Hewlett Packard Enterprise WL553 OfficeConnect ADSL Wireless 11g Firewall Router User Manual supergerry
Hewlett-Packard Company OfficeConnect ADSL Wireless 11g Firewall Router supergerry
Manual
OfficeConnect® ADSL Wireless 108Mbps 11g Firewall Router User Guide Model WL-553 3CRWDR200A-75 3CRWDR200B-75 http://www.3com.com/ Published March 2006 3Com Corporation 350 Campus Drive Marlborough, MA USA 01752-3064 Copyright © 2006, 3Com Corporation. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative work (such as translation, transformation, or adaptation) without written permission from 3Com Corporation. 3Com Corporation reserves the right to revise this documentation and to make changes in content from time to time without obligation on the part of 3Com Corporation to provide notification of such revision or change. 3Com Corporation provides this documentation without warranty, term, or condition of any kind, either implied or expressed, including, but not limited to, the implied warranties, terms or conditions of merchantability, satis34factory quality, and fitness for a particular purpose. 3Com may make improvements or changes in the product(s) and/or the program(s) described in this documentation at any time. If there is any software on removable media described in this documentation, it is furnished under a license agreement included with the product as a separate document, in the hard copy documentation, or on the removable media in a directory file named LICENSE.TXT or !LICENSE.TXT. If you are unable to locate a copy, please contact 3Com and a copy will be provided to you. UNITED STATES GOVERNMENT LEGEND If you are a United States government agency, then this documentation and the software described herein are provided to you subject to the following: All technical data and computer software are commercial in nature and developed solely at private expense. Software is delivered as “Commercial Computer Software” as defined in DFARS 252.227-7014 (June 1995) or as a “commercial item” as defined in FAR 2.101(a) and as such is provided with only such rights as are provided in 3Com’s standard commercial license for the Software. Technical data is provided with limited rights only as provided in DFAR 252.227-7015 (Nov 1995) or FAR 52.227-14 (June 1987), whichever is applicable. You agree not to remove or deface any portion of any legend provided on any licensed program or documentation contained in, or delivered to you in conjunction with, this User Guide. Unless otherwise indicated, 3Com registered trademarks are registered in the United States and may or may not be registered in other countries. 3Com, OfficeConnect and the 3Com logo are registered trademarks of 3Com Corporation. Intel and Pentium are registered trademarks of Intel Corporation. Microsoft, MS-DOS, Windows, and Windows NT are registered trademarks of Microsoft Corporation. Novell and NetWare are registered trademarks of Novell, Inc. UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open Company, Ltd. Netscape Navigator is a registered trademark of Netscape Communications. JavaScript is a trademark of Sun Microsystems Wi-Fi and the Wi-Fi logo are registered trademarks of the WI-Fi Alliance. IEEE and 802 are trademarks of the Institute of Electrical and Electronics Engineers, Inc. All other company and product names may be trademarks of the respective companies with which they are associated. ENVIRONMENTAL STATEMENT It is the policy of 3Com Corporation to be environmentally-friendly in all operations. To uphold our policy, we are committed to: Establishing environmental performance standards that comply with national legislation and regulations. Conserving energy, materials and natural resources in all operations. Reducing the waste generated by all operations. Ensuring that all waste conforms to recognized environmental standards. Maximizing the recyclable and reusable content of all products. Ensuring that all products can be recycled, reused and disposed of safely. Ensuring that all products are labelled according to recognized environmental standards. Improving our environmental record on a continual basis. End of Life Statement 3Com processes allow for the recovery, reclamation and safe disposal of all end-of-life electronic components. Regulated Materials Statement 3Com products do not contain any hazardous or ozone-depleting material. Environmental Statement about the Documentation The documentation for this product is printed on paper that comes from sustainable, managed forests; it is fully biodegradable and recyclable, and is completely chlorine-free. The varnish is environmentally-friendly, and the inks are vegetable-based with a low heavy-metal content. CONTENTS ABOUT THIS GUIDE Naming Convention 7 Conventions 8 Feedback about this User Guide Related Documentation 9 INTRODUCING THE FIREWALL ROUTER OfficeConnect ADSL Wireless 108Mbps 11g Firewall Router Firewall Router Advantages 13 Package Contents 13 Minimum System and Component Requirements 15 Front Panel 15 Rear Panel 17 HARDWARE INSTALLATION Introduction 19 Safety Information 19 Positioning the Router 19 Using the Rubber Feet 20 Stacking the Router 20 Wall Mounting 20 Before you Install your Router 21 Powering Up the Router 22 Connecting the Router 22 SETTING UP YOUR COMPUTERS Obtaining an IP Address Automatically Windows 2000 25 Windows XP 27 25 11 Windows 95/98/ME 27 Macintosh 27 Disabling PPPoE and PPTP Client Software Disabling Web Proxy 28 RUNNING THE SETUP WIZARD Accessing the Wizard 29 Password 32 Time Zone 33 ATM PVC Configuration IGMP 34 Connection Mode 34 LAN Settings 38 Wireless Settings 40 Summary 41 28 33 ROUTER CONFIGURATION Navigating Through the Router Configuration Pages Main Menu 43 Option Tabs 44 Welcome Screen 44 Notice Board 45 Password 45 Wizard 46 LAN Settings 47 Unit Configuration 47 DHCP Lease Table 48 Wireless Settings 48 Configuration 49 Encryption 51 Configuring WPA/WPA2 Encryption 52 Configuring WEP Encryption 54 WMM 56 Connection Control 57 Advanced Wireless Settings 58 Internet Settings 59 Firewall 59 43 Virtual Servers 59 Special Applications 61 Virtual DMZ 62 SPI 63 Internet Access Policy 64 Content Filter 66 System Tools 67 Restart 67 Time Zone 68 Configuration 68 Upgrade 69 Advanced 70 Routing 70 Static Route 71 RIP 71 DNS 73 DDNS 73 DSL 75 IPSec 75 Proxy ARP 76 ALG 77 Management 77 Syslog 78 SNMP 79 Trusted Station 80 Remote Management 81 Diagnostics 82 Device Info 82 Summary 82 WAN 83 Statistics 83 Route 84 ARP 84 Support/Feedback 85 Support 85 Feedback 86 6 TROUBLESHOOTING Basic Connection Checks 87 Browsing to the Router Configuration 87 Connecting to the Internet 88 Forgotten Password and Reset to Factory Defaults Wireless Networking 89 Replacement Power Adapters 92 Alert LED 92 Recovering from Corrupted Software 93 Frequently Asked Questions 94 USING DISCOVERY Running the Discovery Application 97 Windows Installation (95/98/2000/Me/NT) 89 97 IP ADDRESSING The Internet Protocol Suite 99 Managing the Router over the Network 99 IP Addresses and Subnet Masks 99 How does a Device Obtain an IP Address and Subnet Mask? DHCP Addressing 101 Static Addressing 101 Auto-IP Addressing 101 101 C SAFETY INFORMATION END USER SOFTWARE LICENSE AGREEMENT ISP INFORMATION GLOSSARY REGULATORY NOTICES FOR THE ADSL WIRELESS 108MBPS 11G FIREWALL ROUTER INDEX ABOUT THIS GUIDE This guide describes how to install and configure the OfficeConnect ADSL Wireless 108Mbps 11g Firewall Router (3CRWDR200A-75 and 3CRWDR200B-75). This guide is intended for use by those responsible for installing and setting up network equipment; consequently, it assumes a basic working knowledge of LANs (Local Area Networks) and Internet Router systems. If a release note is shipped with the OfficeConnect ADSL Wireless 108Mbps 11g Firewall Router and contains information that differs from the information in this guide, follow the information in the release note. Most user guides and release notes are available in Adobe Acrobat Reader Portable Document Format (PDF) on the 3Com World Wide Web site: http://www.3com.com Naming Convention Throughout this guide, the OfficeConnect ADSL Wireless 108Mbps 11g Firewall Router is referred to as the “Router”. Category 3 and Category 5 Twisted Pair Cables are referred to as Twisted Pair Cables throughout this guide. 8 ABOUT THIS GUIDE Conventions Table 1 and Table 2 list conventions that are used throughout this guide. Table 1 Notice Icons Icon Notice Type Description Information note Information that describes important features or instructions. Caution Information that alerts you to potential loss of data or potential damage to an application, system, or device. Warning Information that alerts you to potential personal injury. Table 2 Text Conventions Convention The words “enter” and “type” Keyboard key names Words in italics Description When you see the word “enter” in this guide, you must type something, and then press Return or Enter. Do not press Return or Enter when an instruction simply says “type.” If you must press two or more keys simultaneously, the key names are linked with a plus sign (+). Example: Press Ctrl+Alt+Del Italics are used to: Emphasize a point. Denote a new term at the place where it is defined in the text. Identify menu names, menu commands, and software button names. Examples: From the Help menu, select Contents. Click OK. Feedback about this User Guide Your suggestions are very important to us. They will help make our documentation more useful to you. Please e-mail comments about this document to 3Com at: pddtechpubs_comments@3com.com Please include the following information when commenting: Document title Document product number (on the title page) Conventions Page number (if appropriate) Example: OfficeConnect ADSL Wireless 108Mbps 11g Firewall Router User Guide Product Number 3CRWDR200A-75 Page 24 Do not use this e-mail address for technical support questions. For information about contacting Technical Support, please refer to the Support and Safety Information sheet. Related Documentation In addition to this guide, each Router document set includes one Installation Guide. This guide contains the instructions you need to install and configure your Router. 10 ABOUT THIS GUIDE 1 INTRODUCING THE FIREWALL ROUTER Welcome to the world of networking with 3Com®. In the modern business environment, communication and sharing information is crucial. Computer networks have proved to be one of the fastest modes of communication but, until recently, only large businesses could afford the networking advantage. The OfficeConnect® product range from 3Com has changed all this, bringing networks to the small office. The products that compose the OfficeConnect range give you, the small office user, the same power, flexibility, and protection that has been available only to large corporations. Now, you can network the computers in your office, connect them all to a single Internet outlet, and harness the combined power of all of your computers. OfficeConnect ADSL Wireless 108Mbps 11g Firewall Router The OfficeConnect ADSL Wireless 108Mbps 11g Firewall Router is designed to provide a cost-effective means of sharing a single broadband Internet connection amongst several wired and wireless computers. The Router also provides internet services with standardized mechanism; namely, NAT and IPSec, etc. Thus, it further prevents anyone outside of your network from seeing your files or damaging your computers. The Router also gives you many administrative features such as scheduled internet access policies, web content filter, and intrusion detections. Figure 1 shows an example network without a Router. In this network, only one computer is connected to the Internet. This computer must always be powered on for the other computers on the network to access the Internet. 12 CHAPTER 1: INTRODUCING THE FIREWALL ROUTER Figure 1 Example Network Without a Firewall Router When you use the Firewall Router in your network (Figure 2), it becomes your connection to the Internet. Connections can be made directly to the Router, or to an OfficeConnect Switch or Hub, expanding the number of computers you can have in your network. Figure 2 Example Network Using a ADSL Wireless 108Mbps 11g Firewall Router Firewall Router Advantages Firewall Router Advantages 13 The advantages of the Firewall ADSL Wireless 108Mbps 11g Firewall Router include: Shared Internet connection for both wired and wireless computers High speed 802.11g wireless networking No need for a dedicated, “always on” computer serving as your Internet connection Cross-platform operation for compatibility with Windows, Unix and Macintosh computers Easy-to-use, Web-based setup and configuration Provides centralization of all network address settings (DHCP) Acts as a Virtual server to enable remote access to Web, FTP, and other services on your network Security — Firewall protection against Internet hacker attacks and encryption to protect wireless network traffic Filtered access of inappropriate Web sites using the built-in URL filter Internet Access Policy, to schedule your Internet Access rules with options in keywords and applications blocking Wireless Multimedia, to maximize the quality of your internet service with traffic prioritization Package Contents The Firewall Router kit includes the following items: One OfficeConnect ADSL Wireless 108Mbps 11g Firewall Router One power adapter for use with the Firewall Router Four rubber feet One Ethernet cable 14 CHAPTER 1: INTRODUCING THE FIREWALL ROUTER One CD-ROM containing the Firewall Router Discovery program and this User Guide Installation Guide One Support and Safety Information Sheet One Warranty Flyer If any of these items are missing or damaged, please contact your retailer. Minimum System and Component Requirements Minimum System and Component Requirements 15 Your Router requires that the computer(s) and components in your network be configured with at least the following: A computer with an operating system that supports TCP/IP networking protocols (for example Windows 95/98/NT/Me/2000/XP, Unix, Mac OS 8.5 or higher). An Ethernet 10Mbps or 10/100 Mbps NIC for each computer to be connected to the four-port switch on your Router. An 802.11b or 802.11g wireless NIC. A cable modem or DSL modem with an Ethernet port (RJ-45 connector). An active Internet access account. A Web browser that supports JavaScript, such as Netscape 4.7 or higher, Internet Explorer 5.0 or higher, or Mozilla 1.2.1 or higher. Front Panel The front panel of the Router contains a series of indicator lights (LEDs) that help describe the status of various networking and connection operations. Figure 3 Router - Front Panel 12 3 5 1 Alert LED Orange Indicates a number of different conditions, as described below. Off - The Router is operating normally. Flashing quickly - Indicates one of the following conditions: The Router has just been started up and is running a self-test routine, or 16 CHAPTER 1: INTRODUCING THE FIREWALL ROUTER The administrator has invoked the Reset to Factory Defaults command, or The system software is in the process of being upgraded In each of these cases, wait until the Router has completed the current operation and the alert LED is Off. Flashing slowly - The Router has completed the Reset to Factory Defaults process, and is waiting for you to reset the unit. To do this, remove power, wait 10 seconds and then re-apply power. The Router will then enter the start-up sequence and resume normal operation. If you have used a cable to reset the unit to Factory Defaults, See "Reset to Factory Default" on page 69. On for 2 seconds, and then off - The Router has detected and prevented a hacker from attacking your network from the Internet. Continuously on - A fault has been detected with your Router during the start-up process. Refer to Chapter 6 “Troubleshooting”. 2 Power LED Green Indicates that the Router is powered on. 3 Wireless LAN (WLAN) Status LED Yellow If the LED is on it indicates that wireless networking is enabled. If the LED is flashing, data is being transmitted or received. If the LED is off, the Wireless LAN has been disabled in the Router, or there is a problem. Refer to Chapter 6“Troubleshooting”. 4 Four LAN Status LEDs Green (100 Mbps link) / yellow (10 Mbps link) If the LED is on, the link between the port and the next piece of network equipment is OK. If the LED is flashing, the link is OK and data is being transmitted or received. If the LED is off, nothing is connected, the connected device is switched off, or there is a problem with the connection (refer to Chapter 6 “Troubleshooting”). The port will automatically adjust to the correct speed and duplex. 5 Cable/DSL Status LED Rear Panel 17 Green (100 Mbps link) / yellow (10 Mbps link) If the LED is on, the link between the Router and the cable or DSL modem is OK. If the LED is flashing, the link is OK and data is being transmitted or received. If the LED is off, nothing is connected, the modem is switched off or there is a problem (refer to Chapter 6 “Troubleshooting”). Rear Panel The rear panel (Figure 4) of the Router contains four LAN ports, one Ethernet Cable/DSL port, a power adapter OK LED, and a power adapter socket. Figure 4 Router - Rear Panel 10 11 6 Wireless Antennae The antennae on the product should be placed in a ‘V’ position when initially installed. CAUTION: Do not force the antennae beyond their mechanical stops. Rotating the antennae further may cause damage. 7 ADSL port Using the RJ11 cable provided, you should connect your Router to the telephone socket via a splitter. 8 Power Adapter Socket Only use the power adapter supplied with this Router. Do not use any other adapter. 9 Power Adapter OK LED Green Indicates that the power adapter is supplying power to the Router. If the LED is off, there may be a problem with the power adapter or adapter cable. 18 CHAPTER 1: INTRODUCING THE FIREWALL ROUTER 10 Reset Button Press this button for resetting your Router to factory default. 11 Four 10/100 LAN ports Using suitable RJ-45 cable, you can connect your Router to a computer, or to any other piece of equipment that has an Ethernet connection (for example, a hub or a switch). The LAN ports will automatically set themselves to MDI or MDIX depending on the device to which they are connected and the type of cable used. 2 Introduction HARDWARE INSTALLATION This chapter will guide you through a basic installation of the Router, including: Connecting the Router to the Internet. Connecting the Router to your network. Setting up your computers for networking with the Router. Safety Information WARNING: Please read the Router section in Appendix C before you start. VORSICHT: Bitte lesen Sie den Abschnitt “Wichtige Sicherheitshinweise” sorgfältig durch, bevor Sie das Gerät einschalten. AVERTISSEMENT: Veuillez lire attentivement la section “Consignes importantes de sécurité” avant de mettre en route. Positioning the Router You should place the Router in a location that: is conveniently located for connection to the cable or DSL modem that will be used to connect to the Internet. is centrally located to the wireless computers that will connect to the Router. A suitable location might be on top of a high shelf or similar furniture to optimize wireless connections to computers in both horizontal and vertical directions, allowing wider coverage. allows convenient connection to the computers that will be connected to the four LAN ports on the rear panel, if desired. 20 CHAPTER 2: HARDWARE INSTALLATION allows easy viewing of the front panel LED indicator lights, and access to the rear panel connectors, if necessary. When positioning your Router, ensure: It is out of direct sunlight and away from sources of heat. Cabling is away from power lines, fluorescent lighting fixtures, and sources of electrical noise such as radios, transmitters and broadband amplifiers. Water or moisture cannot enter the case of the unit. Air flow around the unit and through the vents in the side of the case is not restricted. 3Com recommends you provide a minimum of 25 mm (1 in.) clearance. Using the Rubber Feet Use the four self-adhesive rubber feet to prevent your Router from moving around on your desk or when stacking with other flat top OfficeConnect units. Only stick the feet to the marked areas at each corner of the underside of your Router. Stacking the Router If you are stacking your Router with other OfficeConnect units, install the Router at the top of the stack. Refer to the documentation supplied with your other OfficeConnect unit for details on using the stacking clip. A stacking clip is not supplied with the Router. Use the stacking clip supplied with another stackable OfficeConnect unit. Wall Mounting There are two slots on the underside of the Router that can be used for wall mounting. When wall mounting the unit, ensure that it is within reach of the power outlet. You will need two suitable screws to wall mount the unit. To do this: 1 Ensure that the wall you use is smooth, flat, dry and sturdy and make two screw holes which are 150 mm (5.9 in.) apart. 2 Fix the screws into the wall, leaving their heads 3 mm (0.12 in.) clear of the wall surface. Before you Install your Router 21 3 Remove any connections to the unit and locate it over the screw heads. When in line, gently push the unit on to the wall and move it downwards to secure. When making connections, be careful not to push the unit up and off the wall.Router CAUTION: Only wall mount single units, do not wall mount stacked units. Before you Install your Router Before you install and configure your Router, you need the following additional information. If you do not have this information, contact your Internet Service Provider (ISP). Space is provided below for you to record this information. If you have a DSL connection and your ISP allocates IP information dynamically, you need a User Name and Password: User Name : ______________________ Password : ______________________ Service Name : ______________________ Authentication Method : ______________________ You only need a PPPoE Service Name if your ISP requires one. Do not enter anything if your ISP does not require this information. You should leave the Authentication Method as its default: Auto if your ISP doesn’t specify this parameter. 22 CHAPTER 2: HARDWARE INSTALLATION If your ISP allocates fixed or static IP information, you need the following information: IP Address : ____.____.____.____ Subnet Mask : ____.____.____.____ Default Router address : ____.____.____.____ DNS address : ____.____.____.____ If your ISP allocates IP information dynamically over a protocol other than PPPoE, you do not need any further information. This configuration is typical of cable connections. Powering Up the Router To power up the Router: 1 Plug the power adapter into the power adapter socket located on the back panel of the Router. 2 Plug the power adapter into a standard electrical wall socket. Connecting the Router The first step for installing your Router is to physically connect it to a RJ11 cable with the splitter and then connect the Router to a computer in order to be able to access the Internet. See Figure 5: Connecting the Router 23 Figure 5 Connecting the Router sofu Power Supply Unit Jouf Telephone socket 12VDC 1.25A MAX POWER OK Cable/DSL LAN Xjsfmftt! Vtfst Zpvs!QD To use your Router to connect to the Internet through an DSL connection: 1 Insert one end of the supplied telephone (RJ-11) cable into the Cable/DSL port on the rear panel of the Router. Check that the DSL Sync status LED lights on the Router. 2 Connect your computer to one of the four LAN ports on the Router using a Category 5 twisted pair cable. Check that the corresponding LAN status LED on the Router lights. You have now completed the hardware installation of your Router. Next you need to set up your computers so that they can make use of the Router to communicate with the Internet. 3Com recommends that you perform the initial Router configuration from a computer that is directly connected to one of the LAN ports. If you configure the Router from a wireless computer, note that you may lose contact with the Router if you change the wireless configuration. To communicate wirelessly with your Router, your wireless NIC should be set as follows: Encryption — none 24 CHAPTER 2: HARDWARE INSTALLATION Service Area Name/SSID — 3Com Channel — 11 3 SETTING UP YOUR COMPUTERS The Router has the ability to dynamically allocate network addresses to the computers on your network, using DHCP. However, your computers need to be configured correctly for this to take place. To change the configuration of your computers to allow this, follow the instructions in this chapter. If your computers are configured with fixed or static addresses and you do not wish to change this, then you should use the Discovery program on the Router CD-ROM to detect and configure your Router. Refer to Appendix A for information on using the Discovery program. Obtaining an IP Address Automatically Windows 2000 Refer to the section below which relates to your operating system for details on how to obtain an IP address automatically. If you are using a Windows 2000-based computer, use the following procedure to change your TCP/IP settings: 1 From the Windows Start Menu, select Settings > Control Panel. 2 Double click on Network and Dial-Up Connections. 3 Double click on Local Area Connection. 4 Click on Properties. 5 A screen similar to Figure 6 should be displayed. Select Internet Protocol TCP/IP and click on Properties. 26 CHAPTER 3: SETTING UP YOUR COMPUTERS Figure 6 Local Area Properties Screen 6 Ensure that the options Obtain an IP Address automatically, and Obtain DNS server address automatically are both selected as shown in Figure 7. Click OK. Figure 7 Internet Protocol (TCP/IP) Properties Screen 7 Restart your computer. Obtaining an IP Address Automatically Windows XP 27 If you are using a Windows XP computer, use the following procedure to change your TCP/IP settings: 1 From the Windows Start menu, select Control Panel. 2 Click on Network and Internet Connections. 3 Click on the Network Connections icon. 4 Double click on LAN or High Speed Connection icon. A screen titled Local Area Connection Status will appear. 5 Select Internet Protocol TCP/IP and click on Properties. 6 Ensure that the options Obtain an IP Address automatically, and Obtain DNS servers automatically are both selected. Click OK. 7 Restart your computer. Windows 95/98/ME If you are using a Windows 95/98/ME computer, use the following procedure to change your TCP/IP settings: 1 From the Windows Start Menu, select Settings > Control Panel. 2 Double click on Network. Select the TCP/IP item for your network card and click on Properties. 3 In the TCP/IP dialog, select the IP Address tab, and ensure that Obtain IP address automatically is selected. Click OK. Macintosh If you are using a Macintosh computer, use the following procedure to change your TCP/IP settings: 1 From the desktop, select Apple Menu, Control Panels, and TCP/IP. 2 In the TCP/IP control panel, set Connect Via: to “Ethernet”. 3 In the TCP/IP control panel, set Configure: to “Using DHCP Server.” 4 Close the TCP/IP dialog box, and save your changes. 5 Restart your computer. 28 CHAPTER 3: SETTING UP YOUR COMPUTERS Disabling PPPoE and PPTP Client Software If you have PPPoE or PPTP client software installed on your computer, you will need to disable it. To do this: 1 From the Windows Start menu, select Settings > Control Panel. 2 Double click on Internet Options. 3 Select the Connections Tab. A screen similar to Figure 8 should be displayed. 4 Select the Never Dial a Connection option. Figure 8 Internet Properties Screen You may wish to remove the PPPoE client software from your computer to free resources, as it is not required for use with the Router. Disabling Web Proxy Ensure that you do not have a web proxy enabled on your computer. Go to the Control Panel and click on Internet Options. Select the Connections tab and click LAN Settings at the bottom. Make sure that the Use Proxy Server option is unchecked. 4 Accessing the Wizard RUNNING THE SETUP WIZARD The Firewall Router setup program is Web-based, which means that it is accessed through your Web browser (Netscape Navigator 4.7 or higher, Internet Explorer 5.0 or higher, or Mozilla 1.2.1 or higher). To use the Setup Wizard: 1 Ensure that you have at least one computer connected to the Firewall Router. Refer to Chapter 2 for details on how to do this. 2 Launch your Web browser on the computer. 3 Enter the following URL in the location or address field of your browser: http://192.168.1.1 (Figure 9). The Login screen displays. Figure 9 Web Browser Location Field (Factory Default) 4 To log in as an administrator, enter the password (the default setting is admin) in the System Password field and click Log in (Figure 10). 30 CHAPTER 4: RUNNING THE SETUP WIZARD Figure 10 Firewall Router Login Screen 5 If the password is correct, the Country Selection screen will appear. Select the country you wish to configure the Firewall Router for, then click Apply. (Figure 11) If your purchased your Firewall Router in the United States, you do not see this screen, as it is automatically set. Figure 11 Country Selection Screen Accessing the Wizard 31 6 When you have selected a country either: The Welcome screen will appear (Figure 12). Select the Wizard tab and click Wizard. or If your Router has not been configured before, the Wizard will launch automatically (refer to Figure 13). 7 Click Next. 8 You will be guided step by step through a basic setup procedure. Figure 12 Welcome Screen 32 CHAPTER 4: RUNNING THE SETUP WIZARD Figure 13 Wizard Screen Password Figure 14 Change Administration Password Screen When the Change Administration Password screen (Figure 14) appears, type the Old Password, then a new password in both the New Password and Confirm Password boxes. 3Com recommends entering a new password when setting up the Firewall Router for the first time. The Firewall Router is shipped from the factory with a default password, admin. 1. Password is case sensitive. Accessing the Wizard 33 2. Write the new password down and keep it in a safe place, so that you can change your settings in the future. Click Next to display the Time Zone setup screen (Figure 15). Time Zone Figure 15 Time Zone Screen Select your time zone from the pull-down menu, check the daylight savings option if required, and then click Next. The Daylight Savings option advances the system clock by one hour. It does not cause the system clock to be updated for daylight savings time automatically. ATM PVC Configuration VPI stands for Virtual Path Identifier - contained in the ATM cell header to designate the virtual path on the physical ATM link. VCI stands for Virtual Channel Identifier - 16-bit field in the header of an ATM cell. The VCI, together with the VPI, is used to identify the next destination of a cell as it passes through a series of ATM switches on its way to its destination. You may select on DSL Auto-connect or enter the values for VPI and VCI. Quality of Service Select the type of QoS from the drop-down list: UBR (Unspecified Bit Rate) with/without PCR (Peak Cell Rate): the UBR service class is intended for delay-tolerant or non-real-time applications, for example, those which do not require tightly constrained delay and delay variation, such as traditional computer communications applications. The 34 CHAPTER 4: RUNNING THE SETUP WIZARD UBR service may be considered as "best effort service". Peak cell rate specifies the maximum cell rate at which the user will transmit. CBR (constant bit rate): the CBR service class is intended for real-time applications, for example, those requiring tightly constrained delay and delay variation, such as voice and video applications. The consistent availability of a fixed quantity of bandwidth is considered appropriate for CBR service. VBR (Variable Bit Rate) is subdivided into a real time (RT) class and non-real time (NRT) class. VBR (RT) is used for connections in which there is a fixed timing relationship between samples. VBR (NRT) is used for connections in which there is no fixed timing relationship between samples, but that still need a guaranteed QoS. Typical VBR sources are compressed voice and video. These applications require small delay variations. Figure 16 The ATM Configuration screen IGMP IGMP stands for Internet Group Management Protocol which is defined in RFC 1112 as the standard for IP Multicast. Select to enable IGMP multicast. Select to enable WAN service and enter the service name to identify your internet service. Connection Mode Select an Internet Addressing mode from the following: PPPoE/PPPoA is required (typically DSL users only) see page 35 IP over ATM (IPoA, using ATM networks as the underlying data link for IP networks, defined by IETF RFC 1577) see page 37 Accessing the Wizard 35 MAC Encapsulation Routing (MER) see page 36 Bridging, see page 38 and click Next. PPPoE/PPPoA Mode Figure 17 PPPoE Screen To setup the Firewall Router for use with a PPP over Ethernet (PPPoE) or PPP over ATM (used mainly in UK) connection, use the following procedure: 1 Enter your PPP over Ethernet/ATM user name in the PPPoE/PPPoA User Name text box. 2 Enter your PPP over Ethernet/ATM password in the PPPoE/PPPoA Password text box. 3 Enter your PPP over Ethernet/ATM service name in the PPPoE/PPPoA Service Name text box. Do not enter anything in this box if your ISP does not require a service name. 4 Select PPP Authentication Method from the drop-down menu. 5 Dial on Demand: Check the box to make a connection while in demand. Enter the Inactivity Timeout to cut off the network connection if there is no activity for this router. 36 CHAPTER 4: RUNNING THE SETUP WIZARD 6 PPP IP extension: Check this box to invoke the PPP IP extension. Only one user is allowed to access the web configurator at one time when this is checked. 7 Use Static IP Address: Check this box to enter the IP Address manually. Check all of your settings, and then click Next. Enable 802.1q Check on this to enable this function. The 802.1q standard defines the VLAN protocol which allows insertion of a 4-byte identifier into the ethernet frame format to identify the VLAN to which the frame belongs. Configuring VLANs helps control the size of the broadcast domain and keeps local traffic local.You can configure the router to router traffic to the appropriate destination VLAN. To specify a VLAN interface, enter the Vlan-id in the field. MER Mode Figure 18 MER screen MER mode is used in business environment where static IP address and subnet are assigned by your ISP. Choose MER and click Next. To setup the Firewall Router for use with a MER connection, use the following procedure: Obtain an IP address automatically: Click this button to make the system get an IP address automatically. Accessing the Wizard 37 Manually entering an IP address: To set WAN IP address by yourself. 1 WAN IP Address: Enter the IP address for using in the WAN from your ISP. 2 WAN Subnet Mask: Enter the WAN subnet mask. 3 Default Gateway: Enter the default gateway for using in the WAN from your ISP. 4 Enter your primary DNS address in the Primary DNS Address text box. 5 Enter your secondary DNS address in the Secondary DNS Address text box. 6 Check all of your settings, and then click Next or back to go back to the pervious screen. 7 Configuring LAN setting: See “LAN Settings” in this section for more information. IPoA Mode Figure 19 IPoA Mode Screen To setup the Firewall Router for use with a IPoA connection, use the following procedure: 1 Enter the IP Address for WAN interface. 2 Enter the Subnet Mask for WAN interface. 3 Enter your Primary DNS Address and Secondary DNS address. Your ISP may provide you with primary and secondary DNS addresses. If they have been provided, enter the addresses in the appropriate text boxes. If not, leave 0.0.0.0 in the boxes. 38 CHAPTER 4: RUNNING THE SETUP WIZARD 4 Enable NAT: Check the Enable NAT to enable this function which will allow more than one PC in the LAN to connect the internet. 5 Click on Next to configure your LAN settings. See “LAN Settings” in this section for more information. Bridging Mode Figure 20 Bridging Mode Screen To set up the Firewall Router for use as a bridge in which the router is the bridge between WAN and LAN, use the following procedure: 1 Enter your the name for the bridging service. 2 Enter the IP Address and Subnet Mask for the LAN. See “LAN Settings” LAN Settings Figure 21 LAN IP Address Screen Accessing the Wizard 39 This screen displays a suggested LAN IP address and subnet mask of the Firewall Router. It also allows you to change the IP address and subnet mask. 1 Primary IP Address: Enter the first IP Address for your LAN interface. 2 Subnet Mask: Enter the Subnet Mask for your LAN interface. 3 Enable DHCP server on the LAN: Check this box to enable the DHCP service on the router. See “DHCP” in this section. 4 Configure the second IP Address and Subnet Mask for the LAN interface: Check this box to make another set of IP Address and Subnet Mask to connect to your router if they are not included in the range of DHCP server. 5 Enter the Secondary IP Address and Subnet Mask. DHCP The Firewall Router contains a Dynamic Host Configuration (DHCP) server that can automatically configure the TCP/IP settings of every computer on your network. Figure 22 DHCP Server Setup Screen To activate the DHCP Server option, select Enable the DHCP server with the following settings: Enter the start and end IP Address of your DHCP range. Enter the leased time in hour to specify the frequency for DHCP assignment.Check the Enable DHCP Server Relay to forward the DHCP request to another server. Enter the IP Address of the designated server. 40 CHAPTER 4: RUNNING THE SETUP WIZARD Wireless Settings Figure 23 Wireless Configuration Screen This screen displays the Channel and Service Area Name. It also allows you to change these settings. There are a maximum of 14 channels, the number available to you is dependent on the country you reside in. Selecting Clear Channel Select from the Channel drop-down list allows the Firewall Router to automatically select an available channel when first powered on. The Service Area Name default for 3Com products is “3Com”. Up to 32 (case sensitive) characters can be entered for the Service Area Name. 3Com strongly recommends that you change the SSID to something other than the default. Click Next when you have finished. If you are configuring the Firewall Router from a wireless computer any changes you make to the wireless configuration will result in communication between the Firewall Router and your computer being lost. This is why 3Com strongly recommends that you configure the Firewall Router from a wired computer. It is very important that you set up your wireless clients to use the same Service Area Name or SSID as the one you use on this screen. If your clients use a different Service Area Name then they will not be able to communicate with the Firewall Router. The choice of channel is less important as Clients will generally search all of the available channels. You should however make a note of the channel you select as this may be useful if you experience problems with your clients. Accessing the Wizard Summary 41 Figure 24 Configuration Summary Screen When you complete the Setup Wizard, a configuration summary will display. 3Com recommends that you verify the configuration information of the Firewall Router and then print this page for your records. Click Finish to display the Wizard completed screen, shown in Figure 25 42 CHAPTER 4: RUNNING THE SETUP WIZARD Figure 25 Wizard Completed Screen If you have made changes to the LAN Settings or wireless configuration options, you may need to reconfigure the computer you are using in order to make contact with the Firewall Router again. Your Firewall Router is now configured and ready for use. For information on improving your Wireless network security see "Wireless Settings" on page 48. See Chapter 5 for a detailed description of the Router configuration screens. 5 ROUTER CONFIGURATION Navigating Through the Router Configuration Pages Main Menu This chapter describes all the screens available through the Router configuration pages, and is provided as a reference. To get to the configuration pages, browse to the Router by entering the URL in the location bar of your browser. The default URL is http://192.168.1.1 but if you changed the Router LAN IP address during initial configuration, use the new IP address instead. When you have browsed to the Router, log in using your system password (default admin). At the left side of all screens is a main menu, as shown in Figure 26 on page 45. When you click on a topic from the main menu, that page will appear in the main part of the screen. Welcome — displays the firmware version of the Router, allows you to change your password, and launch the Wizard LAN Settings — allows you to configure the LAN interface and view the leased DHCP list. Wireless Settings — enables /disables access from wireless computers, configures WPA or WEP encryption, provides facilities for improving the security of the wireless network, setup WMM parameters, Wireless mode selection, and Advanced Wireless Settings. Internet Settings — let you set up the WAN (Wide Area Network) ie. DSL Moden connection. Firewall — allows configuration of the Router’s firewall features: Virtual Servers, Special Applications, DMZ Hosts, SPI options, Internet Access Policy, and Content Filtering. System Tools — allows the administrator to perform maintenance activities on the Router. 44 CHAPTER 5: ROUTER CONFIGURATION Advanced — allows you to monitor and configure the Router’s advanced features, including LAN/WAN setup, DSL, RIP, DDNS, Print Server, IPSec, Certificate, Proxy ARP, and ALG. Management — displays the current status and activity logs of the Router, SNMP enable/disable, Internet service enable/disable, and remote management control. Diagnostics — Testing the connection between your wired and wireless device to your Router. Device Info — Providing the configuration summary and statistics on your LAN/WAN/ATM/ADSL connection. Support/Feedback — contains a comprehensive online help system and allows you to provide 3Com with feedback on your Router. Option Tabs Each corresponding menu page may also provide sub-sections which are accessed through the use of tabs (see Figure 26 for example). To access a sub-section, simply click on the required tab. Getting Help On every screen, a Help button is available which provides access to the context-sensitive online help system. Click Help for further assistance and guidance relating to the current screen. Welcome Screen The Welcome section allows you to view the Notice board and to change your Password. You can also gain access to the Configuration Wizard. (See “Accessing the Wizard” on page 29 for details). Welcome Screen Notice Board 45 Figure 26 Notice Board Screen The Notice Board is used to display the firmware version and configuration warning messages. For example, you would be warned if you had disabled wireless networking or wireless encryption. Password Figure 27 Password Screen 46 CHAPTER 5: ROUTER CONFIGURATION Changing the Administration Password You can change the password to prevent unauthorized access to the Administration System. To do this: 1 Enter the current password in the Old Password field 2 Enter the new password in the New Password field 3 Enter the new password again in the Confirm Password field 4 Click Save/Apply to save the new password The password is case sensitive. If you have forgotten your password you need to reset the Router. See "Reset to Factory Default" on page 69. Wizard Figure 28 Wizard Screen Click WIZARD... to launch the configuration wizard. Refer to Chapter 4 for information on how to run the wizard. LAN Settings 47 LAN Settings Unit Configuration Figure 29 LAN Setup Screen This screen allows you to change the IP address and subnet mask. 1 IP Address: Enter the IP Address for your LAN interface. 2 Subnet Mask: Enter the Subnet Mask for your LAN interface. 3 Enable IGMP Snooping: 4 Enable DHCP server on the LAN: Check this box to enable the DHCP service on the router. The Firewall Router contains a Dynamic Host Configuration (DHCP) server that can automatically configure the TCP/IP settings of every computer on your network. 5 Select Enable the DHCP server with the following settings: Enter the start and end IP Address of your DHCP range. Enter the leased time in hours to specify the frequency for DHCP assignment. 6 Configure the second IP Address and Subnet Mask for the LAN interface: Check this box to make another set of IP Address and Subnet Mask to connect to your router if they are not included in the range of DHCP server. 7 Enter the Secondary IP Address and Subnet Mask. 48 CHAPTER 5: ROUTER CONFIGURATION DHCP Lease Table Figure 30 DHCP Lease Table Screen The DHCP Lease table screen list the client’s name, MAC Address, IP Address and Expiration time which reflects the value specified in DHCP server setting in “Unit Configuration” on this chapter. Wireless Settings The Wireless Settings menu provides options described in the following sections. To improve the security of your wireless network, 3Com recommends that you: 1. Change the SSID from its default value - see page 50 2. Enable Encryption - see page 51 3. Enable Connection Control - see page 57 Wireless Settings Configuration 49 Figure 31 Enabling Wireless Screen Enable Wireless Networking Use this check box to enable or disable the wireless section of your LAN. When disabled, no wireless PCs can gain access to either the Internet or other PCs on your Wired or Wireless LAN through this Router. Wireless Mode Select a mode from the drop-down list to configure your wireless networks. The Router supports 11b, 11g, Super G, and Mixed 11b/11g which is the default. Channel Selection Select a number from the drop-down list to specify which Channel the Router will transmit and receive on. If another access point or Router nearby is using the same Channel as you, there will be a reduction in the performance of your network. If this seems to be the case, you should select a different channel number. Usually the Wireless computers will scan to find the correct channel, but if they don't you must configure them to use the same Channel number as the Router. Valid channels are country dependent. See “Channels” on page 119 for a list of channels approved by each country. 50 CHAPTER 5: ROUTER CONFIGURATION Service Area Name/SSID This allows you to name your Wireless network. The Service Area Name/SSID field will accept any alphanumeric string and has a maximum length of 32 characters. Your Wireless computers must be configured with exactly the same name or you will not establish a connection. The Service Area Name may also be referred to as “ESSID” depending on your networking vendor. By default the Router uses the name “3Com”. 3Com recommends that you change the default name. In order that your wireless computers can connect to the Router, you must: Use Infrastructure Mode, not Ad hoc Mode. Have the same Service Area Name as the Router. Have the same Channel number as the Router. Use the same encryption type and keys as the Router. Ensure that the PC is included in the authorized Wireless PCs list if Connection Control is enabled. See page 57. Enable Broadcast SSID Disable this feature after you have installed your wireless network to improve the security of your network. When the check box is checked, the Router will broadcast the Service Area Name/SSID of your wireless network, which reduces the security of your Router as it allows any wireless client to see your wireless LAN. If you have a wireless client that can detect all the available SSIDs in your area, your client will not list the Router SSID unless this feature is enabled. The clients will still be able to connect, provided that they are supplied with the SSID. 3Com recommends that you install your wireless network with this feature enabled and then disable it once you have set up the Router and wireless clients. After you have finished configuring your Router, click on Save to save your existing changes or Cancel to revert your changes. Wireless Settings Encryption 51 Figure 32 Encryption Screen When setting up wireless networks, it is important to remember that with encryption disabled, anyone with a Wireless PC can eavesdrop on your network. 3Com recommends that you get the network working with encryption disabled first and then enable it as the last step. This will simplify setting up your network. The Router supports two types of encryption: WPA/WPA2/Mixed WPA WPA2 — Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. Both WPA and WPA2 use Temporal Key Integrity Protocol (TKIP), Message Integrity Check (MIC) and IEEE 802.11x. In addition to TKIP, WPA2 also uses Advanced Encryption Standard (AES). The mixed mode will let you choose the encryption mechanism interchangeably with either TKIP or AES. WEP — Wireless Equivalent Privacy (WEP) is a 64 bit or 128 bit encryption method with user configurable fixed keys. 52 CHAPTER 5: ROUTER CONFIGURATION WPA/WPA2/Mixed WPA WPA2 +Radius PSK2+RADIUS features using of a RADIUS server with the pre-shared key authentication method. (This should only be used when a RADIUS server is connected to the Router). WPA provides a higher level of security, provided by its longer key and dynamic changes made to the key over time. 3Com recommends that you use WPA with any clients which support it. If you enable encryption on the Router, you must reconfigure your wireless PCs to use exactly the same Encryption Type and Keys otherwise the devices will not understand each other. The encryption methods used by the Router secure data transmitted through wireless communications between the Router and its wireless clients. Enabling encryption has no security effect on data transmitted through wired (Ethernet) connections or through your connections to the Internet. Configuring WPA/WPA2 Encryption You can choose to use a RADIUS server to authenticate clients, or you can specify a pre-shared key. The pre-shared key is used to start the dialog between the Router and the client. During this dialog, a new key is agreed, making it more difficult to eavesdrop on wireless networks encrypted using WPA, than those encrypted using WEP. To use a RADIUS Server to authenticate each user before they join the network, refer to “Using the Radius Server”on page 53. To set up the pre-shared key, refer to “Using Pre-Shared Passphrase”. on page 54. Wireless Settings Using the Radius Server Figure 33 WPA/WPA2 Encryption Screen - Radius Server To set up WPA/WPA2/Mixed WPA and WPA2 with Radius Server: 1 Select Encryption Method from the drop-down box. 2 Enter the frequency for key generating in seconds. 3 Enter the RADIUS Server IP address. 4 Enter the Server Port. 5 Enter the key for the Radius Server. 6 Click Save to save your changes. 53 54 CHAPTER 5: ROUTER CONFIGURATION Using Pre-Shared Passphrase Figure 34 WPA/WPA2 Encryption Screen - Pre-Shared Passphrase To set up Pre-Shared Passphrase as the WPA Type: 1 Select Encryption Method from the drop-down box. Enter a phrase of between 8 and 63 characters in length in the Pre-Shared key field. This passphrase will be used to generate a 256 bit key dynamically. 2 Enter the frequency for key generating in seconds 3 Click Save to save your changes. Configuring WEP Encryption There are two levels of WEP encryption available, 64 bit (sometimes referred to as 40 bit) and 128 bit. Use the Encryption strength drop-down menu to select the desired level. Encryption Keys Wireless Settings 55 Figure 35 64 bit/128 bit Encryption Keys Screen - WEP Configuration To set up WEP encryption: 1 Select 128 bit encryption or 64 bit encryption from the Encryption Strength drop-down list. 2 Enter the passphrase which can be up to 31 characters long and may contain any alphanumeric characters in the field. 3 Click on the Generate to generate 4 hex keys automatically. Virtually all manufacturers support this scheme. Hexadecimal numbers are formed from 0-9 and A-F. In 64 bit WEP, the passphrase will generate 4 different keys. However, in 128 bit WEP, this method only generates 1 key which is replicated for all 4 keys. If you encounter any difficulty when you enable WEP ensure that you check that each key on your wireless computer is exactly the same as each key on your Router. In other words, Key number 1 on the Wireless computer must have the same Hex number as Key number 1 on the Router, Key 2 on the Wireless computer must match Key 2 on the Router and so on. 4 Select the Current WEP Key, which is the key the Router uses when it transmits. You can change the selected key periodically to increase the security of your network. 5 Click on Save to save your changes. 56 CHAPTER 5: ROUTER CONFIGURATION Some wireless adapters have only one key available on their WEP configuration page. If this is the case ensure it is the same as Key 1 on the Router and that it is selected as the Current WEP key. WMM Wi-Fi MultiMedia QOS (Quality of Service) ensures the quality of service in wireless networks for multimedia applications. 3Com recommends that you leave the settings unchanged if you are not sure with your configuration. Changing the values may lead to unexpected blockages of traffic on your wireless LAN, and the blockages might be difficult to diagnose. WMM provides prioritized media access and is based on the Enhanced Distributed Channel (EDCA) method. Figure 36 WMM Screen Admission Control- There are four types for Classes of Services: BK: Background BE: Best Effort VI: Video VO: Voice Enter the appropriate values for each categories: Wireless Settings 57 CWmin: Minimum Contention Window. Enter a number from 0-10. CWMax: Maximum Contention Window. Enter a number from 0-10. AIFSN: Fixed Slot Time. Enter a number from 0-20. TXOPLimit: Transmit Opportunity Limit. Enter a number from 0-65535 millisecond. ACM/ACK-Policy: Admission Control Policy. Can be enabled or disabled. Connection Control Figure 37 Connection Control Screen A higher level of security can be achieved for your wireless network if, in addition to using encryption, you specify that only certain wireless computers can connect to the Router. By default, any wireless computer that has the same Service Area Name/SSID, channel and encryption settings as the Router can connect to it. To specify that only certain wireless computers can connect to the Router, select permit/prevent, and then enter the MAC address of the wireless clients. If you enable this feature from a Wireless PC, it will automatically be added to 58 CHAPTER 5: ROUTER CONFIGURATION the Authorized Wireless PC list. You may enter a maximum of 40 PCs in the list. Click Save to save your existing configurations or Cancel to discard all changes. The MAC Address must be entered as 6 hexadecimal pairs, for example 12-34-56-78-ef-ab. Advanced Wireless Settings Figure 38 Advanced Wireless Screen The Advanced Wireless Settings gives you more specific and advanced options to configure your Wireless Router. Beacon Interval: This value indicates the frequency interval of the beacon. Abeacon is a packet broadcast by the Access Point to keep the network synchronized. A beacon includes the wireless LAN service area, the AP address, the Broadcast destination addresses, a time stamp, Delivery Traffic Indicator Maps, and the Traffic Indicator Message (TIM). Internet Settings 59 XR Mode: The router embeds the Atheros Super G technology which stretches the performance of a WLAN by enabling long-range connections. Select on the drop-down list to enable this feature. RTS Threshold (Request To Send): Should you encounter inconsistent data flow, only minor modifications are recommended. The threshold (number of bytes) for enabling RTS/CTS handshake. Data with its frame size larger than this value will perform the RTS/CTS handshake. Setting this attribute to be larger than the maximum MSDU(MAC service data unit) size turns off the RTS/CTS handshake. Setting this attribute to zero turns on the RTS/CTS handshake. Enter a value between 0 and 2432.) Fragment Threshold defines a threshold above which the wireless packet will be split up, or fragmented. For a fragmented packet, if transmission of part of it were to be interfered with, only the portion that was successfully transmitted would need to be re-sent. Throughput will generally be lower for fragmented packets, since the fixed packet overhead consumes a higher portion of the RF bandwidth. DTIM Interval: This value indicates the interval of the Delivery Traffic Indication Message (DTIM). A DTIM field is a countdown field informing clients of the next window for listening to broadcast and multicast messages. When the Access Point has buffered broadcast or multicast messages for associated clients, it sends the next DTIM with a DTIM Interval value. Access Point Clients hear the beacons and awaken to receive the broadcast and multicast messages. Internet Settings The Internet Settings let you view your current WAN configuration and modify it. You may also add/delete new configuration. Add a new WAN configuration: please refer to Chapter 4 on “Accessing the Wizard” Firewall On the main frame of the Firewall setup screen is a menu with six tabs: Virtual Servers, Special Applications, DMZ, SPI, Internet Access Policy and Content Filter. 60 CHAPTER 5: ROUTER CONFIGURATION Virtual Servers Selecting the Firewall option on the main menu displays the Virtual Servers setup screen. (Figure 39) Figure 39 Virtual Servers Screen Activating and configuring a virtual server allows one or more of the computers on your network to function as a public server. For example, one of your computers could be configured as an FTP server, allowing others outside of your office network to download files of your choosing. Or, if you have created a Web site, you can configure one of your computers as a Web server, so that others can view your Web site. To configure a virtual server: 1 Click Add open the Virtual Server Settings page. 2 Select a service from the drop-down list or type in your desired services. 3 The commonly used port with the associated service will be entered in the table automatically. You may change them manually. 4 Click Save/Apply to save the settings.And the confirmed entries will be displayed. 5 Click Add to return to the Virtual Server configuration page to enter more entries. The are a total of 32 services can be defined in the Virtual Server. Firewall Special Applications 61 Figure 40 Special Applications Screen Select Special Apps tab to display NAT-Port Triggering Setup screen. (Figure 40) Some software applications require special or multiple connections to the Internet and these would normally be blocked by the firewall. For example Internet Telephony or Video conferences require multiple connections. So that these special applications can work properly and are not blocked, the firewall needs to be told about them. In each instance there will be a trigger port and incoming port(s), where traffic on the trigger port tells the firewall to open the incoming ports. Each defined Special Application only supports a single computer user, and up to 32 Special Applications can be defined. Any incoming ports opened by a Special Application trigger will be closed after five minutes of inactivity. To configure special applications: 1 Click Add open the Virtual Server Settings page. 2 Select a service from the drop-down list or type in your desired services. 3 The commonly used port with the associated service will be entered in the table automatically. You may change them manually. 4 Click Save/Apply to save the settings. And the confirmed entries will be displayed. 62 CHAPTER 5: ROUTER CONFIGURATION 5 Click Add to return to the Special Application configuration page to enter more entries. The Router will automatically allow FTP and NetMeeting sessions. You do not need to configure these as Special Applications. Only one computer on your network can use the special application at any one time. Virtual DMZ DMZ (De-Militarized Zone) Host is a computer without the protection of the firewall. This feature allows a single computer to be exposed to unrestricted 2-way communication from outside of your network. This feature should be used only if the Virtual Server or Special Applications options do not provide the level of access needed for certain applications. To configure one of your computers as a DMZ host, enter the IP address of the computer in the DMZ Host IP Address, and then click Save/Apply. Figure 41 Virtual DMZ Screen Firewall SPI 63 Stateful Packet Inspection (SPI) inspects, and if required blocks packets at the application layer. SPI also maintains TCP and UDP session information, including timeouts and the number of active sessions, and provides the ability to detect and prevent certain types of network attacks such as DoS attacks. Denial of Service (DoS) attacks are aimed at devices and networks with a connection to the Internet. The goal is not to steal information, but to disable a device or network so users no longer have access to network resources. To configure SPI information on your Router: 1 Select Firewall from the main menu, then select the SPI tab to display the SPI screen (Figure 42): Figure 42 SPI Screen Intrusion Detection: Check on the box to enable the Stateful Packet Inspection (SPI), Hacker Pattern detection and Denial of Services (DOS) features to further guard your networks from internet attacks. Web Filters: Check on the box to filter out the internet activities/programs from the following: Proxy, Java, ActiveX, and Cookies. Click on Save to save your changes or Cancel to cancel your changes. 64 CHAPTER 5: ROUTER CONFIGURATION Internet Access Policy Figure 43 The Internet Access Policy Screen The Internet Access Policy screen lets you configure your Router’s access availability according to specified day/time with options in blocking the application, website (URL), and website keywords. 1 Select Access Policy number from the drop-down menu. 2 Enter the Policy Name in the field provided. 3 Select on Status for enabling or disabling this policy. 4 The policy can be applied to a single client or a group clients. To do this, enter the MAC Addresses or the IP Addresses of each PC up to the total number limited by the number of the entries.Or enter the range of PC’s IP Address with the last digits of their IP Addresses. 5 Select on Deny/Allow to specify your restriction types. 6 To change the schedule, check the appropriate check box for each day you want to allow access, and enter the permitted access times for each day in 24-hour clock format. Firewall 65 For example, to allow access Monday through Friday between 9 am and 5 pm, check the check boxes for Mon, Tue, Wed, Thu and Fri, and enter 09:00 and 17:00 in the text boxes next to each of these days. 7 Select on an internet service/application to blocked the service/port number. 8 Type in the Website Accessing by URL Address with the URL that you want to block access from. 9 Type in the Website Blocking by Keyword with the keywords on the URL. 10 Click Save to save the settings or Cancel to discard them. To assign different access rights for different computers: 1 Click on the drop-down menu for a different number of the policy. And follow the previous steps for the rest of configuration. You can create up to 10 policies. URL Filter: To filter a specific site, enter the URL for that site. For example, to stop your users from browsing a site called www.badsite.com, enter www.badsite.com or badsite.com in one of the fields. If badsite.com has multiple sub-domains, such as this.badsite.com and that.badsite.com then you can either: Block them individually by entering this.badsite.com in one field and that.badsite.com in another. or Block them by entering the keyword badsite.com into one of the fields. This will block all URLs containing the string badsite.com. As well as blocking this.badsite.com and that.badsite.com, the keyword badsite.com would block searches that mentioned badsite.com in their domain name, for example www.notabadsite.com. To filter a generic keyword enter it into one of the fields. You should exercise caution when choosing a keyword as many keywords are contained within other words. For example, filtering the word sex would filter the following example URLs: www.sussex.com www.thisexample.com 66 CHAPTER 5: ROUTER CONFIGURATION You can filter up to 4 keywords and URLs. Content Filter Figure 44 The Content Filter Screen The content filter lets your block the websites according to pre-defined categories. You can subscribe to the 3Com Content Filter Service, which enables you to block or allow the URLs of a number of pre-defined categories. The Router comes with a 14-day free trial of the 3Com Content Filter Service. To activate the 14-day free trial of the service, you must first register your Router at www.3com.com. To continue using the service after the trial period, you must purchase the full 3Com Content Filter Service (3CSBCFS). URL filtering rules supersede content filtering rules. If the 3Com Content Filter is blocking certain Web sites that you want to allow, you can add these sites to URL Filter’s allow list To activate Content Filtering: 1 Select Firewall from the main menu, then select the Content Filter tab. Content Filter Screen 2 Check the Enable Content Filter check box. 3 Select the Content Filter Server that you require from the drop-down list. If you select custom entry, enter the server IP address in the text box. System Tools 67 4 Select the Server Timeout value in milliseconds. The default is 3000 milliseconds (3 seconds). 5 Select Allow or Deny for each displayed category, as required. Click Save to save the settings, Test URL to test the connection with the specified content filter server or cancel to discard your changes. System Tools The main frame of the System Tools screen includes four administration items: Restart, Time Zone, Configuration, and Upgrade (Figure 45). Restart Figure 45 Restart Screen If your Router is not operating correctly, you can choose to restart the Router by selecting Restart the Router, simulating the effect of power cycling the unit. No configuration information will be lost but the log files will be erased. This function may be of use if you are experiencing problems and you wish to re-establish your Internet connection. Any network users who are currently accessing the Internet will have their access interrupted whilst the restart takes place, and they may need to reboot their computers when the restart has completed and the Router is operational again. 68 CHAPTER 5: ROUTER CONFIGURATION Time Zone Figure 46 Time Zone Screen Check the Automatically synchronize with internet time servers to read the correct time from NTP servers on the Internet and sets its system clock automatically. You may enter two NTP servers according to your priority. Choose the time zone that is closest to your actual location. The time zone setting is used by the system clock when displaying the correct time in the log files. Click on Save/Apply to apply your settings. Configuration Figure 47 Configuration Screen System Tools 69 Select the Configuration tab to display the Configuration screen (Figure 47). Backup Configuration Click BACKUP to save the current Router configuration. You will be prompted to download and save a file to disk. Restore Configuration Data If you want to reinstate the configuration settings previously saved to a file, press Browse to locate the backup file on your computer, and then click RESTORE to copy the data into the Router's memory. The password will remain unchanged. Reset to Factory Default If you want to reset the settings on your Router to those that were loaded at the factory, click RESET. You will lose all your configuration changes. The Router LAN IP address will revert to 192.168.1.1 and so are the wireless settings, and the DHCP server on the LAN will be enabled. You may need to reconfigure and restart your computer to re-establish communication with the Router. Upgrade Figure 48 Upgrade Screen The Upgrade facility allows you to install on the Router any new releases of system software that 3Com may make available. To install new software, you first need to download the software from the 3Com support web site to a folder on your computer. Once you have done this, select Browse to tell your 70 CHAPTER 5: ROUTER CONFIGURATION web browser where this file is on your computer, and then click Apply. The file will be copied to the Router, and once this has completed, the Router will restart. Although the upgrade process has been designed to preserve your configuration settings, it is recommended that you make a backup of the configuration beforehand, in case the upgrade process fails for any reason (for example, the connection between the computer and the Router is lost while the new software is being copied to the Router). The upgrade procedure can take up to two minutes, and is complete when the Alert LED has stopped flashing and is permanently off. Make sure that you do not interrupt power to the Router during the upgrade procedure; if you do, the software may be corrupted and the Router may not start up properly afterwards. If the Alert LED comes on continuously after a failed upgrade, refer to Chapter 6,“Troubleshooting”. Advanced Selecting Advanced from the main menu displays the following five tabs in your Web browser window: Routing, Static Route, RIP, DDNS, DSL, IPSec, Proxy ARP and ALG. Routing The Routing-Default Gateway screen Check the box Enable Automatic Assigned Default Gateway to automatically assign a gateway to the router. Or you may enter the Default Gateway IP Address in the field provided and select on its associated interface. Advanced Static Route 71 Router supports static route functionality. Select the Static Route tab to display the screen shown in Figure 49 Figure 49 Static Route screen Please enter the following values in the box respectively to specify a static route: Network Address - the network address of the route. If network address and subnet mask are both set to 0.0.0.0, this is the default route. Subnet Mask - the subnet mask of the route. If network address and subnet mask are both set to 0.0.0.0, this is the default route. Gateway - the gateway used to route data to the network specified by the network address. The network interface associated with the IP address. RIP The Router supports the Routing Information Protocol (RIP). RIP allows you to set up routing information on one RIP enabled device, and have that routing information replicated to all RIP enabled devices on the network. LAN and WAN interfaces can be configured independently of each other. Select the RIP tab to display the screen shown in Figure 50 72 CHAPTER 5: ROUTER CONFIGURATION Figure 50 RIP screen Setting Up RIP Check the Enable Global RIP Mode check box check box to configure RIP on the Router.The screen displays RIP information for the LAN interface and WAN interface. To set up or change the information for one or both interfaces: 1 Select one of Disable, Enable or Silent from the Operation Mode drop-down list. If you select Enable, the Router transmits RIP update information to other RIP enabled devices. If you select Silent, the Router only receives RIP update messages. 2 Select either 1 (for RIPv1) or 2 (for RIPv2) from the Version drop-down list. 3Com recommends that you use RIPv1 if there is any RIP enabled device on your network that does not support RIPv2. In all other cases, select RIPv2. 3 Select either Enable or Disable from the Poison Reverse drop-down list. Poison Reverse is a feature that helps prevent data loops. Advanced DNS 73 The DNS Screen The DNS Screen lets you specify your Domain Name Service (DNS) server’s information. You may check the Enable Automatic Assigned DNS for automatically assigned DNS or you may manually specify your DNS server’s IP Address. DDNS Dynamic Domain Name Server (DDNS) enables you to map a static domain name to a dynamic IP address. The Router supports two DDNS providers, TZO.com and DYNDNS.org. Before you can set up DDNS, you must obtain an account, password and static domain name from your DDNS provider. DDNS is disabled by default. 74 CHAPTER 5: ROUTER CONFIGURATION To set up DDNS: Figure 51 DDNS screen 4 Select a DDNS Service provider from the drop-down list. This can be either TZO.com or DynDNS.org. TZO.com If you select TZO.com: 1 In the Host Name text box, enter the host name. 2 In the Interface text box, select the WAN/LAN interface that will be using the DDNS. 3 In the Username/E-mail text box, enter the account name. 4 In the Key text box, enter the account password. 5 Click Apply to make this service active. DynDNS.org If you select DYNDNS.org: 1 In the Host Name text box, enter the host name. 2 In the Username text box, enter the account name. 3 In the Password text box, enter the account password. 4 In the Refresh Time box, enter how often you want the service to automatically refresh, in days. The default is three days. 5 Click Apply to make this service active. Advanced DSL 75 Figure 52 The DSL Setting Screen The DSL Screen lets you configure your DSL connections. Check the boxed for the type of DSL connection that you are using. Select the type of phone line you are using. Also Check the compatibility type. IPSec Figure 53 IPSec Screen Internet Protocol Security (IPSec) is a standards-based VPN that offers flexible solutions for secure data communications across a public network like 76 CHAPTER 5: ROUTER CONFIGURATION the Internet. The Virtual Private Network (VPN) is a popular technology used for communications between two networking sites without the expense of leased site-to-site lines. Click on Add New IPsec to add new IPSec configurations. Select on the dropdown menu and enter the values in the text boxes for settings in your IPSec. Proxy ARP Figure 54 The Proxy ARP Screen Proxy ARP is a variation of Address Resolution Protocol (ARP), in which an intermediate device (in this case, the Router) sends an ARP response on behalf of an end node to the requesting host. Proxy ARP can help decrease bandwidth consumption on slow-speed WAN links and allows a site to use a single IP address for two physical networks. To use proxy ARP, you must have a range of static IP addresses assigned by your ISP. Before configuring proxy ARP on the router, you must Proxy ARP only works when the Router is assigned a static IP address. To configure Proxy ARP: 1 On the menu, click Advanced. 2 Click the Proxy ARP tab. 3 Select the Enable Proxy ARP check box. 4 In IP Range From, type the starting IP address of the IP address range that your ISP assigned to you. Management 77 5 In To, type the ending IP address of the IP address range. ALG Figure 55 The ALG Screen An Application Layer Gateway (ALG) is a SIP Back to Back User agent (B2BUA). An ALG can be used to allow firewall traversal with SIP. If the firewall has it's SIP traffic terminated on an ALG then the responsibility for permitting SIP sessions is passed onto the ALG instead of the firewall. It supports access control restrictions, authentication, encryption, etc Application layer gateways can be made for all application level protocols. They can be used for access control, but also for interworking, for example between IPv4 and IPv6. Session Initiation Protocol (SIP) is a protocol developed by the IETF MMUSIC Working Group and proposed standard for initiating, modifying, and terminating an interactive user session that involves multimedia elements such as video, voice, instant messaging, online games, and virtual reality. Select on the box to enable the ALG feature. Management The management Screen lets you administer your routers with features such as system log, SNMP, Access Control, Remote Management. 78 CHAPTER 5: ROUTER CONFIGURATION Syslog If you have a syslog server on the network, you can configure the Router Point to send the device logs to the server. You may need to configure the syslog server to accept logs from the Router. Figure 56 Syslog Screen To view the current logs: 1 Click on the view the syslogs button. To send the device logs to a syslog server: 1 Click on Configure syslogs. 2 Click on Enable. 3 Select on the drop-down menu for a list of available types of logging activities. 4 Select on the Display Level for a list of available types of logging display. 5 Select on the Mode for logging mode: Local, Remote, or Both. For the remote logging, enter the remote server’s IP address and Port number for receiving the logs. Management SNMP 79 Figure 57 The SNMP Screen Simple Network Management Protocol (SNMP) is the protocol used for exchanging management information between network devices. Click Enable/Disable to enable/disable the agent. To Configure the SNMP: 1 Type the Read Community, which is the password for the incoming Get and GetNext requests from the management station. 2 Type the Set Community, which is the password for incoming Set requests from the management station. 3 Type the System Name for the program. 4 Type the System Location for the program. 5 Type the System Contact for the Contract person’s name. 6 Type the IP Address of the station/device for sending your SNMP traps to. 80 CHAPTER 5: ROUTER CONFIGURATION Trusted Station Figure 58 The Trusted Station Screen The Trusted Station Screen let you add/remove the MAC address of the stations which can access the web administration. Management Remote Management 81 Figure 59 The Remote Management Screen It is possible to administer the Router remotely. Select one of the following options for remote administration: Disable Remote Administration - This option is set as default. Enable administration from a single Internet Host - Only the specified Host IP Address can manage the Router. Any other users will be rejected. Enable administration from a whole subnet - This option allows a number of users within the specified Host Network Address and Subnet Mask to administer the Router. Enable administration from any Internet Host - This option allows any host to access the administration pages. To remotely administer your Router, enter http://xxx.xxx.xxx.xxx:8000 in the location bar of the browser running on the remote computer, where xxx.xxx.xxx.xxx is the Internet IP address of the Router. You may then login using the administration password. 82 CHAPTER 5: ROUTER CONFIGURATION Diagnostics Figure 60 The Diagnostics Screen The Diagnostics Screen lets you diagnose your DSL connection and wired and wireless networkings. Click on the Test button to start testing. Device Info The Device Info Settings menu provides the following options: Figure 61 Summary Screen Summary The Summary screen is used to display the information of your LAN status. Device Info WAN 83 Figure 62 WAN Status Screen The WAN Status Screen is used to display the information of your DSL Connection Status. Statistics Figure 63 Statistics Screen The Statistics Screen is used to display the information of your LAN/WAN/ATM/ADSL Connection Statistics. Click on the button for each connection device for more detailed information. 84 CHAPTER 5: ROUTER CONFIGURATION Route Figure 64 Route Screen The Route Screen is used to display the routing status/information between your LAN and WAN. Refer to “Static Route” in this section for more information. ARP Figure 65 ARP Screen Support/Feedback 85 The ARP screen is used to display the Proxy ARP status. Refer to “Proxy ARP” in this section for more information. Support/Feedback Support Selecting Support/Feedback from the main menu displays the Support and Feedback screens. Figure 66 Support Screen Selecting the Support option on the main menu displays the support links screen, which contains a list of Internet links that provide information and support concerning the Router (Figure 66). 86 CHAPTER 5: ROUTER CONFIGURATION Feedback Figure 67 Feedback Screen Selecting the Feedback option displays the Feedback screen and allows you to provide feedback to 3Com on the operation of your Router (Figure 67). This screen should not be used to obtain technical support. 6 Basic Connection Checks TROUBLESHOOTING Check that the Router is connected to your computers and to the cable/DSL modem, and that all the equipment is powered on. Check that the LAN Status and Cable/DSL Status LEDs on the Router are illuminated, and that any corresponding LEDs on the cable/DSL modem and the NIC are also illuminated. Ensure that the computers have completed their start-up procedure and are ready for use. Some network interfaces may not be correctly initialized until the start-up procedure has completed. If the link status LED does not illuminate for a port that is connected, check that you do not have a faulty cable. Try a different cable. Browsing to the Router Configuration If you have connected your Router and computers together but cannot browse to the Router configuration screens, check the following: Confirm that the physical connection between your computer and the Router is OK, and that the LAN Status LEDs on the Router and NIC are illuminated and indicating the same speed (10Mbps or 100Mbps). Some NICs do not have status LEDs, in which case a diagnostic program may be available that can give you this information. Ensure that you have configured your computer as described in Chapter 3, Setting Up Your Computers. Restart your computer while it is connected to the Router to ensure that your computer receives an IP address. When entering the address of the Router into your web browser, ensure that you use the full URL including the http:// prefix (e.g. http://192.168.1.1). Ensure that you do not have a Web proxy enabled on your computer. Go to the Control Panel and click on Internet Options. Select the Connections tab 90 CHAPTER 6: TROUBLESHOOTING and click on the LAN Settings button at the bottom. Make sure that the Proxy Server option is unchecked. If you cannot browse to the Router, use the winipcfg utility in Windows 95/98/ME to verify that your computer has received the correct address information from the Router. From the Start menu, choose Run and then enter winipcfg. Check that the computer has an IP address of the form 192.168.1.xxx (where xxx is in the range 2-254), the subnet mask is 255.255.255.0, and the default Router is 192.168.1.1 (the address of the Router). If these are not correct, use the Release and Renew functions to obtain a new IP address from the Router. Under Windows 2000, use the ipconfig command-line utility to perform the same functions. If you still cannot browse to the Router, then use the Discovery program on the accompanying CD-ROM as described in Appendix A. Connecting to the Internet If you can browse to the Router configuration screens but cannot access sites on the Internet, check the following: Confirm that the physical connection between the Router and the cable/DSL modem is OK, and that the link status LEDs on both Router and modem are illuminated. Confirm that the connection between the modem and the cable/DSL interface is OK. Ensure that you have entered the correct information into the Router configuration screens as required by your Internet Service Provider. Use the “Internet Settings” screen to verify this. For DSL users, check that the PPPoE or PPTP user name, password and service name are correct, if these are required. Only enter a PPPoE service name if your ISP requires one. For cable users, check whether your ISP requires a fixed MAC (Ethernet) address. If so, use the Clone MAC Address feature in the Router to ensure that the correct MAC address is presented. For cable users, check whether your ISP requires a fixed Host Name. If so, enter the required Host Name in the Internet Settings screen. Forgotten Password and Reset to Factory Defaults 91 Ensure that your computers are not configured to use a Web proxy. On Windows computers, this can be found under Control Panel > Internet Options > Connections. Forgotten Password and Reset to Factory Defaults If you can browse to the Router configuration screen but cannot log on because you do not know or have forgotten the password, follow the steps below to reset the Router to it’s factory default configuration. CAUTION: All your configuration changes will be lost, and you will need to run the configuration wizard again before you can re-establish your Router connection to the Internet. Also, other computer users will lose their network connections whilst this process is taking place, so choose a time when this would be convenient. 1 Remove power from the Router. 2 Disconnect all your computers and the cable/DSL modem from the Router. 3 Using a straight through Ethernet cable, connect the Ethernet Cable/DSL port on the rear of the Router to any one of the LAN ports. 4 Re-apply power to the Router. The Alert LED will flash as the Router starts up, and after approximately 30 seconds will start to flash more slowly (typically 2 seconds on, 2 seconds off). Once the Alert LED has started to flash slowly, remove power from the Router. 5 Remove the cable connecting the Cable/DSL port to the LAN port, and reconnect one of your computers to one of the Router LAN ports. 6 Re-apply power to the Router, and when the start-up sequence has completed, browse to: http://192.168.1.1 and run the configuration wizard. You may need to restart your computer before you attempt this. 7 When the configuration wizard has completed, you may reconnect your network as it was before. Wireless Networking Ensure that you have an 802.11b or 802.11g wireless adapter for each wireless computer, and that it is correctly installed and configured. Verify that each Wireless computer has either Windows 95 or higher or MAC OS 8.5 or higher. 92 CHAPTER 6: TROUBLESHOOTING Verify that your wireless computers are configured to work in Infrastructure mode and not Ad Hoc mode. The Router contains an Access Point that is designed to operate in Infrastructure mode. Ad Hoc mode is not supported by the Router. If you have a wired and a wireless NIC in the same computer, ensure that the wired NIC is disabled. Check the status of the Router Wireless LED, it should be lit if wireless is enabled and will flash when there is wireless activity. If not lit go to “Wireless Settings” and enable wireless networking. Ensure that the TCP/IP settings for all devices are correct. Ensure that the Wireless Clients are using the same SSID or Service Area Name as the Router. The SSID is case-sensitive Ensure that the encryption method and level that you use on your clients are the same as those configured on the Router. The Router can simultaneously support WPA and WEP encryption, but can only support one configuration of each. Ensure that you have the Wireless computer enabled in the list of allowed MAC addresses if you are using Wireless Connection control on the Router. If you are having difficulty connecting or are operating at a low speed try changing the antenna positions on the rear of the Router. For more effective coverage you can try reorientating your antennae. Place one antenna vertically and one horizontally to improve coverage. Additionally consider moving the wireless computer closer to the Router to confirm that the building structure or fittings are not adversely affecting the connectivity. If this resolves the problem consider relocating the Wireless computer or the Router, or trying a different channel on the Router. Sources of interference: The 2.4Ghz ISM band is used for 802.11b and 802.11g. This is generally a licence free band for low power applications, and you may have other devices at your location that operate in this frequency band. You should take care to ensure that there are no devices like microwave ovens for example close to the Router or wireless computers as this could affect receiver sensitivity and reduce the performance of your network. If you are unsure try relocating both the wireless computers and the Router to establish whether this problem exists. Power LED or Power Adapter OK LED Not Lit 93 Most wireless computer Adapters will scan the channels for the wireless Router. If a wireless computer has not located the Router then try initiating a search manually if the client software supports this feature or manually set the channel on your wireless computer to correspond to the Router channel number. Please refer to your Wireless computer adapter documentation and vendor to do this. Speed of connection: The 802.11b and 802.11g standards will automatically choose the best speed depending on the quality of your connection. As the signal quality weakens then the speed falls back to a lower speed. The speeds supported by 802.11g are 54 Mbps, 48 Mbps, 36 Mbps, 24 Mbps, 18 Mbps, 12 Mbps, and 6 Mbps. The speeds supported by 802.11b are 11 Mbps, 5.5 Mbps, 2 Mbps and 1 Mbps. In general the closer you are to the Router the better the speed. If you are not achieving the speed you had anticipated then try moving the antenna on the Router or moving the Wireless computer closer to the Router. In an ideal network the Router should be located in the centre of the network with Wireless computers distributed around it. Applications are generally available with the computer wireless card to carry out a site survey. Use this application to find the optimal siting for your wireless computer. Consult your Computer Card documentation and vendor for more details. Power LED or Power Adapter OK LED Not Lit Check that your Router is receiving power by looking at the status of the Power LED on the front panel and the Power Adapter OK LED on the rear panel: If both LEDs are lit green then the unit is receiving power. If both LEDs are unlit then no power is being supplied to the unit. Check that the power adapter is plugged into a working mains outlet and that the mains outlet is supplying power. If the mains socket is supplying power then the power adapter or power adapter connection may be faulty. See “Replacement Power Adapters” below. If the Power Adapter OK LED is lit but the Power LED is unlit then there may be a fault with your unit. Contact 3Com Technical Support. Check that you are using the correct power adapter for your Router. You should only use the power adapter supplied with your Router. 94 CHAPTER 6: TROUBLESHOOTING Replacement Power Adapters If both the Power Adapter OK LED and Power LED are off, check your power adapter connection. If the mains outlet is working and is capable of supplying power to other devices, contact 3Com Technical Support and ask for a replacement power adapter. Please quote the power adapter part number shown on the OfficeConnect power adapter you are using. Alternatively, quote the part number for your region: Power Adapter Part Numbers Alert LED Part Number Region 3C16760 US and Canada 3C16761 UK 3C16762 Europe and Middle East 3C16763 Australasia (except Japan and Korea) 3C16764 South Africa 3C16766 Japan 3C16767 Korea 3C16768 Argentina The Alert LED will flash when the Router unit is first powered up while the system software checks the hardware for proper operation. Once the Router has started normal operation, the Alert LED will go out. If the Alert LED does not go out following start up, but illuminates continuously, this indicates that the software has detected a possible fault with the hardware. Remove power from the Router, wait 10 seconds and then re-apply power. If the Alert LED comes on continuously again, then a fault has been detected. Locate the copy of the Router software on the accompanying CD-ROM or 3Com web site (http://www.3com.com) and upload it to the Router to see if this clears the fault (refer to “Recovering from Corrupted Software” below). If this does not fix the problem, contact your supplier for further advice. During normal operation, you may notice the Alert LED lighting briefly from time to time. This indicates that the Router has detected a hacker attack from the Internet and has prevented it from harming your network. You need take no specific action on this, unless you decide that these attacks are happening frequently in which case you may wish to discuss this with your Recovering from Corrupted Software 95 ISP. The Router logs such attacks, and this information is available through the Status and Logs screens. Recovering from Corrupted Software If the Alert LED remains permanently on following power-up, it is possible that the system software has become corrupted. In this condition, the Router will enter a “recovery” state; DHCP is disabled, and the LAN IP address is set to 192.168.1.1. Follow the instructions below to upload a new copy of the system software to a Router unit in this state. Ensure that one of your computers has a copy of the new software image file stored on its hard disk or available on CD-ROM. The latest software is available on 3Com’s Web site at: www.3com.com. 1 Remove power from the Router and disconnect the Cable/DSL modem and all your computers, except for the one computer with the software image. 2 You will need to reconfigure this computer with the following static IP address information: IP address: 192.168.1.2 Subnet mask: 255.255.255.0 Default Router address: 192.168.1.1 3 Restart the computer, and re-apply power to the Router. 4 Using the Web browser on the computer, enter the following URL in the location bar: http://192.168.1.1. This will connect you to the Microcode Recovery utility in the Router. 5 Follow the on-screen instructions. Enter the path and filename of the software image file. 6 When the upload has completed, the Router will restart, run the self-test and, if successful, resume normal operation. The Alert LED will go out. 7 Refer to the Installation Guide to reconnect your Router to the Cable/DSL modem and the computers in your network. Do not forget to reconfigure the computer you used for the software upload. 96 CHAPTER 6: TROUBLESHOOTING If the Router does not resume normal operation following the upload, it may be faulty. Contact your supplier for advice. Frequently Asked Questions How do I reset the Router to Factory Defaults? See “Forgotten Password and Reset to Factory Defaults” on page 91. How many computers on the LAN does the Router support? A maximum of 253 computers on the LAN are supported. How many wireless clients does the Cable/DSL Router support? A maximum of 128 wireless clients are supported. There are only 4 LAN ports on the Router. How are additional computers connected? You can expand the number of connections available on your LAN by using hubs, switches and wireless access points connected to the Router. 3Com wireless access points and OfficeConnect hubs and switches provide a simple, reliable means of expanding your network; contact your supplier for more information, or visit: http://www.3com.com/ Does the Router support virtual private networks (VPNs)? The Router supports VPN passthrough, which allows VPN clients on the LAN to communicate with VPN hosts on the Internet. It is also possible to set up VPN hosts on your LAN that clients elsewhere on the Internet can connect to, but this is not a recommended configuration. Where can I download software updates for the Router? Updates to the Router software are posted on the 3Com support web site, accessible by visiting: http://www.3com.com What other online resources are there? The 3Com Knowledgebase at: http://knowledgebase.3com.com Frequently Asked Questions 97 is a database of technical information covering all 3Com products. It is updated daily with information from 3Com technical support services, and it is available 24 hours a day, 7 days a week. 98 CHAPTER 6: TROUBLESHOOTING A Running the Discovery Application USING DISCOVERY 3Com provides a user friendly Discovery application for detecting the Router on the network. Windows Installation (95/98/2000/Me/NT) 1 Insert the Router CD-ROM in the CD-ROM drive on your computer. A menu will appear; select Router Discovery. Discovery will find the Router even if it is unconfigured or misconfigured. Figure 71 Discovery Welcome Screen 2 When the Welcome screen is displayed click on Next and wait until the application discovers the Routers connected to your LAN. 98 APPENDIX A: USING DISCOVERY Figure 72 Discovered Router Screen 3 Figure 73 shows an example Discovered Devices screen. Highlight the Cable/DSL Router by clicking on it, and press Next. Figure 73 Discovery Finish Screen 4 Click on Finish to launch a web browser and display the login page for the Router. B IP ADDRESSING The Internet Protocol Suite The Internet protocol suite consists of a well-defined set of communications protocols and several standard application protocols. Transmission Control Protocol/Internet Protocol (TCP/IP) is probably the most widely known and is a combination of two of the protocols (IP and TCP) working together. TCP/IP is an internationally adopted and supported networking standard that provides connectivity between equipment from many vendors over a wide variety of networking technologies. Managing the Router over the Network To manage a device over the network, the Router must be correctly configured with the following IP information: An IP address A Subnet Mask IP Addresses and Subnet Masks Each device on your network must have a unique IP address to operate correctly. An IP address identifies the address of the device to which data is being sent and the address of the destination network. IP addresses have the format n.n.n.x where n is a decimal number between 0 and 255 and x is a number between 1 and 254 inclusive. However, an IP Address alone is not enough to make your device operate. In addition to the IP address, you need to set a subnet mask. All networks are divided into smaller sub-networks and a subnet mask is a number that enables a device to identify the sub-network to which it is connected. 96 APPENDIX B: IP ADDRESSING For your network to work correctly, all devices on the network must have: The same sub-network address. The same subnet mask. The only value that will be different is the specific host device number. This value must always be unique. An example IP address is ‘192.168.100.8’. However, the size of the network determines the structure of this IP Address. In using the Router, you will probably only encounter two types of IP Address and subnet mask structures. Type One In a small network, the IP address of ‘192.168.100.8’ is split into two parts: Part one (‘192.168.100’) identifies the network on which the device resides. Part two (‘.8’) identifies the device within the network. This type of IP Address operates on a subnet mask of ‘255.255.255.0’. See Table 3 for an example about how a network with three computers and a Router might be configured. Table 3 IP Addressing and Subnet Masking Device IP Address Subnet Mask PC 1 192.168.100.8 255.255.255.0 PC 2 192.168.100.33 255.255.255.0 PC 3 192.168.100.188 255.255.255.0 Router 192.168.100.72 255.255.255.0 Type Two In larger networks, where there are more devices, the IP address of ‘192.168.100.8’ is, again, split into two parts but is structured differently: Part one (‘192.168’) identifies the network on which the device resides. Part two (‘.100.8’) identifies the device within the network. How does a Device Obtain an IP Address and Subnet Mask? 97 This type of IP Address operates on a subnet mask of ‘255.255.0.0’. See Table 4 for an example about how a network (only four computers represented) and a Router might be configured. Table 4 IP Addressing and Subnet Masking How does a Device Obtain an IP Address and Subnet Mask? Device IP Address Subnet Mask PC 1 192.168.100.8 255.255.0.0 PC 2 192.168.201.30 255.255.0.0 PC 3 192.168.113.155 255.255.0.0 PC 4 192.168.002.230 255.255.0.0 Router 192.168.002.72 255.255.0.0 There are three different ways to obtain an IP address and the subnet mask. These are: Dynamic Host Configuration Protocol (DHCP) Addressing Static Addressing Automatic Addressing (Auto-IP Addressing) DHCP Addressing The Router contains a DHCP server, which allows computers on your network to obtain an IP address and subnet mask automatically. DHCP assigns a temporary IP address and subnet mask which gets reallocated once you disconnect from the network. DHCP will work on any client Operating System such as Windows® 95, Windows 98 or Windows NT 4.0. Also, using DHCP means that the same IP address and subnet mask will never be duplicated for devices on the network. DHCP is particularly useful for networks with large numbers of users on them. Static Addressing You must enter an IP Address and the subnet mask manually on every device. Using a static IP and subnet mask means the address is permanently fixed. Auto-IP Addressing Network devices use automatic IP addressing if they are configured to acquire an address using DHCP but are unable to contact a DHCP server. Automatic IP addressing is a scheme where devices allocate themselves an IP address at 98 APPENDIX B: IP ADDRESSING random from the industry standard subnet of 169.254.x.x (with a subnet mask of 255.255.0.0). If two devices allocate themselves the same address, the conflict is detected and one of the devices allocates itself a new address. Automatic IP addressing support was introduced by Microsoft in the Windows 98 operating system and is also supported in Windows 2000. B SAFETY INFORMATION Important Safety Information WARNING: Warnings contain directions that you must follow for your personal safety. Follow all directions carefully. You must read the following safety information carefully before you install or remove the unit: WARNING: The Router generates and uses radio frequency (rf) energy. In some environments, the use of rf energy is not permitted. The user should seek local advice on whether or not rf energy is permitted within the area of intended use. WARNING: Exceptional care must be taken during installation and removal of the unit. WARNING: Only stack the Router with other OfficeConnect units. WARNING: To ensure compliance with international safety standards, only use the power adapter that is supplied with the unit. WARNING: The socket outlet must be near to the unit and easily accessible. You can only remove power from the unit by disconnecting the power cord from the outlet. WARNING: This unit operates under SELV (Safety Extra Low Voltage) conditions according to IEC 60950. The conditions are only maintained if the equipment to which it is connected also operates under SELV conditions. WARNING: There are no user-replaceable fuses or user-serviceable parts inside the Router. If you have a physical problem with the unit that cannot be solved with problem solving actions in this guide, contact your supplier. 100 APPENDIX B: SAFETY INFORMATION WARNING: Disconnect the power adapter before moving the unit. WARNING: RJ-45 ports. These are shielded RJ-45 data sockets. They cannot be used as telephone sockets. Only connect RJ-45 data connectors to these sockets. Wichtige Sicherheitshinweise VORSICHT: Warnhinweise enthalten Anweisungen, die Sie zu Ihrer eigenen Sicherheit befolgen müssen. Alle Anweisungen sind sorgfältig zu befolgen. Sie müssen die folgenden Sicherheitsinformationen sorgfältig durchlesen, bevor Sie das Geräts installieren oder ausbauen: VORSICHT: Der Router erzeugt und verwendet Funkfrequenz (RF). In manchen Umgebungen ist die Verwendung von Funkfrequenz nicht gestattet. Erkundigen Sie sich bei den zuständigen Stellen, ob die Verwendung von Funkfrequenz in dem Bereich, in dem der Bluetooth Access Point eingesetzt werden soll, erlaubt ist. VORSICHT: Bei der Installation und beim Ausbau des Geräts ist mit höchster Vorsicht vorzugehen. VORTSICHT: Stapeln Sie das Geräts nur mit anderen OfficeConnect Gerätes zusammen. VORSICHT: Aufgrund von internationalen Sicherheitsnormen darf das Gerät nur mit dem mitgelieferten Netzadapter verwendet werden. VORSICHT: Die Netzsteckdose muß in der Nähe des Geräts und leicht zugänglich sein. Die Stromversorgung des Geräts kann nur durch Herausziehen des Gerätenetzkabels aus der Netzsteckdose unterbrochen werden. VORSICHT: Der Betrieb dieses Geräts erfolgt unter den SELV-Bedingungen (Sicherheitskleinstspannung) gemäß IEC 60950. Diese Bedingungen sind nur gegeben, wenn auch die an das Gerät angeschlossenen Geräte unter SELV-Bedingungen betrieben werden. 101 VORSICHT: Es sind keine von dem Benutzer zu ersetzende oder zu wartende Teile in dem Gerät vorhanden. Wenn Sie ein Problem mit dem Router haben, das nicht mittels der Fehleranalyse in dieser Anleitung behoben werden kann, setzen Sie sich mit Ihrem Lieferanten in Verbindung. VORSICHT: Vor dem Ausbau des Geräts das Netzadapterkabel herausziehen. VORSICHT: RJ-45-Anschlüsse. Dies sind abgeschirmte RJ-45-Datenbuchsen. Sie können nicht als Telefonanschlußbuchsen verwendet werden. An diesen Buchsen dürfen nur RJ-45-Datenstecker angeschlossen werden. Consignes importantes de sécurité AVERTISSEMENT: Les avertissements présentent des consignes que vous devez respecter pour garantir votre sécurité personnelle. Vous devez respecter attentivement toutes les consignes. Nous vous demandons de lire attentivement les consignes suivantes de sécurité avant d’installer ou de retirer l’appareil: AVERTISSEMENT: La Router fournit et utilise de l'énergie radioélectrique (radio fréquence -rf). L'utilisation de l'énergie radioélectrique est interdite dans certains environnements. L'utilisateur devra se renseigner sur l'autorisation de cette énergie dans la zone prévue. AVERTISSEMENT: Faites très attention lors de l'installation et de la dépose du groupe. AVERTISSEMENT: Seulement entasser le moyer avec les autres moyeux OfficeConnects. AVERTISSEMENT: Pour garantir le respect des normes internationales de sécurité, utilisez uniquement l'adaptateur électrique remis avec cet appareil. AVERTISSEMENT: La prise secteur doit se trouver à proximité de l’appareil et son accès doit être facile. Vous ne pouvez mettre l’appareil hors circuit qu'en débranchant son cordon électrique au niveau de cette prise. AVERTISSEMENT: L’appareil fonctionne à une tension extrêmement basse de sécurité qui est conforme à la norme CEI 60950. Ces conditions ne 102 APPENDIX B: SAFETY INFORMATION sont maintenues que si l'équipement auquel il est raccordé fonctionne dans les mêmes conditions. AVERTISSEMENT: Il n’y a pas de parties remplaceables par les utilisateurs ou entretenues par les utilisateurs à l’intérieur du moyeu. Si vous avez un problème physique avec le moyeu qui ne peut pas être résolu avec les actions de la résolution des problèmes dans ce guide, contacter votre fournisseur. AVERTISSEMENT: Débranchez l'adaptateur électrique avant de retirer cet appareil. AVERTISSEMENT: Ports RJ-45. Il s'agit de prises femelles blindées de données RJ-45. Vous ne pouvez pas les utiliser comme prise de téléphone. Branchez uniquement des connecteurs de données RJ-45 sur ces prises femelles. D END USER SOFTWARE LICENSE AGREEMENT IMPORTANT: READ BEFORE INSTALLING THE SOFTWARE 3Com END USER SOFTWARE LICENSE AGREEMENT YOU SHOULD CAREFULLY READ THE FOLLOWING TERMS AND CONDITIONS BEFORE DOWNLOADING, INSTALLING AND USING THIS PRODUCT, THE USE OF WHICH IS LICENSED BY 3COM CORPORATION (ì3COMî) TO ITS CUSTOMERS FOR THEIR USE ONLY AS SET FORTH BELOW. DOWNLOADING, INSTALLING OR OTHERWISE USING ANY PART OF THE SOFTWARE OR DOCUMENTATION INDICATES THAT YOU ACCEPT THESE TERMS AND CONDITIONS. IF YOU DO NOT AGREE TO THE TERMS AND CONDITIONS OF THIS AGREEMENT, DO NOT DOWNLOAD, INSTALL OR OTHERWISE USE THE SOFTWARE OR DOCUMENTATION, DO NOT CLICK ON THE "I AGREE" OR SIMILAR BUTTON. AND IF YOU HAVE RECEIVED THE SOFTWARE AND DOCUMENTATION ON PHYSICAL MEDIA, RETURN THE ENTIRE PRODUCT WITH THE SOFTWARE AND DOCUMENTATION UNUSED TO THE SUPPLIER WHERE YOU OBTAINED IT. LICENSE: 3Com grants you a nonexclusive, nontransferable (except as specified herein) license to use the accompanying software program(s) in executable form (the ìSoftwareî) and accompanying documentation (the ìDocumentationî), subject to the terms and restrictions set forth in this Agreement. You are not permitted to lease, rent, distribute or sublicense (except as specified herein) the Software or Documentation or to use the Software or Documentation in a time-sharing arrangement or in any other unauthorized manner. Further, no license is granted to you in the human readable code of the Software (source code). Except as provided below, this Agreement does not grant you any rights to patents, copyrights, trade secrets, trademarks, or any other rights with respect to the Software or Documentation. Subject to the restrictions set forth herein, the Software is licensed to be used on any workstation or any network server owned by or leased to you, for your internal use, provided that the Software is used only in connection with this 3Com product. You may reproduce and provide one (1) copy of the Software and Documentation for each such workstation or network server on which the Software is used as permitted hereunder. Otherwise, the Software and Documentation may be copied only as essential for backup or archive purposes in support of your use of the Software as permitted hereunder. Each copy of the Software and Documentation must contain 3Com’s and its licensors’ proprietary rights and copyright notices in the same form as on the original. You agree not to remove or deface any portion of any legend provided on any licensed program or documentation delivered to you under this Agreement. ASSIGNMENT; NO REVERSE ENGINEERING: You may transfer the Software, Documentation and the licenses granted herein to another party in the same country in which you obtained the Software and Documentation if the other party agrees in writing to accept and be bound by the terms and conditions of this Agreement. If you transfer the Software and Documentation, you must at the same time either transfer all copies of the Software and Documentation to the party or you must destroy any copies not transferred. Except as set forth above, you may not assign or transfer your rights under this Agreement. Modification, reverse engineering, reverse compiling, or disassembly of the Software is expressly prohibited. However, if you are a European Union (ìEUî) resident, information necessary to achieve interoperability of the Software with other programs within the meaning of the EU Directive on the Legal Protection of Computer Programs is available to you from 3Com upon written request. EXPORT: This product, Software and/or technical data (collectively "Product") may contain encryption. This Product is subject to U.S. and EU export control laws and regulations and may be subject to export or import regulations in other countries, including controls on encryption products. You agree that you will not export, reexport or transfer the Product (or any copies thereof) or any products utilizing the Product in violation of any applicable laws or regulations of the United States or the country where you legally obtained it. You are responsible for obtaining any licenses to export, reexport, transfer or import the Product. In addition to the above, the Product may not be used by, or exported or reexported to (i) any U.S.- or EU- sanctioned or embargoed country, or to nationals or residents of such countries; or (ii) to any person, entity, organization or other party identified on the U.S. Department of Commerce’s Table of Denial Orders or the U.S. Department of Treasury’s lists of "Specially Designated Nationals and Blocked Persons," as published and revised from time to time; (iii) to any party engaged in nuclear, chemical/biological weapons or missile proliferation activities, unless authorized by U.S. and local (as required) law or regulations. TRADE SECRETS; TITLE: You acknowledge and agree that the structure, sequence and organization of the Software are the valuable trade secrets of 3Com and its suppliers. You agree to hold such trade secrets in confidence. You further acknowledge and agree that ownership of, and title to, the Software and Documentation and all subsequent copies thereof regardless of the form or media are held by 3Com and its suppliers. 108 APPENDIX D: END USER SOFTWARE LICENSE AGREEMENT UNITED STATES GOVERNMENT LEGENDS: The Software, Documentation and any other technical data provided hereunder is commercial in nature and developed solely at private expense. The Software is delivered as ìCommercial Computer Softwareî as defined in DFARS 252.227-7014 (June 1995) or as a commercial item as defined in FAR 2.101(a) and as such is provided with only such rights as are provided in this Agreement, which is 3Com’s standard commercial license for the Software. Technical data is provided with limited rights only as provided in DFAR 252.227-7015 (Nov. 1995) or FAR 52.227-14 (June 1987), whichever is applicable. TERM AND TERMINATION: The licenses granted hereunder are perpetual unless terminated earlier as specified below. You may terminate the licenses and this Agreement at any time by destroying the Software and Documentation together with all copies and merged portions in any form. The licenses and this Agreement will also terminate immediately if you fail to comply with any term or condition of this Agreement. Upon such termination you agree to destroy the Software and Documentation, together with all copies and merged portions in any form. LIMITED WARRANTIES AND LIMITATION OF LIABILITY: All warranties and limitations of liability applicable to the Software are as stated on the Limited Warranty Card or in the product manual, whether in paper or electronic form, accompanying the Software. Such warranties and limitations of liability are incorporated herein in their entirety by this reference. GOVERNING LAW: This Agreement shall be governed by the laws of the State of California, U.S.A. excluding its conflicts of laws principles and excluding the United Nations Convention on Contracts for the International Sale of Goods. SEVERABILITY: In the event any provision of this Agreement is found to be invalid, illegal or unenforceable, the validity, legality and enforceability of any of the remaining provisions shall not in any way be affected or impaired and a valid, legal and enforceable provision of similar intent and economic impact shall be substituted therefor. ENTIRE AGREEMENT: This Agreement sets forth the entire understanding and agreement between you and 3Com and supersedes all prior agreements, whether written or oral, with respect to the Software and Documentation, and may be amended only in a writing signed by both parties. Should you have any questions concerning this Agreement or if you desire to contact 3Com for any reason, please contact the 3Com subsidiary serving your country, or write: 3Com Corporation, Customer Support Information, 350 Campus Drive, Marlborough, MA 01752-3064 3Com Corporation 350 Campus Drive, Marlborough, MA 01752-3064 Copyright © 2006 3Com Corporation and its licensors. All rights reserved. 3Com is a registered trademark of 3Com Corporation. E Information Regarding Popular ISPs ISP INFORMATION WAN Types Characteristics Popular ISPs Dynamic IP Cable modem ISP, non-hostname based. Need to clone the MAC address in the Advanced tab of the Internet Settings page. MediaOne, RoadRunner, Optimum Online, Time Warner, Charter, Adelphia, Metrocast. (Clone MAC) Dynamic IP (Hostname) PPPoE (DSL) PPTP Cable ISP, Requires Hostname to @Home Network, Cogoco, authenticate ie. cx213818-B. Need ComCast, Cox, Excite, Rogers, to enter the hostname in the Internet Shaw, Insight, Videotron Settings page. Usually special software installed on PC, MacPOET/WinPOET, EnterNet 300. The Router has this software built in and you can remove it from your PC. You will need to enter the user name and password that your ISP provided to you in the PPPoE page of the Router. Leave the service name blank unless your ISP requires it. Bell*, Century Tel, Citizens, Primus, Prodigy, Snet, Sprint FC, Verizon, First World, Brightnet, Earthlink, Ameritech, Covad, Mindspring, Sympatico DSL, USwest, Owest, SNet Cable or DSL, always on. Some KPN (Netherlands), Austria European ISPs require a PPTP Telecom tunnel to authenticate their network. 106 APPENDIX E: ISP INFORMATION Static (DSL) Static (Cable) DSL Modem, always on. Need to enter ALL IP information from ISP in the Static IP address section of the Internet Settings page. CableSpeed, Cnet, Direct Link, Drizzle, DSL Extreme, Earthlink Wireless, Fast Point, Flashcom, GTE-WhirlWind, Heavenet, HSA Corp, I-55, InterAccess, LinkLine, Mission, Nauticom, NAS, Omitel, Onterra, Phatpipe, Rhythms, Speakeasy, Sterling, XO, Zyan Cable Modem, Always on, ISP assigns specific IP information which needs to be entered on the “Fixed IP” page of the Router. Cox Cable, Sprint, US Cable, Cable-Cable *Bell includes Bell Advantage, Bell Canada, Bell South, PacBell and Southwestern Bell. GLOSSARY 802.11b The IEEE specification for wireless Ethernet which allows speeds of up to 11 Mbps. The standard provides for 1, 2, 5.5 and 11 Mbps data rates. The rates will switch automatically depending on range and environment. 802.11g The IEEE specification for wireless Ethernet which allows speeds of up to 54 Mbps. The standard provides for 6, 12, 24, 36, 48 and 54 Mbps data rates. The rates will switch automatically depending on range and environment. 10BASE-T The IEEE specification for 10 Mbps Ethernet over Category 3, 4 or 5 twisted pair cable. 100BASE-TX The IEEE specification for 100 Mbps Fast Ethernet over Category 5 twisted-pair cable. Access Point An Access Point is a device through which wireless clients connect to other wireless clients and which acts as a bridge between wireless clients and a wired network, such as Ethernet. Wireless clients can be moved anywhere within the coverage area of the access point and still connect with each other. If connected to an Ethernet network, the access point monitors Ethernet traffic and forwards appropriate Ethernet messages to the wireless network, while also monitoring wireless client radio traffic and forwarding wireless client messages to the Ethernet LAN. Ad Hoc mode Ad Hoc mode is a configuration supported by most wireless clients. It is used to connect a peer to peer network together without the use of an access point. It offers lower performance than infrastructure mode, which is the mode the Router uses. (see also Infrastructure mode.) Auto-negotiation Some devices in the OfficeConnect range support auto-negotiation. Auto-negotiation is where two devices sharing a link, automatically configure to use the best common speed. The order of preference (best first) is: 112 GLOSSARY 100BASE-TX full duplex, 100BASE-TX half duplex, 10BASE-T full duplex, and 10BASE-T half duplex. Auto-negotiation is defined in the IEEE 802.3 standard for Ethernet and is an operation that takes place in a few milliseconds. Bandwidth The information capacity, measured in bits per second, that a channel can transmit. The bandwidth of Ethernet is 10 Mbps, the bandwidth of Fast Ethernet is 100 Mbps. The bandwidth for 802.11b wireless is 11Mbps. Category 3 Cables One of five grades of Twisted Pair (TP) cabling defined by the EIA/TIA-586 standard. Category 3 is voice grade cable and can only be used in Ethernet networks (10BASE-T) to transmit data at speeds of up to 10 Mbps. Category 5 Cables One of five grades of Twisted Pair (TP) cabling defined by the EIA/TIA-586 standard. Category 5 can be used in Ethernet (10BASE-T) and Fast Ethernet networks (100BASE-TX) and can transmit data up to speeds of 100 Mbps. Category 5 cabling is better to use for network cabling than Category 3, because it supports both Ethernet (10 Mbps) and Fast Ethernet (100 Mbps) speeds. Channel Similar to any radio device, the OfficeConnect Cable/DSL Router allows you to choose different radio channels in the wireless spectrum. A channel is a particular frequency within the 2.4GHz spectrum within which the Router operates. Client The term used to described the desktop PC that is connected to your network. DDNS Dynamic Domain Name Server. A method that enables Internet users to tie their domain name(s) to computers or servers. DDNS enables a domain name to follow an IP address automatically when the IP address changes. DHCP Dynamic Host Configuration Protocol. This protocol automatically assigns an IP address for every computer on your network. Windows 95, Windows 98 and Windows NT 4.0 contain software that assigns IP addresses to workstations on a network. These assignments are made by the DHCP server software that runs on Windows NT Server, and Windows 95 and Windows 98 will call the server to obtain the address. Windows 98 will allocate itself an address if no DHCP server can be found. GLOSSARY DNS Server Address DSL modem 113 DNS stands for Domain Name System, which allows Internet host computers to have a domain name (such as 3com.com) and one or more IP addresses (such as 192.34.45.8). A DNS server keeps a database of host computers and their respective domain names and IP addresses, so that when a domain name is requested (as in typing “3com.com” into your Internet browser), the user is sent to the proper IP address. The DNS server address used by the computers on your home network is the location of the DNS server your ISP has assigned. DSL stands for digital subscriber line. A DSL modem uses your existing phone lines to send and receive data at high speeds. Encryption A method for providing a level of security to wireless data transmissions. The OfficeConnect Cable/DSL Router and Wireless Cable/DSL Router offer a choice of encryption methods. See “WPA” and “WEP” for details. ESSID Extended Service Set Identifier. The ESSID is a unique identifier for your wireless network. You must have the same ESSID entered into the Router and each of it's wireless clients. Ethernet A LAN specification developed jointly by Xerox, Intel and Digital Equipment Corporation. Ethernet networks use CSMA/CD to transmit packets at a rate of 10 Mbps over a variety of cables. Ethernet Address Fast Ethernet Firewall See MAC address. An Ethernet system that is designed to operate at 100 Mbps. Electronic protection that prevents anyone outside of your network from seeing your files or damaging your computers. Full Duplex A system that allows packets to be transmitted and received at the same time and, in effect, doubles the potential throughput of a link. Router A device that acts as a central hub by connecting to each computer's network interface card and managing the data traffic between the local network and the Internet. 114 GLOSSARY Half Duplex A system that allows packets to transmitted and received, but not at the same time. Contrast with full duplex. Hub A device that regenerates LAN traffic so that the transmission distance of that signal can be extended. Hubs are similar to repeaters, in that they connect LANs of the same type; however they connect more LANs than a repeater and are generally more sophisticated. IEEE Institute of Electrical and Electronics Engineers. This American organization was founded in 1963 and sets standards for computers and communications. IETF Internet Engineering Task Force. An organization responsible for providing engineering solutions for TCP/IP networks. In the network management area, this group is responsible for the development of the SNMP protocol. Infrastructure mode Infrastructure mode is the wireless configuration supported by the Router. You will need to ensure all of your clients are set up to use infrastructure mode in order for them to communicate with the Access Point built into your Router. (see also Ad Hoc mode) IP Internet Protocol. IP is a layer 3 network protocol that is the standard for sending data through a network. IP is part of the TCP/IP set of protocols that describe the routing of packets to addressed devices. An IP address consists of 32 bits divided into two or three fields: a network number and a host number or a network number, a subnet number, and a host number. IP Address Internet Protocol Address. A unique identifier for a device attached to a network using TCP/IP. The address is written as four octets separated with periods (full-stops), and is made up of a network section, an optional subnet section and a host section. ISP Internet Service Provider. An ISP is a business that provides connectivity to the Internet for individuals and other businesses or organizations. LAN Local Area Network. A network of end stations (such as PCs, printers, servers) and network devices (hubs and switches) that cover a relatively small geographic area (usually not larger than a floor or building). LANs are characterized by high transmission speeds over short distances (up to 1000 metres). GLOSSARY MAC 115 Media Access Control. A protocol specified by the IEEE for determining which devices have access to a network at any one time. MAC Address Media Access Control Address. Also called the hardware or physical address. A layer 2 address associated with a particular network device. Most devices that connect to a LAN have a MAC address assigned to them as they are used to identify other devices in a network. MAC addresses are 6 bytes long. NAT Network Address Translation. NAT enables all the computers on your network to share one IP address. The NAT capability of the Router allows you to access the Internet from any computer on your home network without having to purchase more IP addresses from your ISP. Network A Network is a collection of computers and other computer equipment that are connected for the purpose of exchanging information or sharing resources. Networks vary in size, some are within a single room, others span continents. Network Interface Card (NIC) A circuit board installed into a piece of computing equipment, for example, a computer, that enables you to connect it to the network. A NIC is also known as an adapter or adapter card. Protocol PPPoE PPTP PVC A set of rules for communication between devices on a network. The rules dictate format, timing, sequencing and error control. Point-to-Point Protocol over Ethernet. Point-to-Point Protocol is a method of data transmission originally created for dial-up connections; PPPoE is for Ethernet connections. Point-to-Point Tunneling Protocol is a method of secure data transmission between two remote sites over the internet. Permanent Virtual Circuit. A PVC is a logical point-to-point circuit between customer sites. PVCs are low-delay circuits because routing decisions do not need to be made along the way. Permanent means that the circuit is preprogrammed by the carrier as a path through the network. It does not need to be set up to torn down for each session. 116 GLOSSARY RIP Routing Information Protocol. RIP allows an administrator to set up routing information on one RIP enabled device, and have that routing information replicated to all RIP enabled devices on the network. RJ-45 A standard connector used to connect Ethernet networks. The “RJ” stands for “registered jack”. Server A computer in a network that is shared by multiple end stations. Servers provide end stations with access to shared network services such as computer files and printer queues. SPI Stateful Packet Inspection. This feature requires the firewall to remember what outgoing requests have been sent and only allow responses to those requests back through the firewall. This way, un-requested attempts to access the network will be denied. SSID Service Set Identifier. Some vendors of wireless products use SSID interchangeably with ESSID. Subnet Address An extension of the IP addressing scheme that allows a site to use a single IP network address for multiple physical networks. Subnet mask A subnet mask, which may be a part of the TCP/IP information provided by your ISP, is a set of four numbers configured like an IP address. It is used to create IP address numbers used only within a particular network (as opposed to valid IP address numbers recognized by the Internet, which must assigned by InterNIC). Subnets A network that is a component of a larger network. Switch A device that interconnects several LANs to form a single logical LAN that comprises of several LAN segments. Switches are similar to bridges, in that they connect LANs of a different type; however they connect more LANs than a bridge and are generally more sophisticated. TCP/IP Transmission Control Protocol/Internet Protocol. This is the name for two of the most well-known protocols developed for the interconnection of networks. Originally a UNIX standard, TCP/IP is now supported on almost all platforms, and is the protocol of the Internet. GLOSSARY 117 TCP relates to the content of the data travelling through a network — ensuring that the information sent arrives in one piece when it reaches its destination. IP relates to the address of the end station to which data is being sent, as well as the address of the destination network. Traffic universal plug and play URL Filter VLAN The movement of data packets on a network. Universal plug and play is a system which allows compatible applications to read some of their settings from the Router. This allows them to automatically configure some, or all, of their settings and need less user configuration. A URL Filter is a feature of a firewall that allows it to stop its clients form browsing inappropriate Web sites. Virtual Local Are Network. It states in 802.1q, the VLAN features frame format extensions to support Virtual Local Area Network tagging. A VLAN acts like an ordinary LAN, but connected devices don’t have to be physically connected to the same segment. WAN Wide Area Network. A network that connects computers located in geographically separate areas (for example, different buildings, cities, or countries). The Internet is an example of a wide area network. WDS Wireless Distribution System. A system that can be comprised of a bridging and/or a repeater mode. In wireless bridging, APs communicate only with each other to bridge together two separate networks. In wireless repeating, APs rebroadcast received signals to extend reach and range, at the expense of throughput. The Router uses wireless repeating. WECA Wireless Ethernet Compatibility Alliance. An industry group formed to certify cross vendor interoperability and compatibility of 802.11b and 802.11g wireless networking products and to promote the standard for enterprise, small business and home environments. (see also 802.11b, 802.11g, Wi-Fi) WEP Wired Equivalent Privacy. A shared key encryption mechanism for wireless networking. Encryption strength is 40/64 bit or 128 bit. Wi-Fi Wireless Fidelity. This is the certification granted by WECA to products that meet their interoperability criteria. (see also 802.11b, WECA) 118 GLOSSARY Wireless Client Wireless LAN Service Area The term used to describe a desktop or mobile PC that is wirelessly connected to your wireless network Another term for ESSID (Extended Service Set Identifier) Wizard A Windows application that automates a procedure such as installation or configuration. WLAN Wireless Local Area Network. A WLAN is a group of computers and devices connected together by wireless in a relatively small area (such as a house or office). WMM Wi-Fi Multimedia. The standard, which is a precursor to 802.11e, is meant to improve audio, video, and voice applications over Wi-Fi. The 802.11e standard includes quality of service mechanisms, which will allow network administrators to give priority to traffic such as voice that suffers from delays. WPA Wi-Fi Protected Access. A dynamically changing encryption mechanism for wireless networking. Encryption strength is 256 bit. REGULATORY NOTICES FOR THE ADSL WIRELESS 108MBPS 11G FIREWALL ROUTER Channels Use of the ADSL Wireless 11g Firewall Router is only authorized for the channels approved by each country. For proper installation, login to the management interface and select your country from the drop down list. Table 5 below lists the channels permitted by the local regulatory agencies: Table 5 Channels Channels Country 1 - 13 Argentina, Australia, Austria, Bahrain, Belarus, Belgium, Brazil, Chile, China, Columbia, Costa Rica, Croatia, Cyprus, Czech Republic, Denmark, Finland, France*, Germany, Greece, Hong Kong, Hungary, Iceland, India, Indonesia, Ireland, Israel, Italy, Japan(11g), Jordan, Liechtenstein, Lithuania, Luxembourg, Malaysia, Netherlands, New Zealand, Norway, Paraguay, Peru, Philippines, Poland, Portugal, Russia, Saudi Arabia, Singapore, Slovenia, South Africa, South Korea, Spain, Sweden, Switzerland, Thailand, Turkey, United Kingdom, Uruguay, Venezuela. 1 - 11 Canada, Mexico, Taiwan, United States 1-14 Japan(11b) * The channels available for use in France depend on the region in which you are located. The 3Com ADSL Wireless 108Mbps 11g Firewall Router (WL-553) must be installed and used in strict accordance with the manufacturer’s instructions as described in the user documentation that comes with the product. This product contains encryption. It is unlawful to export out of the U.S. without obtaining a U.S. Export License. 120 This product does not contain any user serviceable components. Any unauthorized product changes or modifications will invalidate 3Com’s warranty and all applicable regulatory certifications and approvals. This product can only be used with the supplied antenna(s). The use of external amplifiers or non-3Com antennas may invalidate regulatory certifications and approvals. Exposure to Radio Frequency Radiation This device generates and radiates radio-frequency energy. In order to comply with FCC radio-frequency exposure guidelines for an uncontrolled environment, this equipment must be installed and operated while maintaining a minimum body to antenna distance of 20 cm (approximately 8 in.). The installer of this radio equipment must ensure that the antenna is located or pointed such that it does not emit RF field in excess of Health Canada limits for the general population; consult Safety Code 6, obtainable from Health Canada’s website www.hc-sc.gc.ca/rpb. This product must maintain a minimum body to antenna distance of 20 cm. Under these conditions this product will meet the Basic Restriction limits of 1999/519/EC [Council Recommendation of 12 July 1999 on the limitation of exposure of the general public to electromagnetic fields (0 Hz to 300 GHz)]. IC Radiation Exposure Statement: This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment. End users must follow the specific operating instructions for satisfying RF exposure compliance. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. US – Radio Frequency Requirements This device must not be co-located or operated in conjunction with any other antenna or transmitter. 3Com declares that WL-553 (FCC ID: O9C-WL553) is limited in CH1~CH11 for 2.4 GHz by specified firmware controlled in U.S.A. 121 US Federal Communications Commission (FCC) EMC Compliance This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help. The user may find the following booklet prepared by the Federal Communications Commission helpful: The Interference Handbook This booklet is available from the U.S. Government Printing Office, Washington, D.C. 20402. Stock No. 004-000-0034504. 3Com is not responsible for any radio or television interference caused by unauthorized modification of the devices included with this 3Com OfficeConnect® ADSL Wireless 108Mbps 11g Firewall Router, Model Number: WL-553, or the substitution or attachment of connecting cables and equipment other than specified by 3Com. The correction of interference caused by such unauthorized modification, substitution or attachment will be the responsibility of the user. Changes or modifications not expressly approved by 3Com could void the user’s authority to operate this equipment. REN (Ringer Equivalent Numbers) Statement 122 ''NOTICE: The Ringer Equivalence Number (REN) assigned to each terminal device provides an indication of the maximum number of terminals allowed to be connected to a telephone interface. The termination on an interface may consist of any combination of devices subject only to the requirement that the sum of the Ringer Equivalence Numbers of all the devices does not exceed 5.'' Attachment Limitations Statement ''Notice: This equipment meets telecommunications network protective, operational and safety requirements as prescribed in the appropriate Terminal Equipment Technical Requirements document(s). This is confirmed by marking the equipment with the Industry Canada certification number. The Department does not guarantee the equipment will operate to the user's satisfaction. Before installing this equipment, users should ensure that it is permissible to be connected to the facilities of the local telecommunications company. The equipment must also be installed using an acceptable method of connection. The customer should be aware that compliance with the above conditions may not prevent degradation of service in some situations. Repairs to certified equipment should be coordinated by a representative designated by the supplier. Any repairs or alterations made by the user to this equipment, or equipment malfunctions, may give the telecommunications company cause to request the user to disconnect the equipment. Users should ensure for their own protection that the electrical ground connections of the power utility, telephone lines and internal metallic water pipe system, if present, are connected together. This precaution may be particularly important in rural areas. Caution: Users should not attempt to make such connections themselves, but should contact the appropriate electric inspection authority, or electrician, as appropriate.'' US Manufacturer’s FCC Declaration of Conformity 3Com Corporation 350 Campus Drive Marlborough, MA 01752-3064, USA 123 (508) 323-5000 Date: April 30, 2006 Declares that the Product: Brand Name: 3Com Corporation Model Number: WL-553 Equipment Type: 3Com OfficeConnect® ADSL Wireless 108Mbps 11g Firewall Router Complies with Part 15 of the FCC rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. 3Com OfficeConnect® ADSL Wireless 108 Mbps 11g Firewall Router Model WL-553 Industry Canada – RF Compliance This device complies with RSS 210 of Industry Canada. Operation is subject to the following two conditions: (1) this device may not cause interference, and (2) this device must accept any interference, including interference that may cause undesired operation of this device. L ‘ utilisation de ce dispositif est autorisée seulement aux conditions suivantes: (1) il ne doit pas produire de brouillage et (2) l’ utilisateur du dispositif doit étre prêt à accepter tout brouillage radioélectrique reçu, même si ce brouillage est susceptible de compromettre le fonctionnement du dispositif. The term "IC" before the equipment certification number only signifies that the Industry Canada technical specifications were met. To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the equivalent isotropically radiated power (EIRP) is not more than that required for successful communication. To prevent radio 124 interference to the licensed service, this device is intended to be operated indoors and away from windows to provide maximum shielding. Equipment (or its transmit antenna) that is installed outdoors is subject to licensing. Pour empecher que cet appareil cause du brouillage au service faisant l'objet d'une licence, il doit etre utilize a l'interieur et devrait etre place loin des fenetres afin de Fournier un ecram de blindage maximal. Si le matriel (ou son antenne d'emission) est installe a l'exterieur, il doit faire l'objet d'une licence. This device has been designed to operate with an antenna having a maximum gain of 2.02 dBi. Antenna having a higher gain is strictly prohibited per regulations of Industry Canada. The required antenna impedance is 50 ohms. Industry Canada – Emissions Compliance Statement This Class B digital apparatus complies with Canadian ICES-003. Avis de Conformité à la Réglementation d’Industrie Canada Cet appareil numérique de la classe B est conform à la norme NMB-003 du Canada. Safety Compliance Notice This device has been tested and certified according to the following safety standards and is intended for use only in Information Technology Equipment which has been tested to these or other equivalent standards: UL Standard 60950-1 CAN/CSA C22.2 No. 60950-1 IEC 60950-1 EN 60950-1 125 EU Compliance This equipment may be operated in AT BE CY CZ DK EE FI FR DE GR HU IE LV LT LU MT NL PL PT SK SI ES SE GB IS IT LI NO CH BG RO TR Intended use: ADSL 108Mbps 802.11g/b Firewall Router For connection to ADSL networks NOTE: To ensure product operation is in compliance with local regulations, select the country in which the product is installed. Refer to 3Com OfficeConnect® ADSL Wireless 108Mbps 11g Firewall Router User Guide. English Finnish Dutch French Swedish Danish Hereby, 3Com Corporation, declares that this RLAN device is in compliance with the essential requirements and other relevant provisions of Directive 1999/5/EC. 3Com Corporation vakuuttaa täten että RLAN device tyyppinen laite on direktiivin 1999/5/EY oleellisten vaatimusten ja sitä koskevien direktiivin muiden ehtojen mukainen. Hierbij verklaart 3Com Corporation dat het toestel RLAN device in overeenstemming is met de essentiële eisen en de andere relevante bepalingen van richtlijn 1999/5/EG Bij deze verklaart 3Com Corporation dat deze RLAN device voldoet aan de essentiële eisen en aan de overige relevante bepalingen van Richtlijn 1999/5/EC. Par la présente 3Com Corporation déclare que l'appareil RLAN device est conforme aux exigences essentielles et aux autres dispositions pertinentes de la directive 1999/5/CE Par la présente, 3Com Corporation déclare que ce RLAN device est conforme aux exigences essentielles et aux autres dispositions de la directive 1999/5/CE qui lui sont applicables Härmed intygar 3Com Corporation att denna RLAN device står I överensstämmelse med de väsentliga egenskapskrav och övriga relevanta bestämmelser som framgår av direktiv 1999/5/EG. Undertegnede 3Com Corporation erklærer herved, at følgende udstyr RLAN device overholder de væsentlige krav og øvrige relevante krav i direktiv 1999/5/EF 126 German Greek Italian Spanish Portuguese Malti Estonian Hungarian Slovak Czech Slovene Lithuanian Latvian Hiermit erklärt 3Com Corporation, dass sich dieser/diese/dieses RLAN device in Übereinstimmung mit den grundlegenden Anforderungen und den anderen relevanten Vorschriften der Richtlinie 1999/5/EG befindet". (BMWi) Hiermit erklärt 3Com Corporation die Übereinstimmung des Gerätes RLAN device mit den grundlegenden Anforderungen und den anderen relevanten Festlegungen der Richtlinie 1999/5/EG. (Wien) 3Com Corporation RLAN device 1999/5/ Con la presente 3Com Corporation dichiara che questo RLAN device è conforme ai requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999/5/CE. Por medio de la presente 3Com Corporation declara que el RLAN device cumple con los requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva 1999/5/CE 3Com Corporation declara que este RLAN device está conforme com os requisitos essenciais e outras disposições da Directiva 1999/5/CE. Hawnhekk, 3Com Corporation, jiddikjara li dan RLAN device jikkonforma mal-tiijiet essenzjali u ma provvedimenti orajn relevanti li hemm fid-Dirrettiva 1999/5/EC Käesolevaga kinnitab 3Com Corporation seadme RLAN device vastavust direktiivi 1999/5/EÜ põhinõuetele ja nimetatud direktiivist tulenevatele teistele asjakohastele sätetele. Alulírott, 3Com Corporation nyilatkozom, hogy a RLAN device megfelel a vonatkozó alapvetõ követelményeknek és az 1999/5/EC irányelv egyéb elõírásainak. 3Com Corporation týmto vyhlasuje, že RLAN device spa základné požiadavky a všetky príslušné ustanovenia Smernice 1999/5/ES. 3Com Corporation tímto prohlašuje, že tento RLAN device je ve shod se základními požadavky a dalšími píslušnými ustanoveními smrnice 1999/5/ES. Šiuo 3Com Corporation deklaruoja, kad šis RLAN device atitinka esminius reikalavimus ir kitas 1999/5/EB Direktyvos nuostatas. Šiuo 3Com Corporation deklaruoja, kad šis RLAN device atitinka esminius reikalavimus ir kitas 1999/5/EB Direktyvos nuostatas. Ar šo 3Com Corporation deklar, ka RLAN device atbilst Direktvas 1999/5/EK btiskajm prasbm un citiem ar to saisttajiem noteikumiem. A copy of the signed Declaration of Conformity can be downloaded from the Product Support web page for the 3Com OfficeConnect® ADSL Wireless 108Mbps 11g Firewall Router at http://www.3com.com. Also available at http://support.3com.com/doc/WL-553_EU_DOC.pdf EU – Restrictions for Use in the 2.4GHz band The device may be operated indoors in all countries of the European Community using the 2.4GHz band: Channels 1 – 13. Brazil RF Compliance Este equipamento opera em caráter secundário, isto é, no tem direito a proteço contra interferncia prejudicial, mesmo de estaçes do mesmo tipo, e no causar interferncia a sistema operando em caráter primário. 127 128 INDEX Enable 802.1q 35 encryption 51 WEP 51 WPA 51 Numbers Firewall 59 SPI 63 Forgotten Password 89 802.1q 35 Access Rights 65 Addresses IP 99 Administration Password 32, 46 Advanced 70 DDNS 73 RIP 71 routing table 73 static route 71 Automatic Addressing 101 Internet addresses 99 IP Address 22, 38, 99 LAN 38, 47 LED 15 Login 98 Channels 119 Configuration backup 69 restore 69 content filtering 66 Conventions notice icons, About This Guide 8 text, About This Guide 8 Country Selection 30 MAC Address modifying 58 Network addresses 99 Networking wireless 89 NIC wireless 15 Nitro Mode 51 DDNS 73, 74 DHCP 39, 47, 83, 101 DHCP Server 27 Discovery Application 97 DNS 26, 37 primary 37 secondary 37 DoS attacks 63 Dynamic IP Address 36, 59 Password 29, 45 PC Privileges 62 PPPoE 28 Radius 53 Radius Server 53 Remote Administration 81 Reset to Factory Defaults 69, 89 Restart 67 RIP 71 setting up 72 Safety Information 20 security remote administration 81 Setup Wizard 29, 46 Special Applications 61 SPI 63 Static Addressing 101 static route 71 Subnet Mask 38, 99 Summary 41 Support Information 85 Support Links 85 TCP/IP 25, 27, 39, 47, 99 Time Zone 33, 68 Unit Configuration 82 Upgrade 69 URL Filter 65 Virtual Servers 59 VLAN 35 Web Proxy 28 Wireless channel selection 49 configuration 49 connection control 57 encryption 51 LED 16 networking 89 NIC 15 service area name 50 settings 40, 48 WMM 56 WPA encryption configuring 52 3Com Corporation, Corporate Headquarters, Copyright © 2006 3Com Corporation. All rights reserved. 350 Campus Drive, Marlborough, MA 3Com and OfficeConnect are registered trademarks of 3Com USA 01752-3064. Corporation. All other company and product names may be trademarks of their respective companies. To learn more about 3Com products and services, visit our World Wide Web site at www.3com.com All specifications are subject to change without notice.
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.6 Linearized : No Encryption : Standard V2.3 (128-bit) User Access : Print, Copy, Extract, Print high-res Page Mode : UseOutlines XMP Toolkit : 3.1-702 Producer : Acrobat Distiller 7.0.5 (Windows) Creator Tool : FrameMaker 7.1 Modify Date : 2006:05:26 08:05:47-07:00 Create Date : 2006:04:11 18:39:44Z Metadata Date : 2006:05:26 08:05:47-07:00 Document ID : uuid:fe7b6d79-dd1f-4991-868c-0993e3fe2ba2 Instance ID : uuid:6bbe9c8c-71da-488d-977d-2aaa81bb68ca Format : application/pdf Title : supergerry.book Creator : Mar_Chen Page Count : 134 Author : Mar_ChenEXIF Metadata provided by EXIF.tools