UTT TECHNOLOGIES REG02-UTT Wireless Router User Manual

SHANGHAI UTT TECHNOLOGIES CO., LTD. Wireless Router

User Manual

AC750W Wireless RouterAdvanced Configuration GuideV1.0
UTT Technologies Table of Contentshttp://www.uttglobal.com Page 2UTT Technologies Co., Ltd.http://www.uttglobal.com
Copyright NoticeCopyright © 2000-2011. UTT Technologies Co., Ltd. All rights reserved.Information in this document, including URL and other Internet Web site references, issubject to change without further notice.Unless otherwise noted, the companies, organizations, people and events described inthe examples of this document are fictitious, which have no relationship with any realcompany, organization, people and event.Complying with all applicable copyright laws is the responsibility of the user. No part of thisdocument may be reproduced, stored in or introduced into a retrieval system, ortransmitted in any form or by any means (electronic, mechanical, photocopying, recording,or otherwise), or used for any commercial and profit purposes, without the express priorwritten permission of UTT Technologies Co., Ltd.UTT Technologies Co., Ltd. has the patents, patent applications, trademarks, trademarkapplications, copyrights and other intellectual property rights that are mentioned in thisdocument. You have no license to use these patents, trademarks, copyrights or otherintellectual property rights, without the express prior written permission of UTTTechnologies Co., Ltd.艾泰®and UTT®are the registered trademarks of Technologies Co., Ltd.HiPER ®is the registered trademark of UTT Technologies Co., Ltd.Unless otherwise announced, the products, trademarks and patents of other companies,organizations or people mentioned herein are the properties of their respective owners.Product Number (PN): 0904-0003-008Document Number (DN): PR-PMMU-1150.50-PPR-EN-1.0A
UTT Technologies Table of Contentshttp://www.uttglobal.com Page ITable of ContentsAbout This Manual............................................................................................................................... 10.1 Scope.......................................................................................................................................10.2 Web UI Style........................................................................................................................... 10.3 Documents Conventions.......................................................................................................20.3.1 Symbol Conventions..................................................................................................... 20.3.2 Other Conventions.........................................................................................................20.3.3 Common Button Descriptions......................................................................................20.3.4 Detailed Description of List.......................................................................................... 30.4 Factory Default Settings........................................................................................................50.5 Document Organization........................................................................................................ 50.6 Contact Information................................................................................................................9Chapter 1 Product Overview..................................................................................................101.1 Product Brief.........................................................................................................................101.2 Key Features.........................................................................................................................111.3 Physical Specification..........................................................................................................12Chapter 2 Hardware Installation...........................................................................................132.1 Physical Characteristics......................................................................................................132.1.1 Front Panel...................................................................................................................132.1.2 Rear Panel....................................................................................................................142.2 Installation Procedure..........................................................................................................15Chapter 3 Quick Setup............................................................................................................ 183.1 Configuring Your Computer................................................................................................183.2 Logging in to the Wireless Router.....................................................................................203.3 Setup Wizard........................................................................................................................ 223.3.1 Running the Setup Wizard.........................................................................................223.3.2 Setup Wizard - Internet Access Mode......................................................................233.3.3 Setup Wizard - Internet Connection Settings..........................................................243.3.4 Setup Wizard - Wireless Settings............................................................................. 32Chapter 4 Start Menu...............................................................................................................344.1 Setup Wizard........................................................................................................................ 344.2 System Status...................................................................................................................... 344.2.1 Wired Status.................................................................................................................344.2.2 Wireless Status............................................................................................................35
UTT Technologies Table of Contentshttp://www.uttglobal.com Page II4.3 Interface Traffic.....................................................................................................................374.4 Restart................................................................................................................................... 39Chapter 5 Network....................................................................................................................405.1 WAN Settings....................................................................................................................... 405.1.1 Internet Connection List..............................................................................................405.1.2 Internet Connection Settings..................................................................................... 445.1.3 MAC Address Clone....................................................................................................505.2 Load Balancing.....................................................................................................................515.2.1 Introduction to Load Balancing and Failover...........................................................515.2.2 Load Balancing Global Settings................................................................................535.2.3 Load Balancing List.....................................................................................................545.2.4 Connection Detection Settings..................................................................................555.2.5 How to Configure Connection Detection Settings..................................................575.3 LAN Settings.........................................................................................................................585.4 DHCP Server........................................................................................................................595.4.1 DHCP Server Settings................................................................................................595.4.2 Static DHCP................................................................................................................. 615.4.3 DHCP Client List..........................................................................................................635.4.4 Configuration Example for DHCP.............................................................................655.5 DDNS.....................................................................................................................................685.5.1 Introduction to DDNS..................................................................................................685.5.2 Apply for a DDNS Account.........................................................................................685.5.3 DDNS Settings.............................................................................................................695.5.4 DDNS Status................................................................................................................715.5.5 DDNS Verification........................................................................................................725.6 UPnP......................................................................................................................................735.6.1 Enable UPnP................................................................................................................735.6.2 UPnP Port Forwarding List.........................................................................................73Chapter 6 Wireless................................................................................................................... 756.1 Basic Wireless Settings...................................................................................................... 756.1.1 AP Mode....................................................................................................................... 756.1.2 APClient Mode.............................................................................................................776.1.3 WDS.............................................................................................................................. 796.1.4 Configuration Example for WDS...............................................................................846.2 Wireless Security Settings..................................................................................................886.2.1 Disabling Wireless Security....................................................................................... 886.2.2 Wireless Security Settings – WEP............................................................................886.2.3 Wireless Security Settings - WPA/WPA2.................................................................906.2.4 Wireless Security Settings - WPA-PSK/WPA2-PSK.............................................. 916.3 Wireless MAC Address Filtering........................................................................................936.3.1 MAC Address Filtering Global Settings....................................................................936.3.2 MAC Address Filtering List.........................................................................................94
UTT Technologies Table of Contentshttp://www.uttglobal.com Page III6.3.3 MAC Address Filtering Settings................................................................................ 946.3.4 How to Configure MAC Address Filtering................................................................956.3.5 Configuration Example for MAC Address Filtering.................................................956.4 Advanced Wireless Settings.............................................................................................. 976.5 Wireless Client List.............................................................................................................. 99Chapter 7 Advanced.............................................................................................................. 1007.1 NAT and DMZ.....................................................................................................................1007.1.1 Introduction to NAT Features...................................................................................1007.1.2 Port Forwarding.........................................................................................................1037.1.3 NAT Rule.....................................................................................................................1067.1.4 DMZ............................................................................................................................. 1127.2 IP/MAC Binding..................................................................................................................1147.2.1 Introduction to IP/MAC Binding............................................................................... 1147.2.2 IP/MAC Binding Global Settings............................................................................. 1157.2.3 IP/MAC Binding List.................................................................................................. 1167.2.4 IP/MAC Binding Settings..........................................................................................1177.2.5 How to Add IP/MAC Bindings..................................................................................1187.2.6 Internet Whitelist and Blacklist.................................................................................1197.3 Static Route........................................................................................................................1227.3.1 Introduction to Static Route..................................................................................... 1227.3.2 Static Route List........................................................................................................ 1227.3.3 Static Route Settings................................................................................................ 1237.3.4 How to Add Static Routes........................................................................................ 1247.4 PPPoE Server.................................................................................................................... 1267.4.1 PPPoE Overview.......................................................................................................1267.4.2 PPPoE Server Global Settings................................................................................1287.4.3 PPPoE Account List..................................................................................................1297.4.4 PPPoE Account Settings..........................................................................................1297.4.5 PPPoE User Status...................................................................................................130Chapter 8 User Management...............................................................................................1328.1 Global Management..........................................................................................................1328.1.1 Global Management Policy Settings...................................................................... 1328.1.2 An Example for Global Management Policy......................................................... 1348.2 Group Management.......................................................................................................... 1358.2.1 Group Management Policy List...............................................................................1358.2.2 Group Management Policy Settings.......................................................................1368.2.3 Execution Order of Group Management Policies.................................................1388.2.4 Priorities of Global and Group Management Policies and Access Rules.........1388.2.5 An Example for Group Management Policy..........................................................138Chapter 9 Firewall.................................................................................................................. 1439.1 Access Control...................................................................................................................143
UTT Technologies Table of Contentshttp://www.uttglobal.com Page IV9.1.1 Introduction to Access Control................................................................................ 1439.1.2 Access Rule List........................................................................................................1459.1.3 Access Rule Settings................................................................................................1469.1.4 Configuration Examples for Access Rule.............................................................. 1519.2 Domain Filtering.................................................................................................................1579.2.1 Domain Filtering Global Settings............................................................................ 1579.2.2 Domain Filtering Settings.........................................................................................1579.3 Attack Prevention...............................................................................................................159Chapter 10 VPN.........................................................................................................................16010.1 Introduction to PPTP Implementation.............................................................................16010.1.1 Protocol Overview.....................................................................................................16110.1.2 Packet Flow - PPTP Client.......................................................................................16210.1.3 User Authentication...................................................................................................16310.1.4 Data Confidentiality...................................................................................................16310.1.5 MTU and Fragmentation.......................................................................................... 16310.1.6 PPTP Sessions Limit................................................................................................ 16510.2 PPTP Client Settings.........................................................................................................16510.3 PPTP Client List.................................................................................................................16610.4 Configuration Example for PPTP Client.........................................................................167Chapter 11 System Administration......................................................................................16911.1 Administrator...................................................................................................................... 16911.1.1 Administrator List.......................................................................................................16911.1.2 Administrator Settings.............................................................................................. 17011.2 System Time.......................................................................................................................17111.3 Configuration......................................................................................................................17311.3.1 Backup Configuration............................................................................................... 17311.3.2 Restore Configuration...............................................................................................17311.3.3 Reset to Factory Defaults........................................................................................ 17411.4 Firmware Upgrade.............................................................................................................17511.5 Remote Access..................................................................................................................17711.6 Scheduled Task..................................................................................................................17811.6.1 Scheduled Task Settings..........................................................................................17811.6.2 Scheduled Task List..................................................................................................179Chapter 12 Status.....................................................................................................................18012.1 System Status.................................................................................................................... 18012.2 Traffic Statistics..................................................................................................................18212.3 System Information............................................................................................................183Chapter 13 Support..................................................................................................................185Appendix A How to Configure Your PC......................................................................................186
UTT Technologies Table of Contentshttp://www.uttglobal.com Page VAppendix B FAQ............................................................................................................................... 1901. How to connect the Wireless Router to the Internet using PPPoE?......................... 1902. How to connect the Wireless Router to the Internet using Static IP?....................... 1913. How to connect the Wireless Router to the Internet using DHCP?...........................1914. How to reset the Wireless Router to factory default settings?........................................ 193Appendix C Common IP Protocols..............................................................................................194Appendix D Common Service Ports........................................................................................... 195Appendix E Figure Index................................................................................................................200Appendix F Table Index..................................................................................................................205
UTT Technologies About This Manualhttp://www.uttglobal.com Page 1About This Manual0.1 ScopeThis guide mainly describes how to install and configure the AC750W Wireless Routeroffered by UTT Technologies Co., Ltd. For more information, please visit our website atwww.uttglobal.com.0.2 Web UI StyleThe Web UI style complies with the browser standard, which is as follows:Radio Button: It allows you to choose only one of a predefined set of options.Check Box: It allows you to choose one or more options.Button: It allows you to click to perform an action.Text Box: It allows you to enter text information.List Box: It allows you to select one or more items froma list contained within a static, multiple line text box.Drop-down List: It allows you to choose one item from a list. When adrop-down list is inactive, it displays a single item. When activated, it drops down a list ofitems, from which you may select one.
UTT Technologies About This Manualhttp://www.uttglobal.com Page 20.3 Documents Conventions0.3.1 Symbol Conventions: It represents a configuration parameter. Parameters may be optional or required.Required parameters are indicated by a red asterisk (*).: It represents a button.: It represents one or more notes.0.3.2 Other Conventions0.3.2.1 Convention for a Page PathFirst Level Menu Item > Second Level Menu Item (bold font) means the menu path toopen a page. For example, Wireless > MAC Filtering means that in the Web UI, click thefirst level menu item Wireless firstly, and then click the second level menu item MACFiltering to open the corresponding page.0.3.2.2 Convention for Clicking a ButtonClick the XXX button (XXX is the name of the button, bold font) means performing thecorresponding operation. E.g., click the Delete button means performing the deleteoperation, the Delete button is shown as .0.3.3 Common Button DescriptionsThe following table describes the commonly-used buttons in the Web UI.Button DescriptionClick to save your changes.
UTT Technologies About This Manualhttp://www.uttglobal.com Page 3Click to revert to the last saved settings.Click to delete the selected entry(s).Click to display the latest information on the page.Click to clear all the statistics on the page.Click to go back to the previous page.Table 0-1 Common Button Descriptions0.3.4 Detailed Description of List0.3.4.1 Basic Elements and FeaturesThe Web UI contains two kinds of lists: editable list and read-only list.●An editable list is used to add, display, modify and delete the configuration entries.●A read-only list is used to display the system status information which is not editable.Let’s take the editable MAC Address Filtering List (see Figure 0-1) as an example toexplain the basic elements and features of the list.NoteOnly the editable lists support Add, Modify, and Delete operations. The read-only listsdon’t support them.Figure 0- 1 MAC Address Filtering ListThe following table describes the basic elements and features of the list.
UTT Technologies About This Manualhttp://www.uttglobal.com Page 4Element DescriptionCurrent page number/ total pages, the example means that the currentpage is the first page, and total one page.Click to jump to the first page.Click to jump to the previous page.Click to jump to the next page.Click to jump to the last page.Enter page number in text field, then click Go to or press <Enter> keyto jump to that page.Enter the text string you want to search for in this text box, then press<Enter> key to display all the matched entries. In addition, you can dothe search within the displayed results. If you want to display all theentries, you only need clear the text box and then press <Enter> key.Note that the matching rule is substring matching, that is, it will searchfor and display those entries that contain the specified text string.Configured number / maximum number, the example means that thereare 2 configured MAC address filtering entries, and the maximumnumber of MAC address filtering allowed is 50.Click to go to the setup page to modify the corresponding entry.Click to delete the corresponding entry.Click (add the check mark) to select all the entries in the current page.Click again (remove the check mark) to unselect all the entries in thecurrent page.Click to go to the setup page to add a new entry to the list.Click to delete all the entries in the list.To delete one or more entries, select the leftmost check boxes of them,and then click the Delete button.Table 0-2 Basic Elements and Features of the List
UTT Technologies About This Manualhttp://www.uttglobal.com Page 50.3.4.2 Sorting FunctionAll the lists in the Web UI support sorting function. The operation is as follows: You canclick any column header to sort the entries in a list by that column. Click once to sort theentries in descending order, click again to sort them in ascending order. Click a third timeto sort them in descending order, and so forth. After sorted, the list will be displayed fromthe first page.0.4 Factory Default SettingsThe following table lists the default values of several important parameters.Parameter Default Value DescriptionAdministrator User Name admin You can use the administrator account to loginto the Wireless Router’s Web UI.Note: Both the User Name and Password arecase sensitive.Administrator Password adminLAN IP Address 192.168.1.1 They are the IP address and subnet mask ofthe Wireless Router’s LAN interface. You canuse this IP address to access and manage theWireless Router.LAN Subnet Mask 255.255.255.0SSID UTT-HIPER_XXXXXXTo connect to the Wireless Router, wirelessclients must use the same SSID as theWireless Router. Therein, “XXXXXX” is theWireless Router’s serial number inhexadecimal format.Table 0-3 Factory Default Settings0.5 Document OrganizationThis guide mainly describes the settings and applications of the AC750W Wireless Router,which include product overview, hardware installation, quick setup, start menu, network,wireless, advanced, user management, firewall, VPN, system administration, status andsupport.
UTT Technologies About This Manualhttp://www.uttglobal.com Page 6Chapter 1 Product OverviewThis chapter describes functions and features of the Wireless Router.Chapter 2 Hardware InstallationThis chapter describes how to install the Wireless Router.Chapter 3 Quick SetupThis chapter describes the following contents:•How to install and configure TCP/IP properties on your PC.•How to login to the Wireless Router; and introduction to the WEB UI layout.•How to use the Setup Wizard to quickly configure the basic parameters for theWireless Router to operate properly.Chapter 4 Start MenuThis chapter describes how to quickly go to the following pages to configure the relatedfeatures via the Start menu items:•Setup Wizard: How to configure the basic parameters for the Wireless Router tooperate properly.•System Status: How to view wired and wireless status of the Wireless Router.•Interface Traffic: How to view the real-time traffic chart for each interface, and theingress and egress traffic statistics for each interface.•Restart: How to restart the Wireless Router.Chapter 5 NetworkThis chapter describes how to configure the basic network parameters of the WirelessRouter, including:•WAN: How to configure Internet connections and view their configuration and status.•Load Balancing: How to configure the load balancing feature which includesdetection and weight settings, global settings; and how to view the load balancing list.•LAN Settings: How to configure the parameters of the LAN interface, such as IPaddress, subnet mask, MAC address, and so on.•DHCP Server: How to configure DHCP server, DNS proxy, static DHCP; how to viewthe static DHCP list and DHCP client list.•DDNS: How to apply for DDNS account and configure DDNS service, and viewDDNS status.•UPnP: How to enable or disable UPnP, and view the UPnP port forwarding list.Chapter 6 Wireless
UTT Technologies About This Manualhttp://www.uttglobal.com Page 7This chapter describes how to configure the wireless features of the Wireless Router,including:•Basic Wireless Settings: How to configure basic wireless settings.•Wireless Security Settings: How to configure wireless security settings.•Wireless MAC Address Filtering: How to filter the wireless clients based on theirMAC addresses.•Advanced Wireless Settings: How to configure advanced wireless settings.•Wireless Client List: How to view the status of the wireless clients, and easilyconfigure MAC address filtering entries via the list.Chapter 7 AdvancedThis chapter describes how to configure the advanced features of the Wireless Router,including:•NAT and DMZ: How to configure and view NAT rules, port forwarding entries andDMZ host.•IP/MAC Binding: How to configure IP/MAC bindings to prevent IP address spoofing.How to configure an Internet whitelist or blacklist for the LAN users.•Static Route: How to configure and view the static routes.•PPPoE Server: How to configure PPPoE server global settings and PPPoE accountsettings, and view PPPoE user status.Chapter 8 User ManagementThis chapter describes how to control and manage the Internet behaviors of the LANusers based on schedule, including:•Global Management: How to allow or block the LAN users from using popular IM(e.g., QQ, MSN) and P2P applications (e.g., Bit Comet, Bit Spirit, Thunder Search)based on schedule.•Group Management: How to allow or block the LAN users from using popular IMand P2P applications based on user group and schedule.Chapter 9 FirewallThis chapter describes how to configure firewall features, including:•Access Control: How to configure access control rules to assign Internet accessprivileges to the LAN users based on schedule, and to prevent external attacks.•Domain Filtering: How to configure domain filtering feature to block access to thespecified websites.•Attack Prevention: How to configure attack prevention features.Chapter 10 VPN
UTT Technologies About This Manualhttp://www.uttglobal.com Page 8This chapter describes the PPTP implementation, and how to configure the WirelessRouter as a PPTP client.Chapter 11 System AdministrationThis chapter describes how to perform maintenance activities on the Wireless Router,including:•Administrator: How to add, view, modify and delete the administrator accounts.•System Time: How to set the system date and time manually or automatically.•Configuration: How to backup and restore the system configuration, and reset theWireless Router to factory default settings.•Firmware upgrade: How to backup, download and upgrade firmware.•Remote Access: How to enable HTTP remote management feature to remotelyconfigure and manage the Wireless Router via Internet.•Scheduled Task: How to create and view the scheduled tasks. Now the WirelessRouter only supports one scheduled task: Restart.Chapter 12 StatusThis chapter describes how to view the system status information and statistics, including:•System Status: It displays wired and wireless status of the Wireless Router.•Traffic Statistics: It displays wired and wireless data traffic statistics of the WirelessRouter.•System Information: It displays the current system time, system up time, systemresources usage information, SN, firmware version, and system log messages.Chapter 13 SupportThis chapter describes how to link to the UTTCare, Forum, Knowledge and Reservationpage of the UTT website, which can help you quickly learn the UTT Technologies servicesystem and enjoy the most intimate and professional services.AppendixThis guide provides six appendixes, including:•Appendix A How to Configure Your PC: How to configure TCP/IP settings on aWindows XP-based computer.•Appendix B FAQ: Frequent questions and answers.•Appendix C Common IP Protocols: Provides the list of common IP protocols andtheir protocol numbers.•Appendix D Common Service Ports: Provides the list of common services and theirport numbers.
UTT Technologies About This Manualhttp://www.uttglobal.com Page 9•Appendix E Figure Index: Provides a figure index directory.•Appendix F Table Index: Provides a table index directory.0.6 Contact InformationIf you have any questions regarding the operation or installation of the AC750W WirelessRouter, please contact us in any of the following ways.•Technical Support Phone: +86-4006-120-780, +86-4006-880-780•UTT Forum: http://www.uttglobal.com/forum/•E-mail:uttglobal@utt.com.cn
UTT Technologies Chapter 1 Product Overviewhttp://www.uttglobal.com Page 10Chapter 1 Product OverviewThanks for choosing the AC750W Wireless Router from UTT Technologies Co., Ltd.This chapter describes the functions and features of the AC750W Wireless Router in brief.1.1 Product BriefThe AC750W Wireless Router is designed for small-sized businesses and branch offices,integrating wired networks with 3G and 802.11 wireless networks. In addition, it adheres tothe characteristics of UTT Technologies products: open, easy-to-use, safe, smooth, andso on.The AC750W is based on IEEE 802.11n standard and is compatible with IEEE 802.11band IEEE 802.11g standards. It provides maximum wireless transfer rate up to 300Mbps,wide wireless coverage, and stable wireless data transmission.The AC750W supports multiple security modes which include WEP, WPA-Enterprise,WPA2-Enterprise, WPA-PSK and WPA2-PSK. What’s more, it provides simple andefficient wireless MAC address filtering to improve the security of your wireless network.The AC750W supports DHCP server, NAT, static route, DDNS, IP/MAC binding, PPPoEserver and other advanced features. Furthermore, it provides feature-rich usermanagement, which can help you control and manage the Internet behaviors of the LANusers based on schedule and address group, including QQ, MSN and P2P applications(e.g., Bit Comet, Bit Spirit, and Thunder Search) control, the maximum upload anddownload rate limiting.The AC750W supports flexible firewall features like access control and domain filtering toeffectively prevent network attacks, and provide security for the LAN users.The AC750W provides a concise, intuitive, and feature-rich Web User Interface. TheSetup Wizard can help you quickly configure the basic parameters for the Wireless Routerto operate properly. The status information (System Status, Wireless Client List, TrafficStatistics, etc.) can help you identify and diagnose the source of current system problems,or predict potential system problems. In addition, the Support page provides links to theUTT website to help you quickly learn the UTT Technologies service system and enjoy themost intimate and professional services.
UTT Technologies Chapter 1 Product Overviewhttp://www.uttglobal.com Page 111.2 Key Features•Supports multiple Internet connection types: 3G, PPPoE, Static IP, DHCP and Wi-FiAP•Provides two wired WAN interfaces (WAN1 and WAN2), two wireless WAN interfaces(3G and APClient), and three 10M/100M LAN ports•Supports multiple Internet connections that provide intelligent load balancing andautomatic failover•Supports 6kV lightning protection•Conforms to IEEE 802.11n (802.11g and 802.11b Compatible).•Provides maximum wireless transfer rate up to 300Mbps•Supports multiple wireless security modes which include WEP, WPA-Enterprise,WPA2-Enterprise, WPA-PSK and WPA2-PSK•Supports hidden SSID•Supports VPN pass-through (IPSec, PPTP and L2TP)•Supports PPTP client•Supports WMM (Wi-Fi Multimedia)•Supports wireless MAC address filtering feature, whitelist, blacklist, one-click filteringof MAC addresses•Supports DHCP server•Supports DNS proxy•Supports DDNS (Dynamic Domain Name System)•Supports IP/MAC binding•Supports feature-rich PPPoE server•Supports upload and download rate limiting for the LAN users•Supports Internet behavior management for the LAN users, such as block or allowQQ, MSN and P2P applications (e.g., Bit Comet, Bit Spirit, and Thunder Search)•Supports flexible and strong firewall features•Supports IP packet filtering based on IP address, protocol and TCP/UDP port•Supports URL and keyword filtering•Supports DNS request filtering•Supports HTTP remote management•Provides the Web User Interface (Web UI) for ease of use•Supports firmware upgrade via the Web UI•Supports configuration backup and restore
UTT Technologies Chapter 1 Product Overviewhttp://www.uttglobal.com Page 12•Provides wireless client list and system status1.3 Physical Specification●Conforms to IEEE 802.11n, IEEE 802.11b and IEEE 802.11g standards●Conforms to IEEE 802.3 Ethernet and IEEE 802.3u Fast Ethernet standards●Supports TCP/IP, PPPoE, DHCP, ICMP, NAT, Static Route, etc.●Each physical port supports auto-negotiation for the port speed and duplex mode●Each physical port supports auto MDI/MDI-X●Provides system and port LEDs●Operating Environment:Temperature: 32° to 104° F (0° to 40° C)Relative Humidity: 10% to 90%, Non-condensingHeight: 0m to 4000m
UTT Technologies Chapter 2 Hardware Installationhttp://www.uttglobal.com Page 13Chapter 2 Hardware Installation2.1 Physical Characteristics2.1.1 Front PanelAs shown in Figure 2- 1, the LEDs are located on the front panel of the Wireless Router.The LEDs indicate the status of the system and each port. Table 2- 1 describes theseLEDs.Figure 2-1 Front Panel of the Wireless RouterLED Full Name State DescriptionPWR Power LEDOn The Wireless Router is powered on.Off The Wireless Router is powered off.SYS System LEDBlinking The system is operating properly.On The system is not operating properly.Off The system is not operating properly.USB 3G USB ModemStatus LEDOn A 3G USB modem is connected to the USB port.Off No 3G USB modem is connected.WLAN Wireless LANStatus LEDOn The wireless function is enabled.Blinking The Wireless Router is sending or receiving data over thewireless network.
UTT Technologies Chapter 2 Hardware Installationhttp://www.uttglobal.com Page 14Off The wireless function is disabled.WAN1/WAN2WAN1/WAN2Port Status LEDOn A valid link is established on the corresponding port.Blinking The corresponding port is sending or receiving data.Off No link is established on the corresponding port.1, 2, 3 LAN Port StatusLEDOn A valid link is established on the corresponding port.Blinking The corresponding port is sending or receiving data.Off No link is established on the corresponding port.Note: The Wireless Router doesn’t support WPS feature at present.Table 2-1 Description of LEDs on the Front Panel2.1.2 Rear PanelAs shown in Figure 2-2, the rear panel of the Wireless Router contains a POWERconnector, a RESET button, a USB port, two wired WAN ports (WAN1 and WAN2), threeLAN ports, a WPS button, and two Antenna ports. Note that the Wireless Router doesn’tsupport WPS feature at present.Figure 2- 2 Back Panel of the Wireless Router1. RESET ButtonIf you forget the administrator password, you need to use the RESET button to reset theWireless Router to factory default settings. The operation is as follows: While the WirelessRouter is powered on, use a pin or paper clip to press and hold the RESET button formore than 5 seconds, and then release the button. After that, the Wireless Router willrestart with factory default settings.
UTT Technologies Chapter 2 Hardware Installationhttp://www.uttglobal.com Page 15NoteThis operation will clear all the custom settings on the Wireless Router. If youremember the administrator account, it is strongly recommended that you go toAdministration > Configuration page to backup the current configuration firstly, andthen reset the Wireless Router to factory default settings.2. PortsThe Wireless Router provides three LAN ports, two WAN ports, and a USB port. Table 2- 2describes these ports.Port DescriptionLAN (1, 2, 3) They are used to connect the wired computers, hubs, switches, and other Ethernetnetwork devices on the LAN to the Wireless Router.WAN1/WAN2 They are used to connect the Wireless Router to the Internet.USB The Wireless Router provides a USB port for connecting a 3G USB Modem, whichis used to connect the Wireless Router to the Internet.Table 2-2 Description of Ports on the Rear Panel3. ComponentsComponent Number DescriptionAntenna 2 They are used to receive and transmit wireless signals.Power 1 It is used to connect the power adapter.Table 2-3 Description of Components on the Rear Panel2.2 Installation Procedure1. Selecting a Proper LocationPlease make sure that the Wireless Router is powered off before installing it. Then youneed to select a proper location to install the Wireless Router. In most cases, you caninstall it on a level surface such as a desktop or shelf.
UTT Technologies Chapter 2 Hardware Installationhttp://www.uttglobal.com Page 16NotePlease ensure that the desktop or shelf is stable and the power outlet is groundedproperly, and do not place heavy objects on the Wireless Router.2. Attach the AntennasWhen shipped, the two antennas are not connected to the Wireless Router. To attach theantennas to the Wireless Router, follow these steps:1) Remove one antenna from the box.2) Locate one antenna port (threaded knob) on the back panel of the Wireless Router,see Figure 2- 2.3) Screw the antenna in a clockwise direction to the threaded knob until firmly seated.Don’t over-tighten.4) Repeat the above steps to attach the other antenna.NotePlease make sure that you have attached the two antennas to the Wireless Routerproperly. The antennas will greatly enhance wireless communication capacity of theWireless Router.3. Connecting the Wireless Router to the LANConnect a standard network cable from a PC or switch to a LAN port of the WirelessRouter, or connect a PC to the Wireless Router wirelessly. The Wireless Router willautomatically adapt to any network device operating at 10Mbps or 100Mbps.4. Connecting the Wireless Router to the InternetConnect the network cable provided by the manufacturer from the DSL, cable or fiberoptic modem to a WAN port of the Wireless Router, or insert your 3G USB modem to theUSB port of the Wireless Router.5. Powering On the Wireless RouterConnect the supplied power cord to the power connector on the rear panel of the WirelessRouter, and then plug the other end of the power cord to a grounded power outlet. TheWireless Router will start automatically.Note
UTT Technologies Chapter 2 Hardware Installationhttp://www.uttglobal.com Page 17To prevent the Wireless Router from working abnormally or being damaged, pleasemake sure that the power supply and connectivity are normal, and the power outlet isgrounded properly before powering on the Wireless Router.6. Checking the LEDsVerify that the Wireless Router starts up properly and the network connections areoperational by checking the LED states, as described in Table 2-1.
UTT Technologies Chapter 3 Quick Setuphttp://www.uttglobal.com Page 18Chapter 3 Quick SetupThis chapter describes how to properly configure TCP/IP settings on your computer, how tologin to the Wireless Router, and how to configure the basic parameters to quickly connectthe Wireless Router to the Internet via the Start > Setup Wizard.Inaddition,italsobrieflydescribes the layout and style of the Wireless Router’s Web UI.3.1 Configuring Your ComputerBefore configuring the Wireless Router via the Web UI, you should properly configureTCP/IP settings on the computer that you use to administer the Wireless Router. To do this,follow these steps:Step 1 Connect the computer to a LAN port of the Wireless Router.Step 2 Install TCP/IP protocol on your computer. If it has been installed, please ignoreit.Step 3 Configure TCP/IP settings on your computer: set the computer’s IP address toan IP address in the range of 192.168.1.2 through 192.168.1.254, set its subnetmask to 255.255.255.0, set its default gateway to 192.168.16.1 (the WirelessRouter’s default LAN IP address is 192.168.1.1 with a subnet mask of255.255.255.0), and set its DNS server to an available IP address provided byyour ISP.Step 4 To verify the network connection between your computer and the WirelessRouter, you can use the ping command at the command prompt on thecomputer: Ping 192.168.1.1•If the displayed page is similar to the screenshot below, the connectionbetween your computer and the Wireless Router has been established.
UTT Technologies Chapter 3 Quick Setuphttp://www.uttglobal.com Page 19•If the displayed page is similar to the screenshot below, the connectionbetween your computer and the Wireless Router hasn't been establishedyet.If the connection hasn't been established, please take the following steps to resolve theproblem:1. Is the physical link between your computer and the Wireless Router connectedproperly?Verify that the LED corresponding to the Wireless Router’s LAN port and the LED on yourcomputer’s adapter are lit.2. Is the TCP/IP configuration for your PC correct?Verify that your computer is on the same subnet as the Wireless Router’s LAN interface.For example, if the Wireless Router’s LAN IP address is 192.168.1.1/24 (default value),your computer’s IP address must be an IP address in the range of 192.168.1.2 through192.168.1.254, which is not being used by another network device; and its defaultgateway must be 192.168.1.1.
UTT Technologies Chapter 3 Quick Setuphttp://www.uttglobal.com Page 203.2 Logging in to the Wireless RouterThis section describes how to login to the Wireless Router.No matter what operating system is installed on your computer, such as, MS Windows,Macintosh, UNIX, or Linux, and so on, you can login to and configure the Wireless Routerthrough the Web browser (for example, Internet Explorer).To login to the Wireless Router, do the following: Open a Web browser, enter the WirelessRouter’s LAN interface IP address (the default is 192.168.1.1) in the address bar, andthen press <Enter> key, see Figure 3- 1.Figure 3- 1 Entering IP address in the Address BarA login screen prompts you for your user name and password, see Figure 3-2. When youfirst login to the Wireless Router, please use the default administrator account: Enteradmin in both the User name and Password boxes (the default user name andpassword both are admin), lastly click OK.Figure 3- 2 Login ScreenIf your user name and password are correct, it will display the homepage, see Figure 3-3.
UTT Technologies Chapter 3 Quick Setuphttp://www.uttglobal.com Page 21Figure 3- 3 HomepageEach page of the Wireless Router’s Web UI consists of four panes:1. Top Pane: It displays UTT logo, model and version, and three shortcut icons.1) UTT Logo: Click to link to the homepage of the UTT website.2) Model and Version: The product model and firmware version of the WirelessRouter.3) Short Icons: They are used for fast link to the corresponding pages on thewebsite of UTT Technologies Co., Ltd.●Product: Click to link to the products page of the UTT website to find moreproducts.●Forum: Click to link to the forum homepage of the UTT website toparticipate in product discussions.●Feedback: Click to link to send us your feedback by E-mail.2. Main Pane: It is the location where you can configure each feature of the WirelessRouter, view configuration, status and statistics.3. Side Pane: It displays the two-level main menu bar (i.e., navigation bar). The firstlevel menu is always visible. The second level menu is hidden by default. You canclick a first level menu item to reveal its submenu items, click again to hide them.4. Bottom Pane: It displays copyright information.If this is the first time that you login to the Wireless Router, the first page of the SetupWizard appears. In the next section we will describe how to use the Setup Wizard toconfigure the basic parameters for the Wireless Router to operate properly.
UTT Technologies Chapter 3 Quick Setuphttp://www.uttglobal.com Page 223.3 Setup WizardThis section describes the Start > Setup Wizard page.3.3.1 Running the Setup WizardAs mentioned earlier, the first page of the Setup Wizard appears immediately after yourfirst login, see the following figure.Figure 3-4 Running the Setup WizardDo Not Automatically Launch the Wizard Again: If you select this check box, thesystem don’t automatically launch the Setup Wizard thenexttimeyoulogintotheWireless Router, instead directly open the Welcome page shown in Figure 3- 5. Else,the system will still launch the Setup Wizard automatically.Exit Wizard: Click to exit the Setup Wizard andgototheWelcome page (seeFigure 3- 5). The changes made in the Setup Wizard will be discarded.Next: ClicktogotothenextpageoftheSetup Wizard,thatis,theSetupWizard-Internet Access Mode page shown in Figure 3- 6.
UTT Technologies Chapter 3 Quick Setuphttp://www.uttglobal.com Page 23Figure 3- 5 Welcome Page3.3.2 Setup Wizard - Internet Access ModeIn this page, you can choose one or more Internet connections that you want to configurevia the Setup Wizard, see Figure 3- 6.Figure 3- 6 Setup Wizard - Internet Access ModeWAN1: If you want to configure a wired Internet connection on the WAN1 interfacevia the Setup Wizard, select this check box.WAN2: If you want to configure a wired Internet connection on the WAN2 interface
UTT Technologies Chapter 3 Quick Setuphttp://www.uttglobal.com Page 24via the Setup Wizard, select this check box.3G Client: If you want to configure a 3G Internet connection via the Setup Wizard,select this check box. Here the Wireless Router acts as a 3G client.AP Client: If you want to configure a wireless Internet connection via the SetupWizard, select this check box. Here the Wireless Router acts as an AP client.Back: Click to go back to the previous page of the Setup Wizard.Cancel: Click to revert to the last saved settings.Exit Wizard: Click to exit the Setup Wizard andgototheWelcome page (seeFigure 3- 5). The changes made in the Setup Wizard will be discarded.Next: Click to go to the next page of the Setup Wizard.3.3.3 Setup Wizard - Internet Connection SettingsIn the Setup Wizard, you can configure each Internet connection respectively. For eachInternet access mode, the Internet connection settings are different.3.3.3.1 WAN1/WAN2 Internet Connection SettingsFor the WAN1 or WAN2 Internet connection, there are three connection types: PPPoE,Static IP and DHCP.3.3.3.1.1 Static IP Internet Connection SettingsIf you are required to use a static IP address, please select Static IP from the ConnectionType drop-down list. Then the following page will be shown.
UTT Technologies Chapter 3 Quick Setuphttp://www.uttglobal.com Page 25Figure 3-7 Setup Wizard - WAN1/WAN2 Internet Connection Settings (Static IP)Connection Type: It specifies the type of the Internet connection. Here please selectStatic IP. You need to manually configure IP address, subnet mask, default gatewayand DNS server addresses, which are provided by your ISP.IP Address: It specifies the IP address of the WAN interface, which is provided byyour ISP.Subnet Mask: It specifies the subnet mask of the WAN interface, which is providedby your ISP.Default Gateway: It specifies the IP address of the default gateway, which isprovided by your ISP.Primary DNS Server: It specifies the IP address of your ISP’s primary DNS server.Secondary DNS Server: It specifies the IP address of your ISP’s secondary DNSserver. If it is available, you may set it. Else, please leave it blank.Back: Click to go back to the previous page of the Setup Wizard.Cancel: Click to revert to the last saved settings.Exit: Click to exit the Setup Wizard andgototheWelcome page (see Figure 3- 5).The changes made in the Setup Wizard will be discarded.Skip: Click to go directly to the next page of the Setup Wizard. The changes madeon the current page will be discarded.Next: Click to go to the next page of the Setup Wizard.NoteThe WAN IP address and default gateway IP address must be on the same subnet. Ifnot, please modify the Subnet Mask to make them be on the same subnet. If youdon’t have the subnet related knowledge, please ask a professional or UTT customerengineer for help.3.3.3.1.2 DHCP Internet Connection SettingsIf your ISP automatically assigns an IP address to the Wireless Router via DHCP, pleaseselect DHCP from the Connection Type drop-down list. Then the following page will beshown.
UTT Technologies Chapter 3 Quick Setuphttp://www.uttglobal.com Page 26Figure 3- 8 Setup Wizard - WAN1/WAN2 Settings (DHCP)Connection Type: It specifies the type of the Internet connection. Here please selectDHCP. The Wireless Router will automatically obtain the WAN IP address, subnetmask and gateway and DNS server addresses from your ISP’s DHCP server.Back: Click to go back to the previous page of the Setup Wizard.Cancel: Click to revert to the last saved settings.Exit: Click to exit the Setup Wizard andgototheWelcome page (see Figure 3- 5).The changes made in the Setup Wizard will be discarded.Skip: Click to go directly to the next page of the Setup Wizard. The changes madeon the current page will be discarded.Next: Click to go to the next page of the Setup Wizard.3.3.3.1.3 PPPoE Internet Connection SettingsPlease select PPPoE from the Connection Type drop-down list if your ISP uses PPPoEto establish the Internet connection for you. Then the following page will be shown.Figure 3- 9 Setup Wizard - WAN1/WAN2 Settings (PPPoE)Connection Type: It specifies the type of the Internet connection. Here please selectPPPoE. The Wireless Router will automatically obtain the WAN IP address, subnetmask and gateway IP address from your ISP’s PPPoE server.User Name and Password: They specify the PPPoE login user name and passwordprovided by your ISP. Please ask your ISP if you have any questions.Back: Click to go back to the previous page of the Setup Wizard.
UTT Technologies Chapter 3 Quick Setuphttp://www.uttglobal.com Page 27Cancel: Click to revert to the last saved settings.Exit: Click to exit the Setup Wizard andgototheWelcome page (see Figure 3- 5).The changes made in the Setup Wizard will be discarded.Skip: Click to go directly to the next page of the Setup Wizard. The changes madeon the current page will be discarded.Next: Click to go to the next page of the Setup Wizard.3.3.3.2 3G Internet Connection SettingsFigure 3-10 Setup Wizard - 3G Internet Connection Settings3G USB Modem: It specifies the model of the 3G USB modem. Now the WirelessRouter supports five models: HUAWEI E169,HUEWEI E1750,HUAWEI EC1260,HUAWEI ET128,andZTE MF637U.ISP: It is short for Internet Service Provider, a company that provides 3G wirelessInternet access service for you. Now the Wireless Router supports three ISPs: ChinaMobile,China Unicom and China Telecom.Authentication Method: It specifies the authentication method used by your ISP.The options are SIM and Password.PIN Code: It specifies the PIN code of your 3G SIM card. PIN is short for PersonalIdentification Number.APN: It is short for Access Point Name, which is provided by your ISP.Dial Number: It specifies the dial number provided by your ISP.
UTT Technologies Chapter 3 Quick Setuphttp://www.uttglobal.com Page 28User Name: It specifies the user name used for PPP authentication.Password: It specifies the password used for PPP authentication.Back: Click to go back to the previous page of the Setup Wizard.Cancel: Click to revert to the last saved settings.Exit: Click to exit the Setup Wizard andgototheWelcome page (see Figure 3- 5).The changes made in the Setup Wizard will be discarded.Skip: Click to go directly to the next page of the Setup Wizard. The changes madeon the current page will be discarded.Next: Click to go to the next page of the Setup Wizard.NoteIt is strongly recommended that you configure only the 3G USB Modem and ISP ofthe 3G Internet connection, and leave the other parameters at their default values. Ifnecessary, please change them under the guidance of a professional.3.3.3.3 APClient Internet Connection SettingsIn the Setup Wizard - APClient Connection Settings page, the security settings dependon the value of Security Mode. The following sections describe the APClient connectionsettings under each security mode respectively.3.3.3.3.1 APClient Connection Settings - Disabling WirelessSecurityFigure 3-11 Setup Wizard - APClient Connection Settings (Disabling Wireless Security)AP SSID: It specifies the SSID of the remote AP. It must be between 1 and 32characters long, and it is case sensitive.AP MAC Address: It specifies the MAC address of the remote AP.
UTT Technologies Chapter 3 Quick Setuphttp://www.uttglobal.com Page 29Security Mode: It specifies the security mode to be used by the Wireless Router.Here please select None.Back: Click to go back to the previous page of the Setup Wizard.Cancel: Click to revert to the last saved settings.Exit: Click to exit the Setup Wizard andgototheWelcome page (see Figure 3- 5).The changes made in the Setup Wizard will be discarded.Skip: Click to go directly to the next page of the Setup Wizard. The changes madeon the current page will be discarded.Next: Click to go to the next page of the Setup Wizard.3.3.3.3.2 APClient Connection Settings - WEPFigure 3-12 Setup Wizard - APClient Connection Settings (WEP)AP SSID: It specifies the SSID of the remote AP. It must be between 1 and 32characters long, and it is case sensitive.AP MAC Address: It specifies the MAC address of the remote AP.Security Mode: It specifies the security mode to be used by the Wireless Router.Here please select WEP. WEP is the basic encryption mode which is not as secureas WPA.Authentication Type: It allows you to select the authentication type under WEPsecurity mode. The options are Open System and Shared Key.
UTT Technologies Chapter 3 Quick Setuphttp://www.uttglobal.com Page 30●Open System: It allows the Wireless Router regardless of its WEP keys toauthenticate and attempt to associate with the remote AP. However, even if theWireless Router can complete authentication and associate with the remote AP,the Wireless Router cannot send or receive data from the remote AP unless ithas the correct WEP key.●Shared Key: It requires that the Wireless Router and remote AP have thesame WEP key to authenticate. Without the correct key, authentication will failand the Wireless Router won’t be allowed to associate with the remote AP.Key Format: It specifies the format for entering the WEP keys. The options are Hexand ASCII.●Hex: Select this option if you want to enter the WEP keys in hexadecimalformat. Hexadecimal digits are a set of characters that includes numbers 0through 9 and letters A through F (or a through f). Hex WEP keys are caseinsensitive.●ASCII: Select this option if you want to enter the WEP keys in ASCII format.ASCII WEP keys are case sensitive.Default Tx Key: It allows you to select one of the WEP keys as the default transmitkey to transmit data. All keys can be used to receive data.WEP Key: It allows you to enter a key in one of the WEP Key boxes. You can enterup to four WEP keys. You should enter a key according to the Key Format and KeyType selected.●For 64-bit encryption, enter 10 hex characters or 5 ASCII characters.●For 128-bit encryption, enter 26 hex characters or 13 ASCII characters.Key Type: It allows you to select the size of each key, and it also allows you todisable or enable each key. The options are Disabled,64-bit and 128-bit. By default,Disabled is selected, which means the key is of no effect.Back: Click to go back to the previous page of the Setup Wizard.Cancel: Click to revert to the last saved settings.Exit: Click to exit the Setup Wizard andgototheWelcome page (see Figure 3- 5).The changes made in the Setup Wizard will be discarded.Skip: Click to go directly to the next page of the Setup Wizard. The changes madeon the current page will be discarded.Next: Click to go to the next page of the Setup Wizard.
UTT Technologies Chapter 3 Quick Setuphttp://www.uttglobal.com Page 313.3.3.3.3 APClient Connection Settings - WPA-PSK/WAP2-PSKFigure 3- 13 Setup Wizard - APClient Connection Settings (WPA-PSK/WAP2-PSK)AP SSID: It specifies the SSID of the remote AP. It must be between 1 and 32characters long, and it is case sensitive.AP MAC Address: It specifies the MAC address of the remote AP.Security Mode: It specifies the security mode to be used by the Wireless Router.Here please select WPA-PSK/WPA2-PSK to use WPA-PSK mode or WPA2-PSKmode. In WPA-PSK or WPA2-PSK mode, the Wireless Router uses the pre-sharedkey that is manulally entered to generate encryption keys.WPA Mode: It specifies the WPA mode to be used by the Wireless Router. Theoptions are WPA-PSK and WPA2-PSK.●WPA-PSK: It means that the Wireless Router will use WAP-PSK securitymode.●WPA2-PSK: It means that the Wireless Router will use WAP2-PSK securitymode.Encrption Method: It specifies the encrytion method used for data encryption. Theoptions are TKIP and AES.●TKIP: It means that the Wireless Router will use TKIP for data encryption.●AES: It means that the Wireless Router will use AES for data encryption.Pre-shared Key: This key serves as seed for generating encryption keys. It must beidentical to the remote AP’s. It must be between 8 and 63 characters long.Back: Click to go back to the previous page of the Setup Wizard.Cancel: Click to revert to the last saved settings.Exit: Click to exit the Setup Wizard andgototheWelcome page (see Figure 3- 5).
UTT Technologies Chapter 3 Quick Setuphttp://www.uttglobal.com Page 32The changes made in the Setup Wizard will be discarded.Skip: Click to go directly to the next page of the Setup Wizard. The changes madeon the current page will be discarded.Next: Click to go to the next page of the Setup Wizard.3.3.4 Setup Wizard - Wireless SettingsIn this page, you can configure basic wireless settings of the Wireless Router.Figure 3-14 Setup Wizard - Wireless SettingsSSID: The SSID (Service Set Identification) is also known as the wireless networkname, which is used to uniquely identify a wireless network. It must be between 1 and32 characters long, and it is case sensitive.Wireless Mode: It specifies the wireless standards running on your wireless network.The options are 11g Only,11n Only and 11b/g/n Mixed.●11g Only: In allows both 802.11g and 802.11n wireless clients to connect to theWireless Router at 802.11g data rates with a maximum speed of 54Mbps.●11n Only: It only allows 802.11n wireless clients to connect to the WirelessRouter at 802.11n data rates with a maximum speed of 300Mbps.●11b/g/n Mixed: It allows 802.11b, 802.11g and 802.11n wireless clients toconnect to the Wireless Router at their respective data rates. The maximumspeeds are 11Mbps, 54Mbps and 300Mbps respectively.Channel: It specifies the wireless channel used between the Wireless Router andwireless clients. The valid range is 1 through 11. You can also select Auto to let theWireless Router automatically select the best channel. If there are multiple wirelessrouters in your area, please make sure that their channels don’t interfere with each
UTT Technologies Chapter 3 Quick Setuphttp://www.uttglobal.com Page 33other.Channel Width: It specifies the range of frequecies used by your wireless network.The options are 20/40M and 20M. Note that this parameter can only act on 802.11nwireless clients. 802.11b and 802.11g wireless clients can only use 20MHz channel.●20M/40M: If you select this option, 802.11n wireless clients will negotiate thechannel width with the Wireless Router.●20M: It you select this option, 802.11n wireless clients will use 20MHz channel.Back: Click to go back to the previous page of the Setup Wizard.Cancel: Click to revert to the last saved settings.Exit: Click to exit the Setup Wizard andgototheWelcome page (see Figure 3- 5).The changes made in the Setup Wizard will be discarded.Finish: Click to save the changes you have made in the Setup Wizard and close theSetup Wizard.NoteDo not forget to click the Finish button to save the changes you have made in theSetup Wizard, else these changes will be discarded.
UTT Technologies Chapter 4 Start Menuhttp://www.uttglobal.com Page 34Chapter 4 Start MenuThe Start menu item is the first one under the top-level menu. It provides links to severalcommonly used pages including Setup Wizard,System Status,Interface Traffic andRestart, where you can quickly configure the basic parameters for the Wireless Router tooperate properly, view system status, view interface traffic statistics, and restart theWireless Router.4.1 Setup WizardThe Start > Setup Wizard can help you configure the basic parameters for the WirelessRouter to operate properly. Refer to Section 3.3 Setup Wizard for detailed information.4.2 System StatusThis section describes the Start > System Status page, where you can view the currentstatus information of the Wireless Router.4.2.1 Wired StatusThis page displays the current status information of the wired interfaces, which includeWAN1, WAN2 and LAN.
UTT Technologies Chapter 4 Start Menuhttp://www.uttglobal.com Page 35Figure 4- 1 System Status - Wired StatusWAN1: It displays the current status and basic configuration of the WAN1 Internetconnection, which include connection type, status, IP address, subnet mask, MACaddress, default gateway and DNS server addresses, and up time.WAN2: It displays the current status and basic configuration of the WAN2 Internetconnection, which are the same as those of the WAN1 Internet connection.LAN: It displays the basic configuration of the LAN inteface, which include IP address,subnet mask and MAC address.Refresh: Click to view the latest wired status information.4.2.2 Wireless StatusThis page displays the current status information of the wireless interfaces, which include
UTT Technologies Chapter 4 Start Menuhttp://www.uttglobal.com Page 363G, APClient and Wireless LAN.Figure 4- 2 System Status - Wireless Status3G: It displays the current status and basic configuration of the 3G Internetconnection, which include connection type, status, IP address, subnet mask, MACaddress, default gateway and DNS server addresses, and up time.APClient: It displays the current status and basic configuration of the APClientInternet connection, which are the same as those of the 3G Internection connection.Wireless LAN: It displays the current status and basic configuration of the WirelessLAN, which include status, operation mode, SSID, wireless mode, channel and MACaddress.Refresh: Click to view the latest wireless status information.Note
UTT Technologies Chapter 4 Start Menuhttp://www.uttglobal.com Page 37The Wired Status page and Wireless Status page only display the statusinformation of the interfaces that have been configured.4.3 Interface TrafficThis section describes the Start > Interface Traffic page.This page provides the real-time traffic chart for each interface that has been configured,which displays the real-time Rx/Tx rate, average Rx/Tx rate, maximum Rx/Tx rate andtotal Rx/Tx traffic of each interface. For example, as shown in Figure 4- 3, all of theWireless Router’s interfaces (LAN, WAN1, WAN2, 3G and APClient) have beenconfigured.NoteIf the SVG Viewer plug-in isn’t installed on your web browser, the port traffic chartcannot be displayed properly. Please click the (Please install SVG Viewer if thepage cannot be displayed properly.) hyperlink to download and install the SVGViewer to view the traffic chart.Figure 4- 3 Interface Traffic ChartAvg: 1x, 2x, 4x, 6x: It specifies the number of samples to average, or no averaging.Max: It determines that the charts are scaled uniformly to the max traffic value of allinterfaces or individually per interface.
UTT Technologies Chapter 4 Start Menuhttp://www.uttglobal.com Page 38Display: It allows you to change the type of chart displayed. The options are Lineand Solid.●Line: Select this option to display a line chart. The chart includes two lines withdifferent colors, which represent the real-time Rx rate and Tx rate resectively.●Solid: Select this option to display an area chart. The area chart is like the linechart except that the area between the axis the plot line is solid.Color: It specifies the colors of the two lines (or filled areas), such as red, blue, black,etc.Reverse: Click to toggle the colors of the two lines (or filled areas).LAN,WAN1,WAN2,APClient and 3G: You can select an interface name at the topto view the traffic chart for that interface.View Traffic Statistics: Click to view the ingress and egress traffic statistics for theinterfaces that have been configured, see Figure 4- 4.Figure 4- 4 Traffic StatisticsWAN1,WAN2,3G,APClient and LAN: You can view the traffic statistics for eachinterface, including the number of bytes received and transmitted, and the number ofpackets received and transmitted.
UTT Technologies Chapter 4 Start Menuhttp://www.uttglobal.com Page 39Clear: Click to clear all traffic statistics.Refresh: Click to view the latest traffic statistics.Back: ClicktogobacktotheStart > Interface Traffic page.NoteThis page only displays the traffic statistics for the interfaces that have beenconfigured.4.4 RestartFigure 4- 5 Restart the Wireless RouterRestart: Click to restart the Wireless Router.If you click the Restart button, the system will pop up a prompt dialog box (see Figure4- 6). Then you can click OK to restart the Wireless Router, or click Cancel to cancelthe operation.Figure 4- 6 Prompt Dialog Box - Restart the Wireless RouterNoteRestarting the Wireless Router will disconnect all the sessions, so please do it withcaution.
UTT Technologies Chapter 5 Networkhttp://www.uttglobal.com Page 40Chapter 5 NetworkThis chapter describes how to configure the basic network parameters of the WirelessRouter, which include WAN settings, load balancing, LAN settings, DHCP server, DDNS,and UPnP.5.1 WAN SettingsThis section describes the Network > WAN page.If you have configured one or more Internet connections in the Start > Quick Wizard,youcan view their configuration and status in this page, and modify or delete them if needed.You also can directly configure one or more Internet connections in this page.5.1.1 Internet Connection ListYou can view the configuration and status of each Internet connection in the InternetConnection List, see Figure 5- 1.Figure 5-1 Internet Connection List
UTT Technologies Chapter 5 Networkhttp://www.uttglobal.com Page 41Figure 5-2 Internet Connection List (Continue)5.1.1.1 Parameter DefinitionsInterface: It displays the name of the WAN interface. The Wireless Router has fourWAN interfaces: WAN1, WAN2, 3G, and APClient. Therein, WAN1 and WAN2 arewired interfaces, and 3G and APClient are wireless interfaces.Connection Type: It displays the type of the Internet connection. There are fourconnection types: Static IP, PPPoE, DHCP and 3G.Status: It displays current status of the connection. There are four cases:1. PPPoE Connection StatusFor the PPPoE connection, there are two kinds of status, see Table 5- 1. When it isconnected, it will also display the elapsed time (days: hours: minutes: seconds) sinceconnected.Status DescriptionDisconnectedThe connection is disconnected due to that the interface is disabled ornot connected, or the Wireless Router doesn’t dial up yet, or wrong username or password, etc.Connected Authentication succeeded, and the connection is established and readyfor data transmission.Table 5-1 Description of PPPoE Connection Status2. Static IP Connection StatusFor the static IP connection, there are two kinds of status, see Table 5- 2.Status Description
UTT Technologies Chapter 5 Networkhttp://www.uttglobal.com Page 42Disconnected The connection is disconnected due to that the interface is disabled ornot connected, etc.Connected The connection is established between the Wireless Router and peerdevice.Table 5- 2 Description of Static IP Connection Status3. DHCP Connection StatusFor the DHCP connection, there are two kinds of status, see Table 5- 3. When it isconnected, it will also display the elapsed time (days: hours: minutes: seconds) sinceconnected.Status DescriptionDisconnectedThe connection is disconnected due to that the interface is disabled ornot connected, or the Wireless Router has released the IP address buthasn’t obtained a new one yet, etc.Connected The Wireless Router has obtained an IP address, and the connection isestablished successfully.Table 5- 3 Description of DHCP Connection Status4. 3G Connection StatusFor the 3G connection, there are two kinds of status, see Table 5- 4. When it isconnected, it will also display the elapsed time (days: hours: minutes: seconds) sinceconnected.Status DescriptionDisconnected The connection is disconnected due to that the 3G USB modem isn’tinserted properly, or wrong ISP, 3G USB modem settings, etc.Connected The Wireless Router has obtained an IP address, and the connection isestablished successfully.Table 5- 4 Description of 3G Connection StatusIP Address, Subnet Mask and Default Gateway: They display the current IPsettings of the connection. There are two cases:●For the PPPoE, DHCP or 3G Internet connection, it will show the current WAN IPaddress, subnet mask and gateway IP address which are assigned by your ISP.●For the static IP Internet connection, it will show the information you haveentered manually.
UTT Technologies Chapter 5 Networkhttp://www.uttglobal.com Page 43Rx Rate: It displays the average download speed (in kilobytes per second) of theInternet connection during the time interval between two refresh operations.Tx Rate: It displays the average upload speed (in kilobytes per second) of theInternet connection during the time interval between two refresh operations.5.1.1.2 How to Add, View, Modify and Delete InternetConnectionsAdd an Internet Connection: To add a new Internet connection, first click itsInterface hyperlink or icon, and then configure it, lastly click the Save button.View Internet Connection(s): When you have configured one or more Internetconnections, you can view them in the Internet Connection List.Modify an Internet Connection: To modify a configured Internet connection, click itsInterface hyperlink or icon, the related information will be displayed in the setupfields. Then modify it, and click the Save button.Delete an Internet Connection: To delete an Internet connection, click its Interfacehyperlink or icon to select the connection, and then click the Delete button belowthe list.Refresh Internet Connection List: To view the latest status of the Internetconnections, click the Refresh button below the list.5.1.1.3 How to Connect and Disconnect a PPPoE/3GConnectionIf you click the Interface hyperlink or icon of a PPPoE or 3G connection, the Connectand Disconnect button will appear below the list, see Figure 5- 3.If the PPPoE connection’s Dial Type is set to Manual (see Section 5.1.2.1.3 PPPoEInternet Connection Settings), you need to click the Connect button to connect it, andclick the Disconnect button to disconnect it.Connect: Click to connect the PPPoE or 3G Internet connection manually.Disconnect: Click to disconnect the PPPoE or 3G Internet connection manually.
UTT Technologies Chapter 5 Networkhttp://www.uttglobal.com Page 44Figure 5- 3 Internet Connection List - PPPoE/3G Connection5.1.1.4 How to Renew and Release a DHCPConnectionIf you click the Interface hyperlink or icon of a DHCP connection, the Renew buttonand Release button will appear below the list, see Figure 5-4.Figure 5-4 Internet Connection List - DHCP ConnectionRenew: Click to re-obtain an IP address from the ISP’s DHCP server. The WirelessRouter will automatically release the assigned IP address firstly, and then obtain anew IP address from the DHCP server.Release: Click to release the IP address obtained from the ISP’s DHCP server.5.1.2 Internet Connection SettingsIf you want to configure an Internet connection, please click its Interface hyperlink oricon in the Internet Connection List. The setup page is shown in Figure 5- 5.
UTT Technologies Chapter 5 Networkhttp://www.uttglobal.com Page 45Figure 5-5 Network - WAN SettingsNote1. It allows you to choose the ISP Policy (i.e., route policy database) for each Internetconnection. The system will automatically create the associated static routesaccording to your selection. Thus all traffic destined for one ISP’s servers will beforwarded through this ISP’s connection.2. If you want to configure and use an APClient Internet connection, please chooseAPClient Mode as the Operation Mode in the Wireless > Basic page.5.1.2.1 WAN1/WAN2/APClient Internet ConnectionSettingsFor the WAN1, WAN2 or APClient Internet connection, there are three connection typeswhich include PPPoE, Static IP and DHCP. The following subsections describe how toconfigure the PPPoE, Static IP and DHCP Internet connection respectively.
UTT Technologies Chapter 5 Networkhttp://www.uttglobal.com Page 465.1.2.1.1 Static IP Internet Connection SettingsFigure 5- 6 Static IP Internet ConnectionInterface: It specifies the name of the WAN interface. Here please select WAN1,WAN2 or APClient.Connection Type: It specifies the type of the Internet connection. Here please selectStatic IP. You need to manually configure IP address, subnet mask, default gatewayand DNS server addresses, which are provided by your ISP.ISP Policy: It specifies the route policy database used for the Interent connection.There are four options: None, Telecom, Unicom and Mobile.●None: It means that no route policy database is used. This option is selected bydefault.●Telecom: If your ISP is China Telecom, you may select this option. Then thetraffic destined for China Telecom servers will be forwarded through theconnection.●Unicom: If your ISP is China Unicom, you may select this option. Then the trafficdestined for China Unicom servers will be forwarded through the connection.●Mobile: If your ISP is China Mobile, you may select this option. Then the trafficdestined for China Mobile servers will be forwarded through the connection.Update Policy: Click to update the corresponding route policy database.IP Address,Subnet Mask,Default Gateway,Primary DNS Server and SecondaryDNS Server: Refer to Section 3.3.3.1.1 Static IP Internet Connection Settings fordetailed information.Save: Click to save your changes.Cancel: Click to revert to the last saved settings.
UTT Technologies Chapter 5 Networkhttp://www.uttglobal.com Page 475.1.2.1.2 DHCP Internet Connection SettingsFigure 5-7 DHCP Internet Connection SettingsInterface: It specifies the name of the WAN interface. Here please select WAN1,WAN2 or APClient.Connection Type: It specifies the type of the Internet connection. Here please selectDHCP. The Wireless Router will automatically obtain the WAN IP address, subnetmask and gateway and DNS server addresses from your ISP’s DHCP server.ISP Policy and Update Policy: Refer to Section 5.1.2.1.1 Static IP InternetConnection Settings for detailed information.Save: Click to save your changes.Cancel: Click to revert to the last saved settings.5.1.2.1.3 PPPoE Internet Connection SettingsFigure 5- 8 PPPoE Internet Connection SettingsInterface: It specifies the name of the WAN interface. Here please select WAN1,
UTT Technologies Chapter 5 Networkhttp://www.uttglobal.com Page 48WAN2 or APClient.Connection Type: It specifies the type of the Internet connection. Here please selectPPPoE. The Wireless Router will automatically obtain the WAN IP address, subnetmask and gateway IP address from your ISP’s PPPoE server.ISP Policy and Update Policy: Refer to Section 5.1.2.1.1 Static IP InternetConnection Settings for detailed information.User Name and Password: They specify the PPPoE login user name and passwordprovided by your ISP. Please ask your ISP if you have any questions.PPP Authentication: It specifies the PPP authentication mode of the PPPoEconnection. The available options are Either,PAP,CHAP and NONE. The defaultvalue is Either, which means that the Wireless Router will automatically negotiate itwith the remote PPPoE Server. NONE means that no authentication is performed.Dial Type: It specifies the dial type of the PPPoE connection. The available optionsare Always On,Manual and On Demand.•Always On: If you want the Wireless Router to establish the PPPoE connectionwhen starting up and to automatically re-establish the PPPoE connection oncedisconnected, please select this option.•Manual: If you want to connect and disconnect the PPPoE connection manuallyin the Internet connection List (see Section 5.1.1.3 How to Connect andDisconnect a PPPoE/3G Connection), please select this option.•On Demand: If you want the Wireless Router to establish the PPPoE connectiononly when it listens for packets destined for the Internet, please select this option.Dial Mode: It specifies the dial mode of the PPPoE Internet connection. The defaultvalue is Normal mode. If the PPPoE connection isn’t established successfully evenusing correct user name and password, you may try to use another mode.Idle Timeout: It specifies how long the PPPoE connection keeps connected since noInternet activity. The Wireless Router will automatically terminate the connection afterit has been inactive for the specified period of time. The default value is zero, whichmeans that the Wireless Router will not terminate it.MTU: It the maximum packet size that can be transmitted over a network. Whendialing, the Wireless Router will automatically negotiate it with the peer device.Please leave the default value of 1480 bytes, unless you have a special application.Save: Click to save your changes.Cancel: Click to revert to the last saved settings.
UTT Technologies Chapter 5 Networkhttp://www.uttglobal.com Page 495.1.2.2 3G Internet Connection SettingsTo configure a 3G Internet connection, select 3G from the Interface drop-down list. Thenthe following page will be shown.Figure 5-9 3G Internet Connection SettingsInterface: It specifies the name of the WAN interface. Here please select 3G.ISP Policy and Update Policy: Refer to Section 5.1.2.1.1 Static IP InternetConnection for detailed information.3G USB Modem,ISP,Authentication Method,PIN Code,APN,Dial Number,User Name,andPassword: Refer to Section 3.3.3.2 3G Internet ConnectionSettings for detailed information.Save: Click to save your changes.Cancel: Click to revert to the last saved settings.NoteIt is strongly recommended that you configure only the 3G USB Modem and ISP ofthe 3G Internet connection, and leave the other parameters at their default values. Ifnecessary, please follow your ISP’s instructions to change them. After you click theSave button, the Wireless Router will start to dial. It may take a minute or so,depending on the model of your 3G USB modem. Please click the Refresh button toview the 3G connection status. If it fails to dial, please try to pull out and insert the 3GUSB modem again or restart the Wireless Router.
UTT Technologies Chapter 5 Networkhttp://www.uttglobal.com Page 505.1.3 MAC Address CloneSome ISPs register the MAC address of your network device (usually a computer) whenyour account is first opened, and they will only accept traffic from that MAC address. WithMAC address clone feature, you may assign the registered MAC address to the WirelessRouter’s external interface if you don’t want to re-register the MAC address with your ISP.To configure MAC address clone, go to the Network > WAN page, and then select theMAC Address Clone tab to go to the setup page shown in Figure 5- 10 MAC AddressCloneFigure 5- 10. In this page, you can change the MAC address of each externalinterface (WAN1, WAN2, or APClient interface) as required.Figure 5- 10 MAC Address CloneWAN1 MAC Address: It specifies the MAC address of the Wireless Router’s WAN1interface.WAN2 MAC Address: It specifies the MAC address of the Wireless Router’s WAN2interface.APClient MAC Address: It specifies the MAC address of the Wireless Router’sAPClient interface.Save: Click to save your changes.Cancel: Click to revert to the last saved settings.
UTT Technologies Chapter 5 Networkhttp://www.uttglobal.com Page 515.2 Load BalancingThis section describes the Network > Load Balancing page.In this page, you can configure load balancing global parameters, the connectiondetection parameters (including detection target IP, detection interval, retry times, etc.) foreach Internet connection, and view the status and configuration of them.5.2.1 Introduction to Load Balancing and Failover5.2.1.1 Internet Connection Detection MechanismWhen using multiple Internet connections, to ensure that the network will not beinterrupted when a connection is faulty, the Wireless Router should have the ability ofreal-time monitoring each Internet connection. To this end, we design flexible automaticdetection mechanism on the Wireless Router, and provide multiple detection methods tomeet the actual requirements.For the sake of convenience, we firstly introduce several related parameters includingDetection Target IP,Detection Interval,Retry Times,andDetection Period.●Detection Target IP: It indicates the IP address of a target device. The WirelessRouter will monitor an Internet connection by sending detection packets to thespecified target IP address.●Detection Interval: It indicates the time interval at which the Wireless Routerperiodically sends detection packets, one packet at a time. The default value is 0,which means that connection detection is disabled.●Retry Times: It indicates the number of retries per detection period.●Detection Period: It indicates a period of time during which the Wireless Routerdetects whether the Internet connection is available or not. Its value is the product ofDetection Interval and Retry Times. For example, if the Detection Interval is set to10 seconds and the Retry Times is set to 3, then the Detection Period is 30 (10 × 3= 30) seconds.For a normal Internet connection and a faulty Internet connection, the detectionmechanisms are different, the following describes them respectively.For a normal Internet connection, the detection mechanism is as follows: The WirelessRouter periodically sends a detection packet at the specified time interval to the target IPaddress. Once no response packet received during a detection period, the WirelessRouter will consider that the connection is faulty and shield it immediately. For example,
UTT Technologies Chapter 5 Networkhttp://www.uttglobal.com Page 52when the Retry Times is set to 5, if the Wireless Router has sent five consecutivedetection packets but not received any response packet during a detection period, it willconsider that the connection is faulty.For a faulty Internet connection, the detection mechanism is as follows: Similarly, theWireless Router also periodically sends a detection packet at the specified time interval tothe target IP address. Once more than half of the response packets received during adetection period, the Wireless Router will consider that the connection is back to normaland enable it immediately. For example, when the Retry Times issetto5,iftheWirelessRouter has sent five consecutive detection packets and received three or more packetsduring a detection period, it will consider that the connection is back to normal.On the Wireless Router, you can assign a preferential Internet connection to some localcomputers in advance by setting the connection’s Start Internal IP and End Internal IP,thus the computers in the specified address range will preferentially use the assignedInternet connection to access the Internet. If the assigned Internet connection is normal,those computers can only use it to access the Internet. Else, they will use other normalInternet connections to access the Internet.NoteIf you don’t want to monitor an Internet connection, please leave its DetectionInterval at the default value of 0.5.2.1.2 Load Balancing ModeThe Wireless Router provides two connection groups: primary connection group andbackup connection group. An Internet connection in the primary connection group is aprimary connection, while an Internet connection in the backup connection group is abackup connection. By default, all the Internet connections are primary connections. Youcan move one or more connections into the backup connection group if needed.The Wireless Router provides two load balancing modes: Full Load Balancing andPartial Load Balancing.If you choose to use Full Load Balancing, all the Internet connections are used asprimary connections. The working principle is as follows:1. If all the Internet connections are normal, the LAN users will use these connections toaccess the Internet.2. If an Internet connection is faulty, the Wireless Router will shield it immediately, andthe traffic through the faulty connection will be distributed to other normal connectionsautomatically.3. Once the faulty connection is back to normal, the Wireless Router will enable itimmediately, and the traffic will be redistributed automatically.
UTT Technologies Chapter 5 Networkhttp://www.uttglobal.com Page 53If you choose to use Partial Load Balancing, some Internet connections are used asprimary connections, and others are used as backup connections. The working principle isas follows:1. As long as one or more primary connections are normal, the LAN users will use theprimary connection(s) to access the Internet.2. If all the primary connections are faulty, it will automatically switch to the backupconnection(s) to let the LAN users use them to access the Internet.3. Once one or more faulty primary connections are back to normal, it will automaticallyswitch back to the primary connection.NoteDuring connections switching, some user applications (such as some online games)may be interrupted unexpectedly due to the nature of TCP connection.5.2.2 Load Balancing Global SettingsThe following sections describe the global settings related to Full Load Balancing andPartial Load Balancing respectively. For more information, please refer to Section5.2.1.2 Load Balancing Mode.5.2.2.1 Global Settings - Full Load BalancingFigure 5-11 Global Settings - Full Load BalancingMode: It specifies the mode of load balancing. Here please leave the default value ofFull Load Balancing.Save: Click to save your changes.Cancel: Click to revert to the last saved settings.
UTT Technologies Chapter 5 Networkhttp://www.uttglobal.com Page 545.2.2.2 Global Settings - Partial Load BalancingFigure 5-12 Global Settings - Partial Load BalancingMode: It specifies the mode of load balancing. Here please select Partial LoadBalancing.Primary: It specifies the primary connection group. An Internet connection in thePrimary list box is a primary connection.Backup: It specifies the backup connection group. An Internet connection in theBackup list box is a backup connection.==>: Select one or more Internet connections in the Primary list box, and then click==> to move the selected connection(s) to the Backup list box.<==: Select one or more Internet connections in the Backup list box, and then click==> to move the selected connection(s) to the Primary list box.Save: Click to save your changes.Cancel: Click to revert to the last saved settings.5.2.3 Load Balancing List
UTT Technologies Chapter 5 Networkhttp://www.uttglobal.com Page 55Figure 5-13 Load Balancing ListFigure 5- 14 Load Balancing List (Continue)¾Edit an Internet Connection: To configure or modify the detection relatedparameters of an Internet connection, click its Interface hyperlink or icon, therelated information will be displayed in the Connection Detection Settings page.Then configure or modify it, and click the Save button.¾View Load Balancing List: When you have configured load balancing globalsettings and connection detection settings, you can view the related configuration andstatus in the Load Balancing List.¾Refresh Load Balancing List: Click the Refresh button to view the latestinformation in the list.5.2.4 Connection Detection SettingsYou can configure the connection detection related parameters for each Internetconnection as required. The operation is as follows: Go to the Network > LoadBalancing > Load Balancing List page, and click an Internet connection’s Interfacehyperlink or icon to go the Connection Detection Settings page to configure them.
UTT Technologies Chapter 5 Networkhttp://www.uttglobal.com Page 56Figure 5- 15 Connection Detection SettingsInterface: It indicates the name of the WAN interface. It is non-editable.Detection Interval: It specifies the time interval at which the Wireless Routerperiodically sends detection packets, one packet at a time. It must be between 1 and60 seconds, or 0. The default value is 0, which means that connection detection isdisabled on the Internet connection.Retry Times: It specifies the number of retries per detection period. The default valueis 3.Detection Target IP: It specifies the IP address of a detection target device. TheWireless Router will monitor the Internet connection by sending the detection packetsto the detection target IP address.Bandwidth: It specifies the Internet connection’s bandwidth, which is provided byyour ISP.Start Internal IP and End Internal IP: They specify a range of internal IP addresses.The local computers within the specified range will preferentially use the Internetconnection. Refer to Section 5.2.1.1 Internet Connection Detection Mechanismfor more information.Save: Click to save your changes.Cancel: Click to revert to the last saved settings.Back: ClicktogobacktotheLoad Balancing List page.NoteThe Detection Target IP,Detection Interval,andRetry Times are connectiondetection related parameters. Please refer to Section 5.2.1.1 Internet ConnectionDetection Mechanism for more information.
UTT Technologies Chapter 5 Networkhttp://www.uttglobal.com Page 575.2.5 How to Configure Connection Detection SettingsTo configure connection detection settings, follow these steps:Step 1 Go to the Network > Load Balancing > Load Balancing List page.Step 2 Click an Internet connection’s Interface hyperlink or icon to go theConnection Detection Settings page.Step 3 Configure detection related parameters (Detection Target IP,DetectionInterval,Retry Times, etc.) for the selected Internet connection as required.Step 4 Click the Save button to save your changes.Step 5 To configure the detection settings for another Internet connection, pleaserepeat the above steps.
UTT Technologies Chapter 5 Networkhttp://www.uttglobal.com Page 585.3 LAN SettingsThis section describes the Network > LAN page, where you can configure the IP address,subnet mask and MAC address of the Wireless Router’s LAN interface.Figure 5-16 LAN Interface SettingsIP Address: It specifies the IP address of the LAN interface.Subnet Mask: It specifies the subnet mask that defines the range of the LAN.MAC Address: It specifies the MAC address of the LAN interface. In most cases,please leave the default value.Save: Click to save your changes.Cancel: Click to revert to the last saved settings.NoteIf you have changed the IP address of the LAN interface and saved the change, youmust use the new IP address to re-login to the Wireless Router.
UTT Technologies Chapter 5 Networkhttp://www.uttglobal.com Page 595.4 DHCP ServerThis section describes the Network > DHCP Server page, which includes DHCP serversettings, static DHCP and DHCP client list.5.4.1 DHCP Server SettingsFigure 5- 17 DHCP Server SettingsEnable DHCP Server: It allows you to enable or disable DHCP server. If you want toenable DHCP server on the Wireless Router, please select this check box.Start IP Address: It specifies the first IP address assigned by the DHCP server. Inmost cases, this address must be on the same subnet as the Wireless Router’s LANIP address.End IP Address: It specifies the last IP address assigned by the DHCP server. In
UTT Technologies Chapter 5 Networkhttp://www.uttglobal.com Page 60most cases, this address must be on the same subnet as the Wireless Router’s LANIP address.Subnet Mask: It specifies the subnet mask of the IP addresses assigned by theDHCP server. In most cases, this subnet mask must be identical to the WirelessRouter’s LAN subnet mask.Default Gateway: It specifies the IP address of the default gateway for a DHCP client.In most cases, this address must be identical to the Wireless Router’s LAN IPaddress, that is, the Wireless Router is used as the default gateway for the localcomputers.Lease Time: It specifies the length of time (in seconds) during which a DHCP clientcan use an assigned IP address.Primary DNS Server: It specifies the IP address of the primary DNS server that isavailable to a DHCP client.Secondary DNS Server: It specifies the IP address of the secondary DNS serverthat is available to a DHCP client.Enable DNS Proxy: It allows you to enable or disable DNS proxy. If you want toenable DNS proxy on the Wireless Router, please select this check box. When actingas a DNS proxy, the Wireless Router listens for incoming DNS requests on the LANinterface, relays the DNS requests to the current public DNS servers, and replies as aDNS resolver to the requesting local computers.ISP DNS Server 1 and ISP DNS Server 2: They specify the IP addresses of the ISPDNS servers.Save: Click to save your changes.Cancel: Click to revert to the last saved settings.Note1. If you want a local computer to obtain an IP address and other TCP/IP parametersfrom the Wireless Router’s built-in DHCP server, please configure the computer toobtain an IP address automatically.2. If the DNS proxy is enabled on the Wireless Router, in order to use DNS proxyservice normally, you need to set the local computers’ primary DNS server to theWireless Router’s LAN IP address. In addition, if the DHCP server is also enabled onthe Wireless Router, the Wireless Router will assign its LAN IP address as theprimary DNS server address to the local computers automatically.3. To ensure that the DNS proxy works well, you must at least specify the primary DNSserver provided by your ISP on the Wireless Router.4. The Wireless Router can act as a DNS proxy server to all local computers. Thisgreatly simplifies configuration of your local computers. For example, there is a LAN
UTT Technologies Chapter 5 Networkhttp://www.uttglobal.com Page 61DNS proxy server on which a DNS proxy software is installed (e.g., Wingate), and thelocal computers use this server as the primary DNS server. Now, the Wireless Routerwill be used as a new gateway for the local computers. In this case, in order to useDNS proxy service normally, the administrator only need to change the WirelessRouter’s LAN IP address to the old proxy DNS server’s IP address, and enable DNSproxy on the Wireless Router, without having to change each computer.5.4.2 Static DHCPThe Wireless Router offers static DHCP feature which allows you to manually bind an IPaddress to a computer’s MAC address and thus that computer will always obtain the sameIP address from the DHCP server. More specifically, each time the specified computerboots and requests its IP address from the Wireless Router’s DHCP server, the DHCPserver will recognize the computer’s MAC address and always assign the reserved IPaddress to it.5.4.2.1 Static DHCP SettingsFigure 5- 18 Static DHCP SettingsUser Name: It specifies a unique user name of the DHCP client that wants to beassigned a static IP address.IP Address: It specifies the IP address that you want to reserve for the DHCP client.It must be a valid IP address within the range of IP addresses assigned by the DHCPserver.MAC Address: It specifies the MAC address of the DHCP client.Save: Click to save your changes.Cancel: Click to revert to the last saved settings.Back: ClicktogobacktotheNetwork > DHCP Server > Static DHCP page.
UTT Technologies Chapter 5 Networkhttp://www.uttglobal.com Page 62Note1. The reserved IP address must be a valid IP address within the range of IP addressesassigned by the DHCP server.2. After you have added the static DHCP entry successfully, the Wireless Router willalways assign the reserved IP address to the specified computer.5.4.2.2 Static DHCP ListFigure 5- 19 Static DHCP ListAdd a Static DHCP Entry: To add a new static DHCP entry, first click the Add buttonto go to the Static DHCP Settings page, next configure it, lastly click the Savebutton.View Static DHCP Entry(s): When you have configured one or more static DHCPentries, you can view them in the Static DHCP List.Modify a Static DHCP Entry: To modify a configured static DHCP entry, click itsUser Name hyperlink or icon, the related information will be displayed in theStatic DHCP Settings page. Then modify it, and click the Save button.Delete Static DHCP Entry(s): There are three ways to delete static DHCP entry(s).1. To delete a static DHCP entry, directly click its icon.2. To delete more than one static DHCP entry at a time, select the leftmost checkboxes of the static DHCP entries that you want to delete, and then click theDelete button.3. To delete all the static DHCP entries at a time, directly click the Delete All button.
UTT Technologies Chapter 5 Networkhttp://www.uttglobal.com Page 635.4.2.3 How to Add Static DHCP EntriesTo add one or more static DHCP entries, follow these steps:Step 1 Go to the Network > DHCP Server > Static DHCP page.Step 2 Click the Add button to go to the Static DHCP Settings page, and then specifythe User Name,IP Address and MAC Address,lastlyclicktheSave button.Step 3 Now you can view the static DHCP entry in the Static DHCP List.Step 4 To add another static DHCP entry, please repeat the above steps.NoteIf you want to delete static DHCP entry(s), please follow the ways described inSection 5.4.2.2 Static DHCP List.5.4.3 DHCP Client ListFigure 5-20 DHCP Client ListIP Address: It displays the IP address assigned to the DHCP client.Subnet Mask: It displays the subnet mask of the current IP address.MAC Address: It displays the MAC address of the DHCP client.Lease Left: It displays the time remaining (in seconds) until the current IP addresslease expires.
UTT Technologies Chapter 5 Networkhttp://www.uttglobal.com Page 64Refresh: Click to view the latest information in the list.NoteThe DHCP Client List only displays the DHCP clients with dynamically assigned IPaddresses. It doesn’t display the DHCP clients specified by the static DHCP entries.
UTT Technologies Chapter 5 Networkhttp://www.uttglobal.com Page 655.4.4 Configuration Example for DHCP1. RequirementsIn this example, the Wireless Router acts as a DHCP server to dynamically assign the IPaddresses to the clients that reside on the same subnet. The Wireless Router’s LAN IPaddress is 192.168.1.1/24. The start IP address of the DHCP address pool is192.168.1.11, and the number of addresses is 100.Besides, there are two computers that must always have the same IP address: one’s MACaddress is 00:21:85:9B:45:46 and IP address is 192.168.1.15, the other’s MAC address is00:1f:3c:0f:07:f4 and IP address is 192.168.1.16.2. Configuration StepsStep 1 Go to the Network > DHCP Server > DHCP Server Settings page.Step 2 As shown in the following figure, select the Enable DHCP Server check box,and enter 192.168.1.11 and 192.168.1.110 in the Start IP Address and End IPAddress text boxes respectively. Leave the other parameters at their defaultvalues. Then click the Save button to save the settings.
UTT Technologies Chapter 5 Networkhttp://www.uttglobal.com Page 66Figure 5-21 DHCP Server Settings - ExampleStep 3 Go to the Network > DHCP Server > Static DHCP page.Step 4 Add the static DHCP entry 1: Click the Add button to go to the Static DHCPSettings page (see Figure 5- 22), enter Server1 in the User Name text box,192.168.1.15 in the IP Address text box, and 0021859B4546 in the MACAddress text box, and then click the Save button.Figure 5- 22 Adding the Static DHCP Entry 1 - ExampleStep 5 Add the static DHCP entry 2: Click the Add button to go to the Static DHCPSettings page (see Figure 5- 23), enter Server2 in the User Name text box,
UTT Technologies Chapter 5 Networkhttp://www.uttglobal.com Page 67192.168.1.16 in the IP Address text box, and 001f3c0f07f4 in the MACAddress text box, and then click the Save button.Figure 5- 23 Adding the Static DHCP Entry 2 - ExampleNow you have configured the two static DHCP entries. You can view them in the StaticDHCP List (see Figure 5- 24), and you can directly click the icon to modify either ofthem if desired.Figure 5-24 Static DHCP List - Example
UTT Technologies Chapter 5 Networkhttp://www.uttglobal.com Page 685.5 DDNSThis section describes the Network > DDNS page. In this page, you can not onlyconfigure DDNS parameters, but also view and update DDNS status.5.5.1 Introduction to DDNSDynamic Domain Name Service (DDNS) is a service used to map a domain name whichnever changes to a dynamic IP address which can change quite often. For example, if youhave applied for a PPPoE connection with a dynamically assigned IP address from theISP’s PPPoE server, you can use DDNS to allow the external computers to access theWireless Router by a constant domain name.In order to use DDNS service, you should apply for a DDNS account from a DDNS serviceprovider. Each DDNS provider offers its own specific network services. The DDNS serviceprovider reserves the right to change, suspend or terminate your use of some or allnetwork services at any time for any reason. The DDNS service providers supported byUTT Technologies Co., Ltd. currently provide free DDNS services, but they may chargefor the DDNS services in the future. In this case, UTT Technologies Co., Ltd. will notifyyou as soon as possible; if you refuse to pay for the services, you will no longer be able touse them. During the free phase, UTT Technologies Co., Ltd. does not guarantee that theDDNS services can meet your requirements and will be uninterrupted, and UTT does notguarantee the timeliness, security and accuracy of the services.So far, UTT Technologies Co., Ltd. supports only two DDNS service providers:iplink.com.cn and 3322.org. It will successively support other DDNS service providers inthe future.5.5.2 Apply for a DDNS AccountPlease login to http://www.3322.org or http://www.utt.com.cn/ddns to apply for a fullyqualified domain name (FQDN). This section describes how to apply for a FQDN withsuffix of 3322.org from http://www.3322.org.
UTT Technologies Chapter 5 Networkhttp://www.uttglobal.com Page 69Figure 5- 25 Apply for a DDNS Account from 3322.orgHost Name: It specifies a unique host name of the Wireless Router. The suffix of3322.org will be appended to the host name to create a fully qualified domain name(FQDN) for the Wireless Router. For example, if the Wireless Router’s host name istest,thenitsFQDNistest.3322.org; and it allows you to use test.3322.org toaccess the Wireless Router.IP Address: It specifies the IP address mapped to the registered domain name of theWireless Router.Register: Click to register the domain name.5.5.3 DDNS Settings5.5.3.1 Disabling DDNS ServiceIf you want to disable DDNS service, please leave the Service Provider at its defaultvalue of None, see Figure 5- 26.Figure 5- 26 Disabling DDNS ServiceService Provider: It specifies the DDNS service provider who offers services to theWireless Router. Here please select None to disable DDNS service.Save: Click to save your changes.
UTT Technologies Chapter 5 Networkhttp://www.uttglobal.com Page 70Cancel: Click to revert to the last saved settings.5.5.3.2 DDNS Service Offered by 3322.orgFigure 5-27 DDNS Settings Related to 3322.orgService Provider: It specifies the DDNS service provider who offers services to theWireless Router. Now the Wireless Router only supports two DDNS service providers:iplink.com.cn and 3322.org. Here please select 3322.org.Registry Website: It allows you to click http://www.3322.org to go to this website toregister a DDNS account for the Wireless Router.Host Name: It specifies the host name of the Wireless Router. It must be identical tothe host name that you entered when registering the DDNS account on the websitehttp://www.3322.org.User Name: It specifies the user name that you entered when registering your useraccount on the website http://www.3322.org.Password: It specifies the password that you entered when registering your useraccount on the website http://www.3322.org.Interface: It specifies the interface on which DDNS service is applied.Save: Click to save your changes.Cancel: Click to revert to the last saved settings.
UTT Technologies Chapter 5 Networkhttp://www.uttglobal.com Page 715.5.3.3 DDNS Service Offered by IPLinkFigure 5-28 DDNS Settings Related to iplink.com.cnService Provider: It specifies the DDNS service provider who offers services to theWireless Router. Now the Wireless Router only supports two DDNS service providers:iplink.com.cn and 3322.org. Here please select iplink.com.cn.Registry Website: Itallowsyoutoclick togotothiswebsitetoregisteraDDNSaccount for the Wireless Router.Registration Number: It specifies the registration number of the Wireless Router.Host Name: It specifies the host name of the Wireless Router. It must be identical tothe host name that you entered when registering the DDNS account on the websitehttp://www.utt.com.cn/ddns.Key: It specifies the key that you got when registering the DDNS account on thewebsite http://www.utt.com.cn/ddns.Interface: It specifies the interface on which DDNS service is applied.Save: Click to save your changes.Cancel: Click to revert to the last saved settings.5.5.4 DDNS Status
UTT Technologies Chapter 5 Networkhttp://www.uttglobal.com Page 72Figure 5- 29 DDNS StatusUpdate: Click to update DDNS status.5.5.5 DDNS VerificationTo verify whether DDNS is updated successfully, you can use the ping command at thecommand prompt on the PC, for example: ping avery12345.3322.orgIf the displayed page is similar to the screenshot below: the domain name is resolved toan IP address successfully (58.246.187.126 in this example), DDNS is updatedsuccessfully.Note1. Only when the WAN interface IP address is a public IP address, the Internet userscan use its mapped domain name to access the Wireless Router normally.2. DDNS feature can help you implement VPN tunnels using dynamic IP addresses onthe Wireless Router.
UTT Technologies Chapter 5 Networkhttp://www.uttglobal.com Page 735.6 UPnPThis section describes the Network > UPnP page.The Universal Plug and Play (UPnP) is architecture that implements zero configurationnetworking, that is, it provides automatic IP configuration and dynamic discovery of theUPnP compatible devices from various vendors. A UPnP compatible device candynamically join a network and work properly.When you enable UPnP, the Wireless Router allows any local UPnP-enabled device toperform a variety of actions, including retrieving the public IP address, enumeratingexisting port mappings, and adding or removing port mappings. By adding a port mapping,a UPnP-enabled device opens the related service ports on the Wireless Router to allowoutside computers to access.5.6.1 Enable UPnPFigure 5- 30 Enable UPnPEnable UPnP: It allows you to enable or disable UPnP. If you want to enable UPnP,please select this check box.Save: Click to save your changes.5.6.2 UPnP Port Forwarding ListThe UPnP Port Forwarding List lists all the port forwarding entries established usingUPnP, see the following figure.
UTT Technologies Chapter 5 Networkhttp://www.uttglobal.com Page 74Figure 5-31 UPnP Port Forwarding ListID: It is used to identify each UPnP port forwarding entry in the list.Internal IP: It displays the IP address of the local computer.Internal Port: It displays the service port provided by the local computer.Protocol: It displays the transport protocol used by the service.Remote IP: It displays the IP address of the remote computer.External Port: It displays the external port of the UPnP port forwarding, which isopened for outside user to access.Description: It displays the description of the UPnP port forwarding entry.Refresh: Click to view the latest information in the list.
UTT Technologies Chapter 6 Wirelesshttp://www.uttglobal.com Page 75Chapter 6 WirelessThis chapter describes how to configure and use the wireless features of the WirelessRouter, which include: basic wireless settings, wireless security settings, wireless MACaddress filtering, and advanced wireless settings; and how to view the status of thewireless clients.6.1 Basic Wireless SettingsThis section describes the Wireless > Basic page. In this page, you can configure thebasic wireless settings of the Wireless Router, which include: enable or disable wirelessfunction, operation mode, SSID, wireless mode, channel, channel width, enable or disableSSID broadcast, and so on.The Wireless Router supports multiple operation modes: AP mode, AP Client mode, andthree WDS modes including Repeater mode, Bridge mode and Lazy mode. The followingsections describe the basic wireless settings under each operation mode.Note1. The Wireless Router functions differently under each operation mode. Please selectthe one that best meets your needs.2. After you modify the wireless parameters and save the changes, the wireless modulewill automatically restart. This will disconnect all wireless connections, but won’t affectthe wired connections.6.1.1 AP ModeIf you want the Wireless Router to operate in AP mode, please select AP Mode from theOpeartion Mode drop-down list, see Figure 6-1. In this mode, the Wireless Router canconnect to other wireless network devices in AP Client mode, and at at same time it canprovide connectivity for wireless clients.
UTT Technologies Chapter 6 Wirelesshttp://www.uttglobal.com Page 76Figure 6- 1 Basic Wireless Settings - AP ModeEnable Wireless: It allows you to enable or disable wireless function. If you selectthe check box to enable wireless function, wireless clients can connect to theWireless Router to access the Internet, commnuicate with each other via the WirelessRouter, and access the wired network connected to the Wireless Router. Else, theWireless Router accepts only wired computers and other wired network devices.Operation Mode: Here please select AP Mode.SSID: The SSID (Service Set Identification) is also known as the wireless networkname, which is used to uniquely identify a wireless network. It is case sensitive. Itmust be identical for all wireless devices in the wireless network.Wireless Mode: It specifies the wireless standards running on your wireless network.The options are 11g Only,11n Only and 11b/g/n Mixed.●11g Only: In allows both 802.11g and 802.11n wireless clients to connect to theWireless Router at 802.11g data rates with a maximum speed of 54Mbps.●11n Only: It only allows 802.11n wireless clients to connect to the WirelessRouter at 802.11n data rates with a maximum speed of 300Mbps.●11b/g/n Mixed: It allows 802.11b, 802.11g and 802.11n wireless clients toconnect to the Wireless Router at their respective data rates. The maximumspeeds are 11Mbps, 54Mbps and 300Mbps respectively.Channel: It specifies the wireless channel used between the Wireless Router andwireless clients. The valid range is 1 through 11. You can also select Auto to let the
UTT Technologies Chapter 6 Wirelesshttp://www.uttglobal.com Page 77Wireless Router automatically select the best channel. If there are multiple wirelessrouters in your area, please make sure that their channels don’t interfere with eachother.Channel Width: It specifies the range of frequecies used by your wireless network.The options are 20/40M and 20M. Note that this parameter can only act on 802.11nwireless clients. 802.11b and 802.11g wireless clients can only use 20MHz channel.●20M/40M: If you select this option, 802.11n wireless clients will negotiate thechannel width with the Wireless Router.●20M: It you select this option, 802.11n wireless clients will use 20MHz channel.Enable SSID Broadcast: It allows you to enable or disable SSID broadcast. If youselect the check box to enable this feaute, the Wireless Router will periodicallybroadcast its SSID, so that wireless clients can automatically find it to connect to theWireless Router and join the wireless network identified by the SSID. However, thisfeature also makes it easier for hackers to know your SSID and break into yourWLAN. It is suggested that you disable this feature to improve security of your WLAN.In this case, you need to manually configure the right SSID for your wireless clients.Save: Click to save your changes.Cancel: Click to revert to the last saved settings.6.1.2 APClient ModeIf you want the Wireless Router to operate in APClient mode, please select APClientMode from the Opeartion Mode drop-down list, see Figure 6- 2. In this mode, theWireless Router can connect to a remote network device in AP mode, and at same time itcan provide connectivity for wireless clients.If you configure the APClient Internet connection in the Start > Setup Wizard, the systemwill automatically choose APClient Mode as the Operation Mode.
UTT Technologies Chapter 6 Wirelesshttp://www.uttglobal.com Page 78Figure 6- 2 Basic Wireless Settings - APClient ModeOperation Mode: Here please select APClient Mode.Enable Wireless,SSID,Wireless Mode,Channel,Channel Width,andEnableSSID Broadcast: Refer to Section 6.1.1 AP Mode for detailed information.AP SSID,AP MAC Address and Security Mode: Refer to Section 3.3.3.3 APClientInternet Connection Settings for detailed information.Save: Click to save your changes.Cancel: Click to revert to the last saved settings.NoteIn APClient Mode, the Securtiy Mode,Channel and Channel Width configured onthe Wireless Router must match those on the remote AP. Otherwise, the WirelesssRouter is unable to connect to the remote AP.
UTT Technologies Chapter 6 Wirelesshttp://www.uttglobal.com Page 796.1.3 WDSA Wireless Distribution System (WDS) is a method of interconnecting access points (AP)in a wireless local area network (WLAN) without requiring that they connect through awired backbone. This feature is usually used to extend the range of the wireless networkto reach remote clients.The Wireless Router can be configured to operate in a WDS mode (Repeater Mode,Bridge Mode or Lazy Mode) that allows it to forward traffic directly to other wirelessaccess points, repeaters or routers. Note that the Securtiy Mode,Channel and ChannelWidth configured on the Wireless Router must match those on the remote AP, and theirLAN IP addresses must be on the same subnet.6.1.3.1 Repeater ModeIf you want the Wireless Router to operate in repeater mode, please select RepeaterMode from the Opeartion Mode drop-down list, see Figure 6- 3. In this mode, theWireless Router can connect to other wireless network devices in bridge mode, repeatermode or lazy mode, and at the same time it can provide connectivity for wireless clients.
UTT Technologies Chapter 6 Wirelesshttp://www.uttglobal.com Page 80Figure 6- 3 Basic Wireless Settings - Repeater ModeOperation Mode: Here please select Repeater Mode.Enable Wireless,SSID,Wireless Mode,Channel,Channel Width,andEnableSSID Broadcast: Refer to Section 6.1.1 AP Mode for detailed information.AP MAC Address: It specifies the MAC address of the remote AP.Security Mode: It specifies the security mode to be used by the Wireless Router.There are four options: None, WEP, TKIP and AES.●None: It means that no security mode will be used.●WEP: It means that the Wireless Router will use WEP for data encryption, seeFigure 6- 4.●TKIP: It means that the Wireless Router will use TKIP for data encryption, seeFigure 6- 6.●AES: It means that the Wireless Router will use AES for data encryption, seeFigure 6- 7.
UTT Technologies Chapter 6 Wirelesshttp://www.uttglobal.com Page 81Save: Click to save your changes.Cancel: Click to revert to the last saved settings.Figure 6- 4 Security Settings - WEP ModeSecurity Mode: It specifies the security mode to be used by the Wireless Router.Here please select WEP.Key Format: It specifies the format for entering the WEP keys. The options are Hexand ASCII.●Hex: Select this option if you want to enter the WEP keys in hexadecimalformat. Hexadecimal digits are a set of characters that includes numbers 0through 9 and letters A through F (or a through f). Hex WEP keys are caseinsensitive.●ASCII: Select this option if you want to enter the WEP keys in ASCII format.ASCII WEP keys are case sensitive.Default Tx Key: It allows you to select one of the WEP keys as the default transmitkey to transmit data. All keys can be used to receive data.Key Type: It allows you to select the size of each key, and it also allows you todisable or enable each key. The options are Disabled,64-bit and 128-bit. By default,Disabled is selected, which means the key is of no effect.WEP Key: It allows you to enter a key in one of the WEP Key boxes. You can enterup to four WEP keys. You should enter a key according to the Key Format and KeyType selected.●For 64-bit encryption, enter 10 hex characters or 5 ASCII characters.●For 128-bit encryption, enter 26 hex characters or 13 ASCII characters.Note1. The WEP keys on the Wireless Router must match the WEP keys on the remotewireless device in the same order. That is, WEP Key 1 on the Wireless Router must
UTT Technologies Chapter 6 Wirelesshttp://www.uttglobal.com Page 82match WEP Key 1 on the remote wireless device, and WEP Key 2, 3 and 4 mustmatch in a similar fashion. However, the two devices can have different Default TxKeys as long as the keys are in the same order. For example, the Wireless Routercan use WEP Key 1 as its Default Tx Key, while the remote wireless device can useWEP Key 3 as its Default Tx Key. The two devices will communicate as long as theWireless Router’s WEP Key 1 is identical to the remote wireless device’s WEP Key 1,and the Wireless Router’s WEP Key 3 is identical to the remote wireless device’sWEP Key 3.2. You must configure at least one WEP key. Otherwise, the system will pop up a promptdialog box after you click the Save button, see Figure 6- 5.Figure 6-5 Key Settings Prompt Dialog BoxFigure 6-6 Security Settings - TKIP ModeSecurity Mode: It specifies the security mode to be used by the Wireless Router.Here please select TKIP.Pre-shared Key: This key serves as seed for generating encryption keys. It must beidentical to the remote wireless network device’s. It must be between 8 and 63characters long.Figure 6- 7 Security Settings - AES ModeSecurity Mode: It specifies the security mode to be used by the Wireless Router.Here please select AES.
UTT Technologies Chapter 6 Wirelesshttp://www.uttglobal.com Page 83Pre-shared Key: This key serves as seed for generating encryption keys. It must beidentical to the remote wireless network device’s. It must be between 8 and 63characters long.6.1.3.2 Bridge ModeIf you want the Wireless Router to operate in bridge mode, please select Bridge Modefrom the Opeartion Mode drop-down list, see Figure 6- 8. In this mode, the WirelessRouter can connect to other wireless network devices in repeater mode or lazy mode.However, in this mode wireless clients are unable to connect to the Wireless Routerdirectly.Figure 6- 8 Basic Wireless Settings - Bridge ModeOperation Mode: Here please select Bridge Mode.The other paramters are the same as those of Repeater Mode. Please refer to Section6.1.3.1 Repeater Mode for detailed information.
UTT Technologies Chapter 6 Wirelesshttp://www.uttglobal.com Page 846.1.3.3 Lazy ModeIf you want the Wireless Router to operate in lazy mode, please select Lazy Mode fromthe Opeartion Mode drop-down list, see Figure 6- 9. In this mode, the Wireless Routercan connect to other wireless network devices in bridge mode or repearter mode; and atthe same time it can provide connectivity for wilreless clients.Figure 6- 9 Basic Wireless Settings - Lazy ModeOperation Mode: Here please select Laze Mode.The other paramters are the same as those of Repeater Mode. Please refer toSection 6.1.3.1 Repeater Mode for detailed information.6.1.4 Configuration Example for WDS1. RequirementsIn this example (see Figure 6- 10), there are two Wireless Routers: Router A and Router B.The Wireless Router A operates in Bridge Mode, its SSID is UTT123, security mode isTKIP, pre-shared key is 123456789 and LAN IP address is 192.168.1.1/25. The WirelessRouter B’s IP address is 192.168.1.2/25. We want the two Routers to communicate with
UTT Technologies Chapter 6 Wirelesshttp://www.uttglobal.com Page 85each other wirelessly.Figure 6-10 Configuration Example for WDS - Network Topology2. Configuration and VerificationTo connect the Wireless Router A to the Wireless Router B properly, the Wireless RouterB’s operation mode may be Lazy Mode or Repeater Mode (here we take Lazy Mode forexample), its SSID, security mode and pre-shared key must be the same as those of theWireless Router A.Besides, we leave the other parameters at their default values on both Routers.1)Configuring the Wireless Router AThe following figure shows the detailed settings on the Wireless Router A.NotePlease enter the Wireless Router B’s MAC address (c83a350057e0 in this example)in the first AP MAC Address text box on the Wireless Router A.
UTT Technologies Chapter 6 Wirelesshttp://www.uttglobal.com Page 86Figure 6- 11 Configuration Example for WDS - Configuring the Wireless Router A2)Configuring the Wireless Router BThe following figure shows the detailed settings on the Wireless Router B.
UTT Technologies Chapter 6 Wirelesshttp://www.uttglobal.com Page 87Figure 6- 12 Configuration Example for WDS - Configuring the Wireless Router B3)Verifying Connectivity between the Two RoutersTo verify connectivity between the two Routers, you can use the ping command at thecommand prompt on the Wireless Router B: Ping 192.168.1.1If the displayed page is similar to the screenshot below, the connection between the twoRouters has been established.Figure 6-13 Configuration Example for WDS - Verifying Connectivity
UTT Technologies Chapter 6 Wirelesshttp://www.uttglobal.com Page 886.2 Wireless Security SettingsThis section describes the Wireless > Security page.The Wireless Router provides four security mode options including None,WEP,WPA/WPA2,andWPA-PSK/WPA2-PSK. If you want an open network without wirelesssecurity, keep the default value of None.6.2.1 Disabling Wireless SecurityFigure 6- 14 Disabling Wireless SecuritySecurity Mode: It specifies the security mode that you want to use on your wirelessnetwork. Here please select None to disable wireless securtiy.Save: Click to save you changes.Cancel: Click to revert to the last saved settings.6.2.2 Wireless Security Settings – WEP
UTT Technologies Chapter 6 Wirelesshttp://www.uttglobal.com Page 89Figure 6- 15 Wireless Security Settings - WEPSecurity Mode: It specifies the security mode that you want to use on your wirelessnetwork. Here please select WEP. WEP is the basic encryption mode which is not assecure as WPA.Authentication Type: It allows you to select the authentication type under WEPsecurity mode. The Wireless Router must authenticate a wireless client before theclient can join the wireless network. There are three options: Auto,Open Systemand Shared Key.●Auto: It allows either Open System or Shared Key authentication to be used.The Wireless Router will automatically choose the authentication type.●Open System: It allows any wireless client regardless of its WEP keys toauthenticate and attempt to associate with the Wireless Router. However, even ifa client can complete authentication and associate with the Wireless Router, theclient cannot send or receive data from the Wireless Router unless the client hasthe correct WEP key.●Shared Key: It requires that the wireless client and the Wireless Router havethe same WEP key to authenticate. Without the correct key, authentication willfail and the client won’t be allowed to associate with the Wireless Router.Key Format: It specifies the format for entering the WEP keys. The options are Hexand ASCII.●Hex: Select this option if you want to enter the WEP keys in hexadecimalformat. Hexadecimal digits are a set of characters that includes numbers 0through 9 and letters A through F (or a through f). Hex WEP keys are caseinsensitive.●ASCII: Select this option if you want to enter the WEP keys in ASCII format.ASCII WEP keys are case sensitive.Default Tx Key: It allows you to select one of the WEP keys as the default transmitkey to transmit data. All keys can be used to receive data.WEP Key: It allows you to enter a key in one of the WEP Key boxes. You can enterup to four WEP keys. You should enter a key according to the Key Format and KeyType selected.●For 64-bit encryption, enter 10 hex characters or 5 ASCII characters.●For 128-bit encryption, enter 26 hex characters or 13 ASCII characters.Key Type: It allows you to select the size of each key, and it also allows you todisable or enable each key. The options are Disabled,64-bit and 128-bit. By default,Disabled is selected, which means the key is of no effect.Save: Click to save your changes.Cancel: Click to revert to the last saved settings.
UTT Technologies Chapter 6 Wirelesshttp://www.uttglobal.com Page 906.2.3 Wireless Security Settings - WPA/WPA2Figure 6- 16 Wireless Security Settings - WPA/WPA2Security Mode: It specifies the security mode that you want to use on your wirelessnetwork. Here please select WPA/WPA2 to use WPA mode, WPA2 mode or both. InWPA or WPA2 mode, the Wireless Router uses an external RADIUS server toauthenticate wireless clients.WPA Mode: It specifies the WPA mode that you want to use on your wireless network.The options are Auto,WPA and WPA2.●Auto: It allows both WPA and WPA2 clients to connect to the Wireless Router.●WPA: It only allows WPA clients to connect to the Wireless Router.●WPA2: It only allows WPA2 clients to connect to the Wireless Router.Encrption Method: It specifies the encrytion method used for data encryption. Theoptions are Auto,TKIP and AES.●Auto: It means that the Wireless Router will automatically choose to use TKIPor AES for data encryption.●TKIP: It means that the Wireless Router will use TKIP for data encryption.●AES: It means that the Wireless Router will use AES for data encryption.RADIUS Server IP: It specifies the IP address of the RADIUS server, which is usedto authenticate the wireless clients.RADIUS Server Port: It specifies the UPD port number of the RADIUS server. Thevaild range is 1 to 65535, and the default value is 1812.Shared Secret: It specifies the shared secret key to be used for authenticationbetween the Wireless Router and the RADIUS server. It must be the same on boththe Wireless Router and the RADIUS server.
UTT Technologies Chapter 6 Wirelesshttp://www.uttglobal.com Page 91Key Renewal Interval: It specifies how often the WPA group key changes. The validrange is 60-86400 or 0, and the default value is 3600 seconds. Enter 0 to disableautomatic renewal.Save: Click to save your changes.Cancel: Click to revert to the last saved settings.6.2.4 Wireless Security Settings - WPA-PSK/WPA2-PSKFigure 6- 17 Wireless Security Settings - WPA-PSK/WPA2-PSKSecurity Mode: It specifies the security mode that you want to use on your wirelessnetwork. Here please select WPA-PSK/WPA2-PSK to use WPA-PSK mode,WPA2-PSK mode or both. This mode intends for the wireless network that doesn’thave a RADIUS server. In this mode, the Wireless Router uses the pre-shared keythat is manulally entered to generate encryption keys.WPA Mode: It specifies the WPA mode that you want to use on your wireless network.The options are Auto,WPA-PSK and WPA2-PSK.●Auto: It allows both WPA and WPA2 clients to connect to the Wireless Router.●WPA-PSK: It only allows WPA clients to connect to the Wireless Router.●WPA2-PSK: It only allows WPA2 clients to connect to the Wireless Router.Encrption Method: It specifies the encrytion method used for data encryption. Theoptions are Auto,TKIP and AES.●Auto: It means that the Wireless Router will automatically choose encryptionmethod for each wireless client.●TKIP: It means that the Wireless Router will use TKIP for data encryption.●AES: It means that the Wireless Router will use AES for data encryption.Pre-shared Key: This key serves as seed for generating encryption keys. The
UTT Technologies Chapter 6 Wirelesshttp://www.uttglobal.com Page 92wireless clients also need to be configurd with the same pre-shared key. It must bebetween 8 and 63 characters long.Key Renewal Interval: It specifies how often the WPA group key changes. The validrange is 60-86400 or 0, and the default value is 3600 seconds. Enter 0 to disableautomatic renewal.Save: Click to save your changes.Cancel: Click to revert to the last saved settings.
UTT Technologies Chapter 6 Wirelesshttp://www.uttglobal.com Page 936.3 Wireless MAC Address FilteringThis section describes the Wireless > MAC Filtering page.The MAC address filtering is used to filter the wireless clients based on their MACaddresses. With this feature, you can either allow or block specific wireless clients toconnect to the Wireless Router.6.3.1 MAC Address Filtering Global SettingsFigure 6- 18 MAC Address Filtering Global SettingsEnable MAC Address Filtering: It allows you to enable or disable MAC addressfiltering. If you want to enable MAC address filtering, please select the check box.Filtering Mode: It specifies the mode of MAC address filtering.●Allow: Choose this option to allow the wireless clients with the MAC addresseslisted in the MAC Address Filtering List to connect to the Wireless Router, butblock all other wireless clients.●Deny: Choose this option to block the wireless clients with the MAC addresseslisted in the MAC Address Filtering List from connecting to the Wireless Router,but allow all other wireless clients.Save: Click to save your changes.Cancel: Click to revert to the last saved settings.
UTT Technologies Chapter 6 Wirelesshttp://www.uttglobal.com Page 946.3.2 MAC Address Filtering ListFigure 6- 19 MAC Address Filtering ListAdd a MAC Address Filtering Entry: To add a new MAC address filtering entry, firstclick the Add button to go to the MAC Address Filtering Settings page, nextconfigure it, lastly click the Save button.View MAC Address Filtering Entry(s): When you have configured one or moreMAC address filtering entries, you can view them in the MAC Address Filtering List.Modify a MAC Address Filtering Entry: To modify a configured MAC addressfiltering entry, click its ID hyperlink or icon, the related information will bedisplayed in the setup page. Then modify it, and click the Save button.Delete MAC Address Filtering Entry(s): There are three ways to delete MACaddress filtering entry(s).1. To delete a MAC address filtering entry, directly click its icon.2. To delete more than one MAC address filtering entry at a time, select the leftmostcheck boxes of the entries that you want to delete, and then click the Deletebutton.3. To delete all the MAC address filtering entries at a time, directly click the DeleteAll button.6.3.3 MAC Address Filtering SettingsFigure 6- 20 MAC Address Filtering Settings
UTT Technologies Chapter 6 Wirelesshttp://www.uttglobal.com Page 95MAC Address: It specifies the MAC address of the wireless client that you want toallow or block.Save: Click to save your changes.Back: ClicktogobacktotheWireless > MAC Filtering page.6.3.4 How to Configure MAC Address FilteringTo configure MAC address filtering, follow these steps:Step 1 Go to the Wireless > MAC Filtering page.Step 2 Click the Add button to go to MAC Address Filtering Settings page, nextenter the MAC address of the wireless client that you want to control in theMAC Address text box.Step 3 Now you can view the MAC address filtering entry in the MAC AddressFiltering List.Step 4 Continue to configure other MAC address filtering entries.Step 5 If you want to allow the wireless clients with the MAC addresses listed in theMAC Address Filtering List to connect to the Wireless Router, but block allother wireless clients, select the Enable MAC Address Filtering check box,and choose Allow as the Filtering Mode. If you want to block the specifiedwireless clients from connecting to the Wireless Router, but allow all otherwireless clients, select the Enable MAC Address Filtering check box, andchoose Block as the Filtering Mode.After you have configured MAC address filtering, the Wireless Router will allow or blockwireless clients based on their MAC addresses.To temporarily disable MAC address filtering, clear the Enable MAC Address Filteringcheck box.6.3.5 Configuration Example for MAC Address Filtering1. RequirementsIn this example, we want to block the wireless clients with the MAC addresses00b08c0517ed, 001f3c47f481 and 001f3c0f07f4 accessing the Wireless Router, and allowall other wireless clients to access the Wireless Router.
UTT Technologies Chapter 6 Wirelesshttp://www.uttglobal.com Page 962. Configuration StepsStep 1 Go to the Wireless > MAC Filtering page.Step 2 Click the Add button to go to MAC Address Filtering Settings page (seeFigure 6- 21), enter 00b08c0517ed in the MAC Address text box, and thenclick the Save button.Figure 6- 21 Adding a MAC Address Filtering Entry - ExampleStep 3 Continue to add the other two MAC addresses (001f3c47f481 and 001f3c0f07f4)to the MAC Address Filtering List.Step 4 Select the Enable MAC Address Filtering check box, choose Block as theFiltering Mode, and then click the Save button.Figure 6- 22 MAC Address Filtering Global Settings - ExampleNow the configuration is complete, and you can view the three MAC address filteringentries in the MAC Address Filtering List. If you have entered an incorrect MAC address,directly click its icon to go to the MAC Address Filtering Settings page to modify it,and click the Save button to save the change.Figure 6- 23 MAC Address Filtering List - Example
UTT Technologies Chapter 6 Wirelesshttp://www.uttglobal.com Page 976.4 Advanced Wireless SettingsThis section describes the Wireless > Advanced Wireless Settings page.In this page, you can configure advanced wireless settings for your wireless connection.We suggest that you don’t adjust these settings unless you are an expert user. Incorrectsettings will reduce the performance of your wireless network.Figure 6- 24 Advanced Wireless SettingsRTS Threshold: It specifies the packet size above which an RTS/CTS handshakewill be performed before sending the packet. It must be between 1 and 2347, and thedefault value is 2347 bytes.RTS/CTS handshake is used to reduce collisions introduced by hidden nodes in theWLAN. A low threshold causes RTS packts to be sent more frequently, whichconsume more available bandwidth and reduce the throughput of other networkpackets. However, frequent RTS packets can help the network to recover frominterference or collisions.Fragmentation Threshold: It speicifies the maximum size of a packet that can betransmitted. The packets larger than the specified size will be fragmented beforetransmission. It must be between 256 and 2346, and the default value is 2346 bytes.Reducing this value will decrease network performance. In most cases, please leavethe default value. However, to ensure data transmission, you may decrease this valuein areas where communication is poor, or in areas where there is a great deal of radiointerference.Beacon Interval: It specifies the time interval between beacons. The WirelessRouter periodically broadcasts beacons at the specified interval to synchronize thewireless network. It must be between 20 and 999, and the default value is 100milliseconds.DTIM Interval: It determines how often the beacon contains a Delivery Traffic
UTT Technologies Chapter 6 Wirelesshttp://www.uttglobal.com Page 98Indication Message (DTIM). The DTIM notifies wireless clients in power-save modethat a packet is waiting for them. The DTIM interval is a multiple of the BeaconInterval. For example, if it is set to 4, a DTIM message will be sent with every fourthbeacon. It must be between 1 and 255, and the default value is 1.Enable Short Preamble: It allows you to enable short preamble or long preamble.●Select the check box to enable short preamble. The short preamble canimprove network performance.●Clear the check box to enable long preamble. The long preamble ensurescompatibilities with some old 802.11b devices that require the long preamble, butit can slightly reduce throughout at high data rate.Enable WMM: It allows you to enable or disable WMM (Wi-Fi Multimedia). WMM is asubset of the 802.11e standard. Enable this feature to improve the quality ofmultimedia (video, audio, etc.) applications by prioritizing traffic for them. To use thisfeature, your wireless clients must also support WMM.Save: Click to save your changes.Cancel: Click to revert to the last saved settings.
UTT Technologies Chapter 6 Wirelesshttp://www.uttglobal.com Page 996.5 Wireless Client ListThis section describes the Wireless > Client List page.In the Wireless Client List, you can view the status of all wireless clients which areconnected to the Wireless Router. In addition, you can also easily configure MAC addressfiltering entries via the list.Figure 6- 25 Wireless Client ListID: It is used to identify each wireless client entry in the list.MAC Address: It displays the MAC address of the wireless client.Filtered: It indicates whether the corresponding MAC address has been added to theMAC Address Filtering List in the Wireless > MAC Filtering page. If the MACaddress has been added to the MAC Address Filtering List,theFiltered check boxis checked. Else, the Filtered check box is cleared; and in this case, you can click thecheck box to add the MAC address to the MAC Address Filtering List.Channel Width: It displays the current channel width in MHz.Filter All: Click to select the Filtered check boxes of all MAC addresses and addthem into the MAC Address Filtering List, except those already added.Refresh: Click to view the latest information in the list.
UTT Technologies Chapter 7 Advancedhttp://www.uttglobal.com Page 100Chapter 7 AdvancedThis chapter describes how to configure and use the advanced features of the WirelessRouter, which include NAT and DMZ, IP/MAC binding, static route, and PPPoE server.7.1 NAT and DMZThis section describes the Advanced > NAT&DMZ page.7.1.1 Introduction to NAT Features7.1.1.1 NAT OverviewThe NAT (Network Address Translation) is an Internet standard that is used to map one IPaddress space (i.e., Intranet) to another IP address space (i.e., Internet). The NAT isdesigned to alleviate the shortage of IP addresses, that is, it allows all the local computersto share a single or a small group of IP addresses: On the Internet, there is only a singlenetwork device using a single or a small group of public IP addresses; but the localcomputers can use any range of private IP addresses, and these IP addresses are notvisible from the Internet. As the internal network can be effectively isolated from theoutside world, the NAT can also provide the benefit of network security assurance.The Wireless Router provides flexible NAT features. The following sections describe themin detail.7.1.1.2 NAT Address Space DefinitionsTo ensure that NAT operates properly, the Wireless Router uses and maintains twoaddress spaces:●Internal IP address: It indicates the IP address assigned to a local computer by theadministrator. It is usually a private IP address.●External IP address: It indicates the IP address assigned to the Wireless Router’sInternet connection by the ISP. It is a legal public IP address that can represent one ormore internal IP addresses to the outside world.
UTT Technologies Chapter 7 Advancedhttp://www.uttglobal.com Page 1017.1.1.3 NAT TypesThe Wireless Router provides two types of NAT: One2One and EasyIP.●One2One (One to One): It indicates static network address translation. It is alwaysreferred to as Basic NAT, which provides a one to one mapping between an internaland an external IP address. In this type of NAT, IP address needs to be changed, butport needn’t.One to One NAT can be used to allow the outside users to access a LAN server: In thelocal network, the LAN server still use the private IP address, which is provided to thelocal computers to access; and on the Internet, the Wireless Router will assign anexternal IP address to the local server, then the outside users can using this external IPaddress to access the server through the Wireless Router.●EasyIP: It indicates network address and port translation (NAPT). Since it is the mostcommon type of NAT, it is often simply referred to as NAT. NAPT provides many-to-onemappings between multiple internal IP addresses and a single external IP addresses,that is, these multiple internal IP addresses will be translated to the same external IPaddress. In this type of NAT, to avoid ambiguity in the handling of returned packets, itmust dynamically assign a TCP/UDP port to an outgoing session and change thepackets’ source port to the assigned port before forwarding them. Besides, theWireless Router must maintain a translation table so that return packets can becorrectly translated back.When you obtain multiple public IP addresses from your ISP, you can create more thanone NAT rule for either type of NAT. In actual network environment, the two types of NATrules are often used together.7.1.1.4 Port Forwarding and DMZ HostWhen NAT is enabled on the Wireless Router, the Wireless Router will block all therequests initiated from outside users. However, in some cases, the outside users want toaccess the LAN internal servers through the Wireless Router. To achieve this purpose,you need to configure port forwarding entries or DMZ host on the Wireless Router.1. Port ForwardingPort forwarding feature allows you to create the mapping between <external IP address:external port> and <internal IP address: internal port>, then all the requests from outsideusers to the specified external IP address: port on the Wireless Router will be forwarded tothe mapped local server, so the outside users can access the service offered by theserver.For example, if you want to allow the local SMTP server (IP address: 192.168.1.88) to be
UTT Technologies Chapter 7 Advancedhttp://www.uttglobal.com Page 102available to the outside users, you can create a port forwarding entry: external IP addressis WAN1 IP address (200.200.201.88 in this example), external port is 2100, internal IPaddress is 192.168.1.88, and internal port is 25. Then all the requests to SMTP servicefrom outside users to 200.200.201.88:2100 will be forwarded to 192.168.1.88:25.2. DMZ HostThe DMZ (Demilitarized Zone) feature allows one local computer to be exposed to theInternet for the use of a special service such as online game or video conferencing. Whenreceiving the requests initiated from outside users, the Wireless Router will directlyforward these requests to the specified DMZ host.NoteWhen a local computer is designated as the DMZ host, it loses firewall protectionprovided by the Wireless Router. As the DMZ host is exposed to many exploits fromthe Internet, it may be used to attack your network.3. The Priorities of Port Forwarding Entries and DMZ HostThe port forwarding entries take priority over the DMZ host. When receiving a requestpacket initiated from an outside user, the Wireless Router will firstly search the PortForwarding List to find out if there is a port forwarding entry matching the destination IPaddress and port of the packet. If a match is found, the Wireless Router will forward thepacket to the mapped local computer. Else, the Wireless Router will try to find out if thereis an available DMZ host.7.1.2 Port Forwarding7.1.2.1 Port Forwarding ListFigure 7- 1 Port Forwarding List
UTT Technologies Chapter 7 Advancedhttp://www.uttglobal.com Page 103Add a Port Forwarding Entry: To add a new port forwarding entry, first click the Addbutton to go to the Port Forwarding Settings page, next configure it, lastly click theSave button.View Port Forwarding Entry(s): When you have configured one or more portforwarding entries, you can view them in the Port Forwarding List.Modify a Port Forwarding Entry: To modify a configured port forwarding entry, clickits Name hyperlink or icon, the related information will be displayed in the setuppage. Then modify it, and click the Save button.Delete Port Forwarding Entry(s): There are three ways to delete port forwardingentry(s).1. To delete a port forwarding entry, directly click its icon.2. To delete more than one port forwarding entry at a time, select the leftmost checkboxes of the entries that you want to delete, and then click the Delete button.3. To delete all the port forwarding entries at a time, directly click the Delete Allbutton.NoteAfter you enable HTTP remote management in the Administration > RemoteAccess page, the system will automatically create a port forwarding entry for it. Youcannot modify or delete it in this page.7.1.2.2 Port Forwarding SettingsFigure 7- 2 Port Forwarding Settings
UTT Technologies Chapter 7 Advancedhttp://www.uttglobal.com Page 104Name: It specifies a unique name of the port forwarding entry.Enable: It allows you to enable or disable the port forwarding entry. The default valueis checked, which means the port forwarding entry is in effect. If you want to disablethe entry temporarily instead of deleting it, please clear the check box.Protocol: It specifies the transport protocol used by the service. The availableoptions are TCP,UDP and TCP/UDP. If you are not sure, select TCP/UDP.Start External Port: It specifies the lowest port number provided by the WirelessRouter. The external ports are opened for outside users to access.Internal IP Address: It specifies the IP address of the local computer that providesthe service.Start Internal Port: It specifies the lowest port number of the service provided by thelocal computer. The Start External Port and Start Internal Port can be different.Port Count: It specifies the number of service ports provided by the local computer. Ifthe service uses only one port number, enter 1. Change it if the service uses a rangeof consecutive ports. The maximum value is 20. For example, if the start internal portis 20, the start external port is 2000, and the port count is 2, then the internal portrange is from 20 to 21, and the external port range is from 2000 to 2001.Bind to: It specifies the interface to which this port forwarding entry is bound. Theport forwarding entry will use the selected interface’s IP address as its external IPaddress.Save: Click to save your changes.Cancel: Click to revert to the last saved settings.Back: ClicktogobacktothePort Forwarding List.7.1.2.3 How to Add Port Forwarding EntriesTo add one or more static port forwarding entries, follow these steps:Step 1 Go to the Advanced > NAT > Port Forwarding page, and click the Add buttonto go to the Port Forwarding Settings page.Step 2 Specify the Name, and leave the Enable check box checked.Step 3 Specify the Protocol,Internal IP Address and Start Internal Port as required.Step 4 Specify the Start External Port as required. The Start External Port and StartInternal Port can be different.Step 5 If the open service uses a range of consecutive ports, you need to specify thePort Count.
UTT Technologies Chapter 7 Advancedhttp://www.uttglobal.com Page 105Step 6 Select an interface from the Bind to drop-down list as required. The portforwarding entry will use the selected interface’s IP address as its external IPaddress.Step 7 Click the Save button to save the settings. You can view the port forwardingentry in the Port Forwarding List.Step 8 If you want to add another new port forwarding entry, please repeat the abovesteps.7.1.2.4 Configuration Example for Port ForwardingAn organization wants a LAN server (IP Address: 192.168.1.99) to open Web service(Protocol: TCP; Port: 80) to the outside users. And the Wireless Router will use 10000 asthe external port and the WAN2 IP address (200.200.200.88 in this example) as theexternal IP address. Then all the requests to Web service from outside users to200.200.200.88:10000 will be forwarded to 192.168.1.99:80.The following figure shows the detailed settings.Figure 7-3 Port Forwarding Settings - Example
UTT Technologies Chapter 7 Advancedhttp://www.uttglobal.com Page 1067.1.3 NAT Rule7.1.3.1 NAT Rule ListFigure 7-4 NAT Rule ListAdd a NAT Rule: To add a new NAT rule, first click the Add button to go to the NATRule Settings page, next configure it, lastly click the Save button.View NAT Rule(s): When you have configured one or more NAT rules, you can viewthem in the NAT Rule List.Modify a NAT Rule: To modify a configured NAT rule, click its Name hyperlink oricon, the related information will be displayed in the setup page. Then modify it, andclick the Save button.Delete NAT Rule(s): There are three ways to delete NAT rules.1. To delete a NAT rule, directly click its icon.2. To delete more than one NAT rule at a time, select the leftmost check boxes ofthe NAT rules that you want to delete, and then click the Delete button.3. To delete all the NAT rules at a time, directly click the Delete All button.7.1.3.2 NAT Rule SettingsThe following sections describe the settings of the EasyIP NAT rule and One2One NATrule respectively, see Figure 7- 5 and Figure 7- 6.
UTT Technologies Chapter 7 Advancedhttp://www.uttglobal.com Page 1077.1.3.2.1 NAT Rule Settings - EasyIPFigure 7- 5 NAT Rule Settings - EasyIPName: It specifies a unique name of the NAT rule.NAT Type: It specifies the type of the NAT rule. The available options are EasyIP andOne2One. Here please select EasyIP.External IP: It specifies the external IP address to which the local computers’ IPaddresses are mapped.Start Internal IP and End Internal IP: They specify a range of internal IP addresses.The local computers within the specified range will preferentially use the NAT rule.Bind to: It specifies the interface to which the NAT rule is bound.Save: Click to save your changes.Cancel: Click to revert to the last saved settings.Back: ClicktogobacktotheNAT Rule List.
UTT Technologies Chapter 7 Advancedhttp://www.uttglobal.com Page 1087.1.3.2.2 NAT Rule Settings - One2OneFigure 7- 6 NAT Rule Settings - One2OneName: It specifies a unique name of the NAT rule.NAT Type: It specifies the type of the NAT rule. The available options are EasyIP andOne2One. Here please select One2One.Start External IP: It specifies the start external IP address to which the start internalIP address is mapped.Start Internal IP and End Internal IP: They specify the internal IP address range ofthe NAT rule.Bind to: It specifies the interface to which the NAT rule is bound.Save: Click to save your changes.Cancel: Click to revert to the last saved settings.Back: ClicktogobacktotheNAT Rule List.Note1. When creating a One2One NAT rule, you must set the Start External IP.Thenumber of the external IP addresses is the same as the number of internal IPaddresses, which is determined by the Start Internal IP and End Internal IP.Forexample, if the Start Internal IP is 192.168.16.6, End Internal IP is 192.168.16.8,and Start External IP is 200.200.200.116, then 192.168.16.6, 192.168.16.7, and192.168.16.8 will be mapped to 200.200.200.116, 200.200.200.117, and200.200.200.118 respectively.2. A One2One NAT rule can contain up to 20 external/internal IP addresses.
UTT Technologies Chapter 7 Advancedhttp://www.uttglobal.com Page 1097.1.3.3 How to Add NAT RulesTo add one or more NAT rules, follow these steps:Step 1 Please identify the type of the NAT rule that you want to add.Step 2 Go to the Advanced > NAT > NAT Rule page, and click the Add button to go tothe NAT Rule Settings page.Step 3 Specify the Name for the NAT rule, and select a type from the NAT Typedrop-down list as required.Step 4 There are two cases:1) If the NAT rules’ type is EasyIP, please specify the External IP,StartInternal IP,andEnd Internal IP as required.2) If the NAT rules’ type is One2One, please specify the Start External IP,Start Internal IP,andEnd Internal IP as required.Step 5 Select an interface from the Bind to drop-down list as required.Step 6 Click the Save button to save the settings. You can view the NAT rule in theNAT Rule List.Step 7 If you want to add another new NAT rule, please repeat the above steps.NoteIf you want to delete NAT rule(s), please follow the ways described in Section 7.1.3.1NAT Rule List.7.1.3.4 Configuration Examples for NAT Rule7.1.3.4.1 An Example for Configuring an EasyIP NAT Rule1. RequirementsIn this example, an Internet café has a single Internet connection, and obtains eight publicIP addresses (from 218.1.21.0/29 to 218.1.21.7/29) from the ISP. Therein, 218.1.21.1/29is used as the Internet connection’s gateway IP address, 218.1.21.2/29 is used as theWireless Router’s WAN1 interface IP address. Note that 218.1.21.0/29 and 218.1.21.7/29cannot be used as they are the subnet number and broadcast address respectively.The administrator want the local computers in the online game area (its address range isfrom 192.168.1.10/24 to 192.168.1.100/24) to use 218.1.21.3/29 to access the Internet. To
UTT Technologies Chapter 7 Advancedhttp://www.uttglobal.com Page 110achieve this purpose, he should create an EasyIP NAT rule for them. The rule’s ExternalIP is 218.1.21.3, Start Internal IP is 192.168.1.10, End Internal IP is 192.168.1.100, andBind to be WAN1.2. Configuration StepsThe configuration steps are the following:Step 1 Go to the Advanced > NAT > NAT Rule page, and click the Add button to go tothe NAT Rule Settings page, see the following figure.Figure 7-7 EasyIP NAT Rule Settings - ExampleStep 2 Enter Example1 in the Name text box.Step 3 Select EasyIP from the NAT Type drop-down list.Step 4 Enter 218.1.21.3 in the External IP text box; enter 192.168.1.10 and192.168.1.100 in the Start Internal IP and End Internal IP text boxesrespectively.Step 5 Select WAN1 from the Bind to drop-down list.Step 6 Click the Save button to save the settings. Till now you have finishedconfiguring the NAT rule, and you can view it in the NAT Rule List.NoteIf an EasyIP NAT rule’s External IP is not on the same subnet as the IP address of theinterface to which the rule is bound, the Wireless Router’s default gateway requires asubnet route for the network to which the External IP belongs, or a host route for theExternal IP pointing to the bound interface.
UTT Technologies Chapter 7 Advancedhttp://www.uttglobal.com Page 1117.1.3.4.2 An Example for Configuring a One2One NAT Rule1. RequirementsIn this example, a business has a single static IP Internet connection, and obtains eightpublic IP addresses (202.1.1.128/29 - 202.1.1.1.135/29) from the ISP. Therein,202.1.1.129/29 is used as the Internet connection’s gateway IP address, 202.1.1.130/2 isused as the Wireless Router’s WAN1 IP address. Note that 202.1.1.128/29 and202.1.1.1.135/29 cannot be used as they are the subnet number and broadcast addressrespectively.The business wants its employees to share a single public IP address of 202.1.1.130/29to access the Internet; and it wants its four local servers to provide services for the outsideusers. The LAN subnet is 192.168.1.0/24. The four local servers IP addresses are from192.168.1.200/24 to 192.168.1.203/24.2. AnalysisFirstly we need to configure a static IP Internet connection on the WAN1 interface in theNetwork > WAN page or through the Start > Setup Wizard. After you have configuredthe Internet connection, the Wireless Router will automatically create a related systemreserved EasyIP NAT rule, and also enable NAT.Secondly, we need to create a One2One NAT rule for the four local servers. The IPaddresses of the four local servers are mapped to 202.1.1.131/29, 202.1.1.132/29,202.1.1.133/29, 202.1.1.134/29 respectively. Thus the outside users can use these publicaddresses to access the local servers through the Wireless Router.3. Configuration StepsHere we only describe how to create the One2One NAT rule.Step 1 Go to the Advanced > NAT > NAT Rule page, and click the Add button to go tothe NAT Rule Settings page, see the following figure.Step 2 Enter Example2 in the Name text box.
UTT Technologies Chapter 7 Advancedhttp://www.uttglobal.com Page 112Figure 7-8 One2One NAT Rule Settings - ExampleStep 3 Select One2One from the NAT Type drop-down list.Step 4 Enter 202.1.1.131 in the Start External IP text box; enter 192.168.1.200 and192.168.1.203 in the Start Internal IP and End Internal IP text boxesrespectively.Step 5 Select WAN1 from the Bind to drop-down list.Step 6 Click the Save button to save the settings. Till now you have finishedconfiguring the NAT rule, and you can view it in the NAT Rule List.7.1.4 DMZFigure 7-9 DMZ Host SettingsEnable DMZ: It allows you to enable or disable DMZ feature. If you want to enableDMZ feature on the Wireless Router, please select this check box.DMZ Host IP Address: It specifies the private IP address of the DMZ host.Save: Click to save your changes.Cancel: Click to revert to the last saved settings.
UTT Technologies Chapter 7 Advancedhttp://www.uttglobal.com Page 113NoteWhen a local computer is designated as the DMZ host, it loses firewall protectionprovided by the Wireless Router. The DMZ host can be accessed through all theWAN interfaces.
UTT Technologies Chapter 7 Advancedhttp://www.uttglobal.com Page 1147.2 IP/MAC BindingThis section describes the Security > IP/MAC Binding page.7.2.1 Introduction to IP/MAC Binding7.2.1.1 IP/MAC Binding OverviewTo achieve network security management, you should perform user identification beforeperforming user authorization. In this section, we describe how to implement useridentification. In Section 9.1 Firewall > Access Control, we will describe how to controlthe Internet behaviors of the LAN users in detail.The Wireless Router provides IP/MAC binding feature to implement user identification.Using the IP/MAC address pair as a unique user identity, you can protect the WirelessRouter and your network against IP spoofing attacks. IP spoofing attack refers to that acomputer attempts to use another trusted computer’s IP address to connect to or passthrough the Wireless Router. The computer’s IP address can easily be changed to atrusted address, but MAC address cannot easily be changed as it is added to the Ethernetcard at the factory.7.2.1.2 The Operation Principle of IP/MAC BindingFor the sake of convenience, we firstly introduce several related terms including legal user,illegal user and undefined user.●Legal User: A legal user’s IP and MAC address pair matches an IP/MAC bindingwhose Allow check box is checked.●Illegal User: An illegal user’s IP and MAC address pair matches an IP/MAC bindingwhose Allow check box is cleared; or the IP address or MAC address is the same asthat of an IP/MAC binding, but not both.●Undefined User: An undefined user’s IP address and MAC address both aredifferent from any IP/MAC binding. The undefined users are all the users except legaland illegal users.It allows the legal users to access the Wireless Router or access the Internet through theWireless Router, and denies the illegal users. And the parameter of Allow UndefinedLAN PCs determines whether it allows the undefined users to access the Wireless Router
UTT Technologies Chapter 7 Advancedhttp://www.uttglobal.com Page 115or access the Internet through the Wireless Router, that is, it will allow them if they AllowUndefined LAN PCs check box is checked, else block them.IP/MAC binding feature can act on the packets initiated from the local computers to theWireless Router or outside computers. When receiving a packet initiated from LAN, theWireless Router will firstly determine the sender’s identity by comparing the packet withthe bindings in the IP/MAC Binding List, and then process the packet according to thesender’s identity. The details are as follows:1. If the sender is a legal user, the packet will be allowed to pass, and then be furtherprocessed by other function modules.2. If the sender is an illegal user, the packet will be dropped immediately to prevent IPspoofing.3. If the sender is an undefined user, there are two cases:1) If the Allow Undefined LAN PCs check box is checked, the packet will beallowed to pass, and then be further processed by other function modules.2) Else, the packet will be dropped immediately.7.2.2 IP/MAC Binding Global SettingsFigure 7- 10 IP/MAC Binding Global SettingsAllow Undefined LAN PCs: It allows or blocks the undefined local computers fromaccessing the Wireless Router or accessing the Internet through the Wireless Router.If you want to allow the undefined local computers to access the Wireless Router andInternet, please select the check box.Save: Click to save your changes.NoteIf you want to clear the Allow Undefined LAN PCs check box to block the undefinedlocal computers, please make sure that you have added the IP/MAC address pair ofthe computer that you use to administer the Wireless Router into the IP/MACBinding List. Otherwise you cannot access the Wireless Router from that computer.
UTT Technologies Chapter 7 Advancedhttp://www.uttglobal.com Page 1167.2.3 IP/MAC Binding ListFigure 7-11 IP/MAC Binding ListAdd One or More IP/MAC Bindings: To add one or more IP/MAC bindings, first clickthe Add button to go to the IP/MAC Binding Settings page shown in Figure 7-14,next configure them, lastly click the Save button.View IP/MAC Binding(s): When you have configured one or more IP/MAC bindings,you can view them in the IP/MAC Binding List.Modify an IP/MAC Binding: To modify a configured IP/MAC binding, click its UserName hyperlink or icon, the related information will be displayed in the setuppage shown in Figure 7- 12. Then modify it, and click the Save button.Figure 7- 12 Modifying an IP/MAC BindingThe Allow check box is used to allow or block a user matching an IP/MAC bindingfrom accessing the Wireless Router and Internet. To allow the user matching theIP/MAC binding to access, select the IP/MAC binding’s Allow check box; else clear it.Delete IP/MAC binding(s): There are three ways to delete IP/MAC bindings.1. To delete a IP/MAC binding, directly click its icon.2. To delete more than one IP/MAC binding at a time, select the leftmost checkboxes of the bindings that you want to delete, and then click the Delete button.3. To delete all the IP/MAC bindings at a time, directly click the Delete All button.
UTT Technologies Chapter 7 Advancedhttp://www.uttglobal.com Page 117NoteWhen you add the IP/MAC address pair of the computer that you use to administerthe Wireless Router into the IP/MAC Binding List, please leave the Allow check boxchecked. Otherwise you cannot access the Wireless Router from that computer. Ifyou attempt to clear the check box, you will be prompted that the operation is notpermitted, see the following figure.Figure 7- 13 IP/MAC Binding Error Message7.2.4 IP/MAC Binding SettingsFigure 7- 14 IP/MAC Binding SettingsSubnet: It specifies the subnet you want to scan. The default is the Wireless Router’sLAN IP address and subnet mask.Scan: If you click the Scan button, the Wireless Router will immediately scan thespecified subnet to detect active computers connected to the Wireless Router, learnand display dynamic ARP information (that is, IP and MAC address pairs) in the text
UTT Technologies Chapter 7 Advancedhttp://www.uttglobal.com Page 118box. Note that if a computer’s IP/MAC address pair has been added in the IP/MACBinding List, this IP/MAC address pair will not be displayed here.Bind: Click to bind all the valid IP and MAC address pairs in the text box.Add IP/MAC Binding(s) Manually: To manually add one or more IP/MAC bindings,follow these steps: Enter one or more IP/MAC address pair entries in the text box,and then click the Bind button. The input contents are: IP Address,MAC Addressand User Name, one address pair entry per line; and the input format for each entryis: IP Address <Space> MAC Address <Space> User Name <Enter>.●IP Address: It specifies the IP address of the local computer.●MAC Address: It specifies the MAC address of the local computer.●User Name: It specifies a unique user name of the local computer whoseIP/MAC address pair will be bound. It is an optional parameter. If you don’t enterit, the system will automatically create a user name for the computer.Note1. You can use the ipconfig /all command at the command prompt to find aWindows-based computer’s IP address and MAC address.2. For an IP/MAC address pair entry entered manually, there can be one or morespaces between the IP Address and MAC Address, and between the MAC addressand User Name.3. The Bind operation will skip any invalid IP and MAC address pairs in the text box. Inother words, it will only bind the valid IP and MAC address pairs.7.2.5 How to Add IP/MAC BindingsTo add one or more IP/MAC bindings, follow these steps:Step 1 Go to the Advanced > IP/MAC Binding page, and click the Add button to go tothe IP/MAC Binding Settings page.Step 2 There are two methods to add IP/MAC bindings:1) Method One: Click the Scan button to learn current dynamic ARPinformation (that is, IP and MAC address pairs) of the local computers, nextclick the Bind button to bind the valid IP/MAC address pairs in the text box.2) Method Two: You can manually add one or more IP/MAC address pairs inthe text box, next click the Bind button to bind these IP/MAC address pairs.Refer to Section 7.2.4 IP/MAC Binding Settings for more information.
UTT Technologies Chapter 7 Advancedhttp://www.uttglobal.com Page 119Step 3 After you have added some IP/MAC bindings, you can view them in the IP/MACBinding List.Step 4 If you want to block the undefined local computers from accessing the WirelessRouter and Internet, please clear the Allow Undefined LAN PCs check box;else, the undefined local computers are allowed to access the Wireless Routerand Internet.Step 5 If you want to temporarily block a user matching an IP/MAC binding fromaccessing the Wireless Router and Internet, please clear the binding’s Allowcheck box.After you have finished configuring IP/MAC binding feature, when receiving a packetinitiated from LAN, the Wireless Router will firstly compare the packet with the bindings inthe IP/MAC Binding List, and then process the packet according to the relatedconfiguration. The packet will be allowed to pass or be dropped immediately. If it isallowed to pass, the packet will be further processed by other function modules.7.2.6 Internet Whitelist and Blacklist7.2.6.1 Introduction to Internet Whitelist and BlacklistBased on IP/MAC BindingBy utilizing IP/MAC binding feature, you can flexibly configure an Internet whitelist orblacklist for the LAN users.If you want to allow only a small number of LAN users to access the Internet, you canconfigure an Internet whitelist for these users. Then all users cannot access the Internet,except those listed in the whitelist.If you want to block only a small number of LAN users from accessing the Internet, youcan configure an Internet blacklist for these users. Then all users can access the Internet,except those listed in the blacklist.On the Wireless Router, a user listed in the whitelist is a legal user, i.e., the user’s IP andMAC address pair matches an IP/MAC binding whose Allow check box is checked. A userlisted in the blacklist is an illegal user, i.e., the user’s IP and MAC address pair matches anIP/MAC binding whose Allow check box is cleared; or the IP address or MAC address isthe same as that of an IP/MAC binding, but not both.
UTT Technologies Chapter 7 Advancedhttp://www.uttglobal.com Page 1207.2.6.2 How to Configure an Internet WhitelistTo configure an Internet whitelist, follow these steps:Step 1 Go to the Advanced > IP/MAC Binding page, and click the Add button to go tothe IP/MAC Binding Settings page.Step 2 Specify the legal users by creating the IP/MAC bindings: Add these users’ IPand MAC address pairs into the IP/MAC Binding List. By default, an IP/MACbinding’s Allow check box is checked, which means that the user matching theIP/MAC binding can access the Wireless Router and Internet, so please leavethe default value. Refer to Section 7.2.4 IP/MAC Binding Settings for detailedinformation.Step 3 Clear the Allow Undefined LAN PCs check box to block all the undefinedusers from accessing the Wireless Router and Internet.For example, if you want to allow a local computer with IP address 192.168.1.2 and MACaddress 0021859b4544 to access the Wireless Router and Internet, you can add itsIP/MAC address pair into the IP/MAC Binding List, see Figure 7- 15. The binding’s Allowcheck box is checked by default, so please leave the default value.Figure 7- 15 IP/MAC Binding List - Example 17.2.6.3 How to Configure an Internet BlacklistTo configure an Internet blacklist, follow these steps:Step 1 Go to the Advanced > IP/MAC Binding page, and click the Add button to go tothe IP/MAC Binding Settings page.Step 2 Specify the illegal users by creating the IP/MAC bindings. There are twomethods (Refer to Section 7.2.4 IP/MAC Binding Settings for detailedinformation.):
UTT Technologies Chapter 7 Advancedhttp://www.uttglobal.com Page 1211) Method One: Bind each illegal user’s IP address to a MAC address which isdifferent from any local computer’s, and add these IP/MAC address pairsinto the IP/MAC Binding List.2) Method Two: Add these users’ IP and MAC address pairs into the IP/MACBinding List, and clear each IP/MAC binding’s Allow check boxrespectively. Thus the matched users cannot access the Wireless Routerand Internet.Step 3 Select the Allow Undefined LAN PCs check box to allow all the undefinedusers to access the Wireless Router and Internet.For example, if you want to block a local computer with IP address 192.168.1.3 fromaccessing the Wireless Router and Internet, you can add an IP/MAC binding into theIP/MAC Binding List:theIP Address is 192.168.1.3, and the MAC Address is differentfrom any local computer’s MAC address (112233445566 here), see Figure 7- 16.Figure 7- 16 IP/MAC Binding List - Example 2Another example is that if you want to block a local computer with IP address 192.168.1.3and MAC address 0021859b2564 from accessing the Wireless Router and Internet, youcan add its IP/MAC address pair into the IP/MAC Binding List, next clear the binding’sAllow check box, see Figure 7- 17.Figure 7- 17 IP/MAC Binding List - Example 3
UTT Technologies Chapter 7 Advancedhttp://www.uttglobal.com Page 1227.3 Static RouteThis section describes the Advanced > Static Route page, where you can configure andview static routes.7.3.1 Introduction to Static RouteA static route is manually configured by the network administrator, which is stored in arouting table. By using routing table, the Wireless Router can select an optimaltransmission path for each received packet, and forward the packet to the destination siteeffectively. The proper usage of static routes can not only improve the networkperformance, but also achieve other benefits, such as traffic control, provide a securenetwork environment.The disadvantage of using static routes is that they cannot dynamically adapt to thecurrent operational state of the network. When there is a change in the network or a failureoccurs, some static routes will be unreachable. In this case, the network administratorshould update the static routes manually.7.3.2 Static Route ListFigure 7-18 Static Route ListAdd a Static Route: To add a new static route, first click the Add button to go to thesetup page, next configure it, lastly click the Save button.View Static Route(s): When you have configured one or more static routes, you canview them in the Static Route List.Modify a Static Route: To modify a configured static route, click its Name hyperlink
UTT Technologies Chapter 7 Advancedhttp://www.uttglobal.com Page 123or icon, the related information will be displayed in the setup page. Then modify it,and click the Save button.Delete Static Route(s): There are three ways to delete static route(s).1. To delete a static route, directly click its icon.2. To delete more than one static route at a time, select the leftmost check boxes ofthe static routes that you want to delete, and then click the Delete button.3. To delete all the static routes at a time, directly click the Delete All button.7.3.3 Static Route SettingsFigure 7- 19 Static Route SettingsName: It specifies a unique name of the static route.Enable: It allows you to enable or disable the static route. The default value ischecked, which means the static route is in effect. If you want to disable the staticroute temporarily instead of deleting it, please clear the check box.Destination IP: It specifies the IP address of the destination network or destinationhost.Subnet Mask: It specifies the subnet mask associated with the destination network.Gateway IP Address: It specifies the IP address of the next hop gateway or router towhich to forward the packets.Priority: It specifies the priority of the static route. If there are multiple routes to thesame destination with different priorities, the Wireless Router will choose the routewith the highest priority to forward the packets. The smaller the number, the higher
UTT Technologies Chapter 7 Advancedhttp://www.uttglobal.com Page 124the priority.Interface: It specifies an outbound interface through which the packets are forwardedto the next hop gateway or router. The available options are LAN, WAN1, WAN2,APClient and 3G.Save: Click to save your changes.Cancel: Click to revert to the last saved settings.Back: ClicktogobacktotheStatic Route List.7.3.4 How to Add Static RoutesTo add one or more static routes, follow these steps:Step 1 Go to the Advanced > Static Route page, and click the Add button to go to thesetup page.Step 2 Specify the Name for the static route, and leave the Enable check boxchecked.Step 3 Specify the Destination IP,Subnet Mask,andGateway IP Address.Step 4 Specify the Priority as required.Step 5 Select an outbound interface from the Interface drop-down list as required.For example, if you want to add a static route for the network 192.168.1.0/24 pointing to192.168.1.254, please choose LAN as the outbound interface. The following figure showsthe detailed settings.Figure 7- 20 Static Route Settings - Example
UTT Technologies Chapter 7 Advancedhttp://www.uttglobal.com Page 125Step 6 Click the Save button to save the settings. You can view the static route in theStatic Route List.Step 7 To add another new static route, please repeat the above steps.NoteIf you want to delete static route(s), please follow the ways described in Section 7.3.2Static Route List.
UTT Technologies Chapter 7 Advancedhttp://www.uttglobal.com Page 1267.4 PPPoE ServerThis section describes how to configure PPPoE server global settings and PPPoEaccount settings, and how to view PPPoE user status.7.4.1 PPPoE OverviewThe PPPoE stands for Point-to-Point Protocol over Ethernet, which uses client/servermodel. The PPPoE provides the ability to connect the Ethernet hosts to a remote AccessConcentrator (AC) over a simple bridging access device. And it provides extensive accesscontrol management and accounting benefits to ISPs and network administrators.The PPPoE is a network protocol for encapsulating PPP frames in Ethernet frames toprovide point-to-point connection over an Ethernet network.7.4.1.1 PPPoE StagesAs specified in RFC 2516, the PPPoE has two distinct stages: a discovery stage and aPPP session stage. The following describes them respectively.7.4.1.2 PPPoE Discovery StageIn the PPPoE discovery stage, a PPPoE client will find a proper server, and then build theconnection. When a client initiates a PPPoE session, it should perform discovery toindentify the PPPoE server’s Ethernet MAC address, and establish a PPPoE session ID.Figure 7- 21 PPPoE Discovery Stage FlowsAs shown in Figure 7-21, the discovery stage includes the following four steps:1. PADI (PPPoE Active Discovery Initiation): At the beginning, a PPPoE client
UTT Technologies Chapter 7 Advancedhttp://www.uttglobal.com Page 127broadcasts a PADI packet to find all the servers that can be connected possibly. Untilit receives PADO packets from one or more servers. The PADI packet must contain aservice name which indicates the service requested by the client.2. PADO (PPPoE Active Discovery Offer): When a PPPoE server receives a PADIpacket in its service range, it will send a PADO response packet. The PADO packetmust contain the server’s name, and a service name identical to the one in the PADI,and any number of other service names which indicate other services that the PPPoEserver can offer. If a PPPoE server receives a PADI packet beyond its service range,it cannot respond with a PADO packet.3. PADR (PPPoE Active Discovery Request): The client may receive more than onePADO packet as the PADI was broadcast. The client chooses one server accordingto the server’s name or the services offered. Then the client sends a PADR packet tothe selected server. The PADR packet must contain a service name which indicatesthe service requested by the client.4. PADS (PPPoE Active Discovery Session- confirmation): When a PPPoE serverreceives a PADR packet; it prepares to begin a PPP session. It generates a uniquePPPoE session ID, and respond to the client with a PADS packet. The PADS packetmust contain a service name which indicates the service provided to the client.When the discovery stage completes successfully, both the server and client know thePPPoE session ID and the peer's Ethernet MAC address, which together define thePPPoE session uniquely.7.4.1.3 PPP Session StageIn the PPP session stage, the server and client perform standard PPP negotiation toestablish a PPP connection. After the PPP connection is established successfully, theoriginal datagram are encapsulated in PPP frames, and PPP frames are encapsulated inPPPoE session frames, which have the Ethernet type 0x8864. Then these Ethernetframes are sent to the peer. In a PPPoE session frame, the session ID must be the valueassigned in the Discovery stage, and cannot be changed in this session.7.4.1.4 PPPoE Session TerminationAfter a session is established, either the server or client may send a PADT (PPPoE ActiveDiscovery Terminate) packet at anytime to indicate the session has been terminated. ThePADT packet’s SESSION-ID must be set, to indicate which session is to be terminated.Once received a PADT, no further PPP packets (even normal PPP termination packets)are allowed to be sent using the specified session. A PPP peer should use the PPPprotocol itself to terminate a PPPoE session, but can use the PADT packet to terminate
UTT Technologies Chapter 7 Advancedhttp://www.uttglobal.com Page 128the PPPoE session if PPP cannot be used.7.4.2 PPPoE Server Global SettingsFigure 7-22 PPPoE Server Global SettingsEnable PPPoE Server: It allows you to enable or disable PPPoE server. If you wantto enable PPPoE server on the Wireless Router, please select this check box.Start IP Address: It specifies the starting IP address that is assigned by the PPPoEserver.Primary DNS Server: It specifies the IP address of the primary DNS server that isavailable to a PPPoE client.Secondary DNS Server: It specifies the IP address of the secondary DNS serverthat is available to a PPPoE client.PPP Authentication: It specifies the PPP authentication mode by which the PPPoEserver authenticates a PPPoE client. The available options are PAP,CHAP andAUTO. In most cases, please leave the default value of AUTO, which means that theWireless Router will automatically choose PAP or CHAP to authenticate the PPPoEclient.Maximum Sessions: It specifies the maximum number of PPPoE sessions that canbe created on the Wireless Router.Save: Click to save your changes.Cancel: Click to revert to the last saved settings.
UTT Technologies Chapter 7 Advancedhttp://www.uttglobal.com Page 1297.4.3 PPPoE Account ListFigure 7- 23 PPPoE Account ListAdd a PPPoE Account: To add a new PPPoE account, first click the Add button togo to the setup page, next configure it, lastly click the Save button.View PPPoE Account(s): When you have configured one or more PPPoE accounts,you can view them in the PPPoE Account List.Modify a PPPoE Account: To modify a configured PPPoE account, click its UserName hyperlink or icon, the related information will be displayed in the setuppage. Then modify it, and click the Save button.Delete PPPoE Account(s): There are three ways to delete PPPoE account(s).1. To delete a PPPoE account, directly click its icon.2. To delete more than one PPPoE account at a time, select the leftmost checkboxes of the PPPoE accounts that you want to delete, and then click the Deletebutton.3. To delete all the PPPoE accounts at a time, directly click the Delete All button.7.4.4 PPPoE Account SettingsGo to the Advanced > PPPoE Server > PPPoE Account Settings page, and click theAdd button to go to the setup page shown in Figure 7- 24.
UTT Technologies Chapter 7 Advancedhttp://www.uttglobal.com Page 130Figure 7- 24 PPPoE Account SettingsUser Name: It specifies a unique user name of the PPPoE account. It must bebetween 1 and 31 characters long. The PPPoE server will use User Name andPassword to identify the PPPoE client.Password: It specifies the password of the PPPoE account.Confirm Password: You should re-enter the password.Static IP Address: It specifies a static IP address that is assigned to the user whouses the current PPPoE account. It must be a valid IP address within the range of IPaddresses assigned by the PPPoE server.Save: Click to save your changes.Cancel: Click to revert to the last saved settings.Back: ClicktogobacktothePPPoE Account List.7.4.5 PPPoE User StatusYou can go to the Advanced > PPPoE Server > PPPoE User Status page view thestatus information of online PPPoE dial-in users in the PPPoE User Status List,whichinclude the user name, assigned IP address, MAC address, Rx rate and Tx rate, andonline time.
UTT Technologies Chapter 7 Advancedhttp://www.uttglobal.com Page 131Figure 7- 25 PPPoE User Status ListUser Name: It displays the user name of the PPPoE account. The PPPoE dial-inuser uses it to dial-up and establish the PPPoE session to the Wireless Router.IP Address: It displays the PPPoE dial-in user’s IP address assigned by the PPPoEserver.MAC Address: It displays the PPPoE dial-in user’s MAC address.Online Time: It displays the elapsed time since the PPPoE session was established.Tx Rate: It displays the real-time upload rate (in kilobytes per second) of the PPPoEdial-in user.Rx Rate: It displays the real-time download rate (in kilobytes per second) of thePPPoE dial-in user.Refresh: Click to view the latest information in the list.
UTT Technologies Chapter 8 User Managementhttp://www.uttglobal.com Page 132Chapter 8 User ManagementThis chapter describes how to control and manage the Internet behaviors of the LANusers, including global management and group management.8.1 Global ManagementThis section describes the User > Global Management page.In this page, you can easily control and manage the Internet behaviors of the LAN usersbased on schedule, which include: allow or block the LAN users from using popular IM(e.g., QQ, MSN) and P2P applications (e.g., Bit Comet, Bit Spirit, Thunder Search) duringthe specified schedule. Using P2P applications in the LAN will impact the other usersaccessing the Internet, even cause network congestion and performance deterioration.You can block P2P applications to avoid such situations.8.1.1 Global Management Policy SettingsFigure 8- 1 Global Management Policy SettingsBlock QQ: It allows or blocks QQ application. If you want to block the LAN users fromusing QQ to chat with others, please select this check box.
UTT Technologies Chapter 8 User Managementhttp://www.uttglobal.com Page 133Block MSN: It allows or blocks MSN Messenger. If you want to block the LAN usersfrom using MSN Messenger to chat with others, please select this check box.Block BT: It allows or blocks BitSpirit and BitComet applications. If you want to blockthe LAN users from using BitSpirit or BitComet to download files, please select thischeck box.Block Thunder Search: It allows or blocks Thunder search application. If you wantto block the LAN users from using Thunder to search resources, please select thischeck box.Schedule: It allows you to define a schedule to restrict when the global managementpolicy is in effect. By default, it is always in effect.•Days: It specifies the day(s) of the week during which the schedule is in effect.By default, the Everyday check box is checked, which means all days of theweek. You may clear the Everyday check box, and then select any single day(Monday, Tuesday, Wednesday, Thursday, Friday, Saturday, or Sunday) orcombinations of days as desired.•Time: It specifies a range of hours and minutes during which the schedule is ineffect. By default, the 24 Hours check box is checked, which means theschedule is in effect all day on the selected day(s). You may clear the 24 Hourscheck box, and then choose the daily start time and end time as desired. If thestart time is later than the end time, the system will automatically divide it into twotime periods. E.g., if you select the Mon check box, and choose 23:00 and 06:00as the daily start time and end time respectively, the schedule will be in effectduring 00:00~06:00 and 23:00~23:59 on Monday.Update Policy: Click to update the corresponding policy. If you click the UpdatePolicy hyperlink, the system will jump to the Update Policy page (see Figure 8- 2),and go back to the User > Global Management page after the update is complete.Figure 8-2 Updating PolicySave: Click to save your changes.Cancel: Click to revert to the last saved settings.NoteThe global management policy applies to the LAN users whose IP address is on thesame subnet as the Wireless Router’s LAN interface, and PPPoE dial-in users. Otherusers aren’t subject to the policy.
UTT Technologies Chapter 8 User Managementhttp://www.uttglobal.com Page 1348.1.2 An Example for Global Management PolicyA business uses a AC750W Wireless Router to access the Internet. The CEO wants toblock the employees from using MSN and BT applications during business hours (Mondayto Friday, 9:00 to 17:00).The configuration steps are the following:Step 1 Go to the User > Global Management page.Step 2 Select the Block MSN and Block BT check boxes.Step 3 Define business hours: clear the Everyday check box, next select the Mon,Tue,Wed,Thu,andFri check boxes; clear the 24 Hours check box, nextchoose 09:00 and 17:00 as the daily start time and end time respectively. Theabove settings are shown in Figure 8- 3.Step 4 Click the Save button to save your settings.Figure 8- 3 Global Management Policy - Example
UTT Technologies Chapter 8 User Managementhttp://www.uttglobal.com Page 1358.2 Group ManagementThis section describes the User > Group Management page.In this page, you can group the users that have the same Internet access privileges into auser group, and assign a range of contiguous IP addresses to them. After that, you cancreate group management policies for each group based on schedule. For convenience, agroup can also contain a single user.A group management policy is used to control the Internet behaviors of the users in thegroup, which include: allow or block these users from using popular IM (e.g., QQ, MSN)and P2P applications (e.g., Bit Comet, Bit Spirit, Thunder Search) during the specifiedschedule; in addition, it is also used to control the maximum upload and download rate ofthese users during the specified schedule.8.2.1 Group Management Policy ListFigure 8-4 Group Management Policy ListFigure 8-5 Group Management Policy List (Continue)
UTT Technologies Chapter 8 User Managementhttp://www.uttglobal.com Page 136Add a Group Management Policy: To add a new group management policy, firstclick the Add button to go to the Group Management Settings page, next configureit, lastly click the Save button.View Group Management Policy(s): When you have configured one or more groupmanagement policies, you can view them in the Group Management List.Modify a Group Management Policy: To modify a configured group managementpolicy, click its Group Name hyperlink or icon, the related information will bedisplayed in the setup page. Then modify it, and click the Save button.Delete Group Management Policy(s): There are three ways to delete groupmanagement policy(s).1. To delete a group management policy, directly click its icon.2. To delete more than one group management policy at a time, select the leftmostcheck boxes of the policies that you want to delete, and then click the Deletebutton.3. To delete all the group management policies at a time, directly click the DeleteAll button.8.2.2 Group Management Policy Settings
UTT Technologies Chapter 8 User Managementhttp://www.uttglobal.com Page 137Figure 8- 6 Group Management Policy SettingsGroup Name: It specifies a unique name of group.Start IP Address and End IP Address: They specify a range of contiguous IPaddresses. All the computers within the specified range are members of the group,and are subject to the group management policy.Rate Limit Mode: It specifies the mode by which the Wireless Router will limit themaximum Tx/Rx rate of the LAN computers belonging to the group.●Each: If you select this option, the Tx/Rx rate of each computer can reach upto the Max. Tx Rate/ Max. Rx Rate you specify.●Share: If you select this option, the total Tx/Rx rate of all computers in thegroup can reach up to the Max. Tx Rate/ Max. Rx Rate you specify.Max. Tx Rate: It specifies the maximum upload rate (in Kbit/s) of the LAN computersbelonging to the group.Max. Rx Rate: It specifies the maximum download rate (in Kbit/s) of the LANcomputers belonging to the group. There are two ways to set the Max. Tx Rate andMax. Rx Rate.●Enter a value in the associated text box. If you don’t want to limit Max. TxRate/Max.RxRate, please leave the default value of 0.zSelect an option from the associated drop-down list. If you don’t want to Max. TxRate/Max.RxRate, please leave the default value of No Limit.Block QQ,Block MSN,Block BT,Block Thunder Search,andSchedule: Refer toSection 8.1.1 Global Management Policy Settings for detailed information.Update Policy: Click to update the corresponding policy. Refer to Section 8.1.1Global Management Policy Settings for detailed operation.Save: Click to save your changes.Cancel: Click to revert to the last saved settings.Back: ClicktogobacktotheGroup Management List.Note1. The policy management policies take priority over the global management policy.2. The Wireless Router supports up to five group management policies.3. If both Start IP Address and End IP Address are set to 0.0.0.0, the group willcontain all computers on the LAN no matter what IP address they might have. In thiscase, the Wireless Router will check all the packets initiated from the LAN computers,so the system performance will be degraded to some extent. Therefore, you’d betternot set them to 0.0.0.0.
UTT Technologies Chapter 8 User Managementhttp://www.uttglobal.com Page 1388.2.3 Execution Order of Group Management PoliciesIf a user’s computer belongs to more than one group, in other words, if the user matchesmore than one group management policy, it will be subject to the first one added. Morespecifically, after you configure some group management policies, the Wireless Routerwill search the Group Management List to find out if there is a policy matching a user. Itwill check the user’s IP address against each policy in the order in which the policies arelisted. The first matching policy will apply to the user. Note that the policies are listed inchronological order of creation (i.e., most recent at the bottom).8.2.4 Priorities of Global and Group ManagementPolicies and Access RulesThe access rules have higher priority than the group management policies, and the groupmanagement policies have higher priority than the global management policy. That is,when receiving a packet initiated from a local computer, the Wireless Router will firstcheck it against the access rules, next the group management policies, lastly the globalmanagement policy. The first rule (or policy) that matches the packet is applied. After amatch is found, no further rules or policies are checked.For example, if you have selected the Block MSN check box in the User > GlobalManagement page, added a group management policy which allows a group of users touse MSN (Block MSN check box is cleared) in the User > Group Management page,and added an access rule which denies all users access to the Internet in the Firewall >Access Control page, then any users are unable to access the Internet because theaccess rule is matched first. Now if you only delete the access rule, then the users belongto the specified group can use MSN, but other users cannot.8.2.5 An Example for Group Management Policy1. RequirementsA business uses a AC750W Wireless Router to access the Internet. The CEO wants tocontrol Internet behaviors of the employees of the Administration Department andBusiness Department:1) Block the Administration Department’s employees (IP range: 192.168.1.2-192.168.1.10) from using MSN and QQ, and allow them to access all other services.
UTT Technologies Chapter 8 User Managementhttp://www.uttglobal.com Page 139The exception is that the CEO with IP address 192.168.1.6 can access any services.2) Allow the Business Department’s employees (IP range: 192.168.1.11-192.168.1.30)to access any services.2. AnalysisWe need to create three group management policies to meet the requirements:●Group management policy 1: It allows the CEO to access all Internet services.●Group management policy 2: It blocks the Administration Department’s employeesfrom using QQ and MSN.●Group management policy 3: It allows the Business Department’s employees toaccess all Internet services.3. Configuration StepsStep 1 Go to the User > Group Management page.Step 2 Click the Add button to go to the Group Management Settings page to createthe policy 1. The detailed settings are shown in Figure 8- 7.Figure 8- 7 Group Management Policy Example - Policy 1
UTT Technologies Chapter 8 User Managementhttp://www.uttglobal.com Page 140Step 3 Click the Add button to go to the Group Management Settings page to createthe policy 2. The detailed settings are shown in Figure 8- 8.Figure 8- 8 Group Management Policy Example - Policy 2Step 4 Click the Add button to go to the Group Management Settings page to createthe policy 3. The detailed settings are shown in Figure 8- 9.
UTT Technologies Chapter 8 User Managementhttp://www.uttglobal.com Page 141Figure 8- 9 Group Management Policy Example - Policy 3Step 5 After you have configured the three policies, you can view them in the GroupManagement List, see Figure 8- 10.Figure 8- 10 Group Management List – Example
UTT Technologies Chapter 8 User Managementhttp://www.uttglobal.com Page 142Figure 8- 11 Group Management List – Example (Continue)
UTT Technologies Chapter 9 Firewallhttp://www.uttglobal.com Page 143Chapter 9 FirewallThis chapter describes how to configure firewall features, including access control,domain filtering, and attack prevention.9.1 Access ControlThis section describes the Firewall > Access Control page, which includes the AccessRule List and Access Rule Settings.9.1.1 Introduction to Access Control9.1.1.1 The Purpose of Access Control FeatureBy flexibly utilizing access control, you can not only assign different Internet accessprivileges to different LAN users, but also assign different Internet access privileges to thesame users based on schedules. In practice, you can set appropriate access rulesaccording to the actual requirements of your organization. Such as, for a school, you canblock the students from accessing game websites; for a family, you can only allow yourchildren to access the Internet during the specified period of time; for a business, you canblock the Financial Department’s employees from accessing the Internet.9.1.1.2 The Operation Principle of Access ControlBy default, the Wireless Router will forward all the valid packets received by the LANinterface because no access rule exists. After you have configured some access rules, theWireless Router will examine each packet received by the LAN interface to determinewhether to forward or drop it, based on the criteria you specified in the access rules.More specifically, when receiving a packet initiated from LAN, the Wireless Router willanalyze the packet by extracting its source MAC address, source IP address, destinationIP address, protocol type, port number, content, and the date and time at which the packetwas received, and then compare them with each rule in decreasing order of priority. The
UTT Technologies Chapter 9 Firewallhttp://www.uttglobal.com Page 144first rule that matches the packet is applied, and the specified Action (Allow or Deny)istaken. After a match is found, no further rules are checked. Note that the rules are listed indecreasing order of priority in the Access Rule List: The rule with a higher priority is listedbefore the one with a lower priority.9.1.1.3 Filtering Type of Access RuleThe Wireless Router supports three filtering types of access rule, which include IP filtering,URL filtering and keyword filtering. All of them support access control based on schedule.1. IP FilteringThe IP filtering rules are used to filter IP packets based on the packet header information,such as source IP address, destination IP address, protocol type (TCP, UDP, ICMP, etc.),TCP/UDP source port and destination port.The filtering criteria that you can specify within an IP filtering rule include: source IPaddress, destination IP address, protocol, source port, destination port, and schedule.2. URL FilteringThe URL filtering rules are used to filter URLs based on keyword in the URL. It allows youto filter any web page whose URL contains the specified keyword. For example, if youwant to block sex related websites, you can use the URL keyword “sex”. This will blockany web page whose URL contains sex, such as www.sexpicture.com. Of course, you canuse the full URL (like “www.yahoo.com”) to filter only the specified URL.The filtering criteria that you can specify within a URL filtering rule include: source IPaddress, filtering content (i.e., URL keyword), and schedule.3. Keyword FilteringThe keyword filtering rules are used to block users from submitting information to the webpage based on keyword, that is, the information that contains the specified keyword (suchas pornography, gambling, etc.) cannot be submitted to any web page. The WirelessRouter supports both Chinese and English keyword filtering.The filtering criteria that you can specify within a keyword filtering rule include: source IPaddress, filtering content (i.e., keyword in the web page), and schedule.9.1.1.4 Action of Access RuleThe action of an access rule is either Allow or Deny. As mentioned earlier, the Wireless
UTT Technologies Chapter 9 Firewallhttp://www.uttglobal.com Page 145Router checks each received packet against the access rules in the Access Rule List,and the first access rule that matches a packet determines whether the Wireless Routeraccepts or drops the packet. If the rule’s Action is Allow, the packet is forwarded. If therule’s Action is Deny, the packet is dropped.Note that keyword filtering rules only support the Deny action.9.1.2 Access Rule ListFigure 9- 1 Access Rule ListFigure 9- 2 Access Rule List (Continue)
UTT Technologies Chapter 9 Firewallhttp://www.uttglobal.com Page 146Figure 9- 3 Access Rule List (Continue)Add an Access Rule: To add a new access rule, first click the Add buttontogototheAccess Rule Settings page, next configure it, lastly click the Save button.View Access Rule(s): When you have configured one or more access rules, you canview them in the Access Rule List.Modify an Access Rule: To modify a configured access rule, click its Namehyperlink or icon, the related information will be displayed in the setup page.Then modify it, and click the Save button.Delete Access Rule(s): There are three ways to delete access rule(s).1. To delete a access rule, directly click its icon.2. To delete more than one access rule at a time, select the leftmost check boxes ofthe access rules that you want to delete, and then click the Delete button.3. To delete all the access rules at a time, directly click the Delete All button.9.1.3 Access Rule SettingsThe following sections describe three types of access rule respectively, which include IPfiltering, URL filtering and keyword filtering.
UTT Technologies Chapter 9 Firewallhttp://www.uttglobal.com Page 1479.1.3.1 Access Rule Settings - IP FilteringFigure 9- 4 Access Rule Settings - IP FilteringName: It specifies a unique name of the access rule.Enable: It allows you to enable or disable the access rule. The default value ischecked, which means the access rule is in effect. If you want to disable the ruletemporarily instead of deleting it, please clear the check box.Source IP Range: It specifies a range of source IP addresses (i.e., a group of localcomputers) to which the access rule applies. To specify a single local computer, enterits address in both text boxes.Prority: It specifies the priority of the access rule. The access rules will be checkedagainst the packets in descending order of priority. It must be between 0 and 100. Thesmaller the number, the higher the priority. And the priority of each access rule cannot
UTT Technologies Chapter 9 Firewallhttp://www.uttglobal.com Page 148be repeated.Action: It specifies the action to be taken if a packet matches the access rule. Theavailable options are Allow and Deny.●Allow: It indicates that the Wireless Router will allow the packets matchingthe rule, that is, the Wireless Router will forward these packets.●Deny: It indicates that the Wireless Router will deny the packets matching therule, that is, the Wireless Router will drop these packets.Filtering Type: It specifies the filtering type of the access rule. The options are IPFiltering,URL Filtering, and Keyword Filtering. Here please select IP Filtering.Protocol: It specifies the protocol to which the access rule applies. The options are 1(ICMP),6(TCP),17 (UDP),51 (AH),andAll. Select All if you want to the rule toapply to all protocols. Apendix C provides the list of common IP protocols and theirprotocol numbers.Predefined Service: It provides some of the most common services and theirassociated port numbers. Select All if you want to the rule to apply to all ports1‐65535).Apendix D provides the list of common services and their port numbers.Dest Port Start and Dest Port End: They specify a range of destination ports towhich the access rule applies. To specify a single port, enter the port number in bothtext boxes. The port number must be between 1 and 65535.Dest IP Start and Dest IP End: They specify a range of destination IP addresses towhich the access rule applies. To specify a single IP addres, enter the port number inboth text boxes.Source Port Start and Source Port End: They specify a range of source ports towhich the access rule applies. To specify a single port, enter the port number in bothtext boxes. The port number must be between 1 and 65535.Schedule: It allows you to specify when the access rule is in effect. By default, theaccess rule is always in effect.Save: Click to save your changes.Cancel: Click to revert to the last saved settings.Back: ClicktogobacktotheAccess Rule List.NoteBy default, the Source IP Range is from 0.0.0.0 to 0.0.0.0, which means the accessrule applies to all computers on the LAN no matter what IP address they might have.In this case, the Wireless Router will check any packets initiated from the LANcomputers, so the system performance will be degraded to some extent. Therefore,you’d better change the default value.
UTT Technologies Chapter 9 Firewallhttp://www.uttglobal.com Page 1499.1.3.2 Access Rule Settings - URL FilteringFigure 9-5 Access Rule Settings - URL FilteringThe parameters Name,Source IP Range,Priority and Action,andSchedule relatedparameters are the same as those of the IP Filtering access rule, please refer to Section9.1.3.1 Access Rule Settings - IP Filtering for detailed information.Filtering Type: It specifies the filtering type of the access rule. The options are IPFiltering,URL Filtering, and Keyword Filtering. Here please select URL Filtering.Filtering Content: It specifies the URL keyword that you want to filter. The accessrule is used to filter any web pages whose URL contains the specified keyword.You can enter part of a URL to match all URLs that contain that string, or you canenter the full URL to match only the specified URL. Here we give two examples.Example1:Ifyouenteryahoo, it will match any URL that contains yahoo, such ashttp://www.yahoo.com,http://news.yahoo.com/,http://cn.yahoo.com/,andsoon.Example 2: If you enter news.yahoo.com, it will match http://news.yahoo.com/ andall URLs that start with news.yahoo.com, such as http://news.yahoo.com/education/.However, it won’t match http://www.yahoo.com and http://cn.yahoo.com/.
UTT Technologies Chapter 9 Firewallhttp://www.uttglobal.com Page 150Save: Click to save your changes.Cancel: Click to revert to the last saved settings.Back: ClicktogobacktotheAccess Rule List.Note1. The URL keyword that you enter in the Filtering Content text box is caseinsensitive, and it needn’t include http://.2. The URL filtering rules cannot be used to control users’ access to other servicesthrough a web browser. For example, to control users’ access to ftp://ftp.utt.com.cn,you need to configure an IP filtering rule to allow or deny ftp service.9.1.3.3 Access Rule Settings - Keyword FilteringFigure 9- 6 Access Rule Settings - Keyword FilteringThe parameters Name,Source IP Range,Priority and Action,andSchedule relatedparameters are the same as those of the IP Filtering access rule, please refer to Section
UTT Technologies Chapter 9 Firewallhttp://www.uttglobal.com Page 1519.1.3.1 Access Rule Settings - IP Filtering for detailed information.Filtering Type: It specifies the filtering type of the access rule. The options are IPFiltering,URL Filtering,andKeyword Filtering. Here please select KeywordFiltering.Filtering Content: It specifies the keyword that you want to block. The access rule isused to block users from submitting any information that contains the specifiedkeyword to any web page. The Wireless Router supports both Chinese and Englishkeyword filtering. A keyword must be a single word without white space.Save: Click to save your changes.Cancel: Click to revert to the last saved settings.Back: ClicktogobacktotheAccess Rule List.Note1. The keyword filtering rules only support the Deny action.2. The English keyword is case sensitive.9.1.4 Configuration Examples for Access Rule9.1.4.1 Example 1 -Only Allow a Group of Users toAccess Certain ServicesIn this example, we want to allow a group of users (IP address range:192.168.1.10-192.168.1.20) to access web service, and block them from accessing anyother services.We need to create three access rules to meet the requirements:●Access rule 1: It allows those users to access DNS service. And it is used to ensurethat the domain names can be resolved successfully, thus the users can access webservice properly.●Access rule 2: It allows those users to access Web service.●Access rule 3: It blocks those users from accessing any Internet services.Therein, both rule 1 and rule 2 must have a higher priority than rule 3. Otherwise, rule 3will be matched first. This will make those users unable to access web service.
UTT Technologies Chapter 9 Firewallhttp://www.uttglobal.com Page 152Figure 9- 7 Access Rule List - Example 1Figure 9- 8 Access Rule List - Example 1 (Continue)Figure 9- 9 Access Rule List - Example 1 (Continue)9.1.4.2 Example 2 -Only Block a Group of Users fromAccessing Certain ServicesIn this example, we want to block a group of users (IP address range: 192.168.1.80-192.168.1.100) from accessing www.bbc.com and www.cnn.com, and allow them to
UTT Technologies Chapter 9 Firewallhttp://www.uttglobal.com Page 153access any other services. We need to create three access rules to meet therequirements:●Access rule 1: It blocks those users from accessing www.bbc.com.●Access rule 2: It blocks those users from accessing www.cnn.com.●Access rule 3: It allows those users to access all Internet services.Therein, both rule 1 and rule 2 must have a higher priority than rule 3. Otherwise, rule 3will be matched first. This will make those users unable to access www.bbc.com andwww.cnn.com.Figure 9-10 Access Rule List - Example 2Figure 9- 11 Access Rule List - Example 2 (Continue)
UTT Technologies Chapter 9 Firewallhttp://www.uttglobal.com Page 154Figure 9-12 Access Rule List - Example 2 (Continue)9.1.4.3 Example 3 -Control Internet Behaviors of aGroup of Users based on ScheduleIn this example, we want to only allow a group of users (IP address range: 192.168.1.150-192.168.1.200) to access web service during business hours (Monday to Friday, 9:00 to17:00), and block them from accessing any Internet services during rest periods.We need to create three access rules to meet the requirements:●Access rule 1: It allows those users to access DNS service during business hours.And it is used to ensure that the domain names can be resolved successfully, thus theusers can access web service properly.●Access rule 2: It allows those users to access web service during business hours.●Access rule 3: It blocks those users from accessing any Internet services.Therein, both rule 1 and rule 2 must have a higher priority than rule 3. Otherwise, rule 3will be matched first. This will make those users unable to access web service duringbusiness hours.Figure 9-13 Access Rule List - Example 3
UTT Technologies Chapter 9 Firewallhttp://www.uttglobal.com Page 155Figure 9-14 Access Rule List - Example 3 (Continue)Figure 9-15 Access Rule List - Example 3 (Continue)9.1.4.4 Example 4 -Control Internet Behaviors of aSingle UserYou can assign a range of contiguous IP addresses to the users that have the sameInternet access privileges, and then create access rules for the user group. However, ifone or several users in the group have special or new Internet needs, you need toindividually create access rules for a single user.In this example, we want to allow a group of users (IP address range:192.168.1.10-192.168.1.120) to access web service, and block them from accessing allother services. The exception is that the user with IP address 192.168.1.16 is allowed toaccess all Internet services during business hours (Monday to Friday, 9:00 to 17:00).We need to create four access rules to meet the requirements:●Access rule 1: It allows the user group to access DNS service.●Access rule 2: It allows the user group to access web service.●Access rule 3: It allows the user with IP address 192.168.1.16 to access all Internetservices during business hours.●Access rule 4: It blocks the user group from accessing any Internet services.Therein, rule 4 must have a lower priority than the other three rules.
UTT Technologies Chapter 9 Firewallhttp://www.uttglobal.com Page 156Figure 9-16 Access Rule List - Example 4Figure 9-17 Access Rule List - Example 4 (Continue)Figure 9-18 Access Rule List - Example 4 (Continue)
UTT Technologies Chapter 9 Firewallhttp://www.uttglobal.com Page 1579.2 Domain FilteringThis section describes the Firewall > Domain Filtering page. The domain filtering featureallows you to block access to unwanted websites in your organization.9.2.1 Domain Filtering Global SettingsFigure 9- 19 Domain Filtering Global SettingsEnable Domain Filtering: It allows you to enable or disable domain filtering. If youselect the check box to enable domain filtering, the domain names in the DomainName List will take effect. Else, they will be of no effect.Save: Click to save your changes.9.2.2 Domain Filtering SettingsFigure 9-20 Domain Filtering SettingsDomain Name: It specifies the domain name of the website that you want to block.Domain Name List: It displays the domain names that you have added. The
UTT Technologies Chapter 9 Firewallhttp://www.uttglobal.com Page 158Wireless Router will block the LAN users from accessing these domain names.Add a Domain Name: To add a domain name to the Domain Name List, enter thedomain name of the website that you want to block in the Domain Name text box,and then click the Add button. You can add up to 100 domain names in the list.Delete: To delete one or more domain names, select them in the Domain Name List,and then click the Delete button.Delete All: To delete all the domain names in the Domain Name List at a time,directly click the Delete All button.Note1. The Wireless Router supports up to 100 domain names.2. The matching rule of domain filtering is whole words matching, that is, only adomain name matches the whole words of the domain name in the Domain NameList, the Wireless Router will block access to it.3. You can use the wildcard "*" in a domain name to filter multiple URLs. Forexample, if you add www.163.* into the Domain Name List, then all the URLs thatbegin withwww.163. will be blocked.
UTT Technologies Chapter 9 Firewallhttp://www.uttglobal.com Page 1599.3 Attack PreventionThis section describes the Firewall > Attack Prevention page.Figure 9- 21 Attack Prevention SettingsEnable DDoS Prevention: It is used to enable or disable DDoS prevention. If youselect the check box to enable this feature, it will effectively protect the WirelessRouter against popular DoS/DDoS attacks.Enable Blaster Prevention It is used to enable or disable blaster virus prevention. Ifyou select the check box to enable this feature, it will effectively protect the WirelessRouter against popular virus attacks such as Blaster and Sasser.Block WAN Ping: It is used to block or allow WAN ping. If you select the check box toblock WAN ping, all the WAN interfaces of the Wireless Router will not respond toping requests from the Internet.Save: Click to save your changes.
UTT Technologies Chapter 10 VPNhttp://www.uttglobal.com Page 160Chapter 10 VPNThe Wireless Router supports PPTP client feature. PPTP is a VPN tunneling protocolwhich encapsulates PPP frames in IP packets for transmission over a public IP networksuch as the Internet. PPTP is based on client/server model. The PPTP client initiates aPPTP connection to the server, while the PPTP server accepts the incoming PPTPconnection from the client. PPTP is often used to implement remote access VPNs over anIP network (such as a broadband network), to extend the reach of your Intranet.10.1 Introduction to PPTP ImplementationPPTP is used to encapsulate PPP frames in IP packets for transmission over a public IPnetwork such as the Internet. The PPTP client or server encapsulates the original userpackets inside PPP frames before sending them through a PPTP tunnel over the Internet;while the peer performs decapsulation firstly, and then forward the original packets to theirintended destinations.As shown in Figure 10- 1, the typical application of PPTP is that some laptop or desktopcomputers act as the PPTP client devices, that is, some employees in the remote branchoffices or mobile users (traveling employees, telecommuters, etc.) use the Windowsbuilt-in PPTP client software to initiate PPTP connections; the PPTP server deployed atthe head office accepts the PPTP incoming connections from the clients. After a PPTPtunnel has been established between the PPTP client and server, the PPTP server willreceive the PPTP packets from the client firstly, and then perform decapsulation, lastlyforward the original packets to their intended destinations.Figure 10- 1 Typical Application of PPTP
UTT Technologies Chapter 10 VPNhttp://www.uttglobal.com Page 16110.1.1 Protocol OverviewThere are two parallel components of PPTP:1. A PPTP Control ConnectionIt is a logical connection representing the PPTP tunnel that must be created, maintained,and terminated through a series of PPTP messages. The PPTP control connection trafficuses a dynamically allocated TCP port on the PPTP client and the registered TCP port1723 on the PPTP server.2. GRE encapsulation for dataWhen data is sent through the PPTP tunnel, PPP frames are encapsulated with a GenericRouting Encapsulation (GRE) header, which includes information that identifies thespecific PPTP tunnel for the data packet. GRE is described in RFC 1701.The use of a separate GRE mechanism for PPTP data encapsulation has an interestingside effect for NAT devices. Most NAT devices can translate TCP-based packets for PPTPtunnel maintenance. However, many NAT devices or firewalls cannot handle GRE packets,thus the PPTP data packets with the GRE header cannot pass them. The UTT productssupport NAT traversal for PPTP tunnels.In order for the PPTP tunnel to be established and function properly, the following basicconditions are necessary:1) The PPTP client and server should have IP-route reachability between them.2) The firewalls between the two endpoints of the tunnel should be configured to openTCP port 1723 and IP protocol 47 (GRE) to allow PPTP traffic.
UTT Technologies Chapter 10 VPNhttp://www.uttglobal.com Page 16210.1.2 Packet Flow - PPTP ClientFigure 10- 2 PPTP Packet FlowAs shown in Figure 10- 2, during the PPTP tunnel establishment and data transmissionprocesses, the packet flow through the PPTP client can be summarized as follows:¾After the PPTP tunnel parameters are configured properly, the PPTP clientautomatically creates a virtual interface for the new tunnel to listen for user data ((1)in Figure 10- 2).¾The PPTP client’s virtual interface listens for the user packets destined for the remoteLAN ((3) in Figure 10- 2).¾The PPTP client initiates the PPTP tunnel setup request ((4) in Figure 10- 2).¾The PPTP client receives the user authentication request from the PPTP server, andthen responds to the request ((7) in Figure 10- 2).¾The PPTP client negotiates with the PPTP server to establish a PPTP tunnel ((8) inFigure 10- 2).¾The PPTP client receives the user data (i.e., original packets) and encapsulates themin the PPP frames ((9) in Figure 10- 2).
UTT Technologies Chapter 10 VPNhttp://www.uttglobal.com Page 163¾The PPTP client sends the PPTP packets to the PPTP server through the PPTPtunnel ((10) in Figure 10- 2).¾The PPTP client receives the PPTP packets from the PPTP server, and performsdecapsulation ((15) in Figure 10- 2).¾The PPTP client forwards the user data (i.e., original packets) to their intenddestinations ((16) in Figure 10- 2).¾The PPTP tunnel is terminated manually by the user or automatically due to noactivity for some time ((17) in Figure 10- 2).¾After the PPTP tunnel is terminated, the PPTP client’s virtual interface returns to thelistening state ((18) in Figure 10- 2).10.1.3 User AuthenticationPPTP provides user authentication to authenticate the user attempting the PPTPconnection by PPP-based user authentication modes such as PAP, CHAP, etc. Note thatthe two endpoints of a PPTP tunnel should use the same authentication mode.On the Wireless Router, it allows you to choose PAP, CHAP or Either as the userauthentication mode for a PPTP client. It also allows you to choose None, which meansthat no authentication is performed. By default, the authentication mode is Either, whichmeans that the PPTP client will automatically negotiate it with peer.10.1.4 Data ConfidentialityPPTP doesn’t provide any data encryption service by itself; it uses PPP compression andencryption mechanisms (such as CCP, PPE, etc.) to provide data confidentiality.10.1.5 MTU and FragmentationThe Wireless Router will fragment an IP packet if it exceeds the MTU of the outboundphysical interface. For example, a standard Ethernet-type interface has a MTU of 1500bytes, thus the Wireless Router will fragment a packet exceeding 1500 bytes in order totransmit it over the Ethernet interface.With PPTP, the addition of PPTP headers may cause IP fragmentation. When an IPpacket is nearly the size of MTU of the outbound physical interface (for example, ERP orFTP packets are often relatively large), and it is further encapsulated with PPTP headers,
UTT Technologies Chapter 10 VPNhttp://www.uttglobal.com Page 164the encapsulated packet is likely to exceed the MTU of the outbound physical interface.This causes the encapsulated packet to be fragmented before transmission, and thePPTP receiver is responsible for reassembling the fragments back into the originalencapsulated packet before decapsulation. More specifically, the receiver cannot performreassembly until the last fragment is received; and if one fragment is lost, the entireoriginal encapsulated packet must be resent, and it will also be fragmented.Data fragmentation and reassembly can seriously degrade the system performance, so itis highly necessary to avoid fragmentation and reassembly in the PPTP switching path. Tosolve this problem, PPTP allows the client and server to negotiate PPP MRU/MTU duringPPTP tunnel establishment.In addition, on the Wireless Router, you can adjust the global PPTP tunnel MTU (i.e.,tunnelmtu) to minimize the fragmentation: if an IP packet exceeds the specified MTU, itwill be fragmented by the original computer before transmission. The following twoexamples describe how to calculate PPTP tunnel MTU. Figure 10- 3 illustrates the formatof the PPTP packet to be sent over a static IP or DHCP Internet connection; and Figure10- 4 illustrates the format of the PPTP packet to be sent over a PPPoE Internetconnection. Therein, the sizes of standard Ethernet MTU and each encapsulation headerare as follows:Ethernet MTU 1500 BytesIP Header 20 BytesGRE Header 8 BytesPPTP Header 30 Bytes (at most)PPPoE Header 8 BytesFigure 10-3 PPTP Packet Format - Static IP/DHCP Internet ConnectionFigure 10-4 PPTP Packet Format - PPPoE Internet ConnectionTherefore, to avoid fragmentation and reassembly in the PPTP switching path, the PPTPtunnel MTU should be smaller or equal to 1442 bytes (1500-20-8-30=1442) when thePPTP packets are sent over a static IP or DHCP Internet connection (see Figure 10- 3);and it must be smaller or equal to 1434 bytes (1442-8=1434) when the PPTP packets aresent over a PPPoE Internet connection (see Figure 10- 4).On the Wireless Router, the PPTP tunnel MTU is 1400 bytes by default. In most cases,please leave the default value because it can meet most application needs.
UTT Technologies Chapter 10 VPNhttp://www.uttglobal.com Page 16510.1.6 PPTP Sessions LimitThe Wireless Router supports two concurrent PPTP sessions (i.e., tunnels) at most. Ifthere are already two active PPTP sessions on the Wireless Router, the system will rejectany request for creating a new PPTP session and prompt you.10.2 PPTP Client SettingsFigure 10-5 PPTP Client SettingsEnable: It allows you to enable or disable the PPTP client entry. The default value ischecked, which means the PPTP client entry is in effect. If you want to disable theentry temporarily instead of deleting it, please clear the check box.Tunnel Name: It specifies a unique name of the PPTP tunnel. It is used to identifymultiple tunnels.User Name: It specifies a unique user name of the PPTP/L2TP client. It must bebetween 1 and 31 characters long. The remote PPTP/L2TP server will use the UserName and Password to identify the client.Password: It specifies a password of the PPTP/L2TP client.PPP Authentication: It specifies the PPP authentication mode by which the remotePPTP server authenticates the PPTP client. The available options are None,PAP,CHAP and Either.•PAP: Password Authentication Protocol.•CHAP: Challenge Handshake Authentication Protocol.
UTT Technologies Chapter 10 VPNhttp://www.uttglobal.com Page 166•None: It means that no authentication is performed.•Either: It means that the Wireless Router will automatically negotiate it with theremote VPN appliance.Remote Subnet IP: It specifies the subnet IP address of the remote network. In mostcases, you may enter the IP address of the remote VPN appliance’s LAN interface.Remote Subnet Mask: It specifies the subnet mask of the remote network.Tunnel Server IP/Domain Name: It specifies the IP address or domain name of theremote PPTP/L2TP server. In most cases, you may enter the WAN IP address ordomain name of the remote VPN appliance.Save: Click to save your changes.Cancel: Click to revert to the last saved settings.Back: ClicktogobacktothePPTP Client List.10.3 PPTP Client ListAfter you have configured a PPTP/L2TP client entry, you can view its configuration andstatus in the PPTP Client List, see Figure 10- 6.Figure 10- 6 PPTP Client ListFigure 10- 7 PPTP Client List (Continue)After the Wireless Router has successfully established a PPTP tunnel with the remote
UTT Technologies Chapter 10 VPNhttp://www.uttglobal.com Page 167PPTP server, you will see that the tunnel’s Status changes from Disconnected toConnected,theUp Time timer starts, and the Out Bytes and In Bytes will go onincreasing as long as there is some network traffic being passed through the PPTP tunnel.10.4 Configuration Example for PPTP ClientFigure 10- 8 Network Topology - The Wireless Router Acts as a PPTP clientIn this example, a company’s head office is located in Washington, and its branch office islocated in New York. Now the company wants the head office and branch office tosecurely communicate with each other over the Internet.As shown in Figure 10- 8, we will use PPTP to establish a VPN tunnel, deploy a AC750WWireless Router acting as a PPTP client at the branch office, and another VPN appliance(a UTT VPN gateway is recommended) acting as a PPTP server at the head office. The IPaddresses are as follows:The AC750W (PPTP Client) at the branch office:zLAN Subnet: 192.168.1.0/255.255.255.0zLAN Interface IP Address: 192.168.1.1/255.255.255.0The VPN appliance (PPTP Server) at the head office:zLAN Subnet: 192.168.123.0/255.255.255.0zLAN Interface IP Address: 192.168.123.1/255.255.255.0
UTT Technologies Chapter 10 VPNhttp://www.uttglobal.com Page 168zWAN Interface IP Address: 200.200.202.123/255.255.255.0To configure the AC750W as a PPTP client, follow these steps:Step 1 Go to the VPN > PPTP Client page, and click the Add button to go to the PPTPClient Settings page.Step 2 Make the following settings.Enable SelectTunnel Name To_HQUser Name VPN_testPassword vpntestPPP Authentication EitherRemote Subnet IP 192.168.123.1Remote Subnet Mask 255.255.255.0Tunnel Server IP/Domain Name 200.200.202.123Step 3 Click the Save button.
UTT Technologies Chapter 11 System Administrationhttp://www.uttglobal.com Page 169Chapter 11System AdministrationThis chapter describes how to perform maintenance activities on the Wireless Router,including administrator settings, system time settings, configuration backup and restore,firmware upgrade, remote management, and scheduled task settings.11.1 AdministratorThis section describes the Administration > Administrator page, where you can add,view, modify and delete the administrator accounts.11.1.1 Administrator ListFigure 11- 1 Administrator ListAdd an Administrator Account: To add a new administrator account, first click theAdd button to go to the setup page, next configure it, lastly click the Save button.View Administrator Account(s): When you have configured one or moreadministrator accounts, you can view them in the Administrator List.Modify an Administrator Account: To modify a configured administrator account,click its User Name hyperlink or icon, the related information will be displayed inthe setup page. Then modify it, and click the Save button.Delete Administrator Account(s): There are three ways to delete administratoraccount(s).
UTT Technologies Chapter 11 System Administrationhttp://www.uttglobal.com Page 1701. To delete an administrator account, directly click its icon.2. To delete more than one administrator account at a time, select the leftmostcheck boxes of the administrator accounts that you want to delete, and then clickthe Delete button.3. To delete all the administrator accounts at a time, directly click the Delete Allbutton.NoteYou can change the default administrator password, but you cannot change its username or delete it.11.1.2 Administrator SettingsFigure 11- 2 Administrator SettingsUser Name: It specifies a unique login name (case sensitive) of the administrator.Password: It specifies a login password (case sensitive) of the administrator. Thispassword will be required to login to the Wireless Router in the future.Confirm Password: You should re-enter the password.Save: Click to save your changes.Cancel: Click to revert to the last saved settings.Back: ClicktogobacktotheAdministrator List.NoteTo ensure security, it is strongly recommended that you change the defaultadministrator password, remember your new password and keep it safe. Oncechanged, you should use the new password to login to the Wireless Router in thefuture.
UTT Technologies Chapter 11 System Administrationhttp://www.uttglobal.com Page 17111.2 System TimeThis section describes the Administration > Time page, see Figure 11- 3.To ensure that the time-related features (e.g., DDNS, Schedule, Access Control, etc.)work well, you should synchronize the system clock.You can manually configure the system time or enable SNTP (Synchronize with SNTPServer) to automatically synchronize the system time from a designated SNTP server onthe Internet. It is suggested that you choose SNTP to automatically synchronize time inmost cases.Figure 11-3 System Time SettingsCurrent System Time: It displays the Wireless Router’s current date (YYYY-MM-DD)and time (HH:MM:SS).Time Zone: It specifies the time zone for your local time. To ensure that SNTPoperates properly, you must select the correct time zone.Set Time Manually: If you want to set the date (YYYY-MM-DD) and time (HH:MM:SS)for the Wireless Router manually, select this radio button.Synchronize with SNTP Server: If you want the Wireless Router to automaticallysynchronize the system clock from a designated SNTP server on the Internet, selectthis radio button.
UTT Technologies Chapter 11 System Administrationhttp://www.uttglobal.com Page 172SNTP Server 1 IP Address ~ SNTP Server 3 IP Address: It allows you to configureup to three SNTP servers on the Wireless Router. The Server 1 is the primary server(the default is 192.43.244.18), and the Server 2 is the first backup server (the defaultis 129.6.15.28), and the Server 3 is the second backup server (the default is 0.0.0.0).Save: Click to save your changes.Cancel: Click to revert to the last saved settings.NoteFor more information about SNTP, or to find an SNTP server with which you cansynchronize the system clock, please refer to http://www.ntp.org.
UTT Technologies Chapter 11 System Administrationhttp://www.uttglobal.com Page 17311.3 ConfigurationThis section describes the Administration > Configuration page, where you can backupthe current configuration file to the local PC, restore your previous configuration using thebackup configuration file, and reset the Wireless Router to factory default settings.11.3.1 Backup ConfigurationFigure 11- 4 Backup ConfigurationBackup: Click to export and save the Wireless Router’s current configuration to a textfile on your local computer.11.3.2 Restore ConfigurationFigure 11-5 Restore ConfigurationReset to Factory Defaults before Restore: If you select this check box, it will resetthe Wireless Router to factory default settings before importing the configuration file;elseimportthefiledirectly.Select a Configuration File: Click the Browse button to choose an appropriateconfiguration file or enter the file path and name in the text box.Restore: Click to import the selected configuration file. It will overwrite the currentconfiguration on the Wireless Router with the new configuration.NoteTo avoid any unexpected error, do not power off the Wireless Router during importingthe configuration file.
UTT Technologies Chapter 11 System Administrationhttp://www.uttglobal.com Page 17411.3.3 Reset to Factory DefaultsFigure 11- 6 Reset to Factory DefaultsReset: To reset the Wireless Router to factory default settings, click the Reset button,and then restart the Wireless Router.Note1. After performing the reset operation, you must manually restart the WirelessRouter in order for the default settings to take effect.2. The reset operation will clear all of the Wireless Router’s custom settings. It isstrongly recommended that you backup the current configuration before resetting.3. The default administrator user name and password both are admin (casesensitive). The default LAN IP address is 192.168.1.1 with a subnet mask of255.255.255.0.
UTT Technologies Chapter 11 System Administrationhttp://www.uttglobal.com Page 17511.4 Firmware UpgradeThis section describes the Administration > Firmware page, where you can view thecurrent firmware version information, download the latest firmware from the website ofUTT Technologies Co., Ltd., and upgrade the firmware.Figure 11- 7 Firmware UpgradeCurrent Firmware Version: It displays the version of the current firmware installedon the Wireless Router.To upgrade the Wireless Router’s firmware, follow these steps:Step 1 Downloading the latest firmwareClick the Download Firmware hyperlink to download the latest firmware from the websiteof UTT Technologies Co., Ltd.Note1. Please select the appropriate firmware file according to the product model.2. It is recommended that you go to the Administration > Configuration to backup theWireless Router’s current configuration before upgrade.Step 2 Choosing the firmwareClick the Browse button to choose the firmware file you want to upgrade or enter the filepath and name in the Select a Firmware File text box.Restart after Upgrade: After the upgrade is complete, the Wireless Router willautomatically restart in order for the new firmware to take effect.
UTT Technologies Chapter 11 System Administrationhttp://www.uttglobal.com Page 176Step 3 Renewing the firmwareClick the Upgrade button to renew the Wireless Router’s firmware. If you click theUpgrade button, you will be prompted to confirm the upgrade (see Figure 11- 8). Then youcan click OK to upgrade the firmware and restart the Wireless Router, or click Cancel tocancel the operation.Figure 11-8 Prompt Dialog Box - Firmware UpgradeNote1. It is strongly recommended that you upgrade the firmware when the WirelessRouter is under light load.2. If you upgrade firmware timely, the Wireless Router will have more functionalityand better performance. The right upgrade will not change the Wireless Router’scurrent settings.3. To avoid any unexpected error or unrecoverable hardware damage, do notpower off the Wireless Router during upgrading.4. After the upgrade is complete, the Wireless Router will automatically restart inorder for the new firmware to take effect, without human intervention.
UTT Technologies Chapter 11 System Administrationhttp://www.uttglobal.com Page 17711.5 Remote AccessThis section describes the Administration > Remote Access page. In this page, you canenable HTTP remote management, which allows you to access the Wireless Router’sWeb UI from anywhere over the Internet.Figure 11- 9 Remote Access SettingsEnable HTTP: It allows you to enable or disable HTTP remote management. Selectthis check box to enable HTTP remote management. To access the WirelessRouter’s Web UI over the Internet, you should enter http:// and the Wireless Router'sWAN IP address, followed by a colon and the port number. For example, if the WANIP address is 218.21.31.3 and port number is 8081, please enterhttp://218.21.31.3:8081 in your browser’s address bar.Remote Management Port: It specifies the port number that will be open to outsideaccess. The default value is 8081.Interface: It specifies the interface on which the HTTP remote management isenabled. Here you can select only one interface. To enable HTTP remotemanagement on multiple interfaces at the same time, you need to go to theAdvanced > NAT&DMZ > Port Forwarding page to create port forwarding entry(s)for the other interface(s).Save: Click to save your changes.Cancel: Click to revert to the last saved settings.Note1. To ensure security, it is strongly recommended that you don’t enable HTTP remotemanagement unless necessary.2. After you enable the HTTP remote management, the system will automatically createa port forwarding entry whose name is admin.YoucangototheAdvanced >NAT&DMZ > Port Forwarding page to view it in the Port Forwarding List.
UTT Technologies Chapter 11 System Administrationhttp://www.uttglobal.com Page 17811.6 Scheduled TaskThis section describes the Administration > Scheduled Task page, where you cancreate and view the scheduled tasks. With scheduled tasks, the Wireless Router canperiodically start each task at the time you specify.11.6.1 Scheduled Task SettingsFigure 11- 10 Scheduled Task SettingsTask Name: It specifies a unique name of the task.Repeat: It specifies how often the Wireless Router will perform the task. Theavailable options are Weekly,Daily,Hourly,Minutely.Start Time: It specifies the time at which the Wireless Router will start the task. Itssettings depend on the value of Repeat.Task Content: It specifies the content of the task. Now the Wireless Router onlyprovide one option: Restart, which means that the Wireless Router will restart itselfperiodically.Save: Click to save your changes.Cancel: Click to revert to the last saved settings.Back: ClicktogobacktotheScheduled Task List.
UTT Technologies Chapter 11 System Administrationhttp://www.uttglobal.com Page 17911.6.2 Scheduled Task ListFigure 11- 11 Scheduled Task ListFigure 11-12 Scheduled Task List (Continue)Add a Scheduled Task: To add a new scheduled task, first click the Add button to goto the Scheduled Task Settings page, next configure it, lastly click the Save button.View Scheduled Task(s): When you have configured one or more scheduled tasks,you can view them in the Scheduled Task List.Modify a Scheduled Task: To modify a configured scheduled task, click its UserName hyperlink or icon, the related information will be displayed in the setuppage. Then modify it, and click the Save button.Delete Scheduled Task(s): There are three ways to delete scheduled task(s).1. To delete a scheduled task, directly click its icon.2. To delete more than one scheduled task at a time, select the leftmost checkboxes of the tasks that you want to delete, and then click the Delete button.3. To delete all the scheduled tasks at a time, directly click the Delete All button.
UTT Technologies Chapter 12 Statushttp://www.uttglobal.com Page 180Chapter 12 StatusThis chapter describes how to view the wired status and wireless status, the trafficstatistics for each interface, and system information including the current system time,system up time, system resources usage information, firmware version, and system log.12.1 System StatusThis section describes the Status > System Status page, which include Wired Statusand Wireless Status.Figure 12- 1 System Status - Wired Status
UTT Technologies Chapter 12 Statushttp://www.uttglobal.com Page 181Figure 12- 2 System Status - Wireless Status●Wired Status: Refer to Section 4.2.1 Wired Status for detailed information.●Wireless Status: Refer to Section 4.2.2 Wireless Status for detailed information.NoteThe Wired Status page and Wireless Status page only display the statusinformation of the interfaces that have been configured.
UTT Technologies Chapter 12 Statushttp://www.uttglobal.com Page 18212.2 Traffic StatisticsThis section describes the ingress and egress traffic statistics for each interface.Figure 12-3 Traffic StatisticsWAN1,WAN2,3G,APClient and LAN: You can view the traffic statistics for eachinterface, including the number of bytes received and transmitted, and the number ofpackets received and transmitted.Clear: Click to clear all traffic statistics.Refresh: Click to view the latest traffic statistics.Back: ClicktogobacktotheStart > Interface Traffic page.NoteThis page only displays the traffic statistics for the interfaces that have beenconfigured.
UTT Technologies Chapter 12 Statushttp://www.uttglobal.com Page 18312.3 System InformationThis section describes the Status > System Info page, which includes the current systemtime, system up time, system resources usage information, SN, firmware version, andsystem log. System information can help you identify and diagnose the source of currentsystem problems, or help you predict potential system problems.Figure 12- 4 System InformationCurrent System Time: It displays the Wireless Router’s current date (YYYY-MM-DD)and time (HH:MM:SS).System Up Time: It displays the elapsed time (in days, hours, minutes and seconds)since the Wireless Router was last started.CPU: It displays the current CPU usage.Memory: It displays the current memory usage.
UTT Technologies Chapter 12 Statushttp://www.uttglobal.com Page 184SN: It displays the internal serial number of the Wireless Router, which may bedifferent from the SN found on the label at the bottom of the Wireless Router.Version: It displays the version of the current firmware installed on the WirelessRouter.System Log: It records the events that occur in the system, such as, system startup,wireless enabled, and so on.Refresh: Click to view the latest system information.NoteThe CPU and Memory are displayed as a status bar and percentage value. The colorof the status bar indicates the usage percentage for each resource.●When the percentage is below 1%, the bar is blank.●When the percentage is between 1% and 50% (below 50%), the color is green.●When the percentage is between 50% and 70% (below 70%), the color isorange.●When the percentage is equal to or above 70%, the color is red.
UTT Technologies Chapter 13 Supporthttp://www.uttglobal.com Page 185Chapter 13 SupportThe Support page provides links to the UTTCare, Forum, Knowledge and Reservationpage of the UTT website, which can help you quickly learn the UTT Technologies servicesystem and enjoy the most intimate and professional services.Figure 13- 1 SupportAs shown in Figure 13- 1, it allows you to click each Learn More hyperlink to directly openthe corresponding page of the UTT website.●UTTCare: Link to the support page of the UTT website to download product dataand get help.●Forum: Link to the forum page of the UTT website to participate in productdiscussions.●Knowledge: Link to the knowledge base page of the UTT website to learn moreabout our products and how to use them.●Reservation: Link to the booking customer service page of the UTT website torequest a booking.
UTT Technologies Appendix A How to configure your PChttp://www.uttglobal.com Page 186Appendix A How to Configure Your PCThis appendix describes how to configure TCP/IP settings on a Windows XP-basedcomputer.There are two ways to configure TCP/IP settings: manually configuring TCP/IP settings,and automatically configuring TCP/IP settings with DHCP. The following describes the twoways respectively.●Method One: Manually Configuring TCP/IPTo configure the TCP/IP protocol manually, follow these steps:1. On the Windows taskbar, click Start > Settings > Control Panel.2. Double-click the Network Connections icon, right-click the Local Area Connectionicon and select Properties.OntheGeneral tab (see Figure A-0-1), in the Thisconnection uses the following items box, click the Internet Protocol (TCP/IP)item, and then click the Properties button.
UTT Technologies Appendix A How to configure your PChttp://www.uttglobal.com Page 187Figure A- 0- 1 Local Area Connection Properties3. In the Internet Protocol (TCP/IP) Properties dialog box (see Figure A-0-2), selectthe Use the following IP address option,enter 192.168.1.x (x is between 2 and 254,including 2 and 253) in the IP address text box, 255.255.255.0 in the Subnet masktext box, and 192.168.1.1 in the Default gateway text box.Figure A-0- 2 Internet Protocol (TCP/IP) Properties4. Select the Use the following DNS server address option, enter the primary DNSserver IP address in the Preferred DNS server text box, and enter the secondaryDNS server IP address in the Alternate DNS server text box (optional). A DNS queryis sent to the primary DNS server at first. If the primary DNS server is unable toservice the query, the query will be sent to the secondary DNS server.5. Click the OK button. Now you have finished configuring the TCP/IP settings.●Method Two: Automatically Configuring TCP/IP with DHCP1. To ensure that the PC can obtain an IP address and other TCP/IP parametersautomatically from the Wireless Router, you should go to the Network > DHCPServer page to enable DHCP server on the Wireless Router.
UTT Technologies Appendix A How to configure your PChttp://www.uttglobal.com Page 1882. On the Windows taskbar, click Start > Settings > Control Panel.3. Double-click the Network Connections icon, right-click the Local Area Connectionicon and select Properties.OntheGeneral tab (see Figure A-0-1), in the Thisconnection uses the following items box, click the Internet Protocol (TCP/IP)item, and then click the Properties button.4. In the Internet Protocol (TCP/IP) Properties dialog box, on the General tab (seeFigure A-0-3), select the Obtain an IP address automatically option and ObtainDNS server address automatically option.Figure A-0- 3 Internet Protocol (TCP/IP) Properties5. Click the OK button. Now you have finished configuring the TCP/IP settings.NoteIn Windows XP, the TCP/IP stack is a core component of the operating system.Therefore, you cannot remove TCP/IP in Windows XP. However, if you have networkconnectivity problems and think its TCP/IP related, you can reinstall TCP/IP on yourWindows XP-based computer. To install TCP/IP on top of itself, follow these steps:a. On the Windows taskbar, click Start > Settings > Control Panel.a. Double-click Network Connections, right-click Local Area Connection andselect Properties.
UTT Technologies Appendix A How to configure your PChttp://www.uttglobal.com Page 189b. Click Install.c. Click Protocol, and then click Add.d. Click Have Disk.e. In the Copy manufacturer's files from box, typeSystem_Drive_Letter:\windows\inf,andthenclickOK.f. In the list of available protocols, click Internet Protocol (TCP/IP),andthenclickOK.g. Restart your computer.
UTT Technologies Appendix B FAQhttp://www.uttglobal.com Page 190Appendix B FAQ1. How to connect the Wireless Router to the Internetusing PPPoE?Step 1 Set your ADSL Modem to bridge mode (RFC 1483 bridged mode).Step 2 Please make sure that your PPPoE Internet connection use standard dial-type.You may use Windows XP built-in PPPoE dial-in client to test.Step 3 Connect a network cable from the ADSL modem to a WAN port of the WirelessRouter, and connect your telephone line to the ADSL modem’s line port.Step 4 Configure the PPPoE Internet connection related parameters in the Start >Setup Wizard or the Network > WAN page.Step 5 If you pay monthly for the Internet connection, you can choose Always On asthe Dial Type; else, you can choose On Demand or Manual as the Dial Type,and specify the Idle Timeout to avoid wasting online time due to that you forgetto hang up the connection in time.Step 6 If you choose Manual as the Dial Type, you need to dial up manually in theInternet Connection List on the Network > WAN page. Refer to Section5.1.1.3 for more information.Step 7 After the PPPoE connection is established successfully, you can view itsconfiguration and status information in the Internet Connection List on theNetwork > WAN page, such as Status (Connected means that the connectionis established successfully), the connection’s IP address and Gatewayassigned by your ISP, Tx Rate,Rx Rate, and so on, see Figure B-0- 1.Figure B-0- 1 Viewing PPPoE Connection Status in the Internet Connection List
UTT Technologies Appendix B FAQhttp://www.uttglobal.com Page 191Figure B-0- 2 Viewing PPPoE Connection Status in the Internet Connection List (Continue)Step 8 Configure the local computers according to the steps described in Appendix AHow to Configure Your PC.2. How to connect the Wireless Router to the Internetusing Static IP?Step 1 Please make sure the Internet connection is normal. You may use your PC totest.Step 2 Connect a network cable from the network device provided by your ISP to aWAN port of the Wireless Router.Step 3 Configure the Static IP Internet connection related parameters in the Start >Setup Wizard or the Network > WAN page.Step 4 After the Static IP connection is established successfully, you can view itsconfiguration and status information in the Internet Connection List on theNetwork > WAN page.Step 5 Configure the local computers according to the steps described in Appendix AHow to Configure Your PC.3. How to connect the Wireless Router to the Internetusing DHCP?Step 1 Please make sure the Internet connection is normal. You may use your PC totest.Step 2 Connect a network cable from the network device provided by your ISP to aWAN port of the Wireless Router.
UTT Technologies Appendix B FAQhttp://www.uttglobal.com Page 192Step 3 Configure the DHCP Internet connection related parameters in the Start >Setup Wizard or the Network > WAN page.NoteSome ISPs register the MAC address of your network device (usually a computer)when your account is first opened, and they will only accept traffic from that MACaddress. In this case, you need to change the new Router’s MAC address to theregistered MAC address. The operation is as follows: Go to the Network > WANpage, select the MAC Address Clone tab, and then change the MAC address of thecorresponding interface, lastly click the Save button.Step 4 After the DHCP Internet connection is established successfully, you can go tothe view its configuration and status information in the Internet ConnectionList on the Network > WAN page, such as Status (Connected means theconnection is established successfully), the connection’s IP address andGateway assigned by your ISP, Tx Rate,Rx Rate, and so on, see FigureB- 0- 4.Figure B-0-3 Viewing DHCP Connection Status in the Internet Connection ListFigure B- 0- 4 Viewing DHCP Connection Status in the Internet Connection List (Continue)Step 6 Configure the local computers according to the steps described in Appendix AHow to Configure Your PC.
UTT Technologies Appendix B FAQhttp://www.uttglobal.com Page 1934. How to reset the Wireless Router to factory defaultsettings?NoteThe reset operation will clear all the custom settings on the Wireless Router, so do itwith caution.The following describes how to reset the Wireless Router to factory default settings. Thereare two cases depending on whether you remember the administrator password or not.●Case One: Remember the administrator passwordWhen you remember the administrator password, you can reset the Wireless Router tofactory default settings via the Web UI. The operation is as follows: Go to theAdministration > Configuration page, and then click the Reset button in the Reset toFactory Defaults configuration field, lastly manually restart the Wireless Router.●Case Two: Forget the administrator passwordIf you forget the administrator password, you cannot login to the Wireless Router’s Web UI.However, you can reset the Wireless Router to factory default settings via the RESETbutton, which is located on the rear panel of the Wireless Router. The operation is asfollows: While the Wireless Router is powered on, use a pin or paper clip to press and holdthe RESET button for more than 5 seconds, and then release the button. After that, theWireless Router will restart with factory default settings.
UTT Technologies Appendix C Common IP Protocolshttp://www.uttglobal.com Page 194Appendix C Common IP ProtocolsProtocol Name Protocol Number Full NameIP 0 Internet ProtocolICMP 1 Internet Protocol Message ProtocolIGMP 2 Internet Group ManagementGGP 3 Gateway-Gateway ProtocolIPINIP 4 IP in IP Tunnel DriverTCP 6 Transmission Control ProtocolEGP 8 Exterior Gateway ProtocolIGP 9 Interior Gateway ProtocolPUP 12 PARC Universal Packet ProtocolUDP 17 User Datagram ProtocolHMP 20 Host Monitoring ProtocolXNS-IDP 22 Xerox NS IDPRDP 27 Reliable Datagram ProtocolGRE 47 General Routing EncapsulationESP 50 Encap Security PayloadAH 51 Authentication HeaderRVD 66 MIT Remote Virtual DiskEIGRP 88 Enhanced Interior Gateway Routing ProtocolOSPF 89 Open Shortest Path First
UTT Technologies Appendix D Common Service Portshttp://www.uttglobal.com Page 195Appendix D Common Service PortsService Name Port Protocol Descriptionecho 7 tcpecho 7 udpdiscard 9 tcpdiscard 9 udpsystat 11 tcp Active userssystat 11 udp Active usersdaytime 13 tcpdaytime 13 udpqotd 17 tcp Quote of the dayqotd 17 udp Quote of the daychargen 19 tcp Character generatorchargen 19 udp Character generatorftp-data 20 tcp FTP, dataftp 21 tcp FTP. controltelnet 23 tcpsmtp 25 tcp Simple Mail Transfer Protocoltime 37 tcp timservertime 37 udp timserverrlp 39 udp Resource Location Protocolnameserver 42 tcp Host Name Servernameserver 42 udp Host Name Servernicname 43 tcp whoisdomain 53 tcp Domain Name Server
UTT Technologies Appendix D Common Service Portshttp://www.uttglobal.com Page 196domain 53 udp Domain Name Serverbootps 67 udp Bootstrap Protocol Serverbootpc 68 udp Bootstrap Protocol Clienttftp 69 udp Trivial File Transfergopher 70 tcpfinger 79 tcphttp 80 tcp World Wide Webkerberos 88 tcp Kerberoskerberos 88 udp Kerberoshostname 101 tcp NIC Host Name Serveriso-tsap 102 tcp ISO-TSAP Class 0rtelnet 107 tcp Remote Telnet Servicepop2 109 tcp Post Office Protocol - Version 2pop3 110 tcp Post Office Protocol - Version 3sunrpc 111 tcp SUN Remote Procedure Callsunrpc 111 udp SUN Remote Procedure Callauth 113 tcp Identification Protocoluucp-path 117 tcpnntp 119 tcp Network News Transfer Protocolntp 123 udp Network Time Protocolepmap 135 tcp DCE endpoint resolutionepmap 135 udp DCE endpoint resolutionnetbios-ns 137 tcp NETBIOS Name Servicenetbios-ns 137 udp NETBIOS Name Servicenetbios-dgm 138 udp NETBIOS Datagram Servicenetbios-ssn 139 tcp NETBIOS Session Serviceimap 143 tcp Internet Message Access Protocolpcmail-srv 158 tcp PCMail Server
UTT Technologies Appendix D Common Service Portshttp://www.uttglobal.com Page 197snmp 161 udpsnmptrap 162 udp SNMP trapprint-srv 170 tcp Network PostScriptbgp 179 tcp Border Gateway Protocolirc 194 tcp Internet Relay Chat Protocolipx 213 udp IPX over IPldap 389 tcp Lightweight Directory Access Protocolhttps 443 tcp MComhttps 443 udp MCommicrosoft-ds 445 tcpmicrosoft-ds 445 udpkpasswd 464 tcp Kerberos (v5)kpasswd 464 udp Kerberos (v5)isakmp 500 udp Internet Key Exchangeexec 512 tcp Remote Process Executionbiff 512 udplogin 513 tcp Remote Loginwho 513 udpcmd 514 tcpsyslog 514 udpprinter 515 tcptalk 517 udpntalk 518 udpefs 520 tcp Extended File Name Serverrouter 520 udp route routedtimed 525 udptempo 526 tcpcourier 530 tcp
UTT Technologies Appendix D Common Service Portshttp://www.uttglobal.com Page 198conference 531 tcpnetnews 532 tcpnetwall 533 udp For emergency broadcastsuucp 540 tcpklogin 543 tcp Kerberos loginkshell 544 tcp Kerberos remote shellnew-rwho 550 udpremotefs 556 tcprmonitor 560 udpmonitor 561 udpldaps 636 tcp LDAP over TLS/SSLdoom 666 tcp Doom Id Softwaredoom 666 udp Doom Id Softwarekerberos-adm 749 tcp Kerberos administrationkerberos-adm 749 udp Kerberos administrationkerberos-iv 750 udp Kerberos version IVkpop 1109 tcp Kerberos POPphone 1167 udp Conference callingms-sql-s 1433 tcp Microsoft-SQL-Serverms-sql-s 1433 udp Microsoft-SQL-Serverms-sql-m 1434 tcp Microsoft-SQL-Monitorms-sql-m 1434 udp Microsoft-SQL-Monitorwins 1512 tcp Microsoft Windows Internet Name Servicewins 1512 udp Microsoft Windows Internet Name Serviceingreslock 1524 tcpl2tp 1701 udp Layer Two Tunneling Protocolpptp 1723 tcp Point-to-point tunnelling protocolradius 1812 udp RADIUS authentication protocol
UTT Technologies Appendix D Common Service Portshttp://www.uttglobal.com Page 199radacct 1813 udp RADIUS accounting protocolnfsd 2049 udp NFS serverknetd 2053 tcp Kerberos de-multiplexorman 9535 tcp Remote Man Server
UTT Technologies Appendix E Figure Indexhttp://www.uttglobal.com Page 200Appendix E Figure IndexFigure 0- 1 MAC Address Filtering List...................................................................................................................3Figure 2- 1 Front Panel of the Wireless Router..................................................................................................13Figure 2- 2 Back Panel of the Wireless Router.................................................................................................. 14Figure 3- 1 Entering IP address in the Address Bar.......................................................................................... 20Figure 3- 2 Login Screen.........................................................................................................................................20Figure 3- 3 Homepage.............................................................................................................................................21Figure 3- 4 Running the Setup Wizard.................................................................................................................22Figure 3- 5 Welcome Page.....................................................................................................................................23Figure 3- 6 Setup Wizard - Internet Access Mode.............................................................................................23Figure 3- 7 Setup Wizard - WAN1/WAN2 Internet Connection Settings (Static IP)....................................25Figure 3- 8 Setup Wizard - WAN1/WAN2 Settings (DHCP).............................................................................26Figure 3-9 Setup Wizard - WAN1/WAN2 Settings (PPPoE)...........................................................................26Figure 3-10 Setup Wizard - 3G Internet Connection Settings........................................................................27Figure 3- 11 Setup Wizard - APClient Connection Settings (Disabling Wireless Security)........................28Figure 3-12 Setup Wizard - APClient Connection Settings (WEP)................................................................29Figure 3-13 Setup Wizard - APClient Connection Settings (WPA-PSK/WAP2-PSK)................................ 31Figure 3-14 Setup Wizard - Wireless Settings...................................................................................................32Figure 4-1 System Status - Wired Status........................................................................................................... 35Figure 4- 2 System Status - Wireless Status...................................................................................................... 36Figure 4- 3 Interface Traffic Chart......................................................................................................................... 37Figure 4- 4 Traffic Statistics....................................................................................................................................38Figure 4- 5 Restart the Wireless Router.............................................................................................................. 39Figure 4- 6 Prompt Dialog Box - Restart the Wireless Router.........................................................................39Figure 5- 1 Internet Connection List..................................................................................................................... 40Figure 5- 1 Internet Connection List (Continue)................................................................................................. 41Figure 5- 2 Internet Connection List - PPPoE/3G Connection........................................................................44Figure 5- 3 Internet Connection List - DHCP Connection................................................................................ 44Figure 5- 4 Network - WAN Settings.....................................................................................................................45Figure 5- 5 Static IP Internet Connection.............................................................................................................46Figure 5- 6 DHCP Internet Connection Settings................................................................................................ 47Figure 5- 7 PPPoE Internet Connection Settings...............................................................................................47Figure 5- 8 3G Internet Connection Settings...................................................................................................... 49
UTT Technologies Appendix E Figure Indexhttp://www.uttglobal.com Page 201Figure 5- 9 MAC Address Clone............................................................................................................................50Figure 5-10 Global Settings - Full Load Balancing...........................................................................................53Figure 5-11 Global Settings - Partial Load Balancing...................................................................................... 54Figure 5- 12 Load Balancing List...........................................................................................................................55Figure 5- 12 Load Balancing List (Continue)...................................................................................................... 55Figure 5- 13 Connection Detection Settings....................................................................................................... 56Figure 5- 14 LAN Interface Settings..................................................................................................................... 58Figure 5-15 DHCP Server Settings......................................................................................................................59Figure 5-16 Static DHCP Settings........................................................................................................................61Figure 5-17 Static DHCP List................................................................................................................................62Figure 5- 18 DHCP Client List................................................................................................................................63Figure 5-19 DHCP Server Settings - Example.................................................................................................. 66Figure 5- 20 Adding the Static DHCP Entry 1 - Example................................................................................. 66Figure 5- 21 Adding the Static DHCP Entry 2 - Example................................................................................. 67Figure 5-22 Static DHCP List - Example............................................................................................................ 67Figure 5- 23 Apply for a DDNS Account from 3322.org....................................................................................69Figure 5-24 Disabling DDNS Service..................................................................................................................69Figure 5-25 DDNS Settings Related to 3322.org..............................................................................................70Figure 5- 26 DDNS Settings Related to iplink.com.cn...................................................................................... 71Figure 5-27 DDNS Status......................................................................................................................................72Figure 5-28 Enable UPnP......................................................................................................................................73Figure 5-29 UPnP Port Forwarding List..............................................................................................................74Figure 6- 1 Basic Wireless Settings - AP Mode..................................................................................................76Figure 6- 2 Basic Wireless Settings - APClient Mode....................................................................................... 78Figure 6- 3 Basic Wireless Settings - Repeater Mode......................................................................................80Figure 6- 4 Security Settings - WEP Mode..........................................................................................................81Figure 6-5 Key Settings Prompt Dialog Box...................................................................................................... 82Figure 6- 6 Security Settings - TKIP Mode..........................................................................................................82Figure 6- 7 Security Settings - AES Mode...........................................................................................................82Figure 6- 8 Basic Wireless Settings - Bridge Mode...........................................................................................83Figure 6-9 Basic Wireless Settings - Lazy Mode.............................................................................................. 84Figure 6-10 Configuration Example for WDS - Network Topology................................................................ 85Figure 6- 11 Configuration Example for WDS - Configuring the Wireless Router A................................... 86Figure 6- 12 Configuration Example for WDS - Configuring the Wireless Router B...................................87Figure 6-13 Configuration Example for WDS - Verifying Connectivity..........................................................87Figure 6-14 Disabling Wireless Security.............................................................................................................88Figure 6-15 Wireless Security Settings - WEP..................................................................................................89
UTT Technologies Appendix E Figure Indexhttp://www.uttglobal.com Page 202Figure 6-16 Wireless Security Settings - WPA/WPA2......................................................................................90Figure 6-17 Wireless Security Settings - WPA-PSK/WPA2-PSK...................................................................91Figure 6-18 MAC Address Filtering Global Settings.........................................................................................93Figure 6-19 MAC Address Filtering List..............................................................................................................94Figure 6-20 MAC Address Filtering Settings......................................................................................................94Figure 6-21 Adding a MAC Address Filtering Entry - Example...................................................................... 96Figure 6- 22 MAC Address Filtering Global Settings - Example..................................................................... 96Figure 6-23 MAC Address Filtering List - Example...........................................................................................96Figure 6- 24 Advanced Wireless Settings............................................................................................................97Figure 6-25 Wireless Client List............................................................................................................................99Figure 7- 1 Port Forwarding List..........................................................................................................................103Figure 7- 2 Port Forwarding Settings................................................................................................................. 104Figure 7- 3 Port Forwarding Settings - Example..............................................................................................106Figure 7- 4 NAT Rule List..................................................................................................................................... 106Figure 7- 5 NAT Rule Settings - EasyIP............................................................................................................ 107Figure 7- 6 NAT Rule Settings - One2One........................................................................................................108Figure 7- 7 EasyIP NAT Rule Settings - Example............................................................................................110Figure 7- 8 One2One NAT Rule Settings - Example.......................................................................................112Figure 7- 9 DMZ Host Settings............................................................................................................................ 112Figure 7-10 IP/MAC Binding Global Settings...................................................................................................115Figure 7- 11 IP/MAC Binding List........................................................................................................................ 116Figure 7-12 Modifying an IP/MAC Binding.......................................................................................................116Figure 7-13 IP/MAC Binding Error Message....................................................................................................117Figure 7-14 IP/MAC Binding Settings................................................................................................................117Figure 7-15 IP/MAC Binding List - Example 1.................................................................................................120Figure 7-16 IP/MAC Binding List - Example 2.................................................................................................121Figure 7-17 IP/MAC Binding List - Example 3.................................................................................................121Figure 7-18 Static Route List.............................................................................................................................. 122Figure 7-19 Static Route Settings......................................................................................................................123Figure 7-20 Static Route Settings - Example.................................................................................................. 124Figure 7-21 PPPoE Discovery Stage Flows....................................................................................................126Figure 7-22 PPPoE Server Global Settings.....................................................................................................128Figure 7-23 PPPoE Account List........................................................................................................................129Figure 7-24 PPPoE Account Settings............................................................................................................... 130Figure 7-25 PPPoE User Status List.................................................................................................................131Figure 8- 1 Global Management Policy Settings..............................................................................................132Figure 8- 2 Updating Policy..................................................................................................................................133
UTT Technologies Appendix E Figure Indexhttp://www.uttglobal.com Page 203Figure 8- 3 Global Management Policy - Example..........................................................................................134Figure 8-4 Group Management Policy List...................................................................................................... 135Figure 8-4 Group Management Policy List (Continue)..................................................................................135Figure 8- 5 Group Management Policy Settings...........................................................................................137Figure 8-6 Group Management Policy Example - Policy 1...........................................................................139Figure 8-7 Group Management Policy Example - Policy 2...........................................................................140Figure 8-8 Group Management Policy Example - Policy 3...........................................................................141Figure 8-9 Group Management List – Example..............................................................................................141Figure 8-9 Group Management List – Example (Continue)..........................................................................142Figure 9- 1 Access Rule List................................................................................................................................145Figure 9- 1 Access Rule List (Continue)............................................................................................................145Figure 9- 1 Access Rule List (Continue)............................................................................................................146Figure 9- 2 Access Rule Settings - IP Filtering.................................................................................................147Figure 9- 3 Access Rule Settings - URL Filtering.............................................................................................149Figure 9- 4 Access Rule Settings - Keyword Filtering.....................................................................................150Figure 9- 5 Access Rule List - Example 1......................................................................................................... 152Figure 9- 5 Access Rule List - Example 1 (Continue).....................................................................................152Figure 9- 5 Access Rule List - Example 1 (Continue).....................................................................................152Figure 9- 6 Access Rule List - Example 2......................................................................................................... 153Figure 9- 6 Access Rule List - Example 2 (Continue).....................................................................................153Figure 9- 6 Access Rule List - Example 2 (Continue).....................................................................................154Figure 9- 7 Access Rule List - Example 3......................................................................................................... 154Figure 9- 7 Access Rule List - Example 3 (Continue).....................................................................................155Figure 9- 7 Access Rule List - Example 3 (Continue).....................................................................................155Figure 9- 8 Access Rule List - Example 4......................................................................................................... 156Figure 9- 8 Access Rule List - Example 4 (Continue).....................................................................................156Figure 9- 8 Access Rule List - Example 4 (Continue).....................................................................................156Figure 9-9 Domain Filtering Global Settings....................................................................................................157Figure 9-10 Domain Filtering Settings.............................................................................................................. 157Figure 9- 11 Attack Prevention Settings.............................................................................................................159Figure 10- 1 Typical Application of PPTP..........................................................................................................160Figure 10- 2 PPTP Packet Flow..........................................................................................................................162Figure 10-3 PPTP Packet Format - Static IP/DHCP Internet Connection................................................. 164Figure 10-4 PPTP Packet Format - PPPoE Internet Connection................................................................164Figure 10- 5 PPTP Client Settings......................................................................................................................165Figure 10- 6 PPTP Client List.............................................................................................................................. 166Figure 10- 6 PPTP Client List (Continue)..........................................................................................................166
UTT Technologies Appendix E Figure Indexhttp://www.uttglobal.com Page 204Figure 10- 7 Network Topology - The Wireless Router Acts as a PPTP client...........................................167Figure 11- 1 Administrator List.............................................................................................................................169Figure 11- 2 Administrator Settings.....................................................................................................................170Figure 11- 3 System Time Settings.....................................................................................................................171Figure 11- 4 Backup Configuration..................................................................................................................... 173Figure 11- 5 Restore Configuration.....................................................................................................................173Figure 11- 6 Reset to Factory Defaults.............................................................................................................. 174Figure 11- 7 Firmware Upgrade...........................................................................................................................175Figure 11- 8 Prompt Dialog Box - Firmware Upgrade.....................................................................................176Figure 11- 9 Remote Access Settings................................................................................................................177Figure 11-10 Scheduled Task Settings............................................................................................................. 178Figure 11- 11 Scheduled Task List......................................................................................................................179Figure 11- 11 Scheduled Task List (Continue)..................................................................................................179Figure 12- 1 System Status - Wired Status.......................................................................................................180Figure 12- 2 System Status - Wireless Status..................................................................................................181Figure 12- 3 Traffic Statistics................................................................................................................................182Figure 12- 4 System Information.........................................................................................................................183Figure 13- 1 Support..............................................................................................................................................185Figure A-0- 1 Local Area Connection Properties.............................................................................................187Figure A-0- 2 Internet Protocol (TCP/IP) Properties........................................................................................187Figure A-0- 3 Internet Protocol (TCP/IP) Properties........................................................................................188Figure B-0- 1 Viewing PPPoE Connection Status in the Internet Connection List....................................190Figure B-0- 1 Viewing PPPoE Connection Status in the Internet Connection List (Continue)............... 191Figure B- 0- 2 Viewing DHCP Connection Status in the Internet Connection List.....................................192Figure B- 0- 2 Viewing DHCP Connection Status in the Internet Connection List (Continue)................ 192
UTT Technologies Appendix F Table Indexhttp://www.uttglobal.com Page 205Appendix F Table IndexTable 0- 1 Common Button Descriptions................................................................................................................3Table 0- 2 Basic Elements and Features of the List............................................................................................ 4Table 0- 3 Factory Default Settings.........................................................................................................................5Table 2- 1 Description of LEDs on the Front Panel........................................................................................... 14Table 2- 2 Description of Ports on the Rear Panel.............................................................................................15Table 2- 3 Description of Components on the Rear Panel...............................................................................15Table 5-1 Description of PPPoE Connection Status.........................................................................................41Table 5- 2 Description of Static IP Connection Status.......................................................................................42Table 5- 3 Description of DHCP Connection Status.......................................................................................... 42Table 5-4 Description of 3G Connection Status................................................................................................ 42
Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules.  These limits are designed to provide reasonable protection against harmful interference in a residential installation.   This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.  However, there is no guarantee that interference will not occur in a particular installation.  If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:  z Reorient or relocate the receiving antenna. z Increase the separation between the equipment and receiver. z Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. z Consult the dealer or an experienced radio/TV technician for help.  FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment.  This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.    IMPORTANT NOTE: FCC Radiation Exposure Statement: This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body.

Navigation menu