Al gorithm Used for encryption and authentication. Samba Server Session Key Session Layer SMTP – Simpl e Mail Transfer Protocol A freew are program that allow s for resources to be shared on a ne twork . Mainly used in Unix based op erating syst ems A comput er on a n etw ork that provides services and r esources to other computers on the netw ork An Encryption and d ecryption k e y that is generat ed for ev ery co mmunication session be tw een tw o computers The fifth lay er of the OSI mod el which coordinates the connection and communication betw e en applications at both ends Used for sending and r ecieving mail 27 SNMP – Simple netw ork Management Protocol Govens the manage ment and monitoring of network de vices Special Applications The Sp ecial Application section is used t o op en single or multipl e p orts on your router w hen the router senses data sent to the Internet on a ‘trigg er’ port or port range . Special Applications rules apply to all co mputers on your internal netw ork . SSH – Secure Shell A com mand line interface that allow s for secure connections t o re mote computers SSID – S ervice S et Identifier A name for a w ireless n etwork A feature of a firew all that monitors out going and incoming traffic to m ak e sure that only valid SPI - Stateful Pack et reponses to outgoing requests ar e allowed to pass through the firewall. When SPI is enabled, Inspection the e xtra state information w ill b e re ported on the Status > Active sessions page. Static DHCP Cli ents receiv e th e sam e IP ad dress all the tim e. This is alm ost the sa me as if a device has a static IP address exce pt that it must still actually request an IP address from the CradlePoint Rout er. The Cradl ePoint Rout er w ill provide the devic e the s ame IP a ddress all th e Static DHCP Cli ent time. S ervers on your network should eith er use a static IP address or t his option. To input the MAC address of your syst em, enter i t in manually or connect to the CradlePoint Router’s We bManagement int erface from the syst em and click the Co py Your PC’s MA C Addr ess button. Entries on this list can b e enabled/ disable d b y t oggling the Enable check box. Entries can b e modified by click ing on the pap er and p encil icon. To del et e an entry, cli ck on the trash can icon. After you’ve compl eted all m odifications or d eletions, y ou must cli ck the Save Se ttings Static DHCP Cli ent List button at the top of the pa ge to sav e y our changes. The router must re boot before new settings w ill tak e effect. You w ill be prompt ed to Reb oot the Devic e or Continue. If you n eed to mak e additional s ettings changes, click Continue. If you are finished w it h your configuration settings, click the Re boot the De vice button. Static IP Addr ess An IP address that is enter ed manually on the devic e. Subnet Mask Determines th e portion of an IP addr ess designat ed t o the Network and the portion d edicated to the Host. ( Se e also Default Subnet Mask ) TCP – Transmission Control Applications on network ed hosts use TCP t o creat e connections to one another, over w hich Protocol they can e xchange data. T CP is the layer a bov e the IP and below th e ap plication. TCP/ IP – Transmission control Protocol/ Internet Also k now n as the Internet Protocol Suit e. Impl em ent the protocol stack on w hich netw ork s run. Protocol Thoughput The amount of data that can be transfered in a given time perio d. Trace route A utility that displays th e routes be tw een your computer and a sp ecific destination. Transmission Rate Speed of data on th e Local Area Netw ork Trigger Port Range (See Sp ecial Applications pag e) Enter the outgoing p ort range used b y your application. Select the outbound pro tocol used by your application. UDP – User Datagram Allow s programs on ne tw ork ed comput er to send short messages called datagrams to one Protocol another. UNC - Universal Naming Allow s for shares on a com puter to b e id entified without having to k no w w hat storage d evice it Convention is on Unicast Communication b etween a single s ender and r eciever UPnP – Universal Plug and The feature w hich allow s devices to id entify eachother on a netw ork without requiring set up by Play the user URL – Uniform Resource Locator A unique address for fil es accessible on the internet 28 V VPN – Virtual Private A secure tunnel ov er the internet to connect remo te offices or users t o thier company’s Netw ork netw ork The Virtual Serv er op tion giv es Int ernet users access to services on you r LAN. This feature is useful for hosting online services such as FTP, Web, or Game S ervers. F or each Virtual Serv er, you define a public p ort on your router for r edirection t o an internal LA N IP Address and port. Exampl e: You ar e hosting a Web Serv er on a Laptop or PC that has Private IP Address of 192.168.0.50 and your ISP is block ing Port 80. 1. Name the Virtual Serv er Rule ( ex. We b Server) 2. Enter in the IP Addr ess of the machine on your LAN 192.168.1.1 Virtual Sever 3. Enter the Private Port as [80] 4. Enter the Public Port as [8888] 5. Select th e Protocol - T CP 6. Ensure the schedule is s et t o Alw ays 7. Check the Add Rule to ad d the settings 8. Repeat these steps for each Virtual 9. Server Rule you w ish to add. After the list is comple te, click Save Se ttings at the t op of the page. With this Virtual Server Rule all Internet traffic on Port 8888 will be red irected t o y our internal w eb serv er on port 80 at IP Address 192.168.0.50. Entries on this list can b e enabled/ disable d b y t oggling the Enable check box. Entries can b e modified by click ing on the pap er and p encil icon. To del et e an entry, cli ck on the trash can Virtual Servers List icon. After you’ve compl eted all m odifications or d eletions, y ou must cli ck the Save Se ttings button at the top of the pa ge to sav e y our changes. The router must re boot before new settings w ill tak e effect. You w ill be prompt ed to Reb oot the Devic e or Continue. Reb oot the device if you are satisfied w ith your settings. Virtual Server Rule Name of the virtual s erver, such as Web Server Whether or not th e SS ID w ill be visible on th e LAN. If this is set to invisible oth ers will not Visibility S tatus beable to se e y our network in their list of availabl e network s without sp ecial configurations. You w ill have to connect to an invisibl e network b y manually entering th e na me into your connect utility on y our computer. VoIP – V oice o ver Int ernet Protocol (IP) Sending voice information o ver th e internet Wak e on LAN Allow s you to pow er up a comput er thrrough it’s NIC on a WAN. A utility that allow s you t o vi ew content and int eract with all of th e information in the World Web Browser Wide Web. E xampl es include: Firefox, Mozzilla, Safari, Op era, and lastly though often less flexible and secure, Internet E xplorer. WEP – Wired Equivalent Privacy Security for w ireless ne tw ork s that is supposed t o b e co mpatibl e t o tha t of a w ired network . Wi- Fi Wireless Fidelity WPA – WiFi Protected An updated version of s ecurity for w ireless ne tw ork s that provides auth entication as w ell as Access encryption. Wide Area Netw ork A netw ork spanning a large geo graphical area or consisting of more than one LAN. Wireless Netw ork Name The SSID for the rout er. WISP - Wireless ISP A company that provid es a broadband connection o ver w ireless connections to the internet. 29 WLAN - Wireless LAN Connecting to a Loacl Area Network over one of the 802.11 wireless standards Yagi Ant enna A diractional antenna used to concentrate a wirel ess signal on a spa ecific location 30
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.6 Linearized : No Encryption : Standard V2.3 (128-bit) User Access : Print, Extract, Print high-res XMP Toolkit : 3.1-701 Create Date : 2007:01:31 15:38:16-07:00 Creator Tool : Word Modify Date : 2007:02:02 14:28:40+08:00 Metadata Date : 2007:02:02 14:28:40+08:00 Format : application/pdf Creator : misskniss Title : Microsoft Word - CTR User's Manual.doc Producer : Mac OS X 10.4.8 Quartz PDFContext Document ID : uuid:7663f277-d1c7-41b3-9118-8ecf93459e85 Instance ID : uuid:c548cafb-6a68-4d52-8c62-5f67e835063b Has XFA : No Page Count : 31 Author : missknissEXIF Metadata provided by EXIF.tools