TENDA TECHNOLOGY F452 Wireless N450 Gigabit Router User Manual II

SHENZHEN TENDA TECHNOLOGY CO., LTD. Wireless N450 Gigabit Router II

Contents

User manual II

                                                                             51  ● Enable:Check/unchecktoenable/disabletheDMZhostfeature.● DMZHostIP:EntertheIPaddressofacomputeronyourLANwhichyouwanttosetasaDMZhost.TheDMZhostshouldbeconnectedtoaLANportontherouter.Note1.OnceaPCissettoaDMZhost,itwillbecompletelyexposedtoInternet,andthusmaybevulnerabletoattacksasrelatedfirewallsettingsbecomeinoperative.2.UsersontheWANcanaccesstheDMZhostthroughacorrespondingWANIPaddress.4.5UPnPUPnP(UniversalPlugandPlay)allowsanetworkdevicetodiscoverandconnecttootherdevicesonthenetwork.Withthisfeatureenabled,hostsintheLANcanrequestthedevicetoperformspecialportforwardingsoastoenableexternalhoststoaccessresourcesoninternalhosts.● EnableUPnP:Check/unchecktoenable/disabletheUPnPfeature.NoteUPnPworksinWindowsME,WindowsXP,orlater,orinanenvironmentwithinstalledapplicationsoftwarethatsupportsUPnP.OperationalsystemsneedstobeintegratedwithorinstalledwithDirectx9.0.
                                                                             52  4.6IPTVTheIPTVfeaturemakesitpossibletoenjoyonlinevideosonyourTVsetviaaset‐topboxwhilesurfingtheInternetconcurrentlywithoutmutualinterference.● EnableIPTV:Check/unchecktoenable/disabletheIPTVfeature.● EnableIPTVSTBPort:Check/unchecktoenable/disabletheIPTV‐specificport.Seebelowforthenetworktopology:Note1.Ifyouenabledbothoptionsmentionedabove,thennotebelow:(a).SetIPTVset‐topbox'sconnectiontypetoDHCP/dynamicIPorstaticIP(IMPORTANT:Notethattheset‐topbox'sIPaddressshouldbeonthesameIPnetsegmentastherouter’sLANIP.)iftheset‐topboxisconnectedtoanyportofLANports1‐3.(b).SelectthedialupmodeprovidedbyyourISPiftheset‐topboxisconnectedtotheIPTV‐specificport.
                                                                             53  2.AftertheIPTVportissetforIPTVpurposethePCthatconnectstosuchportwillnotbeabletoobtainanIPaddressoraccessInternet.Considerthissituationbeforeconfiguringthisfeature.Additionally,LANports1‐3canonlybeusedasLANportstoconnectPCsinsteadofanIPTVset‐topbox.3.TheIPTVfeatureiscurrentlynotsupportedonWLAN.4.7RoutingTableThisfeaturedisplaystheroutingtablecontent.4.8StaticRoutingUsethissectiontocustomizestaticroutesofdatathroughyournetwork.ClickAddStaticRouteandherecomesthescreenbelow:
                                                                             54  ● DestinationNetwork:TheIPaddressofadestinationnetwork.● SubnetMask:TheSubnetMaskthatcorrespondstothespecifieddestinationIPaddress.● Gateway:TheIPaddressfornexthop.5USBThisrouterprovidesaUSBinterfaceforUSBdeviceconnection.The"USB"tabincludestwosubmenus:StorageSharingandPrintingService.5.1StorageSharingThestoragesharingfeatureallowsyoutosharedatafilesonthestoragedeviceattachedtotherouter.● EnableSharing:Check/unchecktoenable/disablestoragesharingfeature.● DeviceName:Defineameaningfulnameforthedevice.● WorkGroup:Defineaworkgroupnameforthedevice.● Add:Clicktoaddauseraccount.Upto5accountscanbeadded.
                                                                             55  ● Edit:Clicktoeditanexistingaccount.● Delete:Clicktodeleteanexistingaccount.OperationInstructions:BeforesharingfilesonaUSBstoragedevice,youmustcreateauseraccount.1.Createaccount:ClickAddtodisplayadialogueboxasshownbelow:2.Enterausernameandapassword,whichwillbeusedtoauthenticateuserstryingtoaccesstheUSBstoragedeviceforsharingfiles.Re‐typetoconfirmpassword.ClicktheOKbuttonandwindowbelowwillopen:3.SetAccessRightsFirstselectanaccountandclickUSBStorageDevice.Andthenselectaproperaccessrightfrombelowforeachentry.Read/Write:Therighttoreadandwrite.Read:Therighttoreadonly.Noright:Norighttosharecorrespondingfile.ClickSavetoapplyallsettings.
                                                                             56  4.AccesssharedfileToaccessresourcesonsuchstoragedevice,doubleclick“MyComputer”onyourPCandenter\\192.168.0.1intotheaddressbar.
                                                                             57  5.2USBPrintingServiceTheUSBprintingserviceallowsyoutoconnectaUSBprintertothedeviceandallowallclientsonyournetworktoprintanythingtheywantfromtheirPCs.Theroutercanidentifyaprinterautomaticallyaslongasitissuccessfullyconnected.● EnablePrintingService:Check/unchecktoenable/disableUSBprintingservice.OperationInstructions:1.CorrectlyconnectyourUSBprintertotheUSBportonthedevice.2.EnablePrintingService3.OnyourPC(connectedtotherouter),clickStart——Settings——PrintersandFaxesandselectAddaprinteronappearingwindow(TakeWindowsXPforexample).
                                                                             58  4.ClickNext.5.SelectLocalprinterattachedtothiscomputer”andclickNext.
                                                                             59  6.SelectCreateanewport,Typeofport:StandardTCP/IPPortandclickNext.7.ClickNext.8.EnterRouter’sLANIPaddressandclickNext.
                                                                             60  9.ClickStandardunderDeviceTypeandselectGenericNetworkCard,thenclickNext.10.ClickFinish.11.SelectHaveDisk.12.ClickBrowse,selectcorrespondingdrivefileandclickOpen.AtlastclickOK.
                                                                             61  13.ClickNext.14.DefineanamefortheprinterandclickNext.15.ClickFinish.
                                                                             62  6SecurityTheSecuritytabincludes6submenus:MACFilter,ClientFilter,URLFilter,RemoteWebManagement,DDoSDefenceandSPIFirewall.Clickinganyofthementersthecorrespondinginterfaceforconfiguration.Detailsareexplainedbelow:6.1MACFilterTobettermanagedevicesintheLAN,youmayusetheMACAddressFilterfunctiontoallow/disallowsuchdevicestoaccesstheInternet.● FilterMode:● Disable:DisabletheMACFilterfeature.● DenyAccesstoInternet:DisallowonlyspecifieddevicestoaccessInternet,otherdevicesarenotrestricted.● AllowAccesstoInternet:AllowonlyspecifieddevicestoaccessInternet,otherdevicesaredenied.● Select:SelectanIDforthecurrententry.● Description:Brieflydescribecurrententry.● MAC:SpecifytheMACaddressofthecomputerthatyouwanttorestrict.● Time:Specifyatimerangeforcurrententrytotakeeffect.
                                                                             63  ● Day:selectaday,orseveraldays,fortheentrytotakeeffect.● Enable:Selecttoenable/disablecorrespondingentry.Example:TopreventaPCattheMACaddressof00:E0:4C:69:A4:10fromaccessingInternetbetween8:00and16:00onworkingdays:fromMondaytoFriday,configurethesamesettingsasshowninthescreenbelow,onyourdevice:Tips‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐1.Maximum10entriescanbeconfiguredinMACFilter.2.Aftersavingyourconfigurations,forcorrecttime,pleasegotoTools>Timetoconfigureyourrouter’ssystemtime.‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐6.2ClientFilterTobettermanagedevicesintheLAN,youcanallowordisallowthedevicestoaccesscertainportsontheInternetusingtheClientFilterfunction.
                                                                             64  ● FilterMode:SelectDenyorAllow.● Select:SelectanIDforthecurrententry.● Description:Brieflydescribethecurrententry.● StartIP:EnterastartingIPaddress.● EndIP:EnteranendingIPaddress.● Port:EnterTCP/UDPprotocolportnumber,itcanbeasingleportorarangeofports.● TrafficType:Selectaprotocolorprotocolsforthetraffic(TCP/UDP/Both).● Time:Specifyatimerangeforcurrententrytotakeeffect.● Day:selectadayorseveraldaysforcurrententrytotakeeffect.● Enable:Checktoenableorunchecktodisableacorrespondingfilterrule(allow/disallowmatchedaddressestopassthroughrouter).Example:ToprohibitPCswithintheIPaddressrangeof192.168.0.100‐‐192.168.0.150fromaccessingtheInternet,usethefollowingexample:
                                                                             65
                                                                             66  6.3URLFilterTobettercontrolLANdevices,youcanusetheURLfilterfunctiontoallowordisallowPC’stoaccesscertainwebsiteswithinaspecifiedtimerange.● FilterMode:SelectDenyorAllow.● Select:SelectanIDforcurrententry.● Enable:Checktoenableorunchecktodisableacorrespondingfilterrule(allow/disallowmatchedaddressestopassthroughrouter).● Description:Brieflydescribethecurrententry.● StartIP:EnterastartingIPaddress.● StartIP:EnterastartingIPaddress.● URLString:Enterdomainnamesorapartofadomainnametobefilteredout.● Time:Specifyatimerangeforcurrententrytotakeeffect.● Day:selectadayorseveraldaysforcurrententrytotakeeffect.IfyouwanttodisallowallcomputersonyourLANtoaccessGoogle.comfrom8:00to18:00onworkingdays:Monday‐Friday,thenusethefollowingexample:
                                                                             67  NoteEachentrycanincludeupto16domainnames,eachofwhichmustbeseparatedwiththequotationsymbols"".6.4RemoteWebManagementTheRemotemanagementallowstheroutertobeconfiguredfromtheInternetviaawebbrowser.● Enable:SelecttoenabletheRemoteWeb‐basedManagementfeature.● Port:RemoteadminportistheportnumberusedtoaccesstherouterfromInternet.● IPAddress:EntertheIPaddressofthePContheInternetauthorizedtomanageyourrouterremotely.Forexample:IfyouwanttoallowonlythePCattheIPaddressof218.88.93.33fromtheInternettoaccesstherouter’sweb‐basedutilityviaport8080,thenconfigurethesamesettingsasshownbelowonyourrouter.
                                                                             68  Note1.Thedefaultportis8080.Donotchangeit.2.Toaccesstherouterviaport8080,enter"http://x.x.x.x:8080"where"x.x.x.x"representstheInternetIPaddressoftherouterand8080istheportusedfortheWeb‐Managementinterface.Assumingtherouter'sInternetIPaddressis220.135.211.56,thensimplyreplacethe"x.x.x.x"with"220.135.211.56"(namely,http://220.135.211.56:8080).LeavingtheIPaddressfieldat"0.0.0.0"makestherouterremotelyaccessibletoallthePCsontheInternet.EnteringaspecificIPaddress,suchas218.88.93.33,makestherouteronlyremotelyaccessibletothePCatthespecifiedIPaddress.6.5DDOSDefenceTheDDOSDefencefeatureeffectivelyblocksICMP,UDP,andSYNfloodingattacks.WhenthenumberofICMP,UDP,orSYNpacketsreceivedexceedsthedefinedthreshold,therouterwillrecorditsIPandMACaddressesinthe"DDOSDefenceList".● ICMPFlood:IfanIPreceivesthenumberofICMPrequestpacketsthatexceedsthedefinedlimitcontinuouslyfromthesamesenderwithinonesecond,thensuchIPisconsideredtoencounteranICMPFloodattack.● UDPFlood:IfanIPreceives,onanidenticalport,UDPpacketsexceedingthedefinedlimitcontinuouslyfromthesamesenderwithinasecond,thentheportissufferingaUDPFloodattack.● SYNFlood:IfanIPreceives,onanidenticalport,TCPSYNpacketsexceedingdefinedlimitcontinuouslyfromthesamesenderwithinasecond,thentheportissufferingaSYNFloodattack.
                                                                             69  6.6SPIFirewallStatefulPacketInspection(SPI)helpstopreventcyberattacksbytrackingmorestatepersession.Itvalidatesthatthetrafficpassingthroughthesessionconformstotheprotocol.
                                                                             70  Tips‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐OnceSPIenabled,DMZandremotewebmanagementwillbeinvalid.‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐7ToolsThe"Tools"tabincludes9submenus:Logs,TrafficStatistics,Time,ChangePassword,Backup,Restore,FirmwareUpdate,RestoretoFactoryDefault,andReboot.Clickinganyofthementersthecorrespondinginterfaceforconfiguration.Detailsareexplainedbelow:7.1LogsTheSyslogoptionallowsyoutoviewalleventsthatoccuronsystemstartupandcheckswhetherthereisanattackpresentinyournetwork.Thelogsareclassifiedinto3types:All,System,andWAN.
                                                                             71  7.2TrafficStatisticsTrafficStatisticsdisplayscurrenttrafficofclientsonyourLAN.● EnableTrafficStatistics:DeterminewhethertoenabletheTrafficStatisticsfeatureoninternalusers.● Refresh:Clickittoupdatestatisticdata.● Clear:Clickittoremovestatisticdata.NoteEnablingtheTrafficStatisticsfeaturemaydegradetherouter’sperformance.Donotenableitunlessnecessary.
                                                                             72  7.3TimeThissectionletsyouconfigure,update,andmaintainthecorrecttimeontheinternalsystemclock.YoucaneitherselecttosetthetimeanddatemanuallyorautomaticallyobtaintheGMTtimefromInternet.NotethattheGMTtimeisobtainedonlywhentherouterisconnectedtotheInternet.● SyncwithInternettimeservers:TimeanddatewillbeupdatedautomaticallyfromtheInternet.● SyncInterval:SpecifyatimeintervalforperiodicupdateoftimeanddateinformationfromtheInternet.● TimeZone:Selectyourcurrenttimezone.● SyncwithYourPC:ClickittocopyyourPC’stimetotherouter.7.4ChangePasswordThissectionallowsyoutochangeloginpasswordandusernameforaccessingtherouter’sWeb‐basedmanagementinterface.
                                                                             73  Bothloginpasswordandusernamearepresetto“admin”bydefault.Tochangeeitherorboth,dothefollowing:1.EnteryourcurrentusernameandpasswordinOldUserNameandOldPasswordfields.2.EnteranewusernameandanewpasswordinNewUserNameandNewPasswordfields.3.ClickSave.NoteForsecuritypurpose,itishighlyrecommendedthatyouchangethedefaultloginpasswordandusernameaspartoftheinitialconfigurationofyourrouter.7.5BackupThisfeatureallowsyoutobackupcurrentsettings.Onceyouhaveconfiguredtherouter,youcansavethesesettingstoaconfigurationfileonyourlocalharddrive.Theconfigurationfilecanlaterbeimportedtoyourrouterincasetherouterisresettofactorydefaultsettings.● Backup:Tobackupsettings,clicktheBackupbuttonandspecifyadirectorytosavesettingstoyourlocalhardware.
                                                                             74  7.6RestoreThissectionallowsyoutorestoresettingspreviouslyconfiguredandsavedtoyourlocalharddrive.
                                                                             75  7.7FirmwareUpdateFirmwareupgradeisreleasedperiodicallytoimprovethefunctionalityofyourrouter,andalsotoaddanynewfeatures.Ifyourunintoaproblemwithaspecificfeatureoftherouteryoucouldlogontoourwebsite(www.tendacn.com)todownloadthelatestfirmwaretoupdateyourdevice.Toupdatefirmware,dothefollowing:1.ClickBrowsetolocateandselectthefirmwarefileandUpgradetoupdateyourrouter.2.Devicerestartsautomaticallywhentheupgradeprocessiscompleted.NoteDONOTpowerofftherouterwhentheupgradeisinprocessotherwisetheroutermaybepermanentlydamaged.Whentheupgradeiscompleted,therouterwillautomaticallyreboot.Thefirmwareupgrademaytakeafewminutestocompletesopleasewaitfortheprocesstofinish.7.8RestoretoFactoryDefaultClicktheRestoreFactoryDefaultbuttontoresettheroutertoitsfactorydefaultsettings.● DefaultIPAddress:192.168.0.1● DefaultSubnetMask:255.255.255.0● DefaultUserName:admin● DefaultPassword:admin
                                                                             76  7.9RebootThissectionallowsyoutoreboottherouter.
                                                                                 77  Appendix1ConfigurePCInthissectionweexplainhowtoconfigureyourPC’sTCP/IPsettings.WIN7OS1.ClickStart>ControlPanel;2.EnterControlPanelandclickNetworkandInternet;3.ClickNetworkandSharingCenter;
                                                                                 78  4.ClickChangeadaptersettings;5.RightclickLocalAreaConnectionandselectProperties;
                                                                                 79  6.SelectInternetProtocolVersion4(TCP/IPv4)andclickProperties;7.SelectObtainanIPaddressautomaticallyandclickOKtosavetheconfigurations.BacktoConfigureRouter
                                                                                 80  WindowsXPOS1.RightclickMyNetworkPlacesandselectProperties;2.RightclickLocalandselectProperties;3.SelectInternetProtocol(TCP/IP)andclickProperties;
                                                                                 81  4.SelectObtainanIPaddressautomaticallyandclickOKtosavethesettings.BacktoConfigureRouter
                                                                                  82  Appendix2JoinaWirelessConnectionNoteForwirelessconnection,desktopcomputersneedtobeequippedwithwirelessnetworkcardsfirst.Win7OS1.ClickStart>ControlPanel;2.ClickNetworkandInternet;
                                                                                  83  3.ClickNetworkandSharingCenter;4.ClickChangeadaptersettings;1. ClickWirelessNetworkConnectionaccordinglyandselectConnect/Disconnect;
                                                                                  84  2. Selectthenetworkyouwishtoconnect,suchasTenda‐000090;Accordingtodifferentciphertypes,heregoestwosituations:A. Ifyouhaveconfiguredsecuritykey,clickConnect;Whenthefollowingdialogboxappears,itindicatesconnectingtothenetwork;EnteryoursecuritykeyandclickOK;
                                                                                  85  B.Ifyouhaveconfiguredsecuritykey,clickConnect;Whenthefollowingdialogboxappears,itindicatesconnectingtothenetwork;7.WhendisplayingConnected,youhaveconnectedtonetworksuccessfully.
                                                                                     86  Appendix3FAQsThissectionprovidessolutionstoproblemsthatmayoccurduringinstallationandoperationofthedevice.Readthefollowingifyouarerunningintoproblems.Ifyourproblemisnotcoveredhere,pleasefeelfreetogotowww.tendacn.comtofindasolutionoremailyourproblemsto:support@tenda.com.cnorsupport02@tenda.com.cn.Wewillbemorethanhappytohelpyououtassoonaspossible.1.Q:Ienteredthedevice’sLANIPaddressinthewebbrowserbutcannotaccesstheutility.WhatshouldIdo?a.Checkwhetherdeviceisfunctioningcorrectly.TheSYSLEDshouldblinkafewsecondsafterdeviceispoweredup.Ifitdoesnotlightup,thensomeinternalfaultsmayhaveoccurred.b.Verifyphysicalconnectivitybycheckingwhetheracorrespondingport’slinkLEDlightsup.Ifnot,tryadifferentcable.NotethatanilluminatedlightdoesNOTALWAYSindicatesuccessfulconnectivity.c.Runthe"ping192.168.0.1"command.Ifyougetrepliesfrom192.168.0.1,openyourbrowserandverifythatProxyserverisdisabled.Incasethatpingfails,pressandholdthe"RESET"buttononyourdevicefor7secondstorestorefactorydefaultsettings,andthenrun"ping192.168.0.1"again.d.Contactourtechnicalsupportforhelpiftheproblemstillexistsafteryoutriedalltheabove.2.Q:WhatshouldIdoifIforgettheloginpasswordtomydevice?A:ResetyourdevicebypressingtheResetbuttonforover7seconds.NoteAllsettingswillbedeletedandrestoredtofactorydefaultsonceyoupressedtheResetbutton.3.Q:MycomputershowsanIPaddressconflicterrorafterhavingconnectedtothedevice.WhatshouldIdo?a.CheckifthereareotherDHCPserverspresentinyourLAN.IfthereareotherDHCPserversexceptyourrouter,disablethemimmediately.b.ThedefaultIPaddressofthedeviceis192.168.0.1;makesurethisaddressisnotusedbyanotherPCordevice.IncasethattwocomputersordevicessharethesameIPaddresses,changeeithertoadifferentaddress.4.Q:IcannotaccessInternetandsend/receiveemails;whatshouldIdo?ThisproblemmainlyhappenstouserswhousethePPPoEorDynamicIPInternetconnectiontype.YouneedtochangetheMTUsize(1492bydefault).Inthiscase,goto“WANSettings”tochangetheMTUvaluefromdefault1480to1450or1400,etc.5.Q:HowdoIshareresourcesonmycomputerwithusersonInternetthroughthedevice?ToletInternetusersaccessinternalserversonyourLANsuchase‐mailserver,Web,FTP,viathedevice,usethe"VirtualServer"feature.Todoso,followstepsbelow:Step1:Createyourinternalserver,makesuretheLANuserscanaccesstheseserversandyouneedtoknowrelatedserviceports,forexample,portnumberforWebserveris80;FTPis21;SMTPis25andPOP3is110.Step2:EnterPortForwarding(alsocalledPortRangeForwardingonsomeproducts)screenfromdevicewebUI.Step3:CompletetheStartPort(alsocalledExternal/ExtPortonsomeproducts)andEndPort(alsoknownasInternalPortonsomeproducts)fields,say,80‐80.Step4:Inputtheinternalserver’sIPaddress.Forexample,assumingthatyourWebserver’sIPaddressis192.168.0.10,thensimplyinputit.Step5:Selectaproperprotocoltype:TCP,UDP,orBothdependingonwhichprotocol(s)yourinternalhostisusing.Step6:ClickEnableandsaveyoursettings.Foryourreference,wecollectedalistofsomewell‐knownserviceportsasfollows:ServerProtocol ServicePortWebServerTCP80
                                                                                     87  FTPServerTCP21TelnetTCP23NetMeetingTCP1503、1720MSNMessenger TCP/UDPFileSend:6891‐6900(TCP)Voice:1863,6901(TCP)Voice:1863,5190(UDP)PPTPVPNTCP1723Iphone5.0TCP22555SMTPTCP25POP3TCP110
                                                                              88  Appendix4GlossaryChannelAcommunicationchannel,alsoknownaschannel,referseithertoaphysicaltransmissionmediumsuchasawireortoalogicalconnectionoveramultiplexedmediumsuchasaradiochannel.Itisusedtotransferaninformationsignal,suchasadigitalbitstream,fromoneormoretransmitterstooneormorereceivers.IfthereisonlyoneAPintherange,selectanychannelyoulike.ThedefaultisAuto.IfthereareseveralAPscoexistinginthesamearea,itisadvisablethatyouselectadifferentchannelforeachAPtooperateon,minimizingtheinterferencebetweenneighboringAPs.Forexample,if3American‐standardAPscoexistinonearea,youcansettheirchannelsrespectivelyto1,6and11toavoidmutualinterference.SSIDServicesetidentifier(SSID)isusedtoidentifyaparticular802.11wirelessLAN.Itisthenameofaspecificwirelessnetwork.ToletyourwirelessnetworkadapterroamamongdifferentAPs,youmustsetallAPs’SSIDtothesamename.WPA/WPA2TheWPAprotocolimplementsthemajorityoftheIEEE802.11istandard.ItenhancesdataencryptionthroughtheTemporalKeyIntegrityProtocol(TKIP)whichisa128‐bitper‐packetkey,meaningthatitdynamicallygeneratesanewkeyforeachpacket.WPAalsoincludesamessageintegritycheckfeaturetopreventdatapacketsfrombeinghamperedwith.Onlyauthorizednetworkuserscanaccessthewirelessnetwork.ThelaterWPA2protocolfeaturescompliancewiththefullIEEE802.11istandardandusesAdvancedEncryptionStandard(AES)inadditiontoTKIPencryptionprotocoltoguaranteebettersecuritythanthatprovidedbyWEPorWPA.Currently,WPAissupportedbyWindowsXPSP1.IEEE802.1XAuthenticationIEEE802.1XAuthenticationisanIEEEStandardforport‐basedNetworkAccessControl(PNAC).ItispartoftheIEEE802.1groupofnetworkingprotocols.ItprovidesanauthenticationmechanismtodeviceswishingtoattachtoaLANorWLAN.IEEE802.1XdefinestheencapsulationofEAPoverLANorEAPOL.802.1Xauthenticationinvolvesthreeparties:asupplicant,anauthenticator,andanauthenticationserver.Thesupplicantisaclientdevice(suchasalaptop)thatwishestoattachtotheLAN/WLAN‐thoughtheterm'supplicant'isalsousedinterchangeablytorefertothesoftwarerunningontheclientthatprovidescredentialstotheauthenticator.Theauthenticatorisanetworkdevice,suchasanEthernetswitchorwirelessaccesspoint;andtheauthenticationserveristypicallyahostrunningsoftwaresupportingtheRADIUSandEAPprotocols.Theauthenticatoractslikeasecurityguardtoaprotectednetwork.Thesupplicant(i.e.clientdevice)isnotallowedaccessthroughtheauthenticatortotheprotectedsideofthenetworkuntilthesupplicant’sidentityhasbeenvalidatedandauthorized.With802.1Xport‐basedauthentication,thesupplicantprovidescredentials,suchasusername/passwordordigitalcertificate,totheauthenticator,andtheauthenticatorforwardsthecredentialstotheauthenticationserverforverification.Iftheauthenticationserverdeterminesthecredentialsarevalid,thesupplicant(clientdevice)isallowedtoaccessresourceslocatedontheprotectedsideofthenetwork.PPPOEThePoint‐to‐PointProtocoloverEthernet(PPPoE)isanetworkprotocolforencapsulatingPPPframesinsideEthernetframes.IntegratedPPPprotocolimplementsauthentication,encryption,andcompressionfunctionsthattraditionalEthernetcannotprovideandcanalsobeusedinthecablemodemanddigitalsubscriberline(DSL)andEthernetthatprovideaccessservicetotheusers.Essentially,itisaprotocolthatallowstoestablishapoint‐to‐pointtunnelbetweentwoEthernetinterfaceswithinanEthernetbroadcastdomain.
                                                                              89  DNSTheDomainNameSystem(DNS)isahierarchicaldistributednamingsystemforcomputers,services,oranyresourceconnectedtotheInternetoraprivatenetwork.Itassociatesvariousinformationwithdomainnamesassignedtoeachoftheparticipatingentities.ADomainNameServiceresolvesqueriesforthesenamesintoIPaddressesforthepurposeoflocatingcomputerservicesanddevicesworldwide.Anoften‐usedanalogytoexplaintheDomainNameSystemisthatitservesasthephonebookfortheInternetbytranslatinghuman‐friendlycomputerhostnamesintoIPaddresses.WDSAwirelessdistributionsystem(WDS)isasystemenablingthewirelessinterconnectionofaccesspointsinanIEEE802.11network.Itallowsawirelessnetworktobeexpandedusingmultipleaccesspointswithoutthetraditionalrequirementforawiredbackbonetolinkthem.Allbasestationsinawirelessdistributionsystemmustbeconfiguredtousethesameradiochannel,methodofencryption(none,WEP,orWPA)andthesameencryptionkeys.Theymaybeconfiguredtodifferentservicesetidentifiers.WDSalsorequireseverybasestationtobeconfiguredtoforwardtoothersinthesystem.WDSmayalsobeconsideredarepeatermodebecauseitappearstobridgeandacceptwirelessclientsatthesametime(unliketraditionalbridging).WDSmaybeincompatiblebetweendifferentproducts(evenoccasionallyfromthesamevendor)sinceitisnotcertifiedbytheWi‐FiAlliance.WDSmayprovidetwomodesofwirelessAP‐to‐APconnectivity:Wirelessbridging,inwhichWDSAPscommunicateonlywitheachotheranddon'tallowwirelessclientsorstations(STA)toaccessthem.Wirelessrepeating,inwhichAPscommunicatewitheachotherandwithwirelessSTAs.DMZIncomputersecurity,aDMZ(sometimesreferredtoasaperimeternetworking)isaphysicalorlogicalsubnetworkthatcontainsandexposesanorganization'sexternal‐facingservicestoalargeruntrustednetwork,usuallytheInternet.ThepurposeofaDMZistoaddanadditionallayerofsecuritytoanorganization'slocalareanetwork(LAN);anexternalattackeronlyhasaccesstoequipmentintheDMZ,ratherthananyotherpartofthenetwork.HostsintheDMZhavelimitedconnectivitytospecifichostsintheinternalnetwork,althoughcommunicationwithotherhostsintheDMZandtotheexternalnetworkisallowed.ThisallowshostsintheDMZtoprovideservicestoboththeinternalandexternalnetwork,whileaninterveningfirewallcontrolsthetrafficbetweentheDMZserversandtheinternalnetworkclients.AnyservicessuchasWebservers,Mailservers,FTPserversandVoIPservers,etc.thatarebeingprovidedtousersontheexternalnetworkcanbeplacedintheDMZ.
 90  Appendix5RemoveWirelessNetworkfromYourPCIfyouchangewirelesssettingsonyourwirelessdevice,youmustremovethemaccordinglyyourPC;otherwise,youmaynotbeabletowirelesslyconnecttothedevice.BelowdescribeshowtodoremoveawirelessnetworkfromyourPC.WindowsXPOS1.RightclickMyNetworkPlacesandselectProperties.2.ClickWirelessNetworkConnectionandthenselectProperties.3.ClickWirelessNetworks,selecttheitemunderPreferrednetworksandthenclicktheRemovebutton.
 91  Windows7OS1.ClickNetworkfromyourdesktopandselectProperties.2.SelectManageWirelessNetworks.3.ClickthewirelessconnectionandselectRemovenetwork.
 92  Appendix6SafetyandEmissionStatementCEMarkWarningThisisaClassBproductinadomesticenvironment,thisproductmaycauseradiointerference,inwhichcasetheusermayberequiredtotakeadequatemeasures.ThisdevicecomplieswithEU1999/5/EC.NOTE:(1)ThemanufacturerisnotresponsibleforanyradioorTVinterferencecausedbyunauthorizedmodificationstothisequipment.(2)Toavoidunnecessaryradiationinterference,itisrecommendedtouseashieldedRJ45cable.FCCStatementThisdevicecomplieswithPart15oftheFCCRules.Operationissubjecttothefollowingtwoconditions:(1)Thisdevicemaynotcauseharmfulinterference,and(2)thisdevicemustacceptanyinterferencereceived,includinginterferencethatmaycauseundesiredoperation.ThisequipmenthasbeentestedandfoundtocomplywiththelimitsforaClassBdigitaldevice,pursuanttoPart15oftheFCCRules.Theselimitsaredesignedtoprovidereasonableprotectionagainstharmfulinterferenceinaresidentialinstallation.Thisequipmentgenerates,usesandcanradiateradiofrequencyenergyand,ifnotinstalledandusedinaccordancewiththeinstructions,maycauseharmfulinterferencetoradiocommunications.However,thereisnoguaranteethatinterferencewillnotoccurinaparticularinstallation.Ifthisequipmentdoescauseharmfulinterferencetoradioortelevisionreception,whichcanbedeterminedbyturningtheequipmentoffandon,theuserisencouragedtotrytocorrecttheinterferencebyoneofthefollowingmeasures:‐ Reorientorrelocatethereceivingantenna.‐ Increasetheseparationbetweentheequipmentandreceiver.‐ Connecttheequipmentintoanoutletonacircuitdifferentfromthattowhichthereceiverisconnected.‐Consultthedealeroranexperiencedradio/TVtechnicianforhelp.FCCCaution:Anychangesormodificationsnotexpresslyapprovedbythepartyresponsibleforcompliancecouldvoidtheuser'sauthoritytooperatethisequipment.Thistransmittermustnotbeco‐locatedoroperatinginconjunctionwithanyotherantennaortransmitter.ThemanufacturerisnotresponsibleforanyradioorTVinterferencecausedbyunauthorizedmodificationstothisequipment.RadiationExposureStatementThisequipmentcomplieswithFCCradiationexposurelimitssetforthforanuncontrolledenvironment.Thisequipmentshouldbeinstalledandoperatedwithminimumdistance20cmbetweentheradiator&yourbody.NOTE:(1)ThemanufacturerisnotresponsibleforanyradioorTVinterferencecausedbyunauthorizedmodificationstothisequipment.(2)Toavoidunnecessaryradiationinterference,itisrecommendedtouseashieldedRJ45cable.
 93  NCCNotice經型式認證合格之低功率射頻電機,非經許可,公司、商號或使用者均不得擅自變更頻率、加大功率或變更設計之特性及功能。低功率射頻電機之作用不得影響飛航安全及幹擾合法通信;經發現有幹擾現象時,應立即停用,並改善至無幹擾時方得繼續使用。前項合法通信,指依電信規定作業之無線電信。低功率射頻電機須忍受合法通信或工業、科學及醫療用電波輻射性電機設備之幹擾。

Navigation menu