CyberTAN Technology WG214-K Wireless-G Router User Manual

CyberTAN Technology Inc. Wireless-G Router Users Manual

Users Manual

Download: CyberTAN Technology WG214-K Wireless-G Router User Manual
Mirror Download [FCC.gov]CyberTAN Technology WG214-K Wireless-G Router User Manual
Document ID859941
Application IDmbQC8/hIwrTPg0bN2ZAkSg==
Document DescriptionUsers Manual
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize30.58kB (382260 bits)
Date Submitted2007-10-25 00:00:00
Date Available2007-10-25 00:00:00
Creation Date2007-08-10 20:57:47
Producing SoftwareOpenOffice.org 1.1.4
Document Lastmod2007-10-24 09:46:38
Document TitleUsers Manual
Document CreatorWriter
Document Author: Daniel Strychalski

Wireless-G Router
User’s Manual
CE Declaration of Conformity
This equipment complies with the specifications relating to electromagnetic
compatibility EN 55022/A1 Class B and EN 50082-1. This meets the reasonable
protection requirements set out in the European Council Directive on the
approximation of the laws of the member states relating to Electromagnetic
Compatibility Directive (89/336/EEC).
Manufacturer's Disclaimer
The information in this document is subject to change without notice and does not
represent a commitment on the part of the vendor. No warranty or representation,
either expressed or implied, is made with respect to the quality, accuracy, or fitness
for any particular purpose of this document. The manufacturer reserves the right to
make changes to the content of this document and/or the products associated with it at
any time without obligation to notify any person or organization. In no event will the
manufacturer be liable for direct, indirect, special, incidental, or consequential
damages arising out of the use or inability to use this product or documentation, even
if advised of the possibility of such damages.
Copyright Notice
This document contains materials protected by copyright. All rights are reserved. No
part of this manual may be reproduced or transmitted in any form, by any means, or
for any purpose, without the express written consent of its authors. Product names
appearing in this document are mentioned for identification purposes only. All
trademarks, product names, and brand names appearing in this document are the
property of their respective owners.
Packing List
Below are the items that should be included in your Wireless-G Router package.
•
•
•
•
One Wireless-G router
One AC power adapter (12V, 0.5A)
One 1.5 meter (4 ft. 11 in.) category 5 Ethernet cable
One CD-ROM containing the quick setup guide and user's manual in PDF form
Before installing the system, examine the contents of the package carefully. If
anything appears to be damaged or missing, contact the supplier as soon as possible.
FCC Statement
This product is designed and manufactured to comply with the specifications for a
Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are
designed to provide reasonable protection against harmful radio-frequency
interference in a residential installation. This equipment generates, uses, and can
radiate radio-frequency energy and, if not installed and used according to the
instructions, may cause harmful interference to radio communications. However, there
is no guarantee that interference will not occur in a particular installation. If this
equipment does cause harmful interference to radio or television reception, which is
found by turning the equipment off and on, the user is encouraged to try to correct the
interference by one or more of the following measures:
• Reorient or relocate the receiving antenna
• Increase the separation between the equipment or devices
• Connect the equipment to an outlet other than the receiver's
• Consult a dealer or an experienced radio/TV technician for assistance
FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance
could void the user's authority to operate this equipment.
This device and its antenna(s) must not be co-located or operating in conjunction with any other antenna or
transmitter.
FCC Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This
equipment should be installed and operated with minimum distance 20cm between the radiator & your body.
Contents
Introduction 1
Overview of the Router 1
About this Manual 3
Important Concepts 4
Chapter 1: Required Setup 6
Information You Need 6
Preparation for Setup 6
Setup for Internet Access 8
Setup for Wireless Networking 11
Setup for Router Security 16
Chapter 2: Setup Utility Reference 17
Setup Page – Basic Setup Panel 17
Setup Page – DDNS Panel 21
Setup Page – MAC Address Clone Panel 22
Setup Page – Advanced Routing Panel 22
Wireless Page – Basic Wireless Settings Panel 23
Wireless Page – Wireless Security Panel 24
Wireless Page – Wireless MAC Filter Panel 26
Wireless Page – Advanced Wireless Settings Panel 27
Security Page – Firewall Panel 28
Security Page – VPN Passthrough Panel 29
Access Restrictions Page – Internet Access Panel 29
Applications and Gaming Page – Port Range Forward Panel 31
Applications & Gaming Page – Port Triggering Panel 32
Applications and Gaming Page – DMZ Panel 32
Applications and Gaming Page – QoS Panel 32
Administration Page – Management Panel 34
Administration Page – Log Panel 35
Administration Page – Diagnostics Panel 35
Administration Page – Factory Defaults Panel 35
Administration Page – Upgrade Firmware Panel 36
Administration Page – Config Management Panel 36
Status Page – Language Panel 36
Status Page – Router Panel 36
Status Page – Local Network Panel 37
Status Page – Wireless Panel 37
Appendix A: Troubleshooting 39
Appendix B: Specifications 41
Appendix C: Warranty Information 42
Wireless-G Router User's Manual
Introduction
Congratulations on purchasing a sophisticated, high-quality networking product. Your
Wireless-G router is many devices in one, and was designed and manufactured to the
highest standards. Still, like any digital electronic product, it requires proper setup and
care. Follow the instructions in this manual carefully to ensure that your Wireless-G
router will give you many years of trouble-free service.
Overview of the Router
Not long ago, to get all the functionality provided by your Wireless-G router, you
would have had to buy three separate devices: a router (which at the time would have
been just a router), a wireless access point (AP), and an Ethernet switching hub (now
called an Ethernet switch or simply a switch).
(Why is it called a switch? Because it can switch each transmission to the port the
destination machine is connected to. Early Ethernet hubs sent all transmissions out on
all ports.)
You would have connected the router, the AP, and your computers together through
the switch to form your local-area network (LAN). Then you would have connected
the router to your modem for access to the wide-area network (WAN), that is, your
ISP's network, and through it, the Internet.
With your Wireless-G router, everything is in one box, and the AP and router are
connected internally to the switch. You only have to connect your computers to the
LAN ports and your modem to the WAN port.
For the most part in this manual, we will refer to the combination of router, AP, and
switch as a unit. Terms like "the router" and "your router" should be understood to
include the built-in AP and switch.
The Parts of the Router: The router has seven light-emitting diode (LED) indicators
on its front panel. These are described briefly below.
• ETHERNET indicators: Each of these corresponds to a LAN port on the back of
the router. When a good but idle link is detected on the port, the indicator shines
steadily; when there is activity on the link, the indicator blinks off and on.
• WIRELESS indicator: This indicator shines steadily when wireless networking is
enabled but the router is not actively transmitting or receiving; blinks off and on
Wireless-G Router User's Manual
when there is wireless activity; and stays off when wireless networking is
disabled.
• WAN indicator: This indicator shines steadily when a good but idle link is
detected on the WAN port, and blinks off and on when there is activity on the
WAN link.
• POWER indicator: This indicator flashes on and off during the router's power-on
self-test, and shines steadily when the router is ready for operation.
The router has a button, five Ethernet ports, and a power receptacle on its back panel.
These are described briefly below.
• Reset button: Press this button briefly to restart the router. The router will go
through its power-on self-test and then resume operation. Press Reset for at least
five seconds to restore the router's factory settings.
NOTE: Restoring the factory settings may cause your Internet and/or
wireless links to go down.
• WAN port: This is for the Ethernet connection to your DSL or cable modem.
• LAN ports: These are for Ethernet connections to computers and other devices on
the LAN. These connections can be indirect: you can connect a hub or switch to a
LAN port, and then connect machines to the remaining Ethernet ports of the hub
or switch.
• DC12V receptacle: This is for connecting the AC power adapter included with
the router.
WARNING: Use only the AC power adapter that came with the
router. Connecting any other power adapter may
damage the router and cause a fire hazard.
Major Non-routing Functions: Besides performing the functions of a pure router,
AP, and switch, your Wireless-G router provides many other capabilities, some of
which are provided on some networks by special-purpose devices or powerful servers.
A few of the important ones are listed below.
• Login: Your ISP (especially if you use ADSL, VDSL, etc.) may have given you
software for connecting to and disconnecting from the Internet. Such software is
often called a login client. After the router is set up, you will no longer use any
login client — the router will automatically log on for you.
Wireless-G Router User's Manual
(The router can connect automatically whenever you access the Internet, or it can
stay connected all the time. The choice is yours.)
• DHCP: This stands for Dynamic Host Configuration Protocol. To communicate
on the Internet, a machine needs Internet Protocol (IP) settings such as an IP
address. The router is set at the factory to be a DHCP server, that is, to give
machines on the LAN IP settings if they request them. Most computers are set by
default to be DHCP clients, that is, to request IP settings from a DHCP server.
• NAT: This stands for Network Address Translation. The router uses one IP
address on the LAN and another on the WAN. When a machine on the LAN
sends a request to the Internet, the router changes the source IP address to its own
WAN IP address. Any reply, therefore, is addressed to the router. The router
changes the reply's destination IP address to that of the local machine originating
the exchange, and places it on the LAN so that machine can receive it.
• Firewall: NAT helps protect your computers by hiding their IP addresses from the
WAN. The router also has a firewall that performs "stateful packet inspection,"
monitoring each connection for abnormal activity. By default, the router blocks
common denial-of-service (DoS) attacks. In fact, it blocks all attempts to connect
from the Internet, but you can set it to accept connection types that you need.
The above list is far from complete. The router's other functions will be explained in
the chapters on setup.
Care of the Router: Observe the following precautions to ensure that the router has a
long service life:
• Never block the air vents on the bottom and sides of the router.
• Use only the 12-volt, 0.5-ampere AC power adapter that came with the router.
• Keep the router away from liquids and moisture. Clean it only with a slightly
damp cloth.
• Never open the router. For reasons of electrical safety, the router may only be
opened by an authorized service technician.
About this Manual
A large part of this manual explains the router's setup utility — the user interface that
the router displays to let you change router settings. In this section we explain the
terminology we use to describe the setup utility. This will also help you understand
the setup utility's organization and manner of operation.
The setup utility is coded, and served to your computer, in exactly the same way as a
World Wide Web site, and you will view it with your Web browser, so some of our
terminology comes from the language of the World Wide Web.
Wireless-G Router User's Manual
Many Web sites have links at the top of each page for displaying other pages on the
site. Similarly, at the top of the setup utility are seven buttons that we call page
buttons. Each takes you to a different page of the setup utility.
Most pages are made up of several panels. Panels contain the controls for setting the
router. To change panels, you click panel tabs on the left.
Shown above is the Setup page's Basic Setup panel. It has two sections, named
Internet Setup and Network Setup, and the Internet Setup section has two
subsections, named Internet Connection Type and Optional Settings (required by
some ISPs). The first control in the Optional Settings (required by some ISPs)
subsection is the Router Name control, and its default (factory) setting is myrouter.
This is the terminology we will use in this manual.
Important Concepts
If you are new to networking, you may encounter many unfamiliar terms when setting
up the router. Those that appear most frequently and are most basic for understanding
router settings are explained below.
IP Address: We have already touched on IP addresses without explaining them. A
thorough explanation would require a separate chapter, and is quite beyond the scope
of this manual. A short explanation of IP addressing as it applies to your router,
however, is necessary.
"IP" stands for "Internet Protocol," and IP addresses are the means by which networks
and individual machines are identified on the Internet (and now on most LANs as
well). An IP address is usually written in "dotted quad" notation — four numbers
separated by "dots" (periods). Your Wireless-G router's default LAN-side IP address,
for example, is 192.168.1.1. (It has no default WAN-side IP address; its "WAN IP"
must be set manually or sent to the router by your ISP.)
Wireless-G Router User's Manual
Each number in an IP address takes up an octet — eight bits — of computer storage
space, so its range is 0–255. Certain numbers, however, have special significance in
certain positions. No machine's IP address can end in 0 or 255, for example.
Subnet Mask: Each machine on an IP network must have an IP address that is unique
on that network. All the machines, however, must share a set of values called a subnet
mask. The router's default LAN-side subnet mask is 255.255.255.0. Combined with
the router's default LAN-side IP address of 192.168.1.1, this tells us (and all machines
getting their IP settings from the router) —
• The first three numbers of the IP address — 192.168.1 — are the network portion
of the address, shared by all machines on the LAN, and the fourth number is the
host portion, unique to each machine.
• The machines on the LAN (including the router) can have.IP addresses from
192.168.1.1 to 192.168.1.254. Machines with addresses in this range are local,
and can be reached directly.
• Machines with IP addresses outside this range can only be reached through a
gateway such as the router.
DNS: We prefer names to IP addresses. The name www.bigcompany.com is likely to
identify a Web server in the domain of servers run by bigcompany, which is part of
the domain of commercial enterprises on the Internet. To reach this server, we need its
IP address. Our Internet software gets the address by contacting a Domain Name
System (DNS) server, also called a name server. If one DNS server doesn't have a
particular IP address in its tables, it can get it from a DNS server that does.
The IP address of at least one DNS server is a required setting for any machine that
will access the Internet. On most types of Internet connections, the router can get at
least one DNS server's IP address from your ISP, and it passes the address(es) to
machines on the LAN that get their IP settings from the router.
MAC Address: Ethernet was developed separately from the Internet and has a very
different system of addressing. In Ethernet, each device is identified by its medium (or
media) access control (MAC) address. This is a value that is assigned at the factory
and usually cannot be changed. The Institute of Electrical and Electronics Engineers
(IEEE) administers a system that ensures that no two Ethernet devices in the world
have the same MAC address.
A device's MAC address is usually printed on a sticker placed on the back or bottom
of the device. Various formats are used, but the address is always in hexadecimal
(base 16) notation and always consists of twelve hexadecimal digits. Two common
formats are 12:34:56:78:9A:BC and 123456:789ABC .
Wireless-G Router User's Manual
Chapter 1: Required Setup
The router always requires some setup. There are several reasons:
• It works with six different kinds of Internet connection. Even if the default setting
is the kind of connection you have, some setup may be required to get it working.
• Wireless networking is enabled by default. If you don't change some settings,
your network will be open to possibly malevolent intruders.
• The router's setup utility is password-protected, but the default password is easy
to find out. Unless you change the router password, anyone with access to your
network can change router settings (and cut you off from your own network!).
Information You Need
Internet Connection Type: You will need information from your ISP, starting with
the type of Internet connection you have. That will be one of the following:
•
•
•
•
•
•
Automatic Configuration – DHCP (the Dynamic Host Configuration Protocol)
Static IP (fixed IP settings)
PPPoE (the Point-to-point Protocol over Ethernet)
PPTP (the Point-to-point Tunneling Protocol)
L2TP (the Layer 2 Tunneling Protocol)
Telstra Cable (BigPond broadband cable service)
Depending on which of these you use, other information may be required. It must be
obtained from your ISP.
Wireless Environment: It is important to know in advance what kinds of wireless
stations will access the router: Wireless-G (802.11g), Wireless-B (802.11b), or both.
If you are adding the router to an existing wireless network, you will need to know
how that network is set up. You should also find out if other wireless equipment is
operating nearby, so you can pick a channel that minimizes interference.
Preparation for Setup
Making Connections: It is assumed here that you have a computer connected to your
modem through an Ethernet cable, and that the computer has a Javascript-enabled
Web browser installed. It is best to use this computer to set up the router.
(If your Internet connection type is Static IP or PPTP, this computer might have fixed
IP settings. The computer that you use to set up the router must be set to obtain IP
settings automatically. For information on checking and changing the setting, look up
"automatic addressing" or "DHCP" with the operating system's Help function.)
Wireless-G Router User's Manual
Make connections for setup as follows:
1. Power down the modem.
Some modems are designed to stop working if they detect a change in the MAC
address of the device connected to them.
2. Disconnect the Ethernet cable from the modem.
3. Plug the Ethernet cable into any one of the router's four LAN ports.
The Ethernet cable that led from the computer to the modem should now lead
from the computer to the router.
4. Plug in and connect the router's AC power adapter.
The router will be ready for setup shortly after its POWER indicator stops flashing
and starts shining steadily.
If you need to restore the router's factory defaults, press its Reset button for at least
five seconds and wait until it is again ready.
You can connect the router's WAN port to the modem with an Ethernet cable and turn
the modem on now, if you wish. From the point of view of security, however, it is
better to do this after setup is complete.
Accessing the Setup Utility: If all has gone well, the computer will now have IP
settings (received from the router) that let you conveniently browse to the router's
setup utility. Access the setup utility as follows:
1. Start up the Web browser.
If it tries to go to a start page on the Internet, click its Stop button or press Esc.
2. Type http://192.168.1.1/ into the browser's address bar and then press Enter.
You will be prompted for a user name and password.
3. Leave the User Name box blank, type admin into the Password box, and press
Enter (or click OK).
The Basic Setup panel of the setup utility's Setup page will appear.
Later, after the router and your LAN are fully set up and in operation, you will still be
able to access the router's setup utility in this way: start up a browser on any computer
networked to the router, type http:// plus the router's IP address into the address bar,
press Enter, and supply the correct password when prompted (that password will be
something other than admin if you follow our recommendations during initial setup).
Wireless-G Router User's Manual
Setup Utility Basics: Note the following characteristics of the setup utility:
• Each settings panel has a Save Settings button. After changing settings, you
must click Save Settings to have the changes applied on the router.
• Switching panels cancels unsaved changes. Finish up in one panel before going to
another.
• Many controls appear only when certain settings are selected. If you don't see a
certain control at first, you will see it when you select a setting that makes it
necessary.
• Although you log on to the setup utility by supplying a password, there is no
procedure for logging off. After you save all your settings, you can simply close
your browser or browse to other pages.
Setup for Internet Access
Internet Connection Type: To begin setup for Internet access, open the Internet
Connection Type list and select your connection type.
• For almost all connection types, User Name and Password boxes will appear. If
they do, be sure to click in these boxes and type in the strings required by your
ISP.
NOTE: Your ISP may refer to the user name as a user ID, account
name, or "login."
• For almost all connection types, you can select either Connect on Demand or
Keep Alive. Click the option you want and set the time period you want; this is
not decided by your ISP.
Connect on Demand means automatically connecting to your ISP when Internet
access is needed, and then disconnecting when there has been no activity for a
given number of minutes (the Max Idle Time setting).
Keep Alive means never breaking the connection, and automatically trying to
restore it if it goes down for a given number of seconds (the Redial Period
setting).
Find your connection type below and follow the additional instructions given. When
finished, go to "Optional Settings (required by some ISPs)," below.
• Automatic Configuration – DHCP: This is the most common connection type
for cable ISPs. The router will receive its WAN-side IP settings from a DHCP
server on your ISP's network. Your ISP may require that you connect from a
registered MAC address; in that case you must either (a) register the router's
WAN-side MAC address with your ISP (this address is shown in the Status
Wireless-G Router User's Manual
page's Router panel), or (b) use the MAC Address Clone panel to change the
router's WAN-port MAC address.
• Static IP: Use this setting if you have purchased a fixed IP address from your ISP
and you are not using PPTP. All IP settings must be input manually: Internet IP
Address, Subnet Mask, Gateway, and at least one Static DNS server address.
All values must be obtained from your ISP.
• PPPoE: This is the most common connection type for DSL ISPs. You must input
the User Name and Password settings required by your ISP. WAN-side IP
settings will be received over the wire from your ISP when the router connects.
• PPTP: This is used by a minority of ISPs. You must input the User Name and
Password settings required by your ISP. If you have received fixed IP settings
from your ISP, you must input them in the Internet IP Address, Subnet Mask,
and Gateway boxes. If these settings are assigned dynamically (over the wire),
leave the Internet IP address set to 0.0.0.0.
• L2TP: This is used by a minority of ISPs. You must input the User Name,
Password, and L2TP Server IP address settings required by your ISP. WANside IP settings will be received over the wire when the router connects.
• Telstra Cable: This is used on Telstra BigPond broadband cable connections in
Australia. You must input the User Name and Password settings required by
BigPond. Input the name of a heartbeat server if Telstra BigPond indicates that
this is necessary on your connection; otherwise leave the Heart Beat Server box
blank.
Optional Settings (required by some ISPs): Some of the settings in this group are
required on some Internet accounts. Your ISP can tell you which ones you need to set,
if any.
• Router Name: This is not required by any ISP. It is for your reference, and does
not affect operation. You can set this to any string you like, as long as it does not
contain spaces and is no more than 39 characters long.
• Host Name and Domain Name: One or (more often) both of these may be
required. Enter the strings your ISP has instructed you to use. Usually, a host
name has no dots (www is a common host name), while a domain name has at
least one dot (bigcompany.com, for example).
• MTU and Size: Information is sent over a network in chunks called packets.
Packet size is measured in octets (also called bytes) of eight bits (1s and 0s) each.
MTU stands for Maximum Transmission Unit. MTU size is the greatest allowable
packet size on a given connection.
With the MTU control set to Auto, the router adjusts MTU size according to
connection type (1500 for Ethernet, 1492 for PPPoE, 1436 for PPTP, and so on).
Wireless-G Router User's Manual
In very rare cases, an ISP may require an unusual MTU size. Where this is the
case, set MTU to Manual and enter the value in the Size box.
This completes adjustment of settings in the Basic Setup panel's Internet Setup
section. Some controls in the Network Setup section, however, are related to the
Internet. Below are a few things you can do before you click Save Settings.
• If (1) you will use the router as a DHCP server for machines on the LAN, and (2)
your ISP has given you the IP addresses of any DNS servers, you can enter those
addresses in the Static DNS 1, 2, and 3 boxes. (For a connection type of Static IP,
however, these addresses are entered not here but in the Internet Setup section.)
WINS stands for Windows Internet Name Service. If the router will be a DHCP
server and you have been given the IP address of a WINS server, you can enter
that address in the WINS boxes.
• You can select your time zone from the Time Zone list, and if Daylight Saving
Time is not used in your area, you can uncheck Automatically adjust clock for
daylight saving changes.
The router will set its clock by obtaining Universal Coordinated Time readings
from servers on the Internet and adding or subtracting the number of hours
required for your time zone. This makes it possible for you to specify when
particular machines can and cannot access the Internet.
Unless you are very knowledgeable about networking, we recommend not changing
any other settings in the Network Setup section at this time.
Finishing Up: Click Save Settings to save and apply your settings on the router.
After a short wait, a success message and a Continue button will appear. Click
Continue to return to the Basic Setup panel.
Testing the Connection: If you wish to test the connection, we recommend making
the test brief for security reasons. Setup for Internet access may be complete, but
required setup is not.
You will need a second Ethernet cable. Test the connection as follows:
1. Power up the modem.
2. Connect the router's WAN port to the modem with an Ethernet cable.
3. Point the browser directly at an Internet Web site.
Simply choose a site from your bookmarks or favorites. Do not run any program
your ISP gave you for connecting and disconnecting. The router will do that for
you from now on.
10
Wireless-G Router User's Manual
4. Return to the setup utility and turn the modem off.
If your settings are correct and you still cannot connect, the most likely cause is that
your ISP requires the machine connected to the modem to have a particular MAC
address. One solution is to register the MAC address of the router's WAN port with
your ISP. You can find this MAC address by clicking the Status button.
Another solution is to use the MAC Address Clone function.
MAC Address Clone: If you can find out the MAC address that your ISP requires, or
it is the MAC address of the computer you are using to set up the router, you can
"clone" the address to the router's WAN port. Do this as follows:
1. On the setup utility's Setup page, click the MAC Address Clone tab.
2. Click Enable.
3. Do one of the following:
If the address is not that of the computer being used to set up the router, enter the
address in the User Defined Entry boxes.
If the address is that of the computer being used to set up the router, click Clone
Your PC's MAC.
4. Click Save Settings.
Setup for Wireless Networking
The router acts as a wireless access point (AP, also called a base station). Wireless
clients (computers with wireless interfaces, also called wireless stations) connect to
the wired network, the Internet, and each other through the AP portion of the router.
• If you will not use wireless networking, click the Wireless page button, open the
Wireless Network Mode list, click Disabled, and click Save Settings. Then go
to "Setup for Router Security," below.
If you have a wireless client, we suggest starting up the client's wireless connection
software and clicking Site Survey while the router is on.
The router will be detected (its default SSID, or wireless network name, is mySSID),
and you will be able to join the network (this is usually done by double-clicking the
displayed SSID). Anyone else in the vicinity with a wireless client can do this also.
Setup is required to make the wireless network secure against intrusion.
While the Site Survey results are displayed, take note of the wireless channels used by
any other APs or wireless networks operating in the vicinity.
11
Wireless-G Router User's Manual
Basic Wireless Settings: Start setup for wireless networking by clicking the
Wireless page button. The Basic Wireless Settings panel will appear. The controls
in this panel are explained below.
• Wireless Network Mode: Set this control according to the kind(s) of wireless
client(s) that will join the network. Use Mixed if both Wireless-B (IEEE 802.11b)
and Wireless-G (IEEE 802.11g) clients will join; B-Only if only Wireless-B
clients will join; and G-Only if only Wireless-G clients will join. This is
important for network performance.
Any Wireless-G clients will have a similar control, and must use the same setting
as the router.
• Wireless Network Name (SSID): This is a string by which the router and all its
wireless clients identify themselves as belonging to the same network. It can be
up to 32 characters long. All typable characters, including spaces, are allowed.
The setting is case-sensitive. A long, hard-to-guess SSID that is not broadcast can
help prevent casual intrusion, but is less convenient for authorized clients.
Do not use the factory-set SSID. This is very important for security.
• Wireless Channel: Open this list to see the numbers and center frequencies of
the wireless channels the router can use. Each channel is a cluster of frequencies.
Closely spaced channels share some frequencies, which can cause interference
and impair performance. Networks (or APs on the same network) with
overlapping coverage areas should be set at least 5 channels apart. If channel 6 is
being used by another device near the router, for example, set the router to
channel 1 or channel 11.
Wireless clients will automatically find the channel used by the router.
• Wireless SSID Broadcast: Use the default setting, Enable, to allow the SSID to
show up in wireless clients' Site Survey results. This saves users the trouble of
typing the SSID in by hand on each client. Click Disable to prevent the SSID
from appearing in Site Survey results.
Click Save Settings when finished making changes in the Basic Wireless Settings
panel.
Wireless Security: To make wireless links secure, you must use encryption. This
means scrambling wireless transmissions using a string of characters or values called
a key.
The router offers six encryption options. They are described below in order of
increasing security. Assuming that you will use encryption, you must select an option
that all of your wireless clients can use.
12
Wireless-G Router User's Manual
• WEP (Wired Equivalent Privacy) is the least secure option, but is supported by all
Wireless-B and Wireless-G clients. One reason it is relatively insecure is that it
does not automatically change keys.
• RADIUS (Remote Authentication Dial-in User Service) can be used together with
WEP to provide authentication and periodically change keys. This requires a
RADIUS server, which can be expensive and difficult to administer.
• WPA Personal is Wi-Fi Protected Access–Personal, also known as WPA-PSK
(WPA Pre-shared Key). This uses the Temporal Key Integrity Protocol (TKIP) to
periodically change keys. Newer WPA Personal clients can use AES (see next).
• WPA2 Personal uses the more powerful Advanced Encryption Standard (AES),
and can also use AES and TKIP concurrently so that both WPA2 Personal and
older WPA Personal clients can connect.
• WPA Enterprise is similar to WPA Personal but adds RADIUS authentication,
requiring a RADIUS server.
• WPA2 Enterprise is similar to WPA2 Personal but adds RADIUS authentication,
requiring a RADIUS server.
Setting the Encryption Option: Check your wireless clients to find the most secure
encryption option they can all use (keeping in mind whether or not a RADIUS server
is available). Then click the Wireless page's Wireless Security tab, open the
Security Mode list, and select the option you will use.
Controls for setting up the selected encryption method will appear. Follow the
instructions below for that method.
• WPA Personal Step 1; WPA Enterprise Step 1:
Check, and if necessary change, the WPA Algorithms setting.
Leave this control set to TKIP if you have clients that can only use TKIP. Set this
control to AES if all your clients can use AES and you want stronger encryption.
• WPA2 Personal Step 1; WPA2 Enterprise Step 1:
Check, and if necessary change, the WPA Algorithms setting.
If only WPA2 clients will connect, use AES. If both WPA2 and WPA clients will
connect, use TKIP+AES.
• WPA Personal Step 2; WPA2 Personal Step 2:
(a) Input the WPA shared key.
13
Wireless-G Router User's Manual
The WPA shared key (also called the WPA pre-shared key) must contain 8 to 63
characters. All characters found on a U.S.-type keyboard, including spaces, are
valid. A string of 14 to 22 randomly chosen characters is recommended. The
setting is case-sensitive. All clients must use exactly the same string as the router.
(In some client setup utilities, the WPA shared key is called a passphrase. It is not
in fact used directly as an encryption key; it is used to generate encryption keys
that change periodically.)
(b) Check, and if desired change, the Group Key Renewal setting.
Group Key Renewal controls how frequently the router changes the key for
broadcast and multicast traffic (this key is generated automatically). Most
broadcast traffic is for network control; most multicast (partial broadcast) traffic
is for audio/video applications.
A client can leave the network and then continue to monitor broadcast and
multicast traffic until the group key changes. Input a lower value here if the
possibility of such monitoring is a concern. The default value is 3600 seconds (1
hour); the allowable range is 600 (10 minutes) to 7200 (2 hours).
(c) Click Save Settings and go to "Setup for Router Security.".
• WPA Enterprise Step 2; WPA2 Enterprise Step 2:
(a) Input the RADIUS server address.
(b) Check, and if necessary change, the RADIUS Port setting.
One machine can provide many different services. "Port" here is a number
specifying a particular service. The standard port number for RADIUS is 1812. If
your network's RADIUS server uses a non-standard port number, enter that
number here.
(c) Input the shared key (also called the RADIUS secret or RADIUS shared secret).
This is a string shared by the router and the RADIUS server. Input the string
specified by the administrator of your RADIUS server.
(b) Check, and if desired change, the Key Renewal Timeout setting.
Key Renewal Timeout controls how frequently the key for broadcast and
multicast traffic is changed (this key is generated automatically). Most broadcast
traffic is for network control; most multicast (partial broadcast) traffic is for
audio/video applications.
A client can leave the network and then continue to monitor broadcast and
multicast traffic until the group key changes. Input a lower value here if the
14
Wireless-G Router User's Manual
possibility of such monitoring is a concern. The default value is 3600 seconds (1
hour); the allowable range is 600 (10 minutes) to 7200 (2 hours).
(c) Click Save Settings and go to "Setup for Router Security."
• RADIUS Step 1:
(a) Input the RADIUS server address.
(b) Check, and if necessary change, the RADIUS Port setting.
One machine can provide many different services. "Port" here is a number
specifying a particular service. The standard port number for RADIUS is 1812. If
your network's RADIUS server uses a non-standard port number, enter that
number here.
(c) Input the shared key (also called the RADIUS secret or RADIUS shared secret).
This is a string shared by the router and the RADIUS server. Input the string
specified by the administrator of your RADIUS server.
• RADIUS Step 2; WEP:
(a) If you will use 64-bit WEP, set Default Transmit Key to 1, 2, 3, or 4.
In 64-bit WEP, four short keys are used. Each device can use any one of these
keys as its default transmit key, and uses the other three keys only for decryption.
In 128-bit WEP, a single long key is used by all devices for both encryption and
decryption. It must appear as key 1, and Default Transmit Key must be set to 1.
(b) Set WEP Encryption to 64 bits 10 hex digits or 128 bits 26 hex digits.
64-bit WEP is also known as 40-bit WEP (24 bits are generated automatically).
WEP keys are generated or input in hexadecimal (base 16) numeric notation. In
"hex," the numerals 0–9 and the letters A–F (or a–f; case does not matter) are used
as digits. Your wireless clients must use the same setting as the router.
(c) Either input a passphrase and click Generate, or input the key(s) manually.
The passphrase can contain up to 16 characters. All typable characters, including
spaces, are valid; the generated keys will contain only hex digits.
Your wireless clients' setup utilities may also let you generate the key(s) from a
passphrase. Unfortunately, different manufacturers' setup utilities generate
different keys from the same passphrase. Carefully copy the key(s) down for input
on your wireless clients.
(d) Click Save Settings and go to "Setup for Router Security."
15
Wireless-G Router User's Manual
Setup for Router Security
You accessed the router's setup utility using a simple, easily discovered password,
admin. If you do not change the password, anyone using your network — even
wirelessly — can do the same, and cause considerable trouble for you. We consider
changing the router password a required part of setup.
Change the router password as follows:
1. Click the Administration page button.
The Management panel will appear.
2. Clear the Password box and type the new password.
The password can be up to 32 characters long, and must not contain any spaces.
3. Clear the Re-enter to confirm box and type the new password again.
4. If you do not expect to access the router's setup utility from a wireless client, set
Wireless Access Web to Disable.
3. Click Save Settings and wait to be returned to the Management panel.
16
Wireless-G Router User's Manual
Chapter 2: Setup Utility Reference
After completing required setup, you may wish to further adjust router settings, or use
some of the router's advanced features. This chapter provides a complete reference
covering each panel of each page of the router's setup utility.
Accessing the Setup Utility: To access the setup utility, start up a Web browser on
your computer and enter the router's default IP address, 192.168.1.1, in the address
bar. Then press Enter.
You will be prompted for a user name and password. Leave the User Name box
blank. The first time you open the setup utility, use the default password admin. (You
can set a new password using the Administration page's Management panel.) Click
OK to continue.
Setup Page – Basic Setup Panel
The first panel that appears is the Basic Setup panel. This allows you to change
settings related to Internet access and LAN operation.
The Internet Setup section lets you configure the router for your Internet connection.
Most of the information you need can be obtained from your ISP.
Internet Connection Type: Open this list and select the type of Internet connection
your ISP provides. The available types are:
•
•
•
•
•
•
Automatic Configuration – DHCP (the Dynamic Host Configuration Protocol)
Static IP (fixed IP settings)
PPPoE (the Point-to-point Protocol over Ethernet)
PPTP (the Point-to-point Tunneling Protocol)
L2TP (the Layer 2 Tunneling Protocol)
Telstra Cable (BigPond broadband cable service)
• Automatic Configuration - DHCP: By default, Internet Connection Type is set
to Automatic Configuration - DHCP. Use this setting only if your ISP provides
you with a dynamic IP address via DHCP. (This option usually applies to cable
connections.)
• Static IP: If you use a permanently fixed IP address to connect to the Internet,
select Static IP. To use this option, you must input the settings listed below.
Internet IP Address: This is the router's IP address, as seen from the Internet.
Your ISP will provide you with the IP address you need to specify here.
Subnet Mask: This is the subnet mask used by the router on your ISP's network.
Your ISP will provide you with the subnet mask.
17
Wireless-G Router User's Manual
Gateway: Your ISP will provide you with the gateway address, which is the IP
address of a router on your ISP's network.
DNS: Your ISP will provide you with at least one DNS (Domain Name System)
server IP address.
• PPPoE: Some DSL-based ISPs use PPPoE (Point-to-Point Protocol over
Ethernet) to establish Internet connections. If you are connected to the Internet
through a DSL line, check with your ISP to see if they use PPPoE. If they do, you
will have to enable PPPoE.
User Name and Password: Enter the user name and password provided by your
ISP.
Connect on Demand: Max Idle Time: You can configure the router to
disconnect from the Internet after it has been inactive for a specified period of
time (Max Idle Time). If your Internet connection has been terminated due to
inactivity, Connect on Demand enables the router to automatically reconnect
when you attempt to access the Internet again. To use this option, select Connect
on Demand. In the Max Idle Time box, enter the number of minutes you want to
have elapsed before your Internet connection terminates. The default Max Idle
Time is 5 minutes.
Keep Alive: Redial Period: If you select this option, the router will periodically
check your Internet connection. If you are disconnected, the router will
automatically re-establish your connection. To use this option, select Keep Alive.
In the Redial Period box, specify how often you want the router to check the
Internet connection. The default Redial Period is 30 seconds.
• PPTP: The Point-to-Point Tunneling Protocol (PPTP) is a connection method
used mostly in European countries.
Internet IP Address: This is the router's IP address as seen from the Internet.
Your ISP will provide you with the IP address you need to specify here.
Subnet Mask: This is the subnet mask used by the router on your ISP's network.
Your ISP will provide you with the subnet mask.
Gateway: Your ISP will provide you with the gateway address.
User Name and Password: Enter the user name and password provided by your
ISP.
Connect on Demand: Max Idle Time: You can configure the router to
disconnect from the Internet after it has been inactive for a specified period of
time (Max Idle Time). If your Internet connection has been terminated due to
inactivity, Connect on Demand enables the router to automatically reconnect
when you attempt to access the Internet again. To use this option, select Connect
18
Wireless-G Router User's Manual
on Demand. In the Max Idle Time box, enter the number of minutes you want to
have elapsed before your Internet connection terminates. The default Max Idle
Time is 5 minutes.
Keep Alive: Redial Period: If you select this option, the router will periodically
check your Internet connection. If you are disconnected, the router will
automatically re-establish your connection. To use this option, select Keep Alive.
In the Redial Period box, specify how often you want the router to check the
Internet connection. The default Redial Period is 30 seconds.
• L2TP: The Layer Two Tunneling Protocol is a connection method used mostly in
Israel.
User Name and Password: Enter the user name and password provided by your
ISP.
L2TP Server: This is the IP address of the L2TP server. Your ISP will provide
you with the IP address you need to specify here.
Connect on Demand: Max Idle Time: You can configure the router to
disconnect from the Internet after it has been inactive for a specified period of
time (Max Idle Time). If your Internet connection has been terminated due to
inactivity, Connect on Demand enables the router to automatically reconnect
when you attempt to access the Internet again. To use this option, select Connect
on Demand. In the Max Idle Time box, enter the number of minutes you want to
have elapsed before your Internet connection terminates. The default Max Idle
Time is 5 minutes.
Keep Alive: Redial Period: If you select this option, the router will periodically
check your Internet connection. If you are disconnected, the router will
automatically re-establish your connection. To use this option, select Keep Alive.
In the Redial Period box, specify how often you want the router to check the
Internet connection. The default Redial Period is 30 seconds.
• Telstra Cable: Telstra Cable is a connection method used in Australia only. If
you use Telstra BigPond cable service, then select Telstra.
User Name and Password: Enter the user name and password provided by your
ISP.
Heart Beat Server: This is the name or IP address of the heartbeat server. Your
ISP will provide you with the string or address you need to specify here. If no
heartbeat server is used on your connection, then leave this box blank.
Connect on Demand: Max Idle Time: You can configure the router to
disconnect from the Internet after it has been inactive for a specified period of
time (Max Idle Time). If your Internet connection has been terminated due to
inactivity, Connect on Demand enables the router to automatically reconnect
19
Wireless-G Router User's Manual
when you attempt to access the Internet again. To use this option, select Connect
on Demand. In the Max Idle Time box, enter the number of minutes you want to
have elapsed before your Internet connection terminates. The default Max Idle
Time is 5 minutes.
Keep Alive: Redial Period: If you select this option, the router will periodically
check your Internet connection. If you are disconnected, the router will
automatically re-establish your connection. To use this option, select Keep Alive.
In the Redial Period box, specify how often you want the router to check the
Internet connection. The default Redial Period is 30 seconds.
Optional Settings: Some of these settings may be required by your ISP. Verify with
your ISP before making any changes.
• Router Name: In this box, you can enter a name of up to 39 characters to
represent the router.
• Host Name/Domain Name: These boxes let you supply a host and domain name
for the router. Some ISPs, usually cable ISPs, require these names as
identification. You may have to check with your ISP to see if your Internet
service has been configured with a host and domain name. In most cases, leaving
these boxes blank will work.
• MTU: MTU is the Maximum Transmission Unit. It specifies the largest packet
size permitted for Internet transmission. Select Manual if you want to manually
enter the largest packet size that is transmitted. To have the router select the best
MTU for your Internet connection, keep the default setting, Auto.
• Size: When Manual is selected as the MTU setting, this option is enabled. Leave
this value in the 1200 to 1500 range. The default size depends on the Internet
connection type: DHCP, Static IP, or Telstra — 1500; PPPoE — 1492; PPTP or
L2TP — 1460.
Network Setup: The Network Setup section changes the settings on the network
connected to the router's Ethernet ports. Wireless setup is performed through the
Wireless page.
• Router IP: This presents both the router's IP address and subnet mask as seen by
your network.
• Network Address Server Settings (DHCP): These controls let you configure
the router's Dynamic Host Configuration Protocol (DHCP) server function. The
router can be used as a DHCP server for your network. A DHCP server
automatically assigns an IP address to each computer on your network. If you
choose to enable the router's DHCP server option, make sure there is no other
DHCP server on your network.
DHCP Server: DHCP is enabled by factory default. If you already have a DHCP
20
Wireless-G Router User's Manual
server on your network, or you don't want a DHCP server, then select Disable (no
other DHCP features will be available).
Starting IP Address: Enter a value for the DHCP server to start with when
issuing IP addresses. Because the router's default IP address is 192.168.1.1, the
starting IP address must be 192.168.1.2 or greater, but smaller than
192.168.1.255. The default starting IP address is 192.168.1.100.
Maximum Number of DHCP Users: Enter the maximum number of machines
that you want the DHCP server to assign IP addresses to. This number cannot be
greater than 253. The default is 50.
Client Lease Time: The client lease time is the amount of time a network user
will be allowed connection to the router with their current dynamic IP address.
Enter the amount of time, in minutes, that the user will be "leased" this dynamic
IP address. After the time is up, the user will be automatically assigned a new
dynamic IP address. The default is 0 minutes, which means one day.
Static DNS (1-3): The Domain Name System (DNS) is how the Internet
translates domain or Web site names into IP addresses. Your ISP will provide you
with at least one DNS server IP address. If you wish to use another, enter that IP
address in one of these groups of boxes. You can enter up to three DNS server IP
addresses here. The router will use these for quicker access to functioning DNS
servers.
WINS: The Windows Internet Naming Service (WINS) manages Windows PCs'
interaction with the Internet. If you use a WINS server, enter that server's IP
address here. Otherwise, leave this blank.
Time Setting: Select from this list the time zone in which your network functions.
(You can even automatically adjust for daylight saving time.)
Click Save Settings to apply the new settings, or click Cancel Changes to cancel
any unsaved changes.
Setup Page – DDNS Panel
The router offers a Dynamic Domain Name System (DDNS) feature. DDNS lets you
have a fixed host and domain name without having a fixed Internet IP address. If the
router's Internet IP address is dynamically assigned and you wish to host a Web site,
FTP site, or other service, you must use DDNS so the Domain Name System is
automatically updated when the router's Internet IP address changes.
Before you can use this feature, you need to sign up for DDNS service with DDNS
provider Dynamic Network Services, Inc., also known as DynDNS
(http://www.dyndns.org/). If you do not want to use this feature, keep the default
setting, Disable.
21
Wireless-G Router User's Manual
DDNS Service: If you have signed up for DDNS service with DynDNS, open the
DDNS Service list and select DynDNS.org.
• User Name: Enter the User Name for your DDNS account.
• Password: Enter the Password for your DDNS account.
• Host Name: This is the host name assigned by the DDNS service. It is a fully
qualified domain name (FQDN) in the format name.dyndns.org.
• Internet IP Address: The router's Internet IP address is displayed here. Because
it is dynamic, it will change.
• Status: The status of the DDNS service is displayed here.
Click Save Settings to apply the new settings, or click Cancel Changes to cancel
any unsaved changes.
Setup Page – MAC Address Clone Panel
Enable/Disable: To clone a MAC address to the router's WAN port, select Enable.
User Defined Entry: If the MAC address you wish to clone is not that of computer
you are using to access the router's setup utility, enter that MAC address here.
Clone Your PC's MAC: Clicking this button will clone the MAC address of the
computer you are using to access the router's setup utility.
Click Save Settings to apply the new settings, or click Cancel Changes to cancel
any unsaved changes.
Setup Page – Advanced Routing Panel
This panel is used to configure advanced routing functions. The router can operate as
a gateway with or without static (fixed) routes through other routers on your LAN. It
can also operate as a full router, even using the Routing Information Protocol (RIP) to
discover routes through communication with other routers.
Operating Mode: Select the mode in which the router will function. If the router is
hosting your network's connection to the Internet, select Gateway. If another router
exists on your network, select Router. When Router is chosen, dynamic routing will
be available as an option.
Dynamic Routing: This section appears only when Operating Mode is set to Router.
• RIP: This feature enables the router to automatically adjust to physical changes in
22
Wireless-G Router User's Manual
network layout and exchange routing tables with other routers. This feature is
disabled by default. From the drop-down list, you can select LAN & Wireless,
which performs dynamic routing over your Ethernet and wireless links.
Alternatively, you can select WAN (Internet), which performs dynamic routing on
the link to your ISP. Finally, selecting Both enables dynamic routing on all links.
Static Routing: A static route is a predetermined pathway that network information
must travel to reach a specific host or network.
• Select set number: You can have up to 20 static routes. Each has a number and
a name. Select from this list the static route you wish to be displayed.
• Delete This Entry: Click here to delete the displayed route.
• Enter Route Name: Enter a name for the route here. The name can contain up to
25 alphanumeric characters.
• Destination LAN IP: The destination LAN IP is the address of the remote
network or host to which you want to assign a static route.
• Subnet Mask: The subnet mask determines which portion of a destination LAN
IP address is the network portion, and which portion is the host portion.
• Default Gateway: This is the IP address of the gateway device that provides
contact between the router and the remote network or host.
• Interface: This setting tells the router whether the destination IP address is on the
LAN & Wireless (Ethernet and wireless networks) or the WAN (Internet).
• Show Routing Table: Click this button to open a window displaying how data is
routed through your local network. For each route, the destination LAN IP
address, subnet mask, gateway, and interface are displayed. Click Refresh to
update the information. Click Close to exit this window.
Click Save Settings to apply the new settings, or click Cancel Changes to cancel
any unsaved changes.
Wireless Page – Basic Wireless Settings Panel
The basic settings for wireless networking are set in this panel.
Wireless Network Mode: From this drop-down list, you can select the wireless
standards running on your network. If you have both 802.11g and 802.11b devices on
your network, keep the default setting, Mixed. If you have only 802.11g devices,
select G-Only. If you have only 802.11b devices, select B-Only. If you do not have
any 802.11g or 802.11b devices on your network, select Disable.
Wireless Network Name (SSID): The SSID is the network name shared among all
23
Wireless-G Router User's Manual
devices on a wireless network. The SSID must be identical for all devices on the
wireless network. It is case-sensitive and must not exceed 32 characters (use any of
the characters on the keyboard). Make sure this setting is the same for all devices on
your wireless network. For added security, you should replace the default SSID
(mySSID) with a unique name.
Wireless Channel: Select the channel from the list provided to correspond with your
network settings. Devices that connect to the router wirelessly will automatically
discover the channel it is set to.
Wireless SSID Broadcast: When wireless clients survey the local area for wireless
networks to associate with, they will detect the SSID broadcast by the router. To
broadcast the router's SSID, keep the default setting, Enable. If you do not want to
broadcast the router's SSID, then select Disable.
Click Save Settings to apply the new settings, or click Cancel Changes to cancel
any unsaved changes.
Wireless Page – Wireless Security Panel
This panel lets you protect your wireless network against eavesdropping and
intrusion. There are six wireless security options: WPA Personal, WPA Enterprise,
WPA2 Personal, WPA2 Enterprise, RADIUS, and WEP. These are briefly discussed
here. For detailed instructions on configuring wireless security for the router, see
"Setup for Wireless Security" in Chapter 1.
To be able to join the network, wireless devices must all use the same security method
and wireless encryption key or keys.
Security Mode: Select the security method for your wireless network. If you do not
want to use wireless security, keep the default, Disabled.
• WPA Personal: WPA stands for Wi-Fi Protected Access, which is a security
standard stronger than WEP encryption.
WPA Algorithms: WPA supports two encryption methods, TKIP and AES.
Select the type of algorithm, TKIP or AES. (AES is a stronger encryption method
than TKIP.)
WPA Shared Key: Enter the key shared by the router and your other network
devices. It must have 8–63 characters.
Group Key Renewal: Enter a key renewal period, which tells the router how
often it should change the group (broadcast/multicast) encryption key. The default
group key renewal period is 3600 seconds.
• WPA Enterprise: This version of WPA requires a RADIUS authentication server
on the network. It is designed for large corporate networks.
24
Wireless-G Router User's Manual
WPA Algorithms: WPA supports two encryption methods, TKIP and AES.
Select the type of algorithm, TKIP or AES. (AES is a stronger encryption method
than TKIP.)
RADIUS Server Address: Enter the IP address of the RADIUS server.
RADIUS Port: Enter the port number of the RADIUS server. The default value is
1812.
Shared Key: Enter the key shared by the router and the RADIUS server.
Key Renewal Timeout: Enter a key renewal period, which tells the router how
often it should change the group (broadcast/multicast) encryption key. The default
key renewal timeout is 3600 seconds.
• WPA2 Personal: WPA2 is a more advanced, more secure version of WPA.
WPA Algorithms: WPA2 supports two encryption methods, TKIP and AES.
Select the type of algorithm, AES, or TKIP+AES. The default selection is AES.
Select TKIP+AES to allow connection by both WPA and WPA2 devices.
WPA Shared Key: Enter the key shared by the router and your other network
devices. It must have 8–63 characters.
Group Key Renewal: Enter a key renewal period, which tells the router how
often it should change the group (broadcast/multicast) encryption key. The default
group key renewal period is 3600 seconds.
• WPA2 Enterprise: This version of WPA2 requires a RADIUS authentication
server on the network. It is designed for large corporate networks.
WPA Algorithms: WPA2 supports two encryption methods, TKIP and AES.
Select the type of algorithm, AES, or TKIP+AES. The default selection is AES.
Select TKIP+AES to allow connection by both WPA and WPA2 devices.
RADIUS Server Address: Enter the IP address of the RADIUS server.
RADIUS Port: Enter the port number of the RADIUS server. The default value is
1812.
Shared Key: Enter the key shared by the router and the RADIUS server.
Key Renewal Timeout: Enter a key renewal period, which tells the router how
often it should change the group (broadcast/multicast) encryption key. The default
key renewal timeout is 3600 seconds.
• RADIUS: RADIUS stands for Remote Authentication Dial-in User Service. As a
25
Wireless-G Router User's Manual
wireless security method, RADIUS means WEP used in combination with a
RADIUS server.
RADIUS Server Address: Enter the IP address of the RADIUS server.
RADIUS Port: Enter the port number of the RADIUS server. The default value is
1812.
Shared Key: Enter the key shared by the router and the RADIUS server.
Default Transmit Key: If you will use 64-bit WEP, choose which key the router
should use when transmitting. The default is 1.
WEP Encryption: Select a level of WEP encryption, 64 bits (where the four keys
must each be 10 hex digits long) or 128 bits (where the single key must be 26 hex
digits long). The default is 64 bits 10 hex digits.
Passphrase: If you wish to have keys automatically generated for you, enter a
string of 1–16 characters here and then click Generate.
Key 1–4: If you did not enter a passphrase, enter the WEP key(s) manually.
• WEP: WEP stands for Wired Equivalent Privacy. This is a very early and
relatively less secure wireless encryption method.
Default Transmit Key: If you will use 64-bit WEP, choose which key the router
should use when transmitting. The default is 1.
WEP Encryption: Select a level of WEP encryption, 64 bits (where the four keys
must each be 10 hex digits long) or 128 bits (where the single key must be 26 hex
digits long). The default is 64 bits 10 hex digits.
Passphrase: If you wish to have keys automatically generated for you, enter a
string of 1–16 characters here and then click Generate.
Key 1–4: If you did not enter a passphrase, enter the WEP key(s) manually.
Click Save Settings to apply the new settings, or click Cancel Changes to cancel
any unsaved changes.
Wireless Page – Wireless MAC Filter Panel
Wireless access can be controlled by filtering machines according to their MAC
addresses.
Wireless MAC Filter: To filter wireless users by MAC address, either permitting or
blocking access, click Enable. If you do not wish to filter users by MAC address,
keep the default setting, Disable.
26
Wireless-G Router User's Manual
Prevent: Select this to block wireless access by MAC address. This button is selected
by default.
Permit Only: Select this to allow wireless access by MAC address. This button is not
selected by default.
Edit MAC Filter List: Click this to open the MAC Address Filter List window. In
this window, you can list users, by MAC address, to whom you wish to provide or
block access. For easy reference, click Wireless Client MAC List to display a list of
current wireless network users by MAC address.
Click Save Settings to apply the new settings, or click Cancel Changes to cancel
any unsaved changes.
Wireless Page – Advanced Wireless Settings Panel
This panel is used to set up the router's advanced wireless functions. These settings
should only be adjusted by an expert administrator as incorrect settings can reduce
wireless performance.
Authentication Type: The default is set to Auto, which allows either Open System
or Shared Key authentication to be used. With Open System authentication, the sender
and the recipient do NOT use a WEP key for authentication. With Shared Key
authentication, the sender and recipient use a WEP key for authentication.
Basic Rate: The Basic Rate setting is not actually one rate of transmission but a
series of rates at which the router can transmit. The router will advertise its Basic Rate
to the other wireless devices in your network, so they know which rates will be used.
The router will also advertise that it will automatically select the best rate for
transmission. The default setting is Default, when the router can transmit at all
standard wireless rates from 1 to 54 Mbps. Other options are 1-2 Mbps, for use with
older wireless technology, and All, when the router can transmit at all wireless rates.
The Basic Rate is not the actual rate of data transmission. If you want to specify the
router's rate of data transmission, configure the Transmission Rate setting.
Transmission Rate: The rate of data transmission should be set depending on the
speed of your wireless network. You can select from a range of transmission speeds,
or you can select Auto to have the router automatically use the fastest possible data
rate, with auto-fallback. Auto-fallback will negotiate the best possible connection
speed between the router and a wireless client. The default value is Auto.
CTS Protection Mode: CTS (Clear-To-Send) Protection Mode should remain
disabled unless you are having severe problems with your Wireless-G products not
being able to transmit to the router in an environment with heavy 802.11b traffic. This
function boosts the router's ability to catch all Wireless-G transmissions but will
severely decrease performance.
27
Wireless-G Router User's Manual
Frame Burst: Enabling this option should provide your network with greater
performance, depending on the manufacturer of your wireless products. To turn on the
Frame Burst option, select Enable. The default is Disable.
Beacon Interval: The default value is 100. Enter a value between 1 and 65,535
milliseconds. The Beacon Interval value indicates the frequency interval of the
beacon. A beacon is a packet broadcast by the router to synchronize the wireless
network.
DTIM Interval: This value, between 1 and 255, indicates the interval of the Delivery
Traffic Indication Message (DTIM). A DTIM field is a countdown field informing
clients of the next window for listening to broadcast and multicast messages. When
the router has buffered broadcast or multicast messages for associated clients, it sends
the next DTIM with a DTIM Interval value. Its clients hear the beacons and awaken to
receive the broadcast and multicast messages. The default value is 1.
Fragmentation Threshold: This value specifies the maximum size for a packet
before data is fragmented into multiple packets. If you experience a high packet error
rate, you may slightly increase the Fragmentation Threshold. Setting the
Fragmentation Threshold too low may result in poor network performance. Only
minor reduction of the default value is recommended. In most cases, it should remain
at its default value of 2346.
RTS Threshold: Should you encounter inconsistent data flow, only minor reduction
of the default value, 2347, is recommended. If a network packet is smaller than the
preset RTS threshold size, the RTS/CTS mechanism will not be enabled. The router
sends Request to Send (RTS) frames to a particular receiving station and negotiates
the sending of a data frame. After receiving an RTS, the wireless station responds
with a Clear to Send (CTS) frame to acknowledge the right to begin transmission. The
RTS Threshold value should remain at its default value of 2347.
AP Isolation: This isolates all wireless clients and wireless devices on your network
from each other. Wireless devices will be able to communicate with the router but not
with each other. To use this function, select On. AP Isolation is turned off by default.
Secure Easy Setup: On versions of the router with the SecureEasySetup feature, this
control lets you enable or disable that feature.
Click Save Settings to apply the new settings, or click Cancel Changes to cancel
any unsaved changes.
Security Page – Firewall Panel
This panel is used to configure a firewall that can filter out various types of unwanted
traffic.
Block Anonymous Internet Requests: This feature makes it more difficult for
outside users to work their way into your network. This feature is selected by default.
28
Wireless-G Router User's Manual
Deselect the feature to allow anonymous Internet requests.
Filter Multicast: Multicasting allows for multiple transmissions to specific recipients
at the same time. If multicasting is permitted, then the router will allow IP multicast
packets to be forwarded to the appropriate computers. This feature is selected by
default. Deselect this feature to disable it.
Filter Internet NAT Redirection: This feature uses port forwarding to block access to
local servers from local networked computers. Select Filter Internet NAT Redirection
to filter Internet NAT redirection. This feature is not selected by default.
Filter IDENT (Port 113): This feature keeps port 113 from being scanned by devices
outside your local network. This feature is selected by default. Deselect this feature to
disable it.
Click Save Settings to apply the new settings, or click Cancel Changes to cancel
any unsaved changes.
Security Page – VPN Passthrough Panel
This panel lets you allow or not allow Virtual Private Network tunnels using the
IPSec, PPTP, or L2TP protocol to pass through the router's firewall.
IPSec Passthrough: Internet Protocol Security (IPSec) is a suite of protocols used to
implement secure exchange of packets at the IP layer. To allow IPSec tunnels to pass
through the router, keep the default, Enable.
PPTP Passthrough: Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-
Point Protocol (PPP) to be tunneled through an IP network. To allow PPTP tunnels to
pass through the router, keep the default, Enable.
L2TP Passthrough: Layer 2 Tunneling Protocol is the method used to enable Point-
to-Point sessions via the Internet on the Layer 2 level. To allow L2TP tunnels to pass
through the router, keep the default, Enable.
Click Save Settings to apply the new settings, or click Cancel Changes to cancel
any unsaved changes.
Access Restrictions Page – Internet Access Panel
This panel lets you block or allow specific kinds of Internet usage and traffic, such as
Internet access, designated services, and Web sites during specific days and times.
Internet Access Policy: Access is managed by policies. You can have up to 10
Internet access policies. Each has a number and a name. All the settings in the
Internet Access panel are saved as one policy when you click Save Settings. After
you have created some policies, use this drop-down list to select the policy you want
29
Wireless-G Router User's Manual
displayed. To delete a policy, display that policy and click Delete. To view all your
policies, click Summary. Policies can be deleted using the Internet Policy Summary
window by selecting them and clicking Delete. To return to the Internet Access
panel, click Close.
Status: Policies are disabled by default. To enable a policy, display that policy and
select Enable.
To create an Internet access policy:
1. Select a number from the Internet Access Policy drop-down list.
2. To enable this policy, click Enable.
3. Enter a name in the Enter Policy Name box.
4. Click Edit List of PCs to select which PCs will be affected by the policy.
The List of PCs window will appear. You can identify a PC by its MAC address
or IP address. You can also enter a range of IP addresses if you want this policy to
affect a group of PCs. After making your changes, click Save Settings to apply
your changes or Cancel Changes to cancel your changes. Then click Close.
5. Select the appropriate option, Deny or Allow, depending on whether you want to
block or allow Internet access for the PCs you listed on the List of PCs window.
6. Decide which days and what times you want this policy to be enforced.
Select the individual days during which the policy will be in effect, or select
Everyday. Then enter a range of hours and minutes during which the policy will
be in effect, or select 24 Hours.
7. Input any Blocked Services and Website Blocking settings you wish to use.
8. Click Save Settings to save the policy's settings, or click Cancel Changes to
cancel the policy's settings.
Blocked Services: You can filter access to various services accessed over the
Internet, such as FTP or Telnet, by selecting services from the drop-down lists next to
Blocked Services. (You can block up to 20 services.) Then enter the range of ports
you want to filter.
Add/Edit Service: If the service you want to block is not listed or you want to edit a
service's settings, then click Add/Edit Service. The Port Services window will
appear.
To add a service, enter the service's name in the Service Name box. Select its
protocol from the Protocol drop-down list, and enter its range in the Port Range
30
Wireless-G Router User's Manual
boxes. Then click Add.
To modify a service, select it from the list on the right. Change its name, protocol
setting, or port range. Then click Modify.
To delete a service, select it from the list on the right. Then click Delete.
When you are finished making changes in the Port Services window, click Apply to
save the changes. If you want to cancel your changes, click Cancel. To close the Port
Services window and return to the Access Restrictions panel, click Close.
Website Blocking by URL Address: If you want to block Web sites with specific
URL addresses, enter each URL in a separate box next to Website Blocking by URL
address.
Website Blocking by Keyword: If you want to block Web sites using specific
keywords, enter each keyword in a separate box next to Website Blocking by
Keyword.
Click Save Settings to apply the new settings, or click Cancel Changes to cancel
any unsaved changes.
Applications and Gaming Page – Port Range Forward Panel
This panel allows you to set up public services on your network, such as Web servers,
FTP servers, e-mail servers, or other Internet applications. When a request for a
particular service (indicated by the port number in the request) is received from the
Internet, the router will forward it to the local machine specified here. Any machine to
which you do port forwarding must have a fixed IP address (it cannot be a DHCP
client).
Application: In this box, enter the name of the service or application. This is for your
own reference only. Each name can contain up to 12 characters.
Start/End: This is the port range. Enter the number that starts the port range in the
Start column and the number that ends the range in the End column. These two
numbers can be the same.
Protocol: Select the protocol used for this application, either TCP or UDP, or Both.
IP Address: For each application, enter the IP address of the PC running the specific
application.
Enable: Select Enable to enable port forwarding for the relevant application.
Click Save Settings to apply the new settings, or click Cancel Changes to cancel
any unsaved changes.
31
Wireless-G Router User's Manual
Applications & Gaming Page – Port Triggering Panel
This panel lets you set the router to watch outgoing data for specific port numbers.
The IP address of the computer that sends the matching data is remembered by the
router, so that when the requested data returns through the router, the data is sent to
the proper computer by way of IP address and port mapping rules.
Application: Enter the name of the application for which you will do port triggering.
This name is for your own reference only.
Triggered Range: For each application, list the outgoing triggered port range. Check
the application's documentation for the port number(s) needed.
Start Port: Enter the starting port number of the triggered range.
End Port: Enter the ending port number of the triggered range. This can be the same
as the starting port.
Forwarded Range: For each application, list the incoming forwarded port range.
Check the application's documentation for the port number(s) needed.
Start Port: Enter the starting port number of the forwarded range.
End Port: Enter the ending port number of the forwarded range. This can be the same
as the starting port.
Enable: Select Enable to enable port triggering for the indicated application.
Click Save Settings to apply the new settings, or click Cancel Changes to cancel
any unsaved changes.
Applications and Gaming Page – DMZ Panel
The DMZ feature allows one local computer to be exposed to the Internet for use of a
special-purpose application such as Internet gaming or videoconferencing. All
incoming requests for services not handled by the port forwarding feature will be
directed to this computer. This computer should have its own firewall for security. It
also must have a fixed IP address (it cannot be a DHCP client).
To expose one PC, select Enable. Then, enter the computer's IP address in the DMZ
Host IP Address box. This feature is disabled by default.
Click Save Settings to apply the new settings, or click Cancel Changes to cancel
any unsaved changes.
Applications and Gaming Page – QoS Panel
32
Wireless-G Router User's Manual
Quality of Service (QoS) assigns priority levels to improve the performance of highbandwidth, latency-sensitive applications such as VoIP and videoconferencing. You
can specify priority levels for particular machines, LAN ports, and applications, and
you can enable/disable special QoS options for wireless links.
QoS: This section contains controls not specifically related to wireless QoS.
Enable/Disable: To enable QoS, select Enable. Otherwise, select Disable. QoS is
disabled by default.
Upstream Bandwidth: In this box you can specify the maximum outgoing
bandwidth that applications can utilize.
• Device Priority: Here you can assign priority to particular machines on your
LAN. Enter a name (this is for your own reference only), enter the machine's
MAC address, and then select its priority from the drop-down list.
• Ethernet Port Priority: These controls allow you to assign priority levels to the
router's four LAN ports. For each port, select the priority and flow control setting.
Priority: Select High or Low in the Priority column. All four LAN ports have
been assigned low priority by default.
Flow Control: If you want the router to control the transmission of data between
network devices, select Enabled. To disable this feature, select Disabled.
• Application Priority: Applications are identified by their port (service) numbers,
so they can be given the desired priority throughout their passage between the
LAN and the WAN.
Optimize Gaming Applications: Select this to automatically allow common
game application ports to have a higher priority. These games include, but are not
limited to: Counter-Strike, Half-Life, Age of Empires, Everquest,
Quake2/Quake3, and Diablo II. The default setting is unselected.
Application Name: Enter a name for the application in the Application Name
box. This is for your reference only.
Priority: Select Low, Medium, High, or Highest to assign a priority to the
application. The default selection is Low.
Specific Port #: Enter the port number for the application.
Wireless QoS: This section contains controls specific to wireless QoS.
WMM Support: Wi-Fi Multimedia (WMM), formerly known as Wireless Multimedia
Extensions (WME), is a Wi-Fi Alliance certified feature, based on the IEEE 802.11e
standard. This feature provides QoS to wireless networks. It is especially suitable for
33
Wireless-G Router User's Manual
voice, music, and video applications, for example,Voice over IP (VoIP), video
streaming, and interactive gaming. If you have other devices on your wireless network
that support WMM, select Enabled. Otherwise, keep the default, Disabled.
No Acknowledgement: This feature prevents the router from re-sending data if an
error occurs. To use this feature, select Enabled. Otherwise, keep the default setting,
Disabled.
Click Save Settings to apply the new settings, or click Cancel Changes to cancel
any unsaved changes.
Administration Page – Management Panel
The Administration page's Management panel lets you manage specific router
functions for access and security.
• Router Password: This section controls access to the router's setup utility.
Local Router Access: This lets you change the setup utility password.
Router Password: Enter a new password for the setup utility.
Re-enter to confirm: Enter the Password again to confirm.
• Web Access: These controls concern security and wireless access.
Access Server: HTTP (HyperText Transport Protocol) is the communications
protocol used to connect to servers on the World Wide Web. HTTPS uses SSL
(Secure Sockets Layer) to encrypt data transmitted for higher security. Select
HTTP or HTTPS. The default selection is HTTP.
Wireless Access Web: If you are using the router in a public domain where you
are giving wireless access to your guests, you can disable wireless access to the
router's setup utility. You will only be able to access the setup utility via a wired
connection if you select Disable. Keep the default, Enable, to enable wireless
access to the router's setup utility, or select Disable to disable wireless access to
the utility.
• Remote Router Access: These controls concern access to the setup utility from
the Internet.
Remote Management: To be able to access the router remotely, from outside the
network, select Enable. You will need to enter the router's password when
accessing the router this way, as usual.
Management Port: Enter the port number that will be open to outside access.
Use https: To require the use of HTTPS for remote access, select this feature.
34
Wireless-G Router User's Manual
UPnP: UPnP is Universal Plug-and-Play. Some devices and applications use UPnP to
change router settings so that information that would normally be blocked by the
firewall or NAT can pass through.
UPnP: Keep the default, Enable, to enable the UPnP feature; otherwise, select
Disable.
Click Save Settings to apply the new settings, or click Cancel Changes to cancel
any unsaved changes.
Administration Page – Log Panel
The router can keep logs of all traffic on your Internet connection.
Log: To disable the Log function, keep the default setting, Disable. To monitor
traffic between the network and the Internet, select Enable.
When you wish to view the logs, click Incoming Log or Outgoing Log, depending
on which you wish to view.
Click Save Settings to apply the new settings, or click Cancel Changes to cancel
any unsaved changes.
Administration Page – Diagnostics Panel
The diagnostic tests (Ping and Traceroute) allow you to check the connections of your
network components.
Ping: The Ping test checks the status of a connection. Click Ping to open the Ping
Test window. Enter the address of the PC whose connection you wish to test and how
many times you wish to test it. Then, click Ping. The Ping Test window will show if
the test was successful. To stop the test, click Stop. Click Clear Log to clear the
displayed results. Click Close to return to the Diagnostics panel.
Traceroute: To test the performance of a connection, click Traceroute to open the
Traceroute Test window. Enter the address of the PC whose connection you wish to
test and click Traceroute. The Traceroute Test window will show if the test was
successful. To stop the test, click Stop. Click Clear Log to clear the displayed results.
Click Close to return to the Diagnostics panel.
Administration Page – Factory Defaults Panel
This panel lets you restore the router's factory default settings.
Restore Factory Defaults: To reset the router's settings to the default values, select
Yes, and then click Save Settings. Any settings you have saved will be lost when the
35
Wireless-G Router User's Manual
default settings are restored.
Administration Page – Upgrade Firmware Panel
This panel lets you upgrade the router's firmware. Do not upgrade the firmware unless
you are experiencing problems with the router or the new firmware has a feature you
want to use.
Before upgrading the firmware, find out from your network equipment supplier how
to obtain a router firmware file. Then obtain and extract the file.
Please select a file to upgrade: Click Browse and select the extracted firmware
file. Then click Upgrade and follow the on-screen instructions.
Administration Page – Config Management Panel
Use this panel when you want to save a configuration file containing all of the router's
current settings, and when you want to send a configuration file to the router to restore
the settings in it.
Backup: To create a configuration file, click Backup. Then follow the on-screen
instructions.
Please select a file to restore: Click Browse and select a configuration file. Then
click Restore to send the file to the router.
Status Page – Language Panel
In multilingual versions of the router, this panel is used to select the interface
language and to upgrade the language file held in the router. In the current version of
the router, only English is available as an interface language.
Status Page – Router Panel
This panel displays information about the router's firmware and about router operation
on the WAN.
Firmware Version: This is the version number of the router's current firmware.
Current Time: This shows the time, if the router is in contact with a time server.
MAC Address: This is the MAC address of the router's WAN port.
Router Name: This is the router name currently set in the Basic Setup panel.
Host Name: This is the host name, if any, currently set in the Basic Setup panel.
36
Wireless-G Router User's Manual
Domain Name: This is the domain name, if any, currently set in the Basic Settings
panel.
Internet: The information shown in this section depends on the Internet connection
type selected in the Basic Setup panel.
Click Refresh to update the on-screen information. When the router is set to obtain IP
settings from your ISP by DHCP, there are also buttons to release and renew the
router's DHCP lease.
Status Page – Local Network Panel
This panel displays information about router operation on the wired LAN.
MAC Address: This is the router's MAC address, as seen on your local Ethernet
network.
IP Address: This shows the router's IP address, as it appears on your local Ethernet
network.
Subnet Mask: This shows the subnet mask that the router is set to use on your local
network.
DHCP Server: This shows whether the router's DHCP server function is currently
enabled or disabled.
Start IP Address: This is the lowest IP address that the router will assign by DHCP
on the local network.
End IP Address: This is the highest IP address that the router will assign by DHCP
on the local network.
DHCP Clients Table: Clicking this button will open a window to show you which
PCs are utilizing the router as a DHCP server. You can delete PCs from that list, and
sever their connections, by checking a Delete box and clicking the Delete button.
Click Refresh to update the on-screen information.
Status Page – Wireless Panel
This panel displays information about router operation on your wireless network.
MAC Address: This is the router's MAC address, as seen on your local wireless
network.
Mode: This shows whether the router's wireless interface is disabled, set for a
Wireless-B/Wireless-G mixed environment, or set for Wireless-B only or Wireless-G
37
Wireless-G Router User's Manual
only.
SSID: This is the wireless network name currently set in the Basic Wireless
Settings panel.
DHCP Server: This shows whether the router is acting as a DHCP server for wireless
clients.
Channel: This is the wireless channel currently set in the Basic Wireless Settings
panel.
Encryption Function: This shows the security mode currently selected in the
Wireless page's Wireless Security panel.
Click Refresh to update the on-screen information.
38
Wireless-G Router User's Manual
Appendix A: Troubleshooting
You cannot connect to the Internet.
• Make sure the router is powered on. The POWER indicator should be shining a
steady green and not flashing.
• If the POWER indicator is flashing, then power off all of your network devices,
including the modem, router, and computers. Then power on each device in the
following order: (1) Cable or DSL modem, (2) router, (3) computer.
• Check the cable connections. The computer should be connected to one of the
ports numbered 1-4 on the router, and the modem must be connected to the
Internet port on the router.
The modem does not have an Ethernet port.
It is is a dial-up modem. To use the router, you need a cable or DSL modem and a
high-speed Internet connection.
The software you formerly ran to connect to your DSL service no longer works.
After you set up the router, it will automatically connect to your ISP, so you no longer
need to connect with software from your ISP.
The DSL telephone line does not fit into the router's Internet port.
The router does not have a built-in modem. You still need your DSL modem in order
to use the router. Connect the telephone line to the DSL modem and follow the
instructions in Chapter 1.
When you start up your Web browser, you are prompted for a user name and
password. If you want to get rid of the prompt, follow these instructions.
Launch the Web browser and perform the following steps (these steps are specific to
Internet Explorer but are similar for other browsers):
1. Open the Tools menu and choose Internet Options.
2. Click the Connections tab.
3. Select Never dial a connection.
4. Click OK.
39
Wireless-G Router User's Manual
The router does not have a coaxial port for the cable connection.
The router does not have a built-in modem. You still need your cable modem in order
to use the router. Connect your cable to the cable modem and then follow the
instructions in Chapter 1.
The computer cannot connect wirelessly to the network.
Make sure the wireless network name or SSID is the same on both the computer and
the router. If you have enabled wireless security, then make sure the same security
method and key are used by both the computer and the router.
You need to modify the settings on the router.
Open the Web browser (for example, Internet Explorer or Firefox), and enter the
router's IP address in the address bar (the default IP address is 192.168.1.1). When
prompted, leave the User Name box blank and enter the password to the router (the
default is admin). Click the appropriate tab to change the settings.
40
Wireless-G Router User's Manual
Appendix B: Specifications
Standards
IEEE 802.3, IEEE 802.3u, IEEE 802.11g, IEEE 802.11b
Channels
11 Channels (US, Canada)
13 Channels (Europe)
14 Channels (Japan)
Ports
WAN: One 10/100 RJ-45 Port
LAN: Four 10/100 RJ-45 Switched Ports
One Power Receptacle
Buttons
Reset
Cabling Type
Category 5 Shielded/Unshielded Twisted-pair
LEDs
Ethernet (1-4), Wireless, WAN, Power
UPnP able/cert.
Able
Security Features
Stateful Packet Inspection (SPI) Firewall, Internet
AccessPolicies
Wireless Security
Wi-Fi Protected Access™ 2 (WPA2), WEP, Wireless MAC
Filtering
Power Supply
External, 12V DC, 0.5A
Certifications
FCC, IC-03, CE, Wi-Fi (802.11b, 802.11g), WPA2, WMM
Operating Temp.
32° to 104° F (0° to 40° C)
Storage Temp.
-4° to 158° F (-20° to 70° C)
Operating Humidity 10% to 85%, Noncondensing
Storage Humidity
5% to 90%, Noncondensing
41
Wireless-G Router User's Manual
Appendix C: Warranty Information
Limited Warranty
The manufacturer warrants to You that, for a period of one year (the "Warranty
Period"), the Product will be substantially free of defects in materials and
workmanship under normal use. Your exclusive remedy and the manufacturer's entire
liability under this warranty will be for the manufacturer at its option to repair or
replace the Product or refund Your purchase price less any rebates. This limited
warranty extends only to the original purchaser.
If the Product proves defective during the Warranty Period contact your network
equipment supplier for assistance in obtaining a Return Authorization Number, if
applicable. BE SURE TO HAVE YOUR PROOF OF PURCHASE ON HAND. If
You are requested to return the Product, mark the Return Authorization Number
clearly on the outside of the package and include a copy of your original proof of
purchase. RETURN REQUESTS CANNOT BE PROCESSED WITHOUT PROOF
OF PURCHASE. You are responsible for shipping defective Products to the
manufacturer. The manufacturer pays for UPS Ground shipping from its facilities
back to You only. Customers located outside of the United States of America and
Canada are responsible for all shipping and handling charges.
ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY
OR FITNESS FOR A PARTICULAR PURPOSE ARE LIMITED TO THE
DURATION OF THE WARRANTY PERIOD. ALL OTHER EXPRESS OR
IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES,
INCLUDING ANY IMPLIED WARRANTY OF NON-INFRINGEMENT, ARE
DISCLAIMED. Some jurisdictions do not allow limitations on how long an implied
warranty lasts, so the above limitation may not apply to You. This warranty gives You
specific legal rights, and You may also have other rights which vary by jurisdiction.
This warranty does not apply if the Product (a) has been altered, except by the
manufacturer, (b) has not been installed, operated, repaired, or maintained in
accordance with instructions supplied by the manufacturer, or (c) has been subjected
to abnormal physical or electrical stress, misuse, negligence, or accident. In addition,
due to the continual development of new techniques for intruding upon and attacking
networks, the manufacturer does not warrant that the Product will be free of
vulnerability to intrusion or attack.
TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT WILL THE
MANUFACTURER BE LIABLE FOR ANY LOST DATA, REVENUE OR
PROFIT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL, INCIDENTAL OR
PUNITIVE DAMAGES, REGARDLESS OF THE THEORY OF LIABILITY
(INCLUDING NEGLIGENCE), ARISING OUT OF OR RELATED TO THE USE
OF OR INABILITY TO USE THE PRODUCT (INCLUDING ANY SOFTWARE),
EVEN IF THE MANUFACTURER HAS BEEN ADVISED OF THE POSSIBILITY
42
Wireless-G Router User's Manual
OF SUCH DAMAGES. IN NO EVENT WILL THE MANUFACTURER'S
LIABILITY EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT.
The foregoing limitations will apply even if any warranty or remedy provided under
this Agreement fails of its essential purpose. Some jurisdictions do not allow the
exclusion or limitation of incidental or consequential damages, so the above limitation
or exclusion may not apply to You.
43

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.5
Linearized                      : No
Page Count                      : 47
Has XFA                         : No
XMP Toolkit                     : XMP toolkit 2.9.1-13, framework 1.6
About                           : uuid:4adac7b5-143d-4d3a-9ce8-3889690d8984
Producer                        : OpenOffice.org 1.1.4
Create Date                     : 2007:08:10 20:57:47+08:00
Creator Tool                    : Writer
Modify Date                     : 2007:10:24 09:46:38+08:00
Metadata Date                   : 2007:10:24 09:46:38+08:00
Document ID                     : uuid:97b73923-c1ba-479e-a6cd-ce58bcdd232a
Format                          : application/pdf
Creator                         : Daniel Strychalski
Author                          : Daniel Strychalski
EXIF Metadata provided by EXIF.tools
FCC ID Filing: N89-WG214-K

Navigation menu