Edimax Technology Co 9562881417 AC600 Multi-Function Dual-Band Wi-Fi Router User Manual 1

Edimax Technology Co Ltd AC600 Multi-Function Dual-Band Wi-Fi Router 1

Contents

User Manual-1

                BR-6288ACL   User Manual  09-2014 / v1.0
 CONTENTS I. Product Information .............................................................................. 1 I-1. Package Contents .......................................................................................................... 1 I-2. LED Status ...................................................................................................................... 2 I-3. Back Panel ...................................................................................................................... 3 I-4. RJ-45 Splitter Cable ........................................................................................................ 4 I-5. Wi-Fi Power Switch ........................................................................................................ 5 I-6. Safety Information ......................................................................................................... 6 II. Installation ............................................................................................ 7 II-1.    Wi-Fi Router Mode ...................................................................................................... 10 II-2.   Access Point Mode....................................................................................................... 15 II-3.    Range Extender Mode ................................................................................................. 20 II-4.   Wireless Bridge Mode.................................................................................................. 27 II-5. WISP Mode .................................................................................................................. 33 II-6. WPS Setup .................................................................................................................... 41 II-7. Reset to Factory Default Settings ................................................................................ 41 III. Browser Based Configuration Interface ................................................. 42 III-1. Login ............................................................................................................................. 42 III-2. Save Settings ................................................................................................................ 44 III-3. Main Menu .................................................................................................................. 45 III-3-1. Status ........................................................................................................................... 46 III-3-2. Setup Wizard ................................................................................................................ 47 III-3-3.   Internet/WISP .............................................................................................................. 49 III-3-3-1. WAN Setup ................................................................................................................... 50 III-3-3-1-1.   Dynamic IP ................................................................................................................... 50 III-3-3-1-2.   Static IP ........................................................................................................................ 52 III-3-3-1-3.   PPPoE ........................................................................................................................... 54 III-3-3-1-4.   PPTP ............................................................................................................................. 56 III-3-3-1-5.   L2TP .............................................................................................................................. 59 III-3-3-2.   DDNS ............................................................................................................................ 61 III-3-4.   LAN ............................................................................................................................... 63 III-3-5.   2.4GHz Wireless & 5GHz Wireless ............................................................................... 66 III-3-5-1.   Basic ............................................................................................................................. 66 III-3-5-1-1.   Disable ......................................................................................................................... 70 III-3-5-1-2.   WEP .............................................................................................................................. 71 III-3-5-1-3.   WPA Pre-Shared Key .................................................................................................... 72 III-3-5-1-4.   WPA Radius .................................................................................................................. 73 III-3-5-2. Guest/ Multiple SSID .................................................................................................... 74
 III-3-5-3. WPS .............................................................................................................................. 77 III-3-5-4. Access Control ............................................................................................................. 78 III-3-5-5. Schedule ....................................................................................................................... 80 III-3-6. Firewall ......................................................................................................................... 82 III-3-6-1. URL Blocking ................................................................................................................ 82 III-3-6-2. Access Control ............................................................................................................. 84 III-3-6-3. DMZ .............................................................................................................................. 88 III-3-6-4. DoS ............................................................................................................................... 89 III-3-7. QoS ............................................................................................................................... 91 III-3-7-1. QoS ............................................................................................................................... 91 III-3-7-2. iQoS .............................................................................................................................. 94 III-3-8. Advanced ..................................................................................................................... 96 III-3-8-1. Static Routing ............................................................................................................... 96 III-3-8-2. Port Forwarding ........................................................................................................... 97 III-3-8-3. Virtual Server ............................................................................................................... 99 III-3-8-4. 2.4GHz Wireless .........................................................................................................100 III-3-8-5. 5GHz Wireless ............................................................................................................102 III-3-8-6. IGMP ..........................................................................................................................104 III-3-8-7. UPnP...........................................................................................................................104 III-3-9. Administration ...........................................................................................................105 III-3-9-1. Time Zone ..................................................................................................................105 III-3-9-2. Password ....................................................................................................................106 III-3-9-3. Remote Access ...........................................................................................................107 III-3-9-4. Backup/Restore .........................................................................................................108 III-3-9-5. Upgrade .....................................................................................................................108 III-3-9-6. Restart ........................................................................................................................109 III-3-9-7. Logs ............................................................................................................................109 III-3-9-8. Active DHCP Client .....................................................................................................110 III-3-9-9. Statistics .....................................................................................................................110 IV. Appendix ........................................................................................... 111 IV-1. Configuring your IP address .......................................................................................111 IV-1-1. How to check that your computer uses a dynamic IP address .................................112 IV-1-1-1. Windows XP ...............................................................................................................112 IV-1-1-2. Windows Vista ...........................................................................................................114 IV-1-1-3. Windows 7 .................................................................................................................116 IV-1-1-4. Windows 8 .................................................................................................................119 IV-1-1-5. Mac OS .......................................................................................................................123 IV-1-2. How to modify the IP address of your computer ......................................................125 IV-1-2-1. Windows XP ...............................................................................................................125 IV-1-2-2. Windows Vista ...........................................................................................................127 IV-1-2-3. Windows 7 .................................................................................................................128
 IV-1-2-4. Windows 8 .................................................................................................................131 IV-1-2-5. Mac ............................................................................................................................135 IV-1-3. How to Find Your Network Security Key ...................................................................138 IV-1-3-1. Windows 7 & Vista .....................................................................................................138 IV-1-3-2. Mac ............................................................................................................................140 IV-1-4. How to Find Your Router’s IP Address .......................................................................143 IV-1-4-1. Windows XP, Vista & 7 ...............................................................................................143 IV-1-4-2. Windows 8 .................................................................................................................145 IV-1-4-3. Mac ............................................................................................................................148 IV-2. Connecting to a Wi-Fi network ..................................................................................150 IV-3. Troubleshooting .........................................................................................................152
1  I. Product Information I-1. Package Contents  Before you start using this product, please check if there is anything missing in the package, and contact your dealer to claim the missing item(s):                      Quick Installation Guide  CD-ROM  Power Adapter  BR-6288ACL  USB Cable  RJ-45 Splitter Cable
2  I-2. LED Status        LED Color LED Status Description Orange/Red On Product is starting up. Flashing (Slow) No Internet connection.   Flashing (Fast) Resetting to factory default status or Wi-Fi Protected Setup (WPS) is active. Light Green On Internet is connected and Wi-Fi is full power. Dark Green On Internet is connected and Wi-Fi is in green mode (25% power). Off Off BR-6288ACL is off.
3  I-3. Back Panel      Network Port Power Port WPS/Reset Button LED Wi-Fi Power Switch
4  I-4. RJ-45 Splitter Cable  The BR-6288ACL includes an RJ-45 splitter cable in the package contents. This plugs into the “Network” port of the BR-6288ACL and splits the port into two separate Ethernet ports – providing two ports instead of one, as shown below.  In Wi-Fi router mode, one port is the WAN (Network) port. The WAN port connects directly to your modem.  In Wi-Fi router mode, the other port is the LAN port. The LAN port is for wired connections to other network devices (e.g. computer).   In other modes, both ports function as LAN ports for wired network devices (e.g. computers, games consoles etc.), and in access point mode also for connecting to your router.
5   I-5. Wi-Fi Power Switch  After setup you can use the Wi-Fi power switch to adjust the strength of the BR-6288ACL’s wireless radio if you wish. Normal mode uses full 100% wireless power while green mode uses 25% wireless power.
6  I-6. Safety Information  In order to ensure the safe operation of the device and its users, please read and act in accordance with the following safety instructions.  1. The device is designed for indoor use only; do not place it outdoors.  2. Do not place the device in or near hot/humid places, such as a kitchen or bathroom.  3. Do not pull any connected cable with force; carefully disconnect it from the BR-6288ACL.  4. Handle the device with care. Accidental damage will void the warranty of the device.  5. The device contains small parts which are a danger to small children under 3 years old. Please keep the device out of reach of children.  6. Do not place the device on paper, cloth, or other flammable materials. The device may become hot during use.  7. There are no user-serviceable parts inside the device. If you experience problems with the device, please contact your dealer of purchase and ask for help.  8. The device is an electrical device and as such, if it becomes wet for any reason, do not attempt to touch it without switching the power supply off. Contact an experienced electrical technician for further help.
7  II. Installation  1. Plug in the BR-6288ACL using the included power adapter and/or USB cable.  The BR-6288ACL requires 1 A of current – please ensure that your USB port can provide sufficient power. If not, use the 5V DC adapter.      2. Wait until the circular LED at the base of the product is flashing "Orange/Red".  3. Use a Wi-Fi device (e.g. computer, tablet, smartphone) to search for a Wi-Fi network with the SSID “edimax.setup” and connect to it.
8  4. Open a web browser and if you do not automatically arrive at the “Get Started” screen shown below, enter the URL http://edimax.setup and click “Get Started” to begin.    If you cannot access http://edimax.setup, please make sure your Wi-Fi device is set to use a dynamic IP address. This is a simple procedure and step-by-step instructions to do this on a computer can be found in the user manual.  5. Choose if you want to use your BR-6288ACL in its default Wi-Fi router mode or in a different mode.
9   The BR-6288ACL’s five available modes are outlined below:  Wi-Fi Router Mode The device connects to your modem and provides 2.4GHz and/or 5GHz Internet (wireless and Ethernet) access for your network devices. Access Point Mode The device connects to an existing router via Ethernet cable and provides 2.4GHz and/or 5GHz Internet (wireless and Ethernet) access for your network devices. Range Extender Mode The device connects wirelessly to your existing 2.4GHz and/or 5GHz network and repeats the wireless signal(s). Wireless Bridge Mode The device connects to a network device for example: TV, gaming console, or media player via Ethernet cable and acts as a wireless receiver, allowing the network device to join your Wi-Fi network. WISP Mode The device connects wirelessly to your Wireless Internet Service Provider and provides 2.4GHz and/or 5GHz Internet (wireless and Ethernet) access for your network devices.
10  II-1. Wi-Fi Router Mode  1.  Select whether to use the iQ Setup wizard (recommended) to detect your Internet connection type, or enter the settings manually.  Manual configuration is only recommended for advanced users.    2.  Connect the blue Internet port of your BR-6288ACL to the LAN port of your modem using an Ethernet cable, and then click “Next”.
11   3.  Please wait a moment while the BR-6288ACL tests the connection.                 4.  Click “Next” to continue and configure the device’s wireless network.    5.  Enter a name and password for your 2.4GHz & 5GHz wireless networks, then click “Next” to continue.
12    6.  A summary of your configuration will be displayed, as shown below. Check that all of the details are correct and then click “Next” to proceed.    If you wish to backup the device’s settings, click “Backup this configuration” to open a new window and save your current configuration to a .txt file.
13    7.  Please wait while the BR-6288ACL applies your settings.    8.  A final congratulations screen will indicate that setup is complete. You can now connect to the device’s new SSID(s) which are shown on the screen then close the browser window.
14    9.  The BR-6288ACL is working and ready for use. Refer to IV-2. Connecting to a Wi-Fi network if you require more guidance.
15  II-2. Access Point Mode  1.  Select “Access Point” from the top menu and click “Next”.    2.  Connect the network port of your BR-6288ACL to the LAN port of your existing router using an Ethernet cable, then click “Next”.    3.  Select whether to use the 5GHz wireless frequency, 2.4GHz wireless frequency or both. If you are not sure, select both.
16     4.  Select “Obtain an IP address automatically” or “Use the following IP address” for your BR-6288ACL. If you are using a static IP, enter the IP address, subnet mask and default gateway. Click “Next” to proceed to the next step.    “Obtain an IP address automatically” is the recommended setting for most users. For more guidance on static IP addresses, please refer to IV-1. Configuring your IP address.
17  5.  Enter a name and password for your 2.4GHz & 5GHz wireless networks, then click “Next” to continue.    6.  A summary of your configuration will be displayed, as shown below. Check that all of the details are correct and then click “Next” to proceed.    If you wish to backup the device’s settings, click “Backup this configuration” to open a new window and save your current configuration to a .txt file.
18    7.  Please wait a moment until the BR-6288ACL is ready.    8.  A final congratulations screen will indicate that setup is complete. You can now connect to the device’s new SSID(s) which are shown on the screen then close the browser window.
19    9.  The BR-6288ACL is working and ready for use. Refer to IV-2. Connecting to a Wi-Fi network if you require more guidance.
20  II-3. Range Extender Mode  1.  Select “Range Extender” from the top menu and click “Next”.     2.  Please ensure your BR-6288ACL is within Wi-Fi range of your existing wireless router. Click “Next” to continue.
21  3.  Select whether to use the 5GHz wireless frequency, 2.4GHz wireless frequency or both. If you are not sure, select both and then click “Next”.     4.  Select the Wi-Fi network name (SSID) which you wish to connect to for the specified frequency and click “Next” to continue.  If the Wi-Fi network you wish to connect to does not appear, try clicking “Refresh”.      To connect to a hidden SSID, check the “Setup extender manually” box and enter the details manually on the next page, as shown below.
22      5.  Enter your existing wireless network’s security key/password in the “Security Key” field and click “Next” to continue.
23  6.  Wait a moment while the BR-6288ACL tests the wireless connection.    7.  Select “Obtain an IP address automatically” or “Use the following IP address” for your BR-6288ACL. If you are using a static IP, enter the IP address, subnet mask and default gateway. Click “Next” to proceed to the next step.  “Obtain an IP address automatically” is the recommended setting for most users. The IP address will be displayed in brackets.
24  8.  If you selected to use both 2.4GHz and 5GHz wireless frequencies in step 3, then repeat steps 4 – 7 for the 2.4GHz wireless frequency.     9.  A summary of your configuration will be displayed, as shown below.    Check that all of the details are correct and then click “Next” to proceed.  The device will use the same wireless password/security key as the existing wireless network.    If you wish to backup the BR-6288ACL’s settings, click “Backup this configuration” to open a new window and save your current configuration to a .txt file.
25      10. Please wait a moment until the BR-6288ACL is ready.
26  11. A final congratulations screen will indicate that setup is complete. You   can now connect to the device’s new SSID(s) which are shown on the   screen then close the browser window.   12. The BR-6288ACL is working and ready for use. Refer to IV-2. Connecting to a Wi-Fi network if you require more guidance.
27  II-4. Wireless Bridge Mode  1.  Select “Wireless Bridge” from the top menu and click “Next”.     2.  Please ensure your BR-6288ACL is within Wi-Fi range of your existing wireless router. Click “Next” to continue.    3.  Select the frequency (2.4GHz or 5GHz) of your existing wireless network.  In wireless client mode, the BR-6288ACL can only connect to one wireless network/frequency i.e. 2.4GHz or 5GHz.
28     4.  Select the Wi-Fi network name (SSID) which you wish to connect to and click “Next” to continue.  If the Wi-Fi network you wish to connect to does not appear, try clicking “Refresh”.    To connect to a hidden SSID, check the “Setup extender manually” box and enter the details manually on the next page, as shown below.
29    5.  Enter your existing wireless network’s security key/password in the “Security Key” field and click “Next” to continue.
30  6.  Wait a moment while the BR-6288ACL tests the wireless connection.     7.  Select “Obtain an IP address automatically” or “Use the following IP address” for your BR-6288ACL. If you are using a static IP, enter the IP address, subnet mask and default gateway. Click “Next” to proceed to the next step.  “Obtain an IP address automatically” is the recommended setting for most users. The IP address will be displayed in brackets.
31  8.  A summary of your configuration will be displayed, as shown below.   Check that all of the details are correct and then click “Next” to proceed.    If you wish to backup the BR-6288ACL’s settings, click “Backup this configuration” to open a new window and save your current configuration to a .txt file.
32  9.  Please wait a moment until the BR-6288ACL is ready.    10. A final congratulations screen will indicate that setup is complete. Please close the browser window.    11.  The BR-6288ACL is working and ready for use. You can now connect the BR-6288ACL to your network device using an Ethernet cable and connect to your network as usual.
33  II-5.  WISP Mode  1.  Select “WISP” from the top menu and click “Next”.     2.  Please ensure your BR-6288ACL is within Wi-Fi range of your WISP network and click “Next” to continue.
34  3.  Select whether to use the iQ Setup wizard (recommended) to detect your Internet connection type, or enter the settings manually.  Manual configuration is only recommended for advanced users.    4.  Select the wireless frequency (2.4GHz or 5GHz) of your WISP network.
35  5.  Select the WISP SSID which you wish to connect to and click “Next” to continue.  If the Wi-Fi network you wish to connect to does not appear, try clicking “Refresh”.     To connect to a hidden SSID, check the “Setup extender manually” box and enter the details manually on the next page, as shown below.
36  6.  Enter your existing wireless network’s security key/password in the “Security Key” field and click “Next” to continue.      7.  Wait a moment while the BR-6288ACL tests the wireless connection.
37  8.  Click “Next” to continue your Internet service type configuration.      9.  Wait a moment while the BR-6288ACL connects to the Internet.
38  10. When the Internet is connected, click “Next” to configure your wireless network.    11. Enter a name and password for your 2.4GHz & 5GHz wireless networks, then click “Next” to continue.
39  12.  A summary of your configuration will be displayed, as shown below. Check that all of the details are correct and then click “Next” to proceed.    If you wish to backup the device’s settings, click “Backup this configuration” to open a new window and save your current configuration to a .txt file.
40  13.  Please wait a moment until the BR-6288ACL is ready.    14. A final congratulations screen will indicate that setup is complete. You can now connect to the device’s new SSID(s) which are shown on the screen then close the browser window.    15. The BR-6288ACL is working and ready for use. Refer to IV-2. Connecting to a Wi-Fi network if you require more guidance.
41  II-6.  WPS Setup  If your wireless device supports WPS (Wi-Fi Protected Setup) then you can use this method to connect to the BR-6288ACL’s Wi-Fi network.   1. Press the WPS/Reset button on the BR-6288ACL for 2 seconds to activate WPS. The LED will then quickly flash orange/red to indicate that WPS is active.  2. Within two minutes, press the WPS button on the wireless device/client to activate its WPS.  3. The devices will establish a connection. Repeat for additional wireless devices.  Please check the instructions for your wireless device for how long you need to hold down its WPS button to activate WPS.  II-7.  Reset to Factory Default Settings  If you experience problems with your BR-6288ACL, you can reset the device back to its factory settings. This resets all settings back to default.  1.  Press and hold the WPS/Reset button found on the rear base of the product for at least 10 seconds.  2.  Release the button when the LED is quickly flashing orange/red.  3.  Wait for the BR-6288ACL to restart.
42  III. Browser Based Configuration Interface  After you have setup the BR-6288ACL as detailed in II. Installation or the included Quick Installation Guide, you can use the browser based configuration interface to configure advanced settings.  Please ensure that your computer is set to use a dynamic IP address. Refer to IV-1. Configuring your IP address for more information.  III-1. Login  1.  To access the browser based configuration interface enter http://edimax.setup into the URL bar of a browser on a network device connected to the same Wi-Fi network as the BR-6288ACL.   If you can not access http://edimax.setup, connect the device to a computer using an Ethernet cable and try again.  2.  You will be prompted for a username and password. The default username is “admin” and the default password is “1234”.
43   3.  You will arrive at the “Status” screen. Use the menu down the left side to navigate.
44  III-2. Save Settings  1.  After you configure any settings, click the “Save Settings” button at the bottom of the screen to save your changes.    The device needs to restart in order to bring any changes into effect.  2.  Then, click “Click here to restart” in order to restart the device and bring the changes into effect.    3.  To make several changes at once, use the “Save Settings” button after each change and then click “click here to restart” after your final change. Only one restart is necessary as long as each change is saved with the “Save Settings” button.  After you click “click here to restart”, all saved changes will come into effect.
45  III-3. Main Menu  The main menu displays different options depending on your device’s operating mode.  For Range Extender mode: WPS please refer to 2.4GHz Wireless & 5GHz Wireless  WPS                                 Wi-Fi Router  Access Point  Range Extender  Wireless Bridge  WISP
46  III-3-1. Status  The “Status” page displays basic system information about the device, arranged into categories.  Screenshots displayed are examples.The information shown on your screen will vary depending on your configuration.
47  III-3-2. Setup Wizard  You can run the setup wizard again to reconfigure the basic settings of the device, or you can run a wizard to help you switch the device to a different operating mode. Select “Setup Wizard” or “Switch to Router/Access Point/Range Extender/Wireless Bridge/WISP mode” and then click “Run Wizard” to begin.    Setup Wizard This wizard will help you to set up the basic functions and settings of the device. For guidance about using the setup wizard, please refer to II. Installation. Switch to Router/Access Point/ Range Extender/ Wireless Bridge/ WISP mode This wizard will help you to switch the device to a different operating mode: Wi-Fi router mode, access point mode, range extender, wireless bridge, or WISP mode (see below).  Switch to Router/Access Point/ Range Extender/ Wireless Bridge/ WISP mode:  1.  Follow the on-screen instructions to back up your current settings and then reset the device back to its factory default settings.  2.  After the device has reset you will see the screen below. Close your browser and open it again.
48   3.  Follow the on-screen wizard to setup your device in a different mode. Refer to II. Installation Step 3 onwards for help if needed.  If you don’t see the “Get Started” screen, try reconnecting to the edimax.setup SSID and go to http://edimax.setup in a web browser.
49  III-3-3.    Internet/WISP  The “Internet” menu provides access to WAN and DDNS settings. Click on an item from the submenu to view and/or configure the settings.       In WISP mode, the screen below will be displayed:    Enable / Disable Enable or disable your WISP connection. SSID The name of the WISP network which your BR-6288ACL is connected to. Manually enter an SSID if you wish or use “Site Survey” below. Site Survey Select wireless frequency and click “Show List” to open a new window and select your WISP network. Security Setting Please refer to III-3-5-1. Basic for a description of security settings.
50   III-3-3-1.  WAN Setup  Select a Wide Area Network (WAN) connection mode and configure the settings. If you are unsure about your connection type, contact your ISP.  In WISP mode, only Dynamic IP, Static IP & PPPoE are available for WAN Connection Mode.     III-3-3-1-1.    Dynamic IP  Select “Dynamic IP”. If your Internet service provider assigns IP address automatically using DHCP (Dynamic Host Configuration Protocol).
51   Host Name Enter the host name of your computer. MAC Address For some applications, you may need to designate a specific MAC address for the router. Please enter the MAC address here. If you are connecting the router to a computer, press “Clone Mac” to automatically enter your computer’s MAC address. DNS Address Select “Obtain an IP address automatically” or “Use the following IP address”. Check with your ISP if you are unsure. DNS Address 1,2 & 3 Enter the DNS address(es) assigned by your ISP here. DNS Proxy Enable or disable a DNS proxy server. DNS Proxy Rules (URL) When DNS proxy is enabled, enter the URL of a DNS proxy server. MTU Enter the maximum transmission unit (MTU) value of your network connection. The default value is 1500. TTL Enable/Disable time to live (TTL) function which limits the lifespan of network data to improve performance.
52  III-3-3-1-2.    Static IP  Select “Static IP” if your ISP provides Internet access via a fixed IP address. Your ISP will provide you with such information as IP address, subnet mask, gateway address, and DNS address.    Fixed IP Address Input the IP address assigned by your ISP here. Subnet Mask  Input the subnet mask assigned by your ISP here. Default Gateway Address Input the default gateway assigned by your ISP here. Some ISPs may call this “Default Route”. MAC Address For some applications, you may need to designate a specific MAC address for the router. Please enter the MAC address here. If you are connecting the router to a computer, press “Clone Mac” to automatically enter your computer’s MAC address. DNS Address 1, 2 & 3 Enter the DNS address(es) assigned by your ISP here. DNS Proxy Enable or disable a DNS proxy server. DNS Proxy Rules When DNS proxy is enabled, enter the URL of a
53  (URL) DNS proxy server. TTL Enable/Disable time to live (TTL) function which limits the lifespan of network data to improve performance.
54  III-3-3-1-3.    PPPoE  Select “PPPoE” if your ISP is providing you Internet access via PPPoE (Point-to-Point Protocol over Ethernet).    User Name Enter the user name assigned by your ISP here. Password  Enter the password assigned by your ISP here. MAC Address For some applications, you may need to designate a specific MAC address for the router. Please enter the MAC address here. If you are connecting the router to a computer, press “Clone Mac” to automatically enter your computer’s MAC address.
55  DNS Address Select “Obtain an IP address automatically” or “Use the following IP address”. Check with your ISP if you are unsure. DNS Address 1, 2 & 3 Enter the DNS address(es) assigned by your ISP here. DNS Proxy Enable or disable a DNS proxy server. DNS Proxy Rules (URL) When DNS proxy is enabled, enter the URL of a DNS proxy server. Service Name Give this Internet service a name (optional). MTU Enter the maximum transmission unit (MTU) value of your network connection. The default value is 1392. Connection Type  Specify a connection type:  1. “Continuous”: Connected all the time. 2. “Connect on Demand”: Connect when you initiate an Internet connection. 3. “Manual”: Connect/disconnect manually using the “Connect” and “Disconnect” buttons. Idle Time Out  Specify the amount of time the router waits before shutting down an idle connection. Only available when “Connect on Demand” (above) is selected. Enable Dual-WAN Access Enable/disable dual WAN access. When you enable dual WAN access, select an IGMP source and enter a “Host Name” and “MAC Address”.
56  III-3-3-1-4.    PPTP  Select “PPTP” if your ISP is providing you Internet access via PPTP (Point-to-Point Tunneling Protocol). Then select “Obtain an IP address automatically” or “Use the following IP address” depending on your ISP.
57   Host Name Enter the host name of your computer here If required. MAC Address For some applications, you may need to designate a specific MAC address for the router. Please enter the MAC address here. If you are connecting the router to a computer, press “Clone Mac” to automatically enter your computer’s MAC address. Static IP Address Input the IP address assigned by your ISP here. Subnet Mask Input the subnet mask assigned by your ISP here. Default Gateway Address Input the default gateway assigned by your ISP here. Some ISPs may call this “Default Route”. MAC Address If your ISP filters access by MAC addresses, enter your computer’s MAC address here. Click “Clone MAC” to automatically enter your computer’s MAC address. DNS Address Select “Obtain an IP address automatically” or “Use the following IP address”. Check with your ISP if you are unsure. DNS 1,2 & 3 Enter the DNS address(es) assigned by your ISP here. DNS Proxy Enable or disable a DNS proxy server. DNS Proxy Rules (URL) When DNS proxy is enabled, enter the URL of a DNS proxy server. User ID  Input the user name assigned by your ISP here. Password  Input the password assigned by your ISP here. PPTP Gateway Input the PPTP gateway assigned by your ISP here. Connection ID Specify a reference name/ID for the connection. MTU Enter the maximum transmission unit (MTU) value of your network connection. The default value is 1392. BEZEQ-ISRAEL Check the “Enable” box if you are using BEZEQ network services (Israel users only).
58  Connection Type Specify a connection type: 1. “Continuous”: Connected all the time. 2. “Connect on Demand”: Connect when you initiate an Internet connection. 3. “Manual”: Connect/disconnect manually using the “Connect” and “Disconnect” buttons. Idle Time Out Specify the amount of time the router waits before shutting down an idle connection. Only available when “Connect on Demand” (above) is selected.
59  III-3-3-1-5.   L2TP  Select “L2TP” if your ISP is providing you Internet access via L2TP (Layer 2 Tunneling Protocol).    Host Name Enter the host name of your computer here If required. MAC Address For some applications, you may need to designate a specific MAC address for the router. Please enter the MAC address here. If you are connecting the router to
60  a computer, press “Clone Mac” to automatically enter your computer’s MAC address. Static IP Address Input the IP address assigned by your ISP here. Subnet Mask Input the subnet mask assigned by your ISP here. Default Gateway Address Input the default gateway assigned by your ISP here. Some ISPs may call this “Default Route”. MAC Address If your ISP filters access by MAC addresses, enter your computer’s MAC address here. Click “Clone MAC” to automatically enter your computer’s MAC address. DNS Address Select “Obtain an IP address automatically” or “Use the following IP address”. Check with your ISP if you are unsure. DNS 1,2 & 3 Enter the DNS address(es) assigned by your ISP here. DNS Proxy Enable or disable a DNS proxy server. DNS Proxy Rules (URL) When DNS proxy is enabled, enter the URL of a DNS proxy server. User ID  Input the user name assigned by your ISP here. Password  Input the password assigned by your ISP here. L2TP Gateway Input the L2TP gateway assigned by your ISP here. Connection ID Specify a reference name/ID for the connection. MTU Enter the maximum transmission unit (MTU) value of your network connection. The default value is 1392. Connection Type Specify a connection type: 1. “Continuous”: Connected all the time. 2. “Connect on Demand”: Connect when you initiate an Internet connection. 3. “Manual”: Connect/disconnect manually using the “Connect” and “Disconnect” buttons. Idle Time Out Specify the amount of time the router waits before shutting down an idle connection. Only available when “Connect on Demand” (above) is selected.
61   III-3-3-2.    DDNS  Dynamic DNS (DDNS) is a service which provides a hostname-to-IP service for dynamic IP users. The changing nature of dynamic IPs means that it can be difficult to access a service provided by a dynamic IP user; a DDNS service though can map such dynamic IP addresses to a fixed hostname, for easier access. The router supports several DDNS service providers, for more details and to register for a DDNS account please visit the DDNS providers website(s), examples of which are listed below.    Enable/Disable Enable or disable DDNS Provider Select DDNS service provider. Domain Name Enter the domain name provided by the DDNS provider. Account/Email Please enter the DDNS registration account/email. Password/Key  Enter the DDNS service password/key.  The following DDNS services are supported: 3322     http://www.3322.org DHS     http://www.dhs.org DynDNS      http://www.dyndns.org ODS      http://ods.org TZO        http://www.tzo.com GnuDIP      http://gnudip2.sourceforge.net DyNS     http://www.dyns.cx/
62  ZoneEdit     http://www.zoneedit.com CyberGate   http://cybergate.planex.co.jp/ddns/ NS2GO      http://www.ns2go.com/ NO-IP      http://www.noip.com/
63  III-3-4.   LAN  You can configure your Local Area Network (LAN) on this page. You can enable the router to dynamically allocate IP addresses to your LAN clients, and you can modify the IP address of the device. The device’s default IP address is 192.168.2.1.  You can access the browser based configuration interface using the device’s IP address instead of using the URL http://edimax.setup.    IP Address  Specify the IP address here. This IP address will be assigned to the BR-6288ACL and will replace the default IP address. Subnet Mask Specify a subnet mask. The default value is 255.255.255.0 802.1d Spanning Tree Select “Enable” or “Disable” to enable/disable 802.1d Spanning Tree. This creates a tree of connected layer-2 bridges (typically Ethernet switches) within a mesh network, and disables those links that are not part of the tree, leaving a single active path between any two network nodes. DHCP Server  Enable or disable the DHCP server. Lease Time Select a lease time for the DHCP leases here. The DHCP client will obtain a new IP address after the period expires.
64  Your device’s DHCP server automatically assigns IP addresses to computers on its network, between a defined range of numbers.    Start IP Enter the start IP address for the DHCP server’s IP address leases. End IP Enter the end IP address for the DHCP server’s IP address leases.  Your device’s DHCP server can be configured to assign static (fixed) IP addresses to specified network devices, identified by their unique MAC address.    Enable Static DHCP Leases Enable/disable static DHCP leases. This must be enabled in order to assign any network device a static IP address.   MAC Address  Enter the specified network device’s MAC address here. IP Address  Assign a fixed IP address for the specified network device here. Add Add the information to the “Static DHCP Leases Table”. Clear Clear the MAC address and IP address fields. Delete Selected / Delete All Delete selected or all entries from the table.
65   The LAN IP page will be displayed as below when your device is set to access point mode. You can set theBR-6288ACL to obtain an IP address automatically or you can specify an IP address.
66  III-3-5.   2.4GHz Wireless & 5GHz Wireless  The “2.4GHz Wireless” & “5GHz Wireless” menu allows you to configure SSID and security settings for your Wi-Fi network along with a guest Wi-Fi network. WPS, access control and scheduling functions can also be managed from here.           In Access Point mode, the “Guest” feature in the menu is replaced by “Multiple SSID”.  III-3-5-1.    Basic  The “Basic” screen displays settings for your primary 2.4GHz or 5GHz Wi-Fi network.     Access Point Mode:
67  Disable Wireless  Check the box to disable the wireless function of your device. Mode Keep the default “AP” value for the device to act as a standard wireless access point, or select “AP Bridge-WDS” for the device to function in WDS mode (see below). Band Displays the wireless standard used for the BR-6288ACL’s “2.4GHz (B+G+N)” means that 802.11b, 802.11g, and 802.11n wireless clients can connect to the BR-6288ACL. Wireless Network Name (SSID) This is the name of your Wi-Fi network for identification, also sometimes referred to as “SSID”. The SSID can consist of any combination of up to 32 alphanumerical characters. Broadcast SSID Enable or disable SSID broadcast. When enabled, the SSID will be visible to clients as an available Wi-Fi network. When disabled, the SSID will not be visible as an available Wi-Fi network to clients – clients must manually enter the SSID in order to connect. A hidden (disabled) SSID is typically more secure than a visible (enabled) SSID. Enable Wireless Clients Isolation Check the box to enable wireless clients isolation. This prevents wireless clients connected to the BR-6288ACL from communicating with each other and improves security. Typically, this function is useful for corporate environments or public hot spots and can prevent brute force attacks on clients’ usernames and passwords. Channel Number Select a wireless radio channel or use the default “Auto” setting from the drop-down menu. Site Survey Click “Show List” to display a new window showing information about the surrounding wireless environment. This information is useful to select an effective wireless channel number. Wireless Clients Click “Show List” to display a new window showing
68  information about wireless clients. Please disable any pop-up blockers if you have difficulty using this function.   AP Bridge-WDS:    Wireless Distribution System (WDS) can bridge/repeat access points together in an extended network. WDS settings can be configured as shown below.  When using WDS, configure the IP address of each access point to be in the same subnet and ensure there is only one active DHCP server among connected access points, preferably on the WAN side.  WDS must be configured on each access point, using correct MAC addresses. All access points should use the same wireless channel.    MAC Address 1 - 4  Enter the correct MAC address for other access points in WDS mode. Set Security  Click “Set Security” to open a new window and enter the security settings for WDS (shown below). Click “Save” when finished.  Please ensure you setup and save wireless security settings before you click “Set Security” to set WDS security settings.
69    Wireless Security:    Select an encryption type from the drop-down menu:  “WPA Pre-shared Key” is the recommended and most secure encryption type.  In WISP mode, WPA RADIUS is unavailable for the wireless band that is used to connect to WISP’s AP.
70  III-3-5-1-1.    Disable  Encryption is disabled and no password/key is required to connect to the BR-6288ACL.  Disabling wireless encryption is not recommended. When disabled, anybody within range can connect to your device’s SSID.  Enable 802.1x Authentication Check the box to enable the 802.1x authentication. A RADIUS server is required to perform 802.1x authentication: enter the RADIUS server’s information in the relevant fields (below).
71  III-3-5-1-2.    WEP  WEP (Wired Equivalent Privacy) is a basic encryption type. For a higher level of security consider using WPA encryption.    Key Length Select 64-bit or 128-bit. 128-bit is more secure than 64-bit. Key Format Choose from “ASCII” (any alphanumerical character 0-9, a-z and A-Z) or “Hex” (any characters from 0-9, a-f and A-F). Encryption Key Enter your encryption key/password according to the format you selected above. A complex, hard-to-guess key is recommended. Check the “Hide” box to hide your password from being displayed on-screen. Enable 802.1x Authentication Check the box to enable the 802.1x authentication. A RADIUS server is required to perform 802.1x authentication: enter the RADIUS server’s information in the relevant fields (below).
72  III-3-5-1-3.   WPA Pre-Shared Key  WPA pre-shared key is the recommended and most secure encryption type.    WPA Unicast Cipher Suite Select from WPA (TKIP), WPA2 (AES) or WPA2 Mixed. WPA2 (AES) is safer than WPA (TKIP), but not supported by all wireless clients. Please make sure your wireless client supports your selection. WPA2 (AES) is recommended followed by WPA2 Mixed if your client does not support WPA2 (AES). Pre-shared Key Format Choose from “Passphrase” (8-63 alphanumeric characters) or “Hex” (up to 64 characters from 0-9, a-f and A-F).   Pre-shared Key Please enter a key according to the format you selected above. A complex, hard-to-guess key is recommended. Check the “Hide” box to hide your password from being displayed on-screen.
73  III-3-5-1-4.   WPA Radius  WPA RADIUS is a combination of WPA encryption and RADIUS user authentication. If you have a RADIUS authentication server, you can authenticate the identity of every wireless client against a user database.    WPA Unicast Cipher Suite Select from WPA (TKIP), WPA2 (AES) or WPA2 Mixed. WPA2 (AES) is safer than WPA (TKIP), but not supported by all wireless clients. Please make sure your wireless client supports your selection. WPA2 (AES) is recommended followed by WPA2 Mixed if your client does not support WPA2 (AES). RADIUS Server IP address Input the IP address of the RADIUS authentication server here. RADIUS Server Port Input the port number of the RADIUS authentication server here. The default value is 1812. RADIUS Server Password Input the password of the RADIUS authentication server here.
74  III-3-5-2.  Guest/ Multiple SSID  You can setup an additional “Guest” Wi-Fi network so guest users can enjoy Wi-Fi connectivity without accessing your primary network. The “Guest” screen displays settings for your guest Wi-Fi network.  The guest network is separate from your primary network. The settings for your primary network can be found in the “Basic” menu.  In access point mode, the “Guest” feature in the menu is replaced by “Multiple SSID”. The BR-6288ACL supports up to four additional SSIDs for each wireless band in access point mode.     Enable Guest SSID Check/uncheck the box to enable/disable the guest Wi-Fi network. Wireless Guest Name Enter a reference/ID name for your guest wireless network. Enable Wireless Clients Isolation Check the box to enable wireless clients isolation. This prevents wireless clients connected to the BR-6288ACL from communicating with each other and improves security. Typically, this function is useful for corporate environments or public hot spots and can prevent brute force attacks on clients’ usernames and passwords. Band Displays the wireless standard used for the BR-6288ACL’s frequency band: 2.4GHz (B+G+N): Allows 802.11b, 802.11g, and 802.11n wireless clients to connect to the
75  BR-6288ACL. Channel Number Channel number for the guest network is the same as the main SSID and cannot be adjusted independently.  Encryption Please refer to III-3-5-1. Basic: Wireless Security for details about security settings.   WPA RADIUS encyrption type is not available for the guest network.  MULTIPLE SSID: The BR-6288ACL supports up to four additional SSIDs for each wireless band in access point mode. Once configured, these SSIDs are displayed in the “Multiple SSID Status” table as shown below. Use the “Multiple SSID Basic Settings” box to configure additional SSIDs.       Multiple SSID Use the drop down menu to select which SSID (numbered 1 – 4) to configure. Wireless Network Name (SSID) Enter a reference/ID name to separate your wireless network.
76  Enable Multiple SSID Check/uncheck this box to enable/disable the specified SSID. Must be checked for the SSID to function. Enable Wireless Clients Isolation Check the box to enable wireless clients isolation. This prevents wireless clients connected to the BR-6288ACL from communicating with each other and improves security. Typically, this function is useful for corporate environments or public hot spots and can prevent brute force attacks on clients’ usernames and passwords. Band Displays the wireless standard used for the BR-6288ACL’s frequency band: 2.4GHz (B+G+N): Allows 802.11b, 802.11g, and 802.11n wireless clients to connect to the BR-6288ACL. Channel Number Channel number for the guest network is the same as the main SSID and cannot be adjusted independently. VLAN ID Set a VLAN ID for the specified SSID (see below).  A VLAN is a local area network which maps workstations virtually instead of physically and allows you to group together or isolate users from each other. VLAN IDs 0 – 4094 are supported.
77  III-3-5-3. WPS Wi-Fi Protected Setup is a simple way to establish connections between WPS compatible devices. WPS can be activated on compatible devices by pushing a WPS button on the device or from within the device’s firmware/configuration interface. When WPS is activated in the correct manner and at the correct time for two compatible devices, they will automatically connect. PIN code WPS includes the use of a PIN code between the two devices for verification.     Enable WPS Check/uncheck this box to enable/disable WPS. WPS Status Displays “Configured” or “unConfigured” depending on whether WPS and SSID/security settings for the device have been configured or not, either manually or using the WPS button. Self PIN Code Displays the WPS PIN code of the device. SSID Displays the SSID of the device. Authentication Mode Displays the wireless security authentication mode of the device. Authentication Key Displays the wireless security authentication key. Configuration Mode The configuration mode of the device’s WPS setting is displayed here. “Registrar” means the device acts as an access point for a wireless client to connect
78  to and the wireless client(s) will follow the device’s wireless settings. Configure via Push Button Click “Start PBC” (Push-Button Configuration) to activate WPS on the access point. WPS will be active for 2 minutes. Configure via Client PIN Code Enter the wireless client’s PIN code here and click “Start PIN” to activate PIN code WPS. Refer to your wireless client’s documentation if you are unsure of its PIN code.   III-3-5-4.  Access Control  Access Control is a security feature that can help to prevent unauthorized users from connecting to your wireless router.  This function allows you to define a list of network devices permitted to connect to the BR-6288ACL. Devices are each identified by their unique MAC address. If a device which is not on the list of permitted MAC addresses attempts to connect to the BR-6288ACL, it will be denied.  To enable this function, check the box labeled “Enable Wireless Access Control”.
79   MAC address Select a PC name from the drop-down list and click “>>” to add enter it into the blank field to the right.  Click “Refresh’ in the drop-down menu to refresh the list of available MAC addresses. If the address you wish to add is not listed, enter it manually.  Enter a MAC address of computer or network device manually without dashes or colons e.g. for MAC address ‘aa-bb-cc-dd-ee-ff’ enter ‘aabbccddeeff’. Comment Enter a comment for reference/identification consisting of up to 16 alphanumerical characters. Add Click “Add” to add the MAC address to the MAC address filtering table.    MAC address entries will be listed in the table as shown below. Select an entry using the “Select” checkbox.    Delete Selected / Delete All Delete selected or all entries from the table.
80  III-3-5-5.  Schedule  The schedule feature allows you to automate the wireless radio to switch on/off at specified times. Multiple schedules can be configured. Check/uncheck the box “Enable Schedule Settings” to enable/disable the wireless on/off scheduling function.  The BR-6288ACL must remain connected to the Internet and use an NTP server for the schedule feature to function correctly.    Wireless scheduling can save energy and increase the security of your network.  1.  Use the checkboxes to select which day(s) to include in the schedule.  2.  Specify a time (hour and minute) for the schedule using the drop-down menu.  3.  Select which command applies to this schedule from the drop-down menu, either “Wireless On” or “Wireless Off”.
81  Add Add the schedule to the table of active schedules.  Active schedules will be displayed in the table as shown below. Select an entry using the “Select” checkbox.    Delete Selected / Delete All Delete selected or all entries from the table.
82  III-3-6. Firewall  The “Firewall” menu provides access to URL blocking, access control, DMZ and DoS functions to improve the security of your wireless network.        SPI firewall Enable or disable the Stateful Packet Inspection (SPI) firewall.    III-3-6-1. URL Blocking  This function can block Internet access by either specific URLs or keywords. Check/uncheck the “Enable URL Blocking” box to enable/disable URL blocking.
83   URL/Keyword Enter the URL or keyword to be blocked. Add Add the URL or keyword to the blocked table.  Blocked URLs/keywords entries will be listed in the table as shown below. Select an entry using the “Select” checkbox.    Delete Selected / Delete All Delete selected or all entries from the table.
84  III-3-6-2.  Access Control  Access Control (MAC filtering) can also be configured from III-3-5-4. Access Control.  Access Control is a security feature that can help to prevent unauthorized users from connecting to your wireless router.  This function allows you to define a list of network devices permitted or denied to connect to the BR-6288ACL. Devices are each identified by their unique MAC address or IP address. Specific services can also be allowed/denied for IP addresses.  Check/uncheck the “Enable MAC Filtering” and/or “Enable IP Filtering” box to enable/disable MAC filtering and/or IP filtering.
85  MAC Filtering:  Enable MAC Filtering Check the box to enable MAC filtering and select whether to “Deny” or “Allow” access for specified MAC address. Client PC MAC Address Enter a MAC address of computer or network device manually without dashes or colons e.g. for MAC address ‘aa-bb-cc-dd-ee-ff’ enter ‘aabbccddeeff’. Computer Name Select a computer name from the drop-down list and click “<<” to add its MAC address into the “Client PC Mac Address” field.  Click “Refresh’ in the drop-down menu to refresh the list of available MAC addresses. If the address you wish to add is not listed, enter it manually. Comment  Enter a comment for reference/identification consisting of up to 16 alphanumerical characters. Add Click “Add” to add the MAC address to the MAC address filtering table.    MAC address entries will be listed in the table as shown below. Select an entry using the “Select” checkbox.    Delete Selected / Delete All Delete selected or all entries from the table.
86  IP Filtering:  Enable IP Filtering Check the box to enable IP filtering and select whether to “Deny” or “Allow” access for specified IP address. Add PC Opens a new window to add a new IP to the list, to deny or allow access/services according to above.
87  Client PC Description Enter a description for reference/identification of up to 16 alphanumeric characters. Client PC IP address Enter a starting IP address in the left field and the end IP address in the right field to define a range of IP addresses; or enter an IP address in the left field only to define a single IP address. Service Name Various services are listed here with a short description. Check/uncheck the box for each service you wish to select. Protocol Select protocol “TCP” or “UDP” or “Both” for a service not included in the “Client PC Service” list. Port Range Enter the port range for the service not included in the “Client PC Service” list.  Enter a single port number e.g. 110, a range of port numbers e.g. 110-120, or multiple port numbers separated by a comma e.g. 110,115,120. Add Click “Add” to add selected services or a user defined service to the IP filtering table.  IP filtering entries will be listed in the IP filtering table shown below.    Delete Selected / Delete All Delete selected or all entries from the table.
88  III-3-6-3.  DMZ  A Demilitarized Zone (DMZ) is an isolated area in your local network where private IP addresses are mapped to specified Internet IP addresses, allowing unrestricted access to the private IP addresses but not to the wider local network.  You can define a virtual DMZ host here. This is useful for example, if a network client PC cannot run an application properly from behind an NAT firewall, since it opens the client up to unrestricted two-way access.    Enable DMZ Check/uncheck the box to enable/disable the device’s DMZ function. Public Select “Dynamic IP” or “Static IP” here.  For “Dynamic IP” select an Internet connection session from dropdown menu.  For “Static IP” enter the IP address that you want to map to a specific private IP address. Client PC Enter the private IP address that the internet IP address will be mapped to. Computer Name Select a computer name from the list and click “<<”
89  to enter its IP address into the “Client PC” field (above). Add Click “Add” to add the client to the “Current DMZ Table”.  DMZ entries will be displayed in the table shown below:    Delete Selected / Delete All Delete selected or all entries from the table.  III-3-6-4.  DoS  Denial-of-Service (DoS) is a common form of malicious attack against a network. The router’s firewall can protect against such attacks.  If you are not familiar with these functions, it is recommended you keep the default settings.
90    Ping of Death Specify the frequency of ping of death packets which will trigger the router’s DoS protection function. Discard Ping from WAN Check this box and the router will not answer ping requests from the Internet. Port Scan Intruders use “port scanners” to detect open Internet IP address ports. Check each type of port scan to prevent. Sync Flood Specify the frequency of sync flood packets which will trigger the DoS protection function.
91  III-3-7. QoS  Quality of Service (QoS) is a feature to manage   Internet bandwidth efficiently. Some applications require more bandwidth than others to function properly, and QoS allows you to ensure that sufficient bandwidth is available. Minimum or maximum bandwidth can be guaranteed for a specified application.  QoS can improve the BR-6288ACL’s performance. QoS is recommended to optimize performance for online gaming.  III-3-7-1.  QoS  Check/uncheck the box “Enable QoS” to enable/disable the QoS function. Click “Add” to open a new window and setup a QoS rule. The “Current QoS Table” displays all QoS rules.    Total Download Bandwidth Enter your total download bandwidth limit from your Internet service provider (ISP) in kbits. Total Upload Bandwidth Enter your total upload bandwidth limit from your Internet service provider (ISP) in kbits. Add Opens a new window to add a new QoS rule to the current QoS table.
92    Rule Name Enter a name for the QoS rule for reference/identification. Bandwidth Set the bandwidth limits for the QoS rule:             (1)         (2)         (3)  1. Select “Download” or “Upload” for the QoS rule.  2. Enter the bandwidth limit.  3. Select whether the bandwidth is a “Guarantee” (minimum) or “Max” (maximum). Local IP Address Enter the IP address range to which the QoS rule will be applied. Enter a starting IP address in the left field and the end IP address in the right field to define a range of IP addresses; or enter an IP address in the left field only to define a single IP address.
93  Local Port Range Enter the port range to activate the QoS rule. Enter a single port number e.g. 110 or a range of port numbers e.g. 110-120 Remote IP Address Enter the remote IP address range which will activate the QoS rule. Enter a starting IP address in the left field and the end IP address in the right field to define a range of IP addresses; or enter an IP address in the left field only to define a single IP address. Remote Port Range Enter the remote port range to activate the QoS rule. Enter a single port number e.g. 110 or a range of port numbers e.g. 110-120 Traffic Type Select traffic type as an alternative to specifying a port range above. Protocol Select a “TCP” or “UDP” protocol type. Save Click ‘add’ button to add a new QoS rule (detailed instructions will be given below).  QoS rule entries will be listed in the “Current QoS Table” as shown below. Select a rule using the “Select” checkbox.  When using the “Edit” button only one rule can be selected each time.  QoS rules will be processed in the order that they are listed i.e. the rule at the top of the list will be applied first, and then the second rule etc. The order can be adjusted using the “Move Up/Down” buttons.    Edit Edit a selected rule. Delete Selected/ Delete All Delete selected or all entries from the table. Move Up/Down Move selected rule up or down the list.
94  III-3-7-2.  iQoS  iQoS is a more intuitive and automated tool to manage internet bandwidth than manually configuring the settings using QoS. For online gamers or users with bandwidth requirements for audio/video, iQoS is a useful function.  iQoS cannot be used in conjunction with QoS and vice-versa. When one is enabled, the other is automatically disabled.    Check/uncheck the box “Enable iQoS” to enable/disable the iQoS function, and then enter your bandwidth limits and arrange the network application icons in priority order in the “Current iQoS Table”. Icons with higher priority will be assigned bandwidth more efficiently for better performance.  Total Download Bandwidth Enter your total download bandwidth limit from your Internet service provider (ISP) in kbits. Total Upload Bandwidth Enter your total upload bandwidth limit from your Internet service provider (ISP) in kbits.
95  The icons represent the following categories:  Internet Browsing  P2P/BT Downloads  FTP  Multimedia  Online Gaming  The iQoS table is ordered left to right, high to low priority. Click a small icon below the table to insert it into the table, and click a large icon in the table to remove it. All spaces in the priority table must be filled.
96  III-3-8. Advanced  Advanced features of the BR-6288ACL can be configured from the “Advanced” menu.         III-3-8-1.  Static Routing  Static routing is a method of configuring path selection of routers, characterized by the absence of communication between routers regarding the current topology of the network. The opposite of static routing is dynamic routing, sometimes also referred to as adaptive routing.  You can configure static routing and manually add routes to the routing table shown below.   Enable Static Routing Check/uncheck the box to enable/disable static routing. Destination LAN IP Enter the destination network’s IP address. Subnet Mask Enter the subnet mask of the destination network.
97  Default Gateway Enter the default gateway of the destination network. Hop Count Enter the hop count (the distance between destination network and this broadband router) here. Interface Enter the interface which leads to destination network. Add Add the route to the current static routing table.  Static Routing Table entries will be displayed in the table shown below:    Delete Selected/ Delete All Delete selected or all entries from the table.  III-3-8-2.  Port Forwarding  This function allows you to redirect a single port or consecutive ports of an Internet IP address to the same port of a local IP address. The port number(s) of the Internet IP address and local IP address must be the same.  If the port number of the Internet IP address and local IP address is different, please use the “Virtual Server” function instead.
98   Private IP Enter the IP address of the computer on the local network. Computer Name   Windows computers on the local network will be listed here – select a computer from the list and click << to automatically add the IP address to the “Private IP” field. Type Select the type of connection, “TCP”, “UDP” or “Both”. Port Range Input the starting port number in the left field, and input the ending port number in the right field. If you only want to redirect a single port number, only enter a port number in the left field. Comment Enter a comment for reference or identification.  Port Forwarding Table entries will be displayed in the table shown below:    Delete Selected/ Delete All Delete selected or all entries from the table.
99  III-3-8-3.  Virtual Server  This function allows you to set up an internet service on a local computer, without exposing the local computer to the internet. You can also build various sets of port redirection, to provide various internet services on different local computers via a single internet IP address.    Private IP Specify the IP address of the computer on your local network. Computer Name Select the name of a Windows computer from the drop-down menu and click   to auto-input its IP address in the “Private IP” field. Private Port Specify the private port you wish to use on the computer in your local network. Type Select the type of Internet Protocol. Public Port Specify a public port to access the computer on your local network. Comment Enter a comment for reference or identification.  Current Virtual Table entries will be displayed in the table shown below:
100   III-3-8-4.  2.4GHz Wireless  These settings are for experienced users only. Please do not change any of the values on this page unless you are already familiar with these functions.    Fragment Threshold Set the Fragment threshold of the wireless radio. The default value is 2346. RTS Threshold Set the RTS threshold of the wireless radio. The default value is 2347. Beacon Interval Set the beacon interval of the wireless radio. The default value is 100. DTIM Period Set the DTIM period of wireless radio. The default value is 3. Data Rate Set the wireless data transfer rate. The default is set to Auto. N Data Rate Set the data rate of 802.11n. The default is set to Auto. Delete Selected/ Delete All Delete selected or all entries from the table.
101  Channel Width Select wireless channel width (bandwidth used by wireless signals from the device) – the recommended value is Auto 20/40MHz. Preamble Type Set the wireless radio preamble type. The default value is “Short Preamble”. CTS Protect Enabling this setting will reduce the chance of radio signal collisions between 802.11b and 802.11g wireless access points. It’s recommended to set this option to “Auto”. Tx Power Set the power output of the wireless radio. You may not require 100% output power. Setting a lower power output can enhance security since potentially malicious/unknown users in distant areas will not be able to access your signal. WMM WMM (Wi-Fi Multimedia) technology can improve the performance of certain network applications, such as audio/video streaming, network telephony (VoIP) and others. When WMM is enabled, the device will prioritize different kinds of data and give higher priority to applications which require instant responses for better performance.
102  III-3-8-5.  5GHz Wireless  These settings are for experienced users only. Please do not change any of the values on this page unless you are already familiar with these functions.    Fragment Threshold Set the Fragment threshold of the wireless radio. The default value is 2346. RTS Threshold Set the RTS threshold of the wireless radio. The default value is 2347. Beacon Interval Set the beacon interval of the wireless radio. The default value is 100. DTIM Period Set the DTIM period of wireless radio. The default value is 3. Data Rate Set the wireless data transfer rate. The default is set to Auto. N Data Rate Set the data rate of 802.11n. The default is set to Auto.
103  Channel Width Select wireless channel width (bandwidth used by wireless signals from the device) – the recommended value is 20/40/80MHz. Preamble Type  Set the wireless radio preamble type. The default value is “Short Preamble”. CTS Protect Enabling this setting will reduce the chance of radio signal collisions between 802.11b and 802.11g wireless access points. It’s recommended to set this option to “Auto”. Tx Power Set the power output of the wireless radio. You may not require 100% output power. Setting a lower power output can enhance security since potentially malicious/unknown users in distant areas will not be able to access your signal. WMM WMM (Wi-Fi Multimedia) technology can improve the performance of certain network applications, such as audio/video streaming, network telephony (VoIP) and others. When WMM is enabled, the device will prioritize different kinds of data and give higher priority to applications which require instant responses for better performance.
104  III-3-8-6.  IGMP  IGMP is a communications protocol used to establish multicast group memberships. It allows for a more efficient use of resources and better performance for applications such as IPTV video streaming.    IGMP Snooping IGMP snooping monitors traffic between hosts and multicast routers to facilitate bandwidth conservation. Select enable or disable. IGMP Proxy IGMP proxy enables intelligent multicast forwarding based on IGMP snooping information. Select enable or disable.  It is recommended to set “IGMP Snooping” and “IGMP Proxy” to “Enable”.  III-3-8-7.  UPnP  Universal plug-and-play (UPnP) is a set of networking protocols which enables network devices to communicate and automatically establish working configurations with each other. Select “Enable” or “Disable”.
105  III-3-9. Administration  Various administrative functions can be accessed from the “Administration” menu.            III-3-9-1.  Time Zone    Set Time Zone Select the time zone of your country or region. Time Server Address The travel router supports NTP (Network Time Protocol) for automatic time and date setup. Input the host name of the IP server manually. Daylight Saving If your country/region uses daylight saving time, please check the “Enable Function” box, and select the start and end date.
106  III-3-9-2.  Password  You can change the password used to login to the browser-based configuration interface here. It is advised to do so for security purposes.  Please make a note of the new password. In the event that you forget the password and are unable to login to the browser based configuration interface, see II-7. Reset to factory default settings for how to reset the device.    Current Password Enter your current password. New Password Enter your new password. Confirmed Password Confirm your new password.
107  III-3-9-3.  Remote Access  Check “Enabled” to enable the remote access feature and then enter the appropriate values.    Host IP Address Specify the IP address which is allowed remote access. Port Specify a port number (0–65535) used for remote access.
108  III-3-9-4.  Backup/Restore    Backup Settings Click “Save” to save the current settings on your computer as config.bin file. Restore Settings Click “Browse” to find a previously saved config.bin file and then click “Upload” to replace your current settings. Restore to Factory Default Click “Reset” to restore settings to the factory default. A pop-up window will appear and ask you to confirm and enter your log in details. Enter your username and password and click “Ok”. See below for more information.  III-3-9-5.  Upgrade  The upgrade page allows you to upgrade the system firmware to a more recent version. You can download the latest firmware from the Edimax website. After the upgrade, the system will restart.  Do not switch off or disconnect the device during a firmware upgrade, as this could damage the device. It is recommended that you use a wired Ethernet connection for a firmware upgrade.

Navigation menu