Loopcomm Technology LP-9186-001 Wireless AP Router IEEE 802.11b/g User Manual
Loopcomm Technology,.Inc. Wireless AP Router IEEE 802.11b/g Users Manual
Users Manual
WLAN AP Router User Manual v1.0 Trademarks Copyright ©1005 Contenm are subject to clung: withom notice‘ All trademarks belong to their respective proprietors. Copyrlgm Shumant nus DOCUMENT CQNYALNS FRONIITARV TBCIIMCAL INFORMATION THAT ls THE normv OF TIIIS COMPANE AND NO PART OI’IHIS DOCUMENTATION MAV BE “PRODUCED, 810le IN A NEVA], sva 0]! TRANSMITTED IN ANY FORM OR BY ANV MEANS. ELECTRICAL OR MECHANICAL BY "(WIDCOPYING RECORDING 0! Ul'llERWIfl-L WITHOUT Till PRIOR WRITTEN CONSENT OI’ THIS come. Flthral Communlcfllon Commission Immune. Summon! Thumipmnmhubunhnod And mwmrywmm Ilmlls lul cm. a new mm, pm-umP-n vw chcRum, rum-mmwmmmmmmwmmlmnmlmmmwum [mlum‘ ms oqlbmem 9mm... nu. am am mm nflo mmy may one. w m mun-u mu mm m acne-dam- wilh m. lmmom. my mum humlul mun-um. m Mic wmmmleafiwl. How-w. mm 1- no cur-rule. M mun-um wll an new! In a pamur inn-mo", mm mum-em m emu mm mum mmmummm. Munbemmfindwmmlmimewlpflmmofilmon. m. mull-mum.» wwwmlmwmdmmg’msum: - mum aloe-u m. rue-Mug mum. - Imluu Iln saw-non mun-m. nqllpmflfilfld mow-f. ~ Cowman»oqllpmontlnlolnWWM-dmdlfimmmntomlmmmwhemmm. - mmnuunn'omcxpomuumvmmmnm. Yhit emu eon-pu- mmmwmm rec Rulu. owukals mwwwmwmmmamomzmmmia mty nu mu rum mamv and (2) ml: um mm mm my Immune. Imam Indudlug Inn-mums mm M own “mind owufiun. FCC cutie". Anya-m or mine-rim; mt manly apprwsd by n- my mpomibh for Wine. could void in m mommy b nnaw mi: swam-m. IMPORTANT NOTE: FCC Radlatlon Exposun smonvom: ml; mum-mac mum wnmmmhrmum mmmmm This owlpm'm mwmmwmmmmammmwmnmmmmmwy Tm- awn-mmmwmaommmmjumflmmmymuamunmm. Ilm‘s Manama A? mln'n Table of Contents REVISION HISTORY W...“ TERMINOLOGY .... ..... mm. mummmmJ I INTRODUCTION... Ll PACKAGE CONTEN'ISA... 1,2 mower srecmcmons 1.3 PRODUCT FEATullES 14 F110)" PANEL Dmmon. 1.5 REAR PANEL Descmmon 2 INSTALLATION......“mama.“mm...........‘.1.T.......I.... 2.1 HARDWAREINSTALLAHONN 2.2 SOFTWAREINSMLLATIONN" 3 SOFTWARE CONFIGURATION m...” 3,1 PREPARE YOUR PC 10 conun THE WLAN AP ROUTER ,. 3.2 CONNECTTOTHE WLAN AP ROUTER 3,3 MANAGEMENT AND CONFIGUMTION on THE WLAN AP Rot/Tm 313.1 Status“ 3.3.2 11 Time Zone Setting, lll LAN Interface Setup rv WAN lmerfm Setup . V Wirelm Basic Setting VI Wireless Security Seq-p, 3.3.3 Opemtion Mode 3.314 Wireless - Basic Settings 313.5 Wireless - Advanced Settings 3.3.5 Wirelm - Semi-y Setup. 1 WEP Key Sen-p ., 33.7 3.348 usnvs MANUALOFWl-AN Ar ann r st Smun‘ty Setu II WDS A? Table 3.3.9 Site Survey. 3.3.10 LAN Interface Selu 3.3.1! WAN lnlerfue Setup 1 Static I? ll DHCP Clien Ill PPPoE . lV PPTP 3.3.12 Firewall - Port Filtering 3.3.13 Firewall - l'l’ Filtering. 13. I4 Firewall - MAC Filtenn 3.3.[5 Firewall - Pan Forwarding, 3.3.16 Firewall - DMZ.. 3.3.17 VPN(0ptiun)Sen.ings I VPN Setup - Edit Tunnel u AdvancedlKE Sen-p. 3.3.18 Management - Smisliw. 3.3,[9 Managerial“ - DDNS 3.3.20 Management - Time Zone Sewing. 3.3.2] Management - Log ..... 3322 Management - Upgrade Finnwzre 3,323 Management Snve/ Reload Settings 3.3.24 Mmlgemenl - Password Selup. 3.3.25 Logan ..... 4 FREQUENTLY ASKED QUESTIONS (FAQ)..- 4,1 WHATAND HOW TO FIND MY PC's lPAND MAC ADM-BS? 4.2 WHAT IS WIRELESS LAN? 4,1 WHAT ARE ISM BANDS? 4.4 How DOES WIRELESS NETWORKING WORK? 4.5 WHAT ls BSSlD? .. 4.6 WHAT IS ESSlD? .. 4.7 WHATMIE POTENTIAL FACTORS THAT MAv CAUSES INTERFERENCE? 4.8 WHATARE THE OPEN SYSTEM AND SHARED KEYAuTHEN'flCATloNs 4.9 WHAT IS WEP 4,10 WHAT [S FRAGMENT THRESHOLD. 4.1 l 4.12 4.13 4.14 4.15 4. 16 4.17 4.1 E 4.19 4.20 4.21 4.22 4,23 4.24 425 4.26 4.27 4.28 Im‘s MANUALOIWLAN Ar RerR Vim-l: m WHAT Is RTS (REQUEST To SEND) THRBHOLD? WHAT IS BEACON INTERVAL” WHAT Is PREAMBLE TYPE WHAT Is SSID BROADCAST] .. WHAT IS WI-FI PROTECTED Access (WPA)? WHAT Is WPAZ? WHAT Is solIxAun-LENTlcmoN? .. WHAT Is TEMPORAL Kev INTEGRITY PROTOCOL (TKIP) WHAT rs ADVANCED ENCRvaN STANDARD (AES)? WHAT Is INTER-ACCESS Pom PROTOCOL (IAPP)? WHAT Is WIRELESS DISTRIBUTION SYSTEM (WDS) WHAT Is UNIVERSAL PLUG AND PLAY (UPNP)? WHAT Is MAXIMUM TRANSMISSION UNIT (MT U) SIZE" WHAT ls CLONE MAC ADDRESS WHAT IS DDNS? WHAT Is NTP CLIENT" WHAT IS VPN. 11mm mummy wum Ar uovrm Revision History 2006/11/17 (mm, Vail-u: m usms unnum- Wu" Arlmm Terminology was a n'ple Data Enoiyp on Standard 7 7 Adi/mood Encrflion Samara American National snaiiqaros lnxiimte 7 n won; , a; , , . lccx ‘Complemeniary Coda Kcying 7l CSMA/gA7 7 7 Carrier S-se7ll7/lultiplc fleeces/Collision Avoidance ‘ 6542/03 Car_ricr Sens7c77MuItipIe74cccss/Co 7 7 7 7 77 777 _ 7 7, onus Dynamic Domain Name Saver l loll ‘Diffic-Hel7lman Algorithm 77 7 ‘ Bynnmic Host7Configl-latlon7ljwloool 7 DRCESWWWFEEM 59°69,“ , Emnsibchuthmficafion Protocol 7; Encapsulaling Sewn'ty Payload l Feoa7ial Com7m7m71ications7§ommissio7rl 77 7 Fi1e7 T7ransfe7r Emmi 7 7 7 7 7 7 . l'lEEE ilnsrinite ofElecm'c-I and Electronic Engineels IKE Immul Key Exchange 77 IP __ Ingmql’mofol 7 7 777 7 7 L154 7 lndnsnial, Scigniific and Medical7 7 77 7 LAN jun-l Am Netwotk 7 7 77 7 7 7 7 5 MAC Media Access Control MD5 Message Digest 5 7 77 777 7 7 77 ‘NAT Wemfl 511de Tran§lat7ion ' 7 7 77i Noiwork rerrninaiion 7 F' '7 7 ‘ 7 7 i New? WWW“! P int to Mn; mmielingivmioool” 7 P 7w7er Spectral D7e7l7lsity “mew-01, ;ssn> A Service sn Identification L0;n,fi TW‘“! 9M me' , , TFTP Trivial File Transfer Pmoool wuvxmnuuopwununmu v-u-um mp fanpomKeyhugfltyhmmlfiVV 7 7 W W, ,,, 777 7» mpg ,_ _ 7 riUniversrll Plugand Phy 7 j VPN Vmuxl Prime waork ,, ‘ WDS Wireless Distribution Sm ' 7 V , WE? “ME‘IE‘W‘MQQYMY W, Y, .‘ ,,, , ,, < \Wvl:A7NW_ 7_Ak;W|rel¢sslncalAreaNenvmk WPA Yvfil’m‘fifiszeia. , J, u fl , . ,, WE nsms mrammvwmn unlrmt Vain-z in 1 Introduction The WLAN AP Router is IEEE 802.11b/g WLAN AP router solution; selling SOHO and enterprise snndard for high performance, secure, manageable and reliable WLAN. This document describes the steps required fertile initial 1? address assignment and other WLAN router configuration. The description includes rne implemenurien enlie above sups. 1.1 Package contents The package of the WLAN AP Router includes ilie following items, 1 The WLAN AP Renter J The AC to DC power adapter '/ The Documentation CD 1.2 Product Specifications Product Name JWLAN AP Roma Standard 302.11b/g(WneIess), 802.3(IOBaseT), 802.3n(100338e‘l') Data Transfer Rate S4M]7ps(ere1ess), IOOMbpsi'Ethemet) Modulation Method CCK(BOZ, 1 1h), 0FDM(802,11g) Frequency Band 42146112 — 24483012 ISM Band, DSSS RF Output Power CCK< 17 dBm, OFDM< 13.5 dBln Receiver Sensitivity 802.111: -80 dBm@10%. 302,11; -68 dBm@8% Operation Range 30 to 280 meters (dependth on surroundings) Antenna External Antenna LED Power. Active (WLAN), Act/Link (Ethemet) Security 64 bill 128 bit WEP, WPA, WPAZ, port filtering, 1? filtering, MAC filtering, port forwarding and DMZ hosting LAN interface One IO/IOOaneT wilh R145 connect!" (WAN) £0“, IOIIOOBaseT with ”45 connenols (LAN) Power Consumption 12V, IA DC Power Adapter Operating Temperature 0 ~ 50“C ambient temperature Storage humeral-ire -20 ~ 70°C ambient lemperamre Humidity 5 to 90 % maximum (non-condensing) Dimension 160x120x30mm mien-t mummy WW A? min-n 1.3 Product Features Vv VVVVVVVVV Vvvvvvvvvv Complies with IEEE 802.11b/g standard for 2.4GHz Wireless LAN. Supports bridging. fouling, er, WIS? functions between wireless and wired Ethernet interfaces. Supports 64—bit and 12847“ WEP, WPA. WPAZ encryption/decryption fimction to protect the wireless data transmission. Supports [EEE 802.11Anthenlication, Support Vii-Pi Protected Access Authentication with Ridills and Pie-Shared Key mode. Supports Inter-Access Point Protocol (IAPP). Supports Wireless Distribution System (WDS). Supports IEEE 802.3x full duplex flow control on lO/l00M Ethernet interface. Supports DHCP server to pmvide clients auto 1? addresses assignment. Supports DHCP client for Ethernet WAN interface auto rr address assigunent. Supports static and dynamic IP routing Suppom PPPaE an Ethernet WAN interfnoe. Supports clone MAC address function. Supports firewall seein'ily with part filler-Eng, [P filtering, MAC filtering, port famrdiug, triggerpnrt and DMZ hosting functions. Supports WEB based management and configuration, Supports PP’l'P Client on Ethernet WAN interface. Supports UPnP for automatic Internet access. Supparts Dynamic DNS service. Suppom NTP client service. Supports log table and minute log service, Support Setup Wm mode. Supports Virtual Private Network (VPN) mutation. Supports mstzc tunnel encryplianGDES/AESIZE) and nulhentication(MD5/SHAI) Supports WISP (Wireless ISP). vmvs mun. ow wun Miami I .4 Front Panel Description (MAR) Viri-l: m 1 vw R u el {49 lldkltorV__ Sinltk" Dflcrlylkl_ ‘ __ 7 ._ M‘_ 1, rowan LED On The WLAN AP Roma: is powened on. 2'. fiKLED" imi“‘3_,_.__._ _,_. ___ 05 No am is transmilling or MEG-"(g on the _ ~~~~~~~ w k “W; _4 ‘A, , __ 3,1.ANLEDAcr _ 7 ,__ 7 "tr— (um-4) On Dam is Innsmitfing or receiving an the LAN ;£°erfl£ ___ ¥ fl _ _A 7‘ Off No data us humming): recelvlng on the IAN interface, _ 4. WAN LED ACl' Flushing Data is transmitting or weeiving on the WAN interface. —on No an}; mefizfieb-Eimon the WAN interface. mum mmumrwun n noun: LS Rear Panel Description mm: m mm: muumww A? normal Vanni: u Push continually the m bunon s~ 10 seconds to reset the configuration parameters to fuelory The Ill—45 socket allows WAN connect on lllrough a Category 5 cable. Support auto-sensing on 10/ IOOM speed and half/ full duplex; comply with IEEE 302.3! 802,3u respectively. 4. LAN 5 Power The R145 sockm allow LAN connection through Category 5 cables Support auto-sensing on 1011 MM speed and halfl filll duplex, comply “E1255? £31): 3/ 801 3u respectively 777777 The power jack allows an external DC 12 v power supply connection The exlemlj AC to DC adupmr provide adaptive power reqnilement to the WLAN AP Router. urn-s MANUALWWmArlmml m m 2 Installation 21 Hardware Installation Slep 1: Place the WLAN AP Router lo the optimum transmission location. The best transmission location for your WLAN AP Router is usually at the geographic center ofyour wireless network, with line ofsign to all of your mobile stations. Sup 2: Connect the WLAN AP Router to your wired nelwork Connect the Ethernet WAN inertia: of WLAN AP Router by category 5 Ethen-let cable to your swilch/ huh/ xDSL modem or cable modem, A sh'aiglit-throltgh Ethernet cable with appmprlm cable length is needed. Step 3: Supply DC power to the WLAN AP Router Use only the AC/DC power adapter supplied with the WLAN AP Router; it my occur dams: by using a different type ofpower adapter. The hardware installation is finished, 2.2 Software Installation > There are no sofiwnre drivers, patches or utilities installation needed, but only the configuration sening. Please refer to chapter 3 for sofiware configuration, um-suwuorwmnnwnu V-nh-zl» 3 Software configuration The web based management and configuration functions allow you to do the slep-by-step easily. The WLAN AP Router is delivered with the following factory default parameters on the Ethernet LAN interfaces. Default 1? Address: 192.168.1‘254 Default IP suhuel mask: 155l255.255.0 WEB login User Name: wry> WEB login Password: W 3,1 Prepare your PC to configure the WLAN AP Router For Mlcroson Windows 95! 98! ME: 1. Click the Mr! Inmon and select Settings. then click Control Panel. The Can/ml Panel window will appear. Note: “findnws Me users may not see the Network control panel. if so, select View all Control Pmd options on the Iefi side oftlle window 2. Move mouse md double-click the right button on Network iwn, The Network window will appear 3, Check the installed list oleorl Convenient. lfTCP/ll’ is not installed, click the Addbutwn to install it; omerwiee go to step 6. 4. Select Protocol in the Network Component Type dialog box and click Add button. Sl Select TCP/lP in Wrong]? of Select Nmork Fromm! dialog box Ihlen click OK button Io install the TCP/lP protocol. it may need the Mlcrosofi “Endows CD to complete the installation. Close and go back toNetwork dialog box afier the TCP/l'l’ inmllation. 6. Select TCP/IP and click the properties button on the Network dialog box. 7. Select Speq'fyan lPaddrm and type in values as following example. I l'PAddress: 192.168‘IJ. lPaddresswithin the range “192,168.” to l92.l68.l.253 is used to connect the WLAN AP Router. 1 IP Sulmet Mask: 255.255.1551) 8. Click OK and reboot your PC mer completing the [P paramelerr setting. For Mlcroson WIndws ZODDIXP: 1. Click the San button and select Settings, then click Control Panel. The Control “ hams mnuuovwmnummn vm in mud window will appear, 2. Move mouse and double—click the right button on Networked Dill—up Connections icon. Move mouse Mid double-click the LocalAm Connection icon. The Local Area Cnnnecn'an window will appear. Click Properties button in the Local/4nd Connection window. 3. Check the installed list of Network Component lfTCP/lP is not inslalled, click the Add button to install it; otherwise go to step 6, 4, Select Protocol in the Network Component Me dialog box and click Add button. 5. Select TCP/lP in Micmsqfl “Sela-(Network Protocol dialog box Ihen click OK billion to install the TCP/IP proloool, it may need the Microsoft Windows CD to complete the installation. Close and go back (0 Network dialog box afier the TCP/lP installation. 6. Select 10/1? and click thepmptrdts onnon on the Newark dialog hon 7. Seleei spam an [roam and type in values as following example. / l'l’Address: 192.168.1J. ll’ addxess Within the Rage of l92,l68.l.1 to 19116811152 is used to connect the WLAN AP Router. / lP Snbnet Mask: 255.155.2551) 8. Click 0K to complete the 11> parameters setting. For Mlcmofl Windows NT: 1. Click the “in lumen and select Settings. then click Cnntml Panel. The Control Paul window will appeu 2. Move mouse and doublNIick the right button on Namath icon, The Newark window will appear. Click hmml tab from the Newark window, 31 Check the installed list omeor/t Pmlawl window. lfTCP/ll’ is not installed, click the Addbulton to install 11; otherwise go to step 61 41 Select Meal in the Network Component 1570 dialog box and click Add 1mm. 51 Select TCP/IP in Micmrofi’ of SdmNem-ork MM dialog box then click OK button to install the TCP/lP protocol, it may need the Microsofl Windows CD to complete the insmllntion. Close and to back to Nmrk dialog box alter the TCP/l'l’ installation. 6. Select raw- and click lhepmpenies button on the Nmork dialog box, 7. Seleei Spcaxv an [Paldnn and type in values as following example. « lPAddress: 192.153.1.1.11> address within the range of 192.168.1Jw 192.168.1253 is used to connect the Wnelees LAN Access Point / 11> Subtle! Mlsk: 1551551554) 3. Click ox to complete the leanrne'er: setting. “ users MANUALOIWLANMROVIER Vuhxln 3,2 Connect to the WLAN AP Router Open a WEB browser, it. Microsofl Internet Explore, then enter 192.168.1154 on the URL to connect the WLAN AP Router. 3.3 Management and configuration on the WLAN AP Router 3.3.1 Status This page shows the currenl status and some basic settings affine device, includes system, wireless, Ed|=met LAN and WAN configuration infonmtion. Access Point Slams Mnfiuhmfihd—i-fiifiufiu, 1: shows me dumion since WLXN A? Router is powmd on, Finnwuu version n shows the fimwnn velsion ofWLAN AP Router. vsn-s swam. 01 mm A! mum Vnhx 1.0 wireless configuration Mode It shows wireless operation mode __ , sin ’ f M 77777 ,_ _, E5115 _ 7 7 Eowxge ssm of smN AP’Romer. The SSID is the unique name of WLAN AP Router and shared among its service area, m 1111 devices mempts to join me same wireless network can identify a. Channel Numb“ I! Show: the winless channel connected cnmntly. Encryption II shows the sums of encryption function _ ~ Miami Clients ll shows flu number of connected clients (or nations. PCs). BSSlD It shows the 135st address ofthc WLAN AP Roma, 135er is s six-by-s address, _ LAN configuring _‘ _ A _ IP Address 1! shows the IP address of LAN interfaces of WMN AP ,. Router. _ Subnel Musk It shows the [P subnct mask of LAN inherfaces of WLAN AP Defil’fl’tidfllcway 7 outgoing data packets QHEgServer lt shuws the DHCP server is enubled or n MAC Addmss I! shows the MAC nidrfis of LAN inlefl‘ Router. WAN configuration Athin 11> Protocol 11 shows how she WLAN AP Rome: gcu me 11> addmss. The IP address can be an manually to a fixed one or set dynamically by DHCP server or main 11> by , s A ,, l?!“ ’ "WSW“ W. A IPAddress 1: shows the 1p addmss ofWAN intesfaee’ZifiAN AP Routen Snbnet Mask 11 shows the 1? subnel mask of WAN 1mm ofWLAN AP ,, , B9B?" ,;,, . “7, fl, is Default Gateway 11 shows the defauk ganeivsy se-nng‘forix'lnN invades 77 fl ‘ outgoing dam mkfls MAC Address 1: shows the MAC address ofWAN interface ofWLAN AP Rowen 10 MANUAL on mm A lama 3.3.2 Setup Wizard This page guides you to configure Wireless A? muler for fim time Setup Wand mmmfl—l-ynhwm-p—lmhh.hmflpvfin~filnyq n, m—u—w—u mmaflF-wh~uym-m |. wand-um z floaty-INT- : mun-m 4 WWMH‘: s tau-"mm s Wat-“Mun. WM 1 Operation Mode This page followed by Setup Wizard page to define Ihe opemion mode. l. Opzulion Mode Yum-Mm-fihwnmmmflAT-lmm g m hfi—Aulfi’nhwn—aum—qnmwfin mun-mun hwmflfimflhlflw wmmm—uwmu-u.vmmw_mm “Wei-crash. o W hfinnumuwwn-«uwuxm M-wu-Wmmhfin—fi—Inmw 0 mm u—u‘n—nw-wnwuu-‘muua mhflmmmmxiMMKI-“mmfl- murmur-”mm: Yu—n‘u-quuhuh du—nflun’MEW-yw mmwuuma wmmnuqmwamu-mm E-En-E} ode wars mnuuovwm AP nume- 11 Time Zone Setting This page is used to enable ml configlue NT? client 2. Time Zane Setting Ynen-fimumhwmm-Mwlmm n human-1.1.- link-lune: m": «Baa: H M» II] LAN Interface Setup Venn-z m This page is used to configure local area network IP address and subnet mask 3. LAN Interline Setup Mnnud-nfl—ummhhanMn—ofiummmdm mumumqmmu—unmm—qm,‘ nu..." Thing ,» am...» 5—‘ngzgo J [E- “fl vsu-s mun. ow wLAnulmrm m: u IV WAN Interface Setup This page is used to configure WAN access iype 4. WAN Interface Setup mwuuua‘m-mhummwmuwmmdm MPfiH—y—nlflfi-fifimmulfitfl.m,mumiyflmh vacuum-"m mun-nap mm‘ can“ [rd-i» Mm V Wireless Basic Settings This page is used to configure basic wireless parameters like Bum], Mode, Network Type SSTD, Channel Number, Enable Mac Clone(Single Ethernel Clienl) Wirelm Basic Belting; mu-uu-u-u—um-wnu-u—m h-hhnntnv-m-fi-fl-‘fi— mum-an...“ n “Wham-“inlaid“ man-u..- L ' ' j 13 Wt!" mmumrwun u IWI'EI VI Wireless Security Setup This page is used to configure wireless security 6. Wireless Seculity Setup mmmmm—wiuun-iyJ—nm-wnnnqmm mmqwmummnm ham-Ag] (E-(E St: W Ie 3.343 Operation Mode This page in used to configure which made wireless AP router acts Opcnn'un Mode y-nwm—uu-wuwmmmunhm a a.” hfi—ghmhwumun—mmm man.—....m.w,.._...—m.m..m- mmmwnum.wm~vy—gmmu mm...» o ..,,,. hmmuhmuw-anwumr a...uuuuwmmn.a--4m..uw o mu...“ hmsfi‘m—umnww-‘hmfl-fl munmw.mmunuum-Mmmn _rummmw Vu-nufiwfi-uanuh Mu-mflM-m~.mmwmkmn wumbyuqmwe-trmmumn. ENE Screen snapshot - Dpemtion Mod: Gateway Traditional gateway configuration. ll always connects intern“ via ADSl/Cnble Modem LAN inmfm‘ WAN “ 14 nus-vs mwumwunnmmn Vern..- interface, Villeless interface, NAT and Firewall modules . 7, is, a ,, fiffiflflWfli s ,__ “in, M 7 Bridge Each interface (LAN, WAN and Wireless) regards as bridge, NAT, Firewall and all mum's firnerians are not . W A, 7 a, , ‘Wfi‘lnid,__ s_. fiukfwm 77“ Wireless [SP Elwin wireless interface WAN pot! and all Ethernet ports in bridge mode. Wireless intexfipe can (30 all router‘s functions Apply Changes Click thieApply Changes lumen on complete the new configuntion selling. Reset Click the Rem button to nbcn change and recover the pmious configuration setting. 3.3.4 Wireless - Basic Settings This page is used tn configure the parameters for wireless LAN clients that my connect to your AP Rowen Hm ymn may change wireless encryption setting as well as wireless network pammetels. Wireless Basic Seninu m—lfihn‘hmh'fiwhuw—bn A.M-l--mq-~n¢-fi-~~a unsung—an I: umb—um-n-a—M man-run. C' ll to disable the wireless LAN data Innsmissiom Disable Wireless LAN Click 0 Interface Band Click to select Z.4GHzl(B) / 244GH2(G) / 2.46Hz(B+G) “is mm mammary/unaware Van-nu Mode Click to select the WLAN AP/ Client / WDS / AP+WDS ., .. w A 71ifilefill°€iw m, ._ m_v,,, _ , . WM ,, Site Survey The Sin Survey button provides tool to won the wireless network. "any Access Point or IBSS is found, you could choose Io meet it manually when client mode is enabled, Refem 11mm SSlD ll is the whales network name. The SSll) can be 32 bytes long _ Channel Number Select the wireless communimtion channel from pull-down menu Associated Clients Click the ShawActive Clients button to open Active Wireless Client Table that shows the MAC nddmss, Innsmil-packet, receive-packet and transmission-rule for each associaxed wireless client, bane Mee Clone Take Laptop NIC MAC address u wireless client MAC (Single Ethernet Client) address, [Client Made only] Apply Changes Click the Apply Changes button to oomplete the new _ ¥ 77 _> configuration setting Reset Click Ihe new human to abort change and recover the previous configuration setting, W __ 3,3.5 Wireless -Advanced Settings These settings are only for more technically advanced users who have : suficient knowledge about wireless LAN These settings should not be changed unless you know whal effect the changes will have on your WLAN AP Router. 16 um-s mmumv wun n mun! Wireless Advanced Seltlngs m.u—p-qh-Mn_«mmm.u_mmw w. Mm.mmnuwunmmnnw—m-mm» mm can»... ass-«w em. r-v—nnflk mum-m: he.“ nth-m Mm mm mun-u... Authenncation Type Click to select the authentication type in Open mm, W ‘ i _ Shamlxey 0mm selection, _A Fragment Threshold Set the data packet fragmentation llumhold, value can be written between 256 and 2346 bytes. Refer w i-Mamfimmqu RTS Thmhold Set the RTS Threshold, value can be written between 0 and 2347 bytes. ‘ 7A 7 ”7 _ 7 __Refeftg4l ‘ T eslT 317 Beacon Interval Set the Beacon lntervnl value can be written between 20 and 1024 ms. Refer to 4 zwnm '§ 3mm! lntem 7 Data Rate Selm the mnsmission data we fivm pull—down menu. Data rate can be unto-select, llM, 5.5M‘ 2M or leps. humble Type Click to select Ihe Long Preamble or Short Preamble support cm the wireless data packet transmission. limdcafl Ssm Click lo enable or disable the SSID broadcast fimction. Refer to 4 29 What '3 [mg-5995; Pg'm mam (IAPPfl 17 m1mnmwrm~ A? mourn v“: u 802.115 Proteetion Protect 802.1 lb uscr. Apply Changes Click the Apply Change: human 00 complete the new configmalion setting. Reset Click the Rest! human m abm't change Ind “cover Ihe previous configumion setting. 3,3.6 Muless - Security Setup This page allows you setup the wireless security “him on W'EP, WPA, WPAZ by using encryption keys could prevent any unauthorized access m your wimless network, Wirelzss Security Setup m~wayn~m~ifi~mlq m-ww-wAvy-s‘qswp—lmuu wqmmnlynii‘u“ m a; j semwm ; EMMA“ warm, wanna mum-m u—nmm "manna-mm) “Mmm.w,...-mm_ [El nsna ol—W' ' Sam Se on the encrypuon supported over wn-elws am. Fe encryption method can be None. WEP. WPAfl'KIP), WPAZorWPAZMixed Referw4QEhAQ'5 flag 4 IQWhali§M-F’ Wm Em ? Al “SW? 7 Q I Z EM is 302.1X Angm’mign’ Mm 4 ' v Enc I8 mwmnolrwm nrmmu vmx u Use 802i Ix While Encryption is selected to be WEP. Authentication Click me check box to enable IEEE 802.11 authentication function. Refer tn 4.16 What is 802.1x Authentication? WPA Authentication While Encryption is selected to be WPA, Mode Click to select the WPA Authentication Mode with Enterprise (RADIUS) or Personal (Pm-Shared Key), Refer w A” What i; fli-Fi M AM WPA 7 Freshmen Key Format While Encryption is selected to be pr. Select the Pre-shared key format from the pull—down menu The format can be Passphrase or Hex (64 chum-s» lwm “BE“(PES'1E’5'MLWXL, Pre-Slured Key Fill in the key value [WPA, Pemnakl’re—Sllared Key) only] Enable Click to enable Pris-Authentication. lerz/wmz ."‘"‘"L‘“‘E"E°°‘5€"L Mifsdsflh EBWLwflxL e A _ A, ,. _ _ Authentication 5c: the IP address, port and login Mord information RADIUS Sewer ohmhentication moms sever. Apply Changes Click theApply Changes hnnon to enmpleie the new . n _ _, , _ ¥73flfimsfiml _ _ — Reset Click the Rue! lninnn to abort change and recover if previous configuration setting. 19 vim-s mum on wun u mural I WEP Key Setup Wimless WEP Key Setup MnmnmfiWh‘hvmmflwfiwalnb-km nuanmcnailncemdn—vn I'll-at Key Length Select the WE? shared secret key length from pull-down menu. The length can be chose between 64-bit and [28—bit (known as “WEP2") keys. The WEP key is composed “initialization vemr (24 bits) and secret key (40-bit or IN-hit), Key Format Select the wrap sir-red mm key format from pull-down menu. The format can he chose between plant text (ASCII) and hexadecimal (HEX) code, Default Tx Key Set the detail]! secret key [or W? security function , , . . , , Y,“E°1"l”.£‘!°fl°‘l“£ljfiflt 7fi. Encryption Key I Secret key 1 ofWEP security encryption function. Encryption Key 2 Secret key 2 ofWEP semirity encryprien function, Encryption Key 3 Secret key 3 of WEP security encryplion function. Click theAppIy Cherry: bmmn to cmriplete the new ’ configuration setting, Click to clg this WEP Key setup window. 7 Chill the mm bug to abqn chungeartd recover the “ usu's muopwun Ar now-n previous epnfigumuon smug1 WEP enclyption key (mm key) length: 3.3.7 Mrcless - Access Comm] If you enable wiulm mess comm]. only those clienls whose wirelm MAC addresses an in the access control list will be able to connect to your Access Point. When this option is enabled, no wireless clients will be able (0 oonnefl if the list wnlains no entriesl Wirelzss Access Colml vy-mww.qmo—n--—unmm—.nmmu wlu‘nn-uny—M mmmualmunmu-un fl—Mmumflm m Wireless Access Chck the Duablzl, 11W Lulzdgbmy Listed ofdmp Control Mode dawn mtnu choose wireless access own-01 mode. This is a security conunl function; only those clients registered in the access control list can link 10 this WLAN AP Router, MAC Adm Fill in the MAC addmss of client to register this WLAN 2! van-s mnmwrwun ummn Valli: u AP Router am capability. new configuration setting Rout Click the Rue! button in short change and recover Ihe pmious co gumticm selling, and Access Contml 1: shows the Ngistel'ed clients um are allowed to link to List this WLAN AP Renter. Delete Selccwd Click to duet: the sclemd clients that will be access 7 rigln unwed from this WLAN AP Routet. Delete All Click la delete all the registered clients mm the nmss 777 7 _ fallowed hit. ¥ 77 _ , F 7777, Rem ' ' Hit" the mine: an; to new“; an} Yemen the pxwious configuration setting, fimum 7 3.3.8 W'DS Settings Wireless Distribution System uses Wil‘ltSS media in communicate with otllct APS, like the Ethernet does. To do this, you must set these Al’s in the same channel and set MAC addla'ys ofmhcrAPIhxt you want to communicate with in the table and then enable the WDSA wns Setting: mun-Mm-finnfiummmmhfih—imJ-u fiwflan-nme—iumWMnrdQ-MMy-lv-h c—dn-mhs'ufi—n-ndnhm Elan-cm mmm mu—F'_ "77m- Wfim 1s-mq|mm mun-Arne —Ec@ ot~ 22 nun-s mnmmpwun A? mm: W n Enable WDS Click the check box to enable Wireless distribution sysiem- Refer to MM M12 MAC Addms Fill in the MAC addl‘ess oiAP to regime: the winlzss __ » distribution system mess “palm-y. 7 pommem _ __ A Fill in ll_1e comment mg for the regism’od AP. _ Apply Changes Click the Apply Changes button 10 register mm? to new A» configunlion setting. Reset Click the Rafi bumm to abort change and recover the previous canflgmllon setting. Sel Security Click butum to configure wireless securily likg WEP(6lbik), WEHIZBMIS), WI’AH‘KIP), WPAZMES) , , , ‘."'fi"!L,,, ,,,,,,,,,,, _4 ”W” Show Sminics It shows the TX, Rx packets, rate statistics Delele Selecled Click Io delete tho selected clients that will be removed fronlflw tireless dlflfibut—igll syslem. 03m All " Click lo delete all the registered Al’s fromim wlleloss dish-lbnllan syswm allowed lisl. Rem Click the Run butlon to abort change and recover the Vprcvious configuration searing? 7 7 WDS Security Setu. 23 “ZIP! MANUAL okunumunn Var-Mal: m wns Security Setup mwmmiqmw‘nmhmm-‘ummm mmwumumummmmum. II WDS AP Table This page is used in show was statistics WDS AP Table mmmummxwmmmmmm Mmmwm MAC Address It showsithe MAC _Add.rgss within VLDS. Tx PEG; 7M “ ltshows flwmfisfic oouiiofseni packefiane wireiés‘s' 7_ M w LAN interface. __ A» Tx 15mm It shows flie mastic count ofermr sent packets on the _v_ Wmless LAN interface. Rx mm It shows «he statistic count ofrcceived packets on the wilelgs LAN interfacei mumuormnu-mn v-m- u Tx Rm (M'hrps) It shows me wirelm link rale within wns. Ben” 3,349 Site Survey This page is used 10 view or mnfigure me: APs near youtsl Wirelcs Site Survey mnwfinflbnhfiuruhmum-Hnnflwbmk “fink-tn“ It shows lhe SSI'D ofAP. lass") 77 7 7. 7 7 7h lam/3 assrg ofAP._ 77 7 9M, . , laahmlzsimzzcmslflm Type ltxhnwwhich lypeAPams. Encrypt It shows flue encryption slam; $31.31 , 777 7 7 7 _ll shows the p_ower level ofct7l7rl'vnt Alf, 717777777 Select ' _ Click a; select AP or client you‘d like w comm. Refresh Click the lie/ml: mm. m re-scan site survey on the 7 screen. Connect ‘ Click the Come; may.» mam, can-mien. 3.3.10 LAN Intel-I‘m Setup This page is used to configure the pammelm for local area network that connects to the LAN porls ofyour WLAN AP Routel: Here you may 25 Um‘l MANUAl-OIWLANMlOlfllR Vent-en change lhe selling for IP address, subnel mask, 13ch etc, LAN Ilmfwe Sewn hum-m...- uu...—.a..~.a.u. . -A—h-l- —- ammonia—"A - . .... inn-Tu a...“ assume 3 SM mapshot —LAN lmgrfwe sung lPAddress Fill in the IP address ofLAN inlet-flaws ofthis mm Rowen siihnet Mask Fill in the mlmet mask ofLAN interfaces onhis WLAN AP Router, _ Default Gateway Fill in the derauh gateway for LAN interfixces out going due packetsi DHCP Server Click to select ambled, Client or Server in different operation mode ofwirelm AP mun DHCP Clienthange Fill in the sun IP address and end [P addrm lo allncm a lange ofTP addresses; client with DHCP function set will Show Client cave DHCP Client mu window that shows the active clienls with their assigned u> address, MAC address and time expired information. [Server so: ld shim}; Zriee ' EeléEEei-xble or disable the [EMS 802.1d Spanning , 7 7 m e , __ Eificg’lfi‘lmflflflflmfl“; a fi _ _. _ Clone MAC Address Fill“ In the MAC address that“ ls the MAC address lo be cloned. Refer to 4.24 Em 15 Q gm M7 Ag AME-7 . “ 26 on.“ mnorwun “noun: Apply Chmses Reset , ., ,E“Lfi&‘1“.‘?9“m8~ Venn-x u Click the Apply cums button m complete the new Click the Rent human 10 abort change and recover the m PW‘EQ’LQKEFE‘?“ WE; , ,, 3.3.11 WAN Interface Setup This page is used no configure Ihe pammmls for wide am network um connects to the WAN pan or your WLAN AP Runner. Here you may change Ike access mahod to fifldcll’. DHCP. PPPaE or PPTP by click the item vlluc of WAN Access Type. I Static IP WAN Interface Setup mw.u.*mmnu—M-fiamumw~vm4y~ Am-h‘hwnyflumnmufimmm-mwmmh— mdeNAnu-nyp D Inn-m D M'dhm-IAN D “Wampum KEEP a — WAN rfsce — St ' Cliek to 849100! Static IP suppon cm WAN inlerfue. There we]? address, subnet mask and default gateway settings Static IP need lo be done, l'PAddmss "you selem the Static IP snppoll on WAN inn-rm, m] fl in the 1? address for n. sum; Mask lfyou select the sgm; rp sump on WAN igmfm, fill 27 In.“ MANUALOFWLAN AP mum: venu- “A, in the subnet mask for in. Default Gateway lfyou select the Static LP support on WAN interface, fill in the defamlt gateway for WAN inlerfice out going data packets. DNsrlr 77 7 7 Fill in the 1? address ofDomnin Name Server 1 mi;: 2 7 7 m: 7 7 DNS 3 7 i mime 1p mifDmTain Name . Clone MAC Addass Fill in the MAC address ills! is the MAC address to be claneqiefenw 4 14 What '; Clong MACAfim? Enible “Fir Click the checkbox to enable uFN'P function. Rflfflwmmixwhum Enable Web Server Click the checkbox to enable web configuration from Age“ on WAN 7 , WAN side. _ ., Enable WAN Bell; Click lhe checkbox to enable WAN ICM'P response. Reply Apply Changes Click the Apply Change: button to complete the new . 7 , m , wfiwfimwfiw A 7 , Mi", Reset Flick the MIT-awn Ellen elm; Ind move: me __ pleviqus configuration setting. _ II DHCP Client WAN Interface Setup mnuunnuummu—nmwm-uwup-cm Mhhmwfi-fi‘mnmumlflmmumwumh md'lAlAu-nlnt mum-«em- Wmi Gunman—an Qumran-g, mu: um: mas: mummy-en Cl mm D “IOWA-uni“ D Minna-m (ME usual mummy wuu n nomn DHCP cuent Click to select DHCP support on WAN lnterfaee for 11> address assigned auxomalically from n DHCP server. Attnln DNS Click tn select getting bus addw for anp Suppon. Amomafically Please selecl MDNS Manually llthe mu? suppon is _ selectedl Set nus Mnnunlly Click to select getting DNS addxess for DIICPsuppon. bus 1 Fill in the IP address ofDomain Name Serve: 11 ptis 2 ,_ 7“ > Fill lnthe lpnddms omnntnln Nnme Serveiz.‘ PNS 3 Fill in the 11> addmss ofDamaill Name Server 34 _ 7 Clane MAC Add-ens Fill in the MAC address that is the MAC addxus to he a W _ cloned. Refer to 4 z4 mg; '; Clong MAC Agmg” A Enable uPN'P 7 black the eheekhox to ennhle lIPN_'P function. " _A 7 __7 R5fer!94.zzmti§!1n'vfl P113 angtnulrm" Enable Web Serve: Click the checkbox to enable web configuration fmm 5915032“! ,_ . WA’iiidL . _ u ”A, Ennhle WAN Echo $1: the eheEkhoiKEnahle—wfimnespmm Reply Apply Changes Click LheApply Changes button to complete the new ., ,_,_°?’.‘fil"“‘i°"mi“§; m, ,_, _ W Reset Click the Rae! bunon to abon change and recover the previous confiilnation setting 29 Ilm‘! mnnummu noun: v- Hl PPPOE WAN lnterfac: Setup (LIN—M) v “mun-y...) User Nam Pisswol'd Connection Type Click to select PPPOE support on WAN inlflfacen There an: user name, password, connection type and idle time settings weed to be none. lfyon select the PPPoE slippm‘l on WAN interflce, fill in the usernnme and password to login the PPPoE server. Ifyml select the PPPOE slipper! on WAN interface, fill in the user name and password in login the PPPoE mm Select the connection type from pull-down menu. There are Glam-Imus, Culture! on Del-mud and [than] three types to select. Continuous connection type mum; to setup the connection through PPPoE protocol whenever this WLAN AP Router is powered an. some} en 05». ‘ lull-s MANUALOIWLAN n mom-m Vents. connection through PPPoE protocol whenever you send the data packets out through the WAN interface; there are a watchdog implemented to close the PPPoE connection while there In no data sent out longer than the idle time set. Manual connection type means to setup the connection through the PPPoE protoool by clicking the Connect bunon manually. and clicking the Disconnect bulwn lfyml select the PPPoE and Cal-net! an Dmami connection type,l fiII' III the idle time for auto-disconnect _ bfimction. Value can be between 1 and woe minutes, Fill in the mm size ofMTU Size. The default value is 1400. Refer to 913 mm is Magnum Tgmm'gigg Quit fixtuin DNS Click to seleet getting nus address for PPPaE support. Arnonrstioally Please selectSermvsmnunayifthe ppm: support is selected. Set DNS Manually Click to seleot getting DNS address form]? support. DNS 1 Fill in the 11> address of Domain Nnnre Server 1, pus: N 7‘ FillintheanddmisofDomainNa-rlc Serverz. _k DNS 3 * Fill inthe lPaddress oiDontnin Name Server 34 Clone MAC Address Fill in the MAC rddress that is the MAC address to he 7 _ ‘ v 77 7 W clonegLRefer lo4 24 Whgl '5 Clone MAC? Mg 3? _ Enable uPNP Click the check—hon to ensble um iinrotion' Refer to WWW} Enable Web Server Click the checkbox to enable web oonfigurstion from A999?s MN. m, EAN side- A Enahle WAN Echo CliTrhe Ereibo'x to‘erble wmfimsi; ” 3wa M Apply Changes Click the Apply Changes button to complete the new , . , ,, , m mfimignsstzizs “knit _ _ _ Reset Click the 11:32me abort change and recover the previous configru-stion setting, 3! us 1 human: wun A! mm: IV PPTP WAN [menace Selup mmnnuumummuwmmmumwumum Amllh‘imyw-nywfimywu mm,m,m-nnwuu- wm-ll'AXAmnw mum. 1m "m.“ L‘L A swam-m eA-INA-l—dly Cumin-flu ml: ‘h’fi m1: nan» cue-mu..." mm , D Inn-urn El “was-muunnwm D “WASIAQM [ME] Sc 3 ol—W - PP’TP Allow “set no make a tunnel WI remote site directly to secure the data transmission among the commion. User can use embeddgd PP'I'P client supported by this router to make I VPN connection. LPAddress _ lfyou select the WT? support on WAN interface, fill: line I? xddress for it. Subnct Mask Ifyou select the pnp support on WAN interface, fill in the mime: mask f Seiver’uikdfdrés am we 11> address ome PPTP Server. User Name Ifyou select me PPTP suppon on WAN intm‘face, fill in usm-s munmmfl AP [OUTER Vent—1L! Password fyoll select the my suppon on WAN inmf-ne‘ fill in MTTSiQe ., M " ' Fill inlhemtusizeofMTUSize Tnedefniuzvalneis * 1400. Refer m4 z; my 15 Maximum Tm§mis§ gn Hull ,, , , , _, mm ,... _, “73,7, Amin DNS Click MIe—E—inn ENS address’foi PPTPsuppm. Aulmmlically Please selea sa mvs Manually ifthe my support is selected. Click lo _seleel getting DNSidl'eis [95115ng 7 pgsl ‘ _ _ m ¥lilll Ill me lpflmfiigtbmm Name Sewer l. ,- _ DNS 2 Fill In the 1? address ofDomain Nnme Sewer 2 DNS 3 Fill in the IP address ofDomnill Nime Sen/er 3 Clone MAC Add“ Flll in the MAC Mikes: that Is the MAC an‘ldnss lo be Clbnedl Refer Io 174mm Emble uPNP Click the ckeclnlm to emble uPNP function. Refer (04 22 Km! is Univeg [I ilk m Em “ENE. Enable Web Server Click the checkbox to enable web mfiguratlon from Access on WAN WAN side. Enable WAN Echo Click the Checkbox 10 ennble WAN ICMP response. Replxg _ 7, W , _ _D*7 » Apply Changes Click meAJIyZh-zlglv fiQTngnEleTe ii: i; configmtion setting. Reset Click me Reset button Io aborl Change and recover me previous configuration setting 3.3.12 Firewall - Port Filtering Entries in this table are used to rem-lei certain types ofdava packets from your local network in lntemel through the Gateway. Use ofsuch filters can be helpful in securing or restricting your local nelwm'k. 33 um's mnuuorwum A? lama Port Filtering E—nm-fl-nw-mm'fl‘xflfivml—whfimhb—n mun-m, wanna-naumnmum-amum a nun...“ mum—3C] NJ cm _E'~:'Z| ., C ik “l en_nl>1e the poll filterin ficurity function To restrict data transmission from the local network on cemin pom, fill in the range ofstamport and end-port, Comments and the protocol, also put your cqmments on it. The Protocol can be TCP. UDP of Both. Com-rm let you know about whys to restrict data fmm the ports. Apply Chmges Click the Apply Changes button to register the ports to , _r , , .r , . Mfil'flinsui‘;_~ _ mam RM Click the Rest! button to abort change and recover the previous configuration setting Delete Selected Click to delele the selected pon range that will be W, .. , ,_m"°£fi_wflh9p1fl-fihifi'fih_ , 7,” A. W, Delete All Click to delete all the reglstet'et‘l entries from the A . _port-filten'ng list. ‘ Rm Click the Rent button to abort change and recover the _ m .. ., __ mvioux configuration setting. 33.13 Firewall - IP Filtering Entries in this table are used to restrict cemin types ofdatx packets from your local network to lntemet through the Gateway Use ofsuch films can be helpful in securing or mtricling your local network. 34 mn's mnuuormn nun-nu Wei-u n hum-mun“.- inmmfiwx-{mmfi-yfl-hslwnh—fl WNW 3mm...“ ' ‘Enable IP Ewing __ Click to enable the IP fillgl'illg soundly filncti n. 7 Local lPAddress To restrict am transmission fmm local network en' Protocol cemin IP addresses, fill in the IP address and the Comments protocol. also put your comments on it. 'l1|e Pmlocnlcan be TCP, UDP or Both. Eminent: let you know about whys to restrict data firm the l? addlvss, Apply Changes Click the Apply Chung“ lmnon to register the l'Paddress , . ,, ,, Emmett ._ ,, H. H-” A m. Reset Click the Rent button to abort change and recover the _ __ pmions configuration setting. Delete Selccled Click to delete the selected 1? address that will be ienwved from the lP-filtcring list. Delete All Click to delete all the registered entries from the lP-flluring list. Rm! Click the RM button to abort change and recover the previous configuration setting, . 3.3414 Firewall - MAC Filtering Entries in this table an used to restrict certain types ol'data packets from your local network to lmemet through the Gateway Use ofsuch filters can be “35 Im‘i mmmoewwi AP mm: helpful in securing or mu-icring your local network MAC Filtering l—n-mhfi-mlumrmmlwml—ynh‘mum mummy Unamhmhm-mummbmm E “my...” mun-m‘ 7 ("d-nut;r —@ mun-rum _ nable MAC Filtering Click Io enable the MAC filtering security funcuo . MAC Ailing To magi—data hanxmission from local network on Comments 84min MAC “dresses, fill in the MAC address and your comments on it. Can-mm lei you know about whys to restrict dam from the MAC addressl Apply Chnnges Click Ille Apply Changes lumen to register the MAC , A ,, ,, EdEiwfléCfl'efiflgfifg.w ,,,,,,, A, Reset Ch'ek rhe Raul Inmcm to abon change and recover the previous configuration getting _ Delete Selected Click in delete the 9:1er MAC address Lhal will be removed from the MAGfilwring lisL Deleie All Click to delete all the registered entries from (he MAC-filtering list. Reset Click the Reset button to abort change and recover the previous confignnnion seizing, 3.3.15 Firewall - Port Forwarding Entries in this table allow you to auwmarically redirect common network services to a specific machine behind the NAT firewall, These mines are only “ 36 mm unsunwkun A! nmrm nemwy ifyou wish lo liosi some sort of server like a web server or mail server on Ille private local network behind your Gateway's NAT firewall. Port Forwarding l—almm‘efimhmflyflfiwr—mMH-fllmnxulmwm UNAYMMu—‘u-rmmnqimnnuhummdrmhlwunun min-unumnwmwmwimrm _En__xble pnnfcnwnding Click loenable melon Forwarding security ligation, [P Address To [ward data packers coming from WAN m a specific Protocol IP address that hosted in local network behind the NAT Port Range firewall, fill in llle IP address, prolocol. pen range and Comment your comments. The Pmtocal can be TCP, UDP or Both The Part Range for data transmission. Conn-mm let you know elm-l whys to allow data packets forward an the l? addlms and port number. Apply Changes Click ineApply Changes button to register the 1? address and port number in Pan forwarding list Reset Click the Run button to shell change and reoover the previous configuration swing, Delete Selected Click Io delete the seleaed IP address and port number that will be removed fi'cm the port-forwarding list. Delele All Click on delete all the registered entries from the pon-forwardinglist. 37 mmmuorwmnnwmu vmzu Reset Click the Rm! button to abort change and recover the previmn; Qnfigunfion setting, 7 3.116 Firewall - DMZ A Demilitarized Zone is used 00 provide 111me services without swrificing unauthorized access to its local private lulwork. Typically, the DMZ hos! ennui-is devices accessible to lnnernei tnfl'l . such as Web (HTTP) servers, m servers, SMTP (”mill servers and DNS servers. DMZ AwhiMuMWW‘MIMq—Mvduix‘unbd pmmmmwwmmmmanmmmnnwamml mmmmlumm um um II—ulnu manna-mm] WM M) ngn musket — Em - DMZ Enable DMZ Click to enable llre DMZ (Mon. DMZ Hon l'PAddress To snppan DMZ in your firewall design, fill in the 1? address ofDMZ lion llm can be were from the WAN lnierfree. Apply Changes Click flieApply Changes button to register me [P sddlcss 7 7 _ . e n, JL‘PI’EE‘PLf-.- _ __AV-. _ . Resel Click the RM bimon to abort change and recover previoniqonfigmtion setting. 3.3.17 VPN (Option) Settings This page is used no show VPN connecticm table, configure IPSEC VPN, NAT vaersal, Gwen“: RSA Key, Show RSA Public Key, Note: V'PN is optional. 38 Inn's muncrwm n nan-n le-z u Enable lPSEC VPN Click in enable IPSEC Vl’N functnon. Refer to Lulu; _‘ “Mum 8Whatisl E '! Emblc NAT Traversal Click to enable NAT Tmersal function. Geneme RSA Key Click to generate RSA key Show RSA Public Key Click Io show RSA public key lhatwe geneme. M Apply Chmges Click the Apply Chaugn bunon to enable lPSEC VFNl NAT Traversal settings. Cunenl VPN II shows cumml WAN interface infomlxlion and VPN szfliimw ,m °Ei°wb1=«, _ Edit to enter the an}; lunnel cmfigumuan page Delm Click to delete the cur-em VPN tunnel Ihal ml‘lo button slay. Refit?“ Click to wheel! the cum! VPN connectioll table, 39 Ilsn's mm“. okun A? novrut wee-lee: u I VPN Setup - Edit Tunnel VPN Sewn Emu-ti cunt-ii— Enable Tunnel 35 Click to enable the lPSEC VPN sin-rent tin—nu Connection Name Assign the connection name tag 7 7 77 Qllgiflselectl'sxorm, Elick to select Single/441MB or SubnetAddtm VPN connection LocalIP Fill in IP address or subnet address depends on which AddmlflVfl-vork Local Sile option you choose LocalSubnfl Mmk Fill in the local subnet mask, “Remote Site Click (a select SlugkAldms, SubnnAldlm. Any Aldus: or NAT-uh; Address va remote connection, Realm Seam Fill in remote gateway IP address Gateway Remnufl’ Fill in ll> address orsubneladdressdepcnds on which AddeeMork Remote Site option you choosel Rea-wt: Slim!“ Mask Fill in mime subncl mask [meal/Peer m Define IKE exchange infomtuion type ’ LocnIlD 1m Click to select IP,DNSorbnuilas local exchange type LocallD Fill in local l'D except ll> seleoted gmmem Me; 7 _ Click to selegt lP. ozvs or E-wyil as mote exchange “ 40 IISEI‘S MMDIWLAN Ar new“ Vain: w type Rural: ID , Fill in remote 1D except 1? selected Key Munagenwnt ' Click to select 11m nrM-nul mode. AW, W _ , cm" Aflfflflyflflflfflfflflfin ConnectionType ' Clickloselect lm'k'clormknponder mode, 999°“ . cm" ‘° °W WEE“?! IRSEE'L'F'EQMi Qiuonnéln 7 7 Click GEM—nu?“ manually. [Responder mode only]. ESP Click to oonflgm‘e was, firm orNULL encryption. .. r _, ,, f ' 0:2 yrflfirmmm "2"? _ _ _ PreShared Key the k y value. IKE mode onty Remote RSA Key Fill in the rel-now ptcway RSA key. mm mode only] Status It shows connection statusl [IKE mode only] SP] Fill in Securily Parameter Index value. [Mutual mode only] Encryption Key Fill in encryption key [Mnmul mode only] Hi'leflfiifilfixnjiey Fi Enigmatic“ key [Mnnujlflnwde MIIL Apply Change ‘cuclr the Apply Ell-ages buttln to save current tunnel he}; 7 7 7" Click uieEEEiEiTo JonéfingTaTfiTeQVZtE7 previous configuration setting Refresh It shows the current connection slams, [Mann-I mode only] Back _ ll remms back to VPN Sen-p pagel 4| MEMAKUALOIWIMAPIWER Vern-in II Advanced IKE Setup Adavnced VPN Setting for IKE mmukwnmmwhnm del M 1: WMok Klimt mm» @ MGM» DHMW) hymn“ as» M1: *7'"*7 mm in mm @ MAW M05 . kylife'l'ine moo flaunt-fix 1mm mwmm on i E] sin —Ad va ' f (I ”E” ‘ _ Negotiation Mode Main model Encryption Algal-mini Click to select was MAESIZU encryption. Amhenlication Click in select Mm orSHAI authentication. Algorithm my Group Click to select nflumdwm DHNWMII) or push-wuss; key goup, Default value is Dl-lz Key Life Tlm Fill in the key life Lime value by worlds, "m“ 2 12 Wu's MmALorwun A? non-nu v-r-tm 1) Active Protocol ESP. Authenticition ' Click to seiect M05 orSHAl annhemicalion Algorithm _ Fill“ in the key life time vnlne by seconds. Perfect Forward Secrecy (PF S) 0k? Cancel ' Click the Cancelhnlton we close current window without any changat 3,3.18 Management ~ Statistics This page shows the packet countens for innsmission and reception regarding IA) Wingless, Ethernet LAN and Emmet WAN networks. Statistics mwmanlummummnpqu-wummm w‘rreiess LAN Ir skews the statistic count or sent packets on the wireless 30:1an _ _ LAN interface. Wireless LAN It shows the statistic count ofteceived packets on the Raceivedl’ackm wireless LAN imerfxoe. Ethemet LAN It shows the mfisfic count ofmt packets on the Sent Fades Ethernet LAN inlerfnce. , EihsEleANm M7 _ itehgws the smtistig gaunt of received mkets on the 43 mu'smxuuorwumnounu Venue-en Rulivfll Finders Ethernet LAN interface. Emmet WAN it shows the misfit: count of sent packets on the Seal Puke“ Ethernn WAN interface. Ethernet WAN It shows the statistic count of received packets on the Ethemel WAN interffwe. rh uh smligfic coilnlels on the semen, 33.19 Management - DDNS This page is used to configure Dynamic DNS service to have DNS with dynamic 11> address. Dynamic DNS Setting “Mu-mnupwiny-rw‘nm-nmmM—‘fl-UIUwum uwmmwum aw Fumm‘MMliadmhrflmwwy-Dmmnw IVQflEMMMWMVS-xmm Enable DDNS Click the checkbox to enable DDNS service. Refer ta , , ,, ,, ,, ,, ,1~?_ A470“! me, A ,,, t, , .. Service vaider Cl 1: the drop div/n rnenn w picinp the right provider. Domain Name To configure the DomainName. Useanme/izmfl Configure User Name, Email. £82946” , , , Sflfiflm “Wm-E! , , ,, , .. . , Apply Change Clickthe L’pp’iy éthgerTuncn to'rm' the enable DDNS service, Reset Click the Rem button to abort change and recover the > previous configuration setting “ 44 mm; mwuorwun n murmur Vam u 3.3420 Management - Time Zone Setting This page is used to wnfiguxe NTP cliem to get current time. Time Zone Setting Ynmmfimofl—mbyolm—‘mlp‘k-ruwfinvfih-fi cum-um rrLJm-[TlgqandH-LMLJ fl muse.“ [mmToanl-w Ell-Mammal“ mm“ 9 mum MAn-nm I 11 ot— —'l'| ne _Cllrrent_‘r_“lme It shows the cunmt time Time Zone Select Click the time zone in your country. Enable NTP client Click the eheeklmx to enable NTP client update. Refer m "9912 _ 7 ,_ , , 4M, f “Tiling _._ ,_ hm _ NTP Server ‘ qickfiecheEult or input NTP screenwriters. Apply Change Click the Apply Change. button to save and enable NTP , 7 e , , W, M Lfim‘ififim _A “A, “mm _ Reset Click the Beer hufito atht flange and recover the _ previous configuration sewing, refresh fl Click the refresh the arr-em rime shown err the screen. 3,321 Management - Log This page is used to configure the remote log server and shown the current log. 45 Wu'suwuokun A? noun: Yank-ill System Log mwmhmnummhpmumm m...” a mum cum-q- em." a mu...” Him-"rune": ,: ‘lé'e-v fl: aaxalwoanl m-ama lxaetlulfl) 4m car has us up: mm noxomu may: unuvouo u anemone (mum - mun “tux-x m aunmma 45mm mm | on use 0 mm. n mu many 00. am mun, u an. my aoxomu 1mm: a mu, m, eoxnoxn mm ea—nn nu: xwv—latv/u- mun-a (ML-Luna» sum 1m), 00:00:11 C-hbx-ulv any use... EMEIE Screen snapshot ~ Mmgemem — Log nun mum Enable Log Click the checkbox to enable log. Winks: only Only show wireless log Aynem all Show all log ofwiueless AP mum Enable Rum”: Log Click the checkbox Io enable mmwe log service, Log Sam IPA/Mm: Input the remote log 11> address APP]! W554 , gig [hf Alli-V 94539 I’Jyflflsfl'ejbfliyfinffa 4 Refresh Click the refresh the lug shown on the screen. Clear 10; qlsplay screen 3.322 Management - Upgrade Firmware This page allows you upde the Access Point firmware to new version. Please note, do not power offthe device during the upload because it may mash the symm. usuvs muolrwun Arlmmn thx u Upgrade Firmware MplrfinyflmfiAMIMfi-mhmrn— hmmnhnflmn‘h’ mmuumemnnmm Select File Click the Browse bumn w select the new vetslorl of web , fimwmji’fiflf; aim, "m, , ,, Upload an the Upload button to update the selected web firmware image in the WLAN AP Router. Reset Click the Rue! button to abon change and recover the previous configumign selling, 3.323 Management Snve/ Reload Settings This page allows you save current settings to a file or reload the settings from the file lint was saved previously. Besides, you could reset the current configuration to factory default, Sue/Reload Settings Mmmmmmnflpnrlfluwhmi—hflmn um Mame—mmmwmumm hem-m puma-m mung-m Save Settings (0 File Click the Save human to download the configuration plmnmers to your personal computer. Load Settings (mm File Click the 3mm billion in select the configuration files then click the Upleqd human to update the seleeted 7 ——-————-—— 17 m's munokun u nun-n Venn-z u configuration in the WLAN AP Router. Reset Settings to Click the new button to reset the configuration Default parameter m factnry defaiflts. 343.24 Management - Password Setup This page is used M) m the account to mess the web server orAeeess Point. Empty user name and password will disable the protection, Password Setup Minnuutlumflmhmxumm‘rwuum Mwflmmfiluwfl dummy-m 01-34-14 "new: can—mum: . iflumflmsiflfi'! New Password Fill in the password for web mnTgement login control Confirmed Password Because the password input is invisible. so please fill In ., _i W , , _ A. 0“ “£1432" for mfimfi'fllw Apply Changes Clear the User Mann: and PM fields to empty, means to apply no web management iogin commL Click the Apply Changes button to complete the new 7 configln-ntion setting ___ m _4 _ Reset Click the Rm button to rim change and recover the previous conflgmtion setting. 3.3.25 Logout This page is used to logout web mamgement page. This item will be activated next time you login afier you define user account and password. 4! umrs mu. ow wun AP mun-n v...“ m Logoul non-mmmn Apply Change Click the Appfy Change mum, Then click Oxbumm lo logout. _ 49 van-s mum. or wm A? norm- Mg m 47 What are potential factors Ihal may causes interference? Factors of interference: F Obstacles: walls, ceilings, fimriture etc. > Building Materials: metal door. aluminum studar > Electrical devices: microwaved, monitors and electrical motors. Solutions to overcome the interferences: J Minimizing the number ofwalls and ceilings. '/ Position the WLAN antenna for best reception / Keep WLAN devices away from other electrical devices, eg: microwaves, monitors, electric motors, etc. '/ Add additional WLAN Access Points if necessary 4.8 What are the Open System and Shared Key authentications‘! lEEE 802.1] suppom two subtypes ornetwm-k authentication services: open system and shared key, Under open system authentication, any wireless station can request authentication. The station that needs to authenticate with another wireless station sends an authentication management frame that contains the identity oftbe sending station. The receiving swim] then returns a frame that indicates whether it recognizes the sending station Under shared key authentication, each wireless station is assumed to have received a secret shared key over a secure channel that is independent from the 802. ll wireless network communications channel 4.9 What is WEP‘? An optional IEEE 801“ function that offers Frame transmission privacy similar to a wired network The Wired Equivalent Privacy generates secret shared encryption keys that both source and destination swim can use to alert frame bits to avoid disclosure to cavesdmppers. WEYrelies on a secret key that is shared between a mobile station (eg, a laptop with a wireless Ethernet card) and an access point (i,e. a base station), The secret key is used to encrypt packets before they are transmitted, and an integriry check is used to ensure that packets are not modified in transit. 410 What is Fragment Threshold? The prom protocol use: the frame fragmentation mechanism defined in IEEE 802.1] to achieve parallel transmissions. A large data frame is fragmented into several 52 use" MANUALOFWIAN nlwnn Venn-i: u fragments each ofsize equal to fmgnent threshold. By tuning the fragment threshold value, we can get varying fragment sizes. The determination ofnn efficient fragment threshold is an important issue in this scheme. If the hymn! threshold is small, the overlap part of the master and parallel transmissions is larger This means the spatial reuse ratio ofparallel transmissions is high In contrast. with a large fragment threshold, the overlap is small and the spatial reuse ratio is low. However high fragment threshold leads to low fragment overhead, Hence there is a trade-off between spatial reuse and fragnent overhead. anmenl threshold is the maximum packet size used for fragmentation. Packets larger than the size programnwd in this field will he fingrnented. if you find that your corrupted packets or asymmetric packet reception (all send packets, for example), You may want to try lowering your fragmentation threshold. This will cause packets to be broken into smelter fragments. These sin-u fragments, ifoorrupted. can be resent foster than a larger fragment, Fragmentation increases overhead. so you'll want to keep this Value as close to the maximum value as possible 4.11 What is RTS (Request To Send) Threshold? The RTS threshold is the paelret size at which pneket transmission is governed by the RTS/CTS transaction. The IEEE 80211-1997 standald allows for short packets to be transmitted without RTS/C’m transactions, Eula station can have a different RTS threshold, RTS/CTS is used when the data packet size exceeds the defined RTS threshold, With the CSMA/CA transmission mechanism. the transmitting station sends out an MS packet to the receiving station, and waits for the receiving smtion to send back a C'l'S (Clearw Send) packet before sending the actual packet data. This setting is useful for networks with many clients. With many clients, and a high network load, there will be many more collisionx. Hy lowering the RTS threshold. there may be fewer collisions, and perfomhanoe should improve. Basically. with a faster RTS threshold, the system can recover from problems faster. RTS packets consume valuable bandwidth, however, so setting this value too low will limit performance, 4. 12 What is Beacon Interval? In addition to data fumes thnt carry information from higher layers, 802.11 includes management and control frames that support data transfer. 11|e beacon frame. which is a type of ntartiigement frame, provides the "heartbeat" of a wireless LAN, enabling “ 53 bums mnunnocwm n noun-m Vent-a; u stations In ashblish and maintain communications in an orderly fashion. Beacon Interval represents the amount ortime between beacon transmissions. Before a station enters power save mode, the station needs the beacon interval to know when to wake up to receive the beacon (and learn whether there are buffered frames at the access point). 4.13 What is Preamble Type? There are two preamble types defined in [BEE 302. ll specification Along preamble bmieally gives the decoder more time to process the preamble. All 802,11 devices supper! a long preamble, The short preamble is designed to improve efficiency (for eurnple, for Vol? systems). The difl'erenoe beiween the two is in the Synchronization field, The long preamble is I28 bits, and the short is 56 bits. 4.14 What is SSID Broadcast? Broadcast of SSID is done in wuss points by the beacon, This announce: your access point (including various bits of information about it) to the wireless world uroturd it. By disabling that (centre, the SSID configured in the client must match the SSID ofthe access point, Some wireless devices don't work properly if SSID isn‘t broadcast (for example the D~link DWL~120 USB 802.1 lb adapter). Generally if your client hardware supports operation with SSID disabled, it's not a bad idea to run that way to enhance network securily. However it's no replmnent for WEP, MAC filtering or other protections. 4.15 What is Wi-Fi Protected Access (WPA)? Wi~Fi‘s original security mechanism, Wired Equivalent Privacy (WEP). has been viewed as insufficient for securing confidential business communication A longer-rem solution, the IEEE 802. l li standard, is under development. However, since the “£155 802.1“ sundurd is not expected to be published until the end of2003‘ several members orthe Wl-FiAlliarwe mmedup with membersamre IEEE 302.1“ taskgmp to develop a significant hear—term enhancement to Wi-Fi security. Together. this team developed Wi-Fi Protected Access. To upgmie I WLAN network w support WPA, Access Points will require n WPA sofiware upgrde. Clients will require a sofiwrre upgrade for the network interface card. and possibly a sofiware update for the operating system. For enterprise networks, an my mumuunnnrwmnnwnn Venhxll 4 Frequently Asked Questions (FAQ) 41 What and how to find my PC’s IP and MAC address? it address is the identifier for a computer or device an a TCP/IP network. Networks using the TCP/IP protocol inure messages based on the IP address critic destination. The formal ofan IP address is a 32~bi| numeric address written as four numbers separated by periods. Each number can be zero to 255. For example. 191,168,I 254 could be an IP address The MAC (Media Amer. Control) address is your computer‘s unique hardware number. (On an Ethernet LAN, it‘s the same as your Emmi address) When you‘re connected to the lntemet From your computer (or host as the lntemot protocol thinks of it), a correspondence mile relates your [Paddress to your computer's physical (MAC) address on the LAN. To find your PC‘s l? and MAC address, / Open the Command program in the Microsofi Windows. I W in Ware/all then press the Euler button. > Your PC’s 1? address is the one entitled lPAddress and your PC's MAC address is the one entitled Phym'cal Address. 442 What is Wireless LAN? A wireless LAN (WLAN) is a network that allows access to lmemct without the need for any wired connections to the user‘s machine. 443 What are ISM bands? ISM Hands for lrlduslrial, Scientific and Medial: radio fi'equency bands that the Federal Communications Commission (FCC) authorized for wireless LAN, The ISM bands are located at 915 +l- I3 MHL 2450 H- 50 MHz and 5800 H— 75 MHz. 4.4 How does wireless networking work? The 802.“ standard define two modes: infraxlruuure mode and ad hoc mode. In infrastructure mode. the wireless network wnsists ofat least one access point connected to the wired network infrastructure and a set of wireless end swionn This configuration is culled a Basic Service Set (355). An Extended Service Set (ESS) is a set of two or more 3585 forming a single subnetwork Since most corporate WLANs require access “50 use" munorwmurwvmn Vault-11.0 to the wired LAN for services (file servers, printefl‘ Internet links) Ihey will operate in infiastnwture mode. bin-mu n! Q} aim!» mm a wuss) Example 1: wireless lnfnstrucnne Mode Ad hoc mode (also called peervtcrpeer mode or an Independent Basic Service Set, or 1358) is simply a set of 802“ wireless stations that communicate directly with one another without using an access point or any connection to a wired network This mode is useful for quickly and easily setting up awireless network anywhere that a wireless infrastructure does not exist or is not required for services, such as n hone] mm convention center, or airport, or where m to the wired network is barred (such as for consultants a! a client rite). Mindful M ml Walt!) Example 2: wireless Ad Hoc Mode 4.5 What is BSSID? Asix-hyte mm um dininguishes n partieulur ! paniculnr access poim fmm others. Also Irnow asjust SSlD. Servu as a network [D or name. 4.6 What is ESSID'J The Extended Service Sen ID (ESSlD) is the rune ofthe network you want to access, It is used to identify difl'erent wilelus networks. 51 um's MANUALOIWLAN A? nom- Vflnh- u “ 4.21 What is Wireless Distribution System (WDS)? The Wireless Distribution System feature allows WLAN AP to talk directly to other Al’s via wireless ehannel, like the wireless bridge or repeater service. 4.22 What is Universal Plug and Play (uPNP)? UPnP is an open networking architecture that consists of services, devices, and wntrol points. The ultimate goal is to allow data communication among all UPnP devices regardless ofmedia. operating system, programming language, and wired/wireless connection 423 What is Maximum Transmission Unit (MTU) Size? Maximum Transmission Unit (MT U) indicates the network stack of any packet is larger than this value will be fragmented before the transmission. During the PPP negotiation, the peer of the PPP connection will indicate its MRU and will be accepted. The actufll MTU of the PPP connection will be set to the smaller one of MTU and the peer‘s MRUA The default is value 1400. 4.24 What is Clone MAC Address? Clone MAC address is designed for your special application that request the clients to register to a server machine with one identified MAC lddress. Since that all the clients will communicate outside world through the WLAN AP Router, so have the cloned MAC address set on the WLAN AP Router will solve the issue. 425 What is DDNS? DDNS is the abbreviation of Dynamic Domain Name Server. It is designed for user own the DNS server with dynamic WAN IP address 4.26 What is NTP Client? NTP client is designed for fetching the current Iimfitamp from internet via Network Time protocol, User can specify time zone, NTP server IP address. 4.27 What is VPN? VPN is the abbreviation of Virtual Private Network. lt is designed for creating point~to point private link via shared or public network. us-rs mnuuol mm A? new v“.- m 428 What is IPSEC'! IPSEC is the abbreviation of]? Security, 1! is used In transferring dm securely under VPN, 57
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.4 Linearized : No Modify Date : 2008:02:14 15:10:41+08:00 Create Date : 2008:02:14 15:00:27+08:00 Creator : Acrobat 5.0 Scan Plug-in for Windows Page Count : 65 Mod Date : 2008:02:14 15:10:41+08:00 Creation Date : 2008:02:14 15:00:27+08:00 Producer : Acrobat 5.0 Scan Plug-in for Windows Metadata Date : 2008:02:14 15:10:41+08:00 Has XFA : NoEXIF Metadata provided by EXIF.tools