Well Communication WLL-5410R 802.11g WIRELESS AP User Manual WLL 5410R manual

Well Communication Corporation 802.11g WIRELESS AP WLL 5410R manual

Contents

USERS MANUAL 2

Download: Well Communication WLL-5410R 802.11g WIRELESS AP User Manual WLL 5410R manual
Mirror Download [FCC.gov]Well Communication WLL-5410R 802.11g WIRELESS AP User Manual WLL 5410R manual
Document ID466548
Application IDEn1a050jJw9+B+iBHjwT8g==
Document DescriptionUSERS MANUAL 2
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize199.56kB (2494493 bits)
Date Submitted2004-09-08 00:00:00
Date Available2004-09-08 00:00:00
Creation Date2004-09-08 13:44:25
Producing SoftwareAcrobat Distiller 5.0.5 (Windows)
Document Lastmod2004-09-08 13:44:35
Document TitleMicrosoft Word - WLL-5410R manual.doc
Document CreatorADOBEPS4.DRV Version 4.51
Document Author: linda

5.3.4. Blocking Individual (or Service Port) of LAN
Clients from Accessing the Internet
1. Click on the Security tab.
2. Under the Firewall menu item, click on Outgoing Policy.
3. Enter the IP address and port number (or range) to be blocked onto the corresponding
text box at the bottom of the list (marked New) according the following figure.
4. Click combo box and select protocol.
5. Click combo box and select PERMIT / DENY action.
6. Check Enable box to log the event.
7. Press Apply.
This figure describes all the IP address coming from LAN port will be denied to access
WAN services, but: Accessing to the port 80 (HTTP service) of WAN IP 210.201.37.199
from LAN IP 192.168.1.33(with port 80) will be allowed.
Accessing to the port 20~80 of WAN IP 66.218.71.198 from LAN IP 192.168.1.52 (with
port 20~80) will be allowed.
Letting Stuff in
By default, IEEE 802.11g WLAN Router is deployed in firewall mode and will not allow
outside computers to reach the LAN unless the connection is initiated by a LAN client.
IEEE 802.11g WLAN Router empowers network administrators to allow WAN clients to
access certain services provided by LAN clients. In other words, it is possible for WAN
side computers to initiate connections provided the Network Administrator allows it.
This is done through a technique called Port Mapping. When computers on the Internet
communicate, they do so through IP addresses and special numbers called port addresses
(or simply ports). The port determines which service is trying to connect to (e.g. port
80=HTTP/Web services).
Each service also has what is known as a transmission protocol (either TCP or UDP). To
properly use this feature, you would need the connection details for the service you wish
to open to the Internet. Each WAN port/LAN IP/port group is called a rule. In addition,
IEEE 802.11g WLAN Router rules can be further defined to allow or deny connections
according to IP address using filters.
Port Mapping allows IEEE 802.11g WLAN Router to “pretend” to offer the service that
an outside computer (WAN side) wishes to reach. Once the connection is made, all the
requests between the outside and local (LAN side) computers are redirected by IEEE
802.11g WLAN Router to the proper destination. This process is completely transparent
to the outside computers.
5.3.5. Mapping Internal Ports to the Outside
Add a record of Port Mapping
1. Click on Port Mapping under Firewall in the Security tab.
2. Click on Add.
3. Enter Service Name (ex: FTP), External Port (ex: 23).
4. Click on TCP.
5. Enter the last digit of IP address into Internal Host (ex: 192.168.1.22), port (ex:23).
6. Click on Enable.
7. Press Apply.
Any request from Internet for port 21 (FTP service port) to the IEEE 802.11g WLAN
Router will be forwarded to LAN client 192.168.1.22
Deleting a record of Port Mapping
1. Click on Port Mapping under Firewall in the Security tab.
2. Click on Delete? beside record you want to delete and press Apply.
Enable a record of Port Mapping
1. Click on Port Mapping under Firewall in the Security tab.
2. Click on some records of Port Mapping and press Apply.
5.3.6. Configuring a Virtual Server
Adding a record to virtual server
1. Setup FTP server and Telnet Server in LAN port (ex: 192.168.1.1)
2. Click on Virtual Server under Firewall in the Security tab.
3. Enter Name (ex: Test)
4. Enter Port Range (ex: 20, 30).
5. Select TCP / UDP / ALL. (ex: TCP)
6. Enter IP address (ex: 192.168.1.1).
7. Click on Enable.
8. Press Apply.
Deleting a record from virtual server
1. Click on Virtual Server under Firewall in the Security tab.
2. Select the rule you want to delete
3. Press “del” button in the right of the rule
4. Press Apply.
5.3.7. Port Triggering Configuration
Port trigger is a set of rules that are used to open ports in the firewall dynamically. Each
rule is composed of a trigger condition and a port opening rule.
Add a Port Trigger rule for Realplayer
1. Click on Port trigger under Firewall in networking tab.
2. Add the following items in the port trigger page and press Apply.
3. Input the name. RealOne
4. Input the triggered port: 554-554
5. Select the triggered protocol: “TCP”
6. Input the opened port range: 7070-7071
7. Select the opened protocol: ”UDP”
8. Select the server check: “No”
Add a Port Trigger rule for mIRC
1. Click on Port trigger under Firewall in Networking tab.
2. Add the following items in the port trigger page and press Apply.
3. Input the name. MIRC
4. Input the triggered port range: 6660:6670
5. Select the triggered protocol: “TCP”
6. Input the opened port range: 113-113
7. Select the opened protocol: ”TCP”
8. Select the server check: “No”
5.3.8. SNMP
IEEE 802.11g WLAN Router supports the Simple Network Management Protocol
(SNMP). This protocol allows other SNMP aware systems to remotely monitor the
behavior of your IEEE 802.11g WLAN Router. IEEE 802.11g WLAN Router complies
with SNMP version 1 and version 2 type requests. SNMP compliant network
management systems (NMS) can requests information from your IEEE 802.11g WLAN
Router by providing the proper community strings.1 Community strings act as passwords
between SNMP aware devices (also called agents).
IEEE 802.11g WLAN Router distinguishes requests from the WAN and LAN sides. This
allows the network administrator to prevent unwanted monitoring. By default, SNMP
monitoring is allowed throughout the LAN, while disallowed through the WAN.
Enable WAN Access
1. Click on SNMP under Firewall in the Security tab.
2. Click on Enable in the WAN Access item.
3. Modify Read Only Community, Read Write Community.
4. Press Apply.
Enable LAN Access
1. Click on SNMP under Firewall in the Security tab.
2. Click on Enable in the LAN Access item.
3. Modify Read Only Community and Read Write Community.
4. Press Apply.
1. Commnuity strings are the primary authentication mechanisms employed by SNMP V1 and SNMP V2. Read-Only
SNMP support is available on all models. Read-Write SNMP support is available only on select models.
5.3.9. URL Blocking
Uniform Resource Locator (URL) blocking can be used by parents to limit access to
certain Internet sites for their children. This feature is more effective than Internet IP
Blocking as Internet sites might have multiple IP addresses and the user does not required
to know the IP address to set a blocking rule. In addition, the user can set a keyword list
that would block any URL that comprises the keyword. This way, the user can make the
list short, making it easier to manage.
Add a record on URL Blocking
1. Click on URL Blocking under URL Blocking in the Security tab.
2. Click on Enable in the URL Blocking item.
3. Enter URL/URI List, Keyword List and press Apply.
Delete a record on URL Blocking
1. Click on URL Blocking under URL Blocking in the Security tab.
2. Click on Enable in the URL Blocking tab.
3. Click on del beside URL/URI List you want to delete.
4. Click on del beside Keyword List you want to delete.
5. Press Apply.
5.4. INTRANET
Local Area Network Computing Internet style
The technology developed for the Internet has revolutionized so many aspects of modern
day society. Applications of the Internet technology within a corporate environment
present the same benefits and synergy at a much more personal scale.
Dubbed Intranets, local area networks that leverage technology developed for the World
Wide Web provide a wealth of resources to the office. Like its global counter-part
intranets offer the user with fast, reliable on-line services. Unlike its global counter-parts,
intranets that are run behind properly configured firewalls are safe from malicious or
unintentional intrusions that cause serious interruptions or intellectual property loss or
damage.
Dynamic LAN Client Configuration
LAN side client computers can automatically obtain new IP addresses from IEEE
802.11g WLAN Router, through its built-in DHCP daemon. To achieve this each client
computer should be set to acquire IP addresses via dynamic host configuration protocol
(DHCP) or its predecessor the Bootstrap Protocol (BootP).
By default, IEEE 802.11g WLAN Router will assign up to 99 IP addresses within the
range starting from 192.168.1.2 up to 192.168.1.100. Once assigned, a client computer
would retain or lease the IP address for as long as 1 day (7 day max). Once the lease
expires, the client computer can re-apply for a new IP address. It is possible that the
DHCP daemon may assign a different IP address from what was just released. In order to
guarantee that a LAN side computer gets the same IP address every time, see the section
on permanent IP address assignment below.
Caution: There should be only one (1) DHCP daemon on your LAN. If you are already
running another DHCP daemon or server, you should disable it before activating IEEE
802.11g WLAN Router DHCP daemon. Running more than one DHCP daemon on a
LAN can have unpredictable (and sometimes difficult to fix) consequences.
5.4.1. DHCP Server Basic Settings
SET UP DHCP SERVER
1. Click on Basic Settings under DHCPD in the Intranet tab.
2. Click on Yes in Enable DHCP?
3. Enter the last digit of DHCP start IP and DHCP end IP.
4. Click on one of Contract Period.
5. Press Apply.
MODIFY DHCP IP RANGE OF DHCP SERVER
1. Click on Basic Settings under DHCPD in the Intranet tab.
2. Modify DHCP start IP and DHCP end IP and press Apply. (IP value must be between
1 and 254)
MODIFY CONTRACT PERIOD OF DHCP IP
1. Click on Basic Settings under DHCPD in the Intranet tab.
2. Click on other options in the Contract Period item.
5.4.2. DHCPD Fixed MAC/IP
Adding a record of fixed MAC/IP
1. Click on Fixed MAC / IP under DHCPD in the Intranet tab.
2. Enter MAC Address, the last digit of IP address, and press Apply.
Deleting a record of fixed MAC / IP
1. Click on Fixed MAC / IP under DHCPD in the Intranet tab.
2. Click on del button beside record you want to delete.
3. Press Apply.
5.4.3. DHCP Server Status
1. Click on Current Status under DHCPD in the Intranet tab.
5.5. ADMINISTRATION
Access Control and Troubleshooting tools
IEEE 802.11g WLAN Router provides an extensive set of system tools that equip the
novice network administrator to do advanced network trouble shooting. IEEE 802.11g
WLAN Router also provides sophisticated control structures which can restrict access to
its configuration.
Authentication
By now you have familiarized yourself with username/password authentication
mechanism used by IEEE 802.11g WLAN Router. This is an industry standard method
for authenticating the identity of the user who intends to use the system. Only authorized
users should be entrusted with the valid username and password.
This feature allows the network administrator to manage the users who can change the
IEEE 802.11g WLAN Router configuration or use the tools for trouble shooting. Users
are also authenticated through the LAN clients they access IEEE 802.11g WLAN Router
through. Users who attempt to access IEEE 802.11g WLAN Router through restricted
workstations are denied access.
Besides, you can also choose a language setting. IEEE 802.11g WLAN Router currently
supports English and Chinese (Big 5).
System Tools
IEEE 802.11g WLAN Router provides the following tools which aid in administration of
the network.
System Status. This utility displays the current system status. It displays the current
Network Status Current Routing Table, and DHCP clients information. The feature
shows read-only system status and it will not allow you to modify the information. It
provides a method of inspecting the health of your system.
Time Setup. This utility will setup your system time. You can either setup your system
time manually or use Network Time Server to synchronize your system clock over the
network. Router Service Time. This utility allows user to access Internet based on a
predefined time frame.
System Restart. This utility is used for restarting IEEE 802.11g WLAN Router. System
restarts is needed in events of modified important system settings. Any saved changes of
the system activities will be applied after the system rebooted.
Factory Default. This utility is used for clearing the configuration and resetting it back
to original values (as it came out of the box)
Software Update. This utility allows the Network Administrator to connect to a server
which provides software which can be used to upgrade IEEE 802.11g WLAN Router.
The software update can also be done on local machine. Please check separate
information sheet or vendor web site for more details.
Config Setting. This utility is used for backup your current IEEE 802.11g WLAN Router
configurations in your PC. In the case you need to reset IEEE 802.11g WLAN Router
back to factory default value, you can load the configuration you backup before.
5.5.1. User Account
User who has Read / Write access right
1. Click on the Authentication tab and choose the User Account menu item.
2. Under the User who has Read/Write access right item, enter the user name in the
Username text box.
3. Enter the password in the password text box.
4. Enter password again in the confirm password text box.
User who has Read-Only access right
1. Click on the Authentication tab. Choose the User Account menu item,
2. Under the User who has Read-Only access right item, enter the user name in the
Username text box.
3. Enter the password in the password text box.
4. Enter password again in the confirm password text box.
5.5.2. Access IP
1. Click on the Authentication tab. Choose the Access IP menu item.
2. Select Enable / Disable on WAN access.
3. Enter up to three sets of LAN IP address (or Ranges) into appropriate text box.
4. Click on Apply button.
5.5.3. Language
1. Click on the Administration tab.
2. Under the Authentication menu item, click on Language.
3. Select your language in the Language box.
4. Clicks Apply to set your language.
5.5.4. System Status
1. Click on the Administration tab.
2. Under the Authentication menu item, click on System status.
5.5.5. Time Setup
1. Click on the Administration tab.
2. Under the System menu item, click on Time Setup.
3. Select your time zone in the Time Zone selection box.
4. Choose either Set Time Manually or Use Time Server.
5. If you choose the setup time manually, enter current time by specifying Month, Day,
Hours, Minutes, and Seconds in the appropriate fields.
6. If you choose to use Time Server, specifying the Time server.
7. Click on Apply button to setup time.
5.5.6. System Restart
1. Click on the Administration tab.
2. Under the System menu item, click on System Restart.
3. Press Yes button to restart the system.
5.5.7. Factory Default
1. Click on the Administration tab.
2. Under the system menu item, click on Factory Default.
3. Press Yes button to restart the system with factory default.
5.5.8. Software Update
1. Click on the Administration tab.
2. Under the System menu item, click on Software Update.
3. Choose either the software update file is in the internet or on the local host.
4. If the file is in the internet, type in the URL.
5. If the file is on local host, type in the name file with full path or click on Browse button
to search the file on local host.
6. Click Apply button to start update.
5.5.9. Config Setting
1. Click on the Administration tab.
2. Under the System menu item, click on Config Setting.
3. Select following method to Download or Upload configuration file.
4. If you select Download, you can either enter the path and filename in then text box or
press browser button to assign path and filename. Press Download button to start.
5. If you select Upload, then press Upload button to save.
5.5.10. System Log
IEEE 802.11g WLAN Router provides a system log of all system activities up to 50
entries. Old entries will be purged automatically to ensure a healthy system. However, if
you want to keep a full system log, you can setup a remote system log daemon (remote
syslogd) to record all system events remotely.
This feature can also be very helpful to monitor the system activities at distant.
1. Change some settings of IEEE 802.11g WLAN Router.
2. Click on the Administration tab.
3. Under the Log menu item, click on System Log.
6. Terminology
Boot
It is the process when the PC starts executing instructions.
Browser
It is an application program that helps users to view and interact with the information of
the World Wide Web.
BSS (Basic Service Set)
A group of wireless Network PC Card users and an Access Point.
Cable Modem
It is a device that connects a PC to the Internet via the cable television network. It
features asymmetric transmission rates: around 36 Mbps downstream from the Internet to
the PC, and from 200 Kbps to 2 Mbps upstream from the PC to the Internet.
DHCP (Dynamic Host Configuration Protocol)
It is a protocol that automates the assignment and acquirement of IP addresses between a
server and a client in a network.
DMZ (De-Militarized Zone)
It allows LAN clients behind a NAT Router to be totally exposed and accessible to the
WAN side in order to run special applications or set up a server.
DNS (Domain Name System)
Domain Name System explains where Internet domain names are located. In addition, it
translates Internet domain names into Internet Protocol (IP) addresses. A domain name
must be meaningful, so you can remember it easily for the access of websites.
Domain
It is a subnet work composed of a group of clients and servers.
DoS (Denial of Service)
Denial of Service attacks network devices and try to disable the devices.
Dynamic IP Address
Dynamic IP Address is automatically assigned to a client in a TCP/IP network by a
DHCP server in the network.
Encryption
A security method that applies a specific algorithm to data in order to alter the data
appearance and prevent other devices from reading the information.
ESS (Extended Service Set)
An ESS is composed of two or more BSS, and the users can roam in an ESS.
Ethernet
It is a common LAN protocol defined as the 802.3 standard by IEEE (Institute of
Electrical and Electronics Engineers). All clients in the network share the total bandwidth.
It could be 10 Mbps (Ethernet), 100 Mbps (Fast Ethernet) or 1000 Mbps (Gigabit
Ethernet).
FTP (File Transfer Protocol)
File Transfer Protocol enables you to transfer files in a bi-directional method over a
TCP/IP network.
Firewall
It is a mechanism that protects a network from attacks from the other networks. Also, it
can provide the Internet access control list that restricts clients?connection to other
networks.
Firmware
It is programming that is inserted into programmable read-only memory and becomes a
permanent part of a computing or network device.
Hardware
It is the physical part of PCs and network device.
HTTP (Hyper Text Transport Protocol) (WEB)
It is the protocol used to transmit and receive data over the World Wide Web. It can
establish connection with a Web server and transmit HTML pages to the client browser.
For instance, when you enter a domain name on your browser, you are actually sending
an HTTP request to a Web server for Web page information. After the Web server
receives your HTTP request, it will send the Web page to you by displaying it via the
browser.
ICMP (Internet Control Message Protocol)
It is a kind of TCP/IP protocol that sends the error message, the control message, and the
information messages to a network device. For instance, a router uses ICMP to notify the
sender that its destination node is not available. A ping utility can send ICMP echo
request to verify the existence of an IP address, too.
IP (Internet Protocol)
It is the Network Layer protocol in the TCP/IP communication and provides the basic
packet delivery for TCP/IP networks. It contains a network address and allows messages
to be routed to a different network or subnet.
IP Address
It is a 32-binary digit number that provides the source or destination information on the
Internet.
ISP (Internet Service Provider)
It is a company that provides individuals and companies the access to the Internet.
LAN (Local Area Network)
It consists a group of PCs and network devices that communicate with each other over a
network and share the resources of a single processor or server within a small geographic
area.
MAC Address (Media Access Control Address)
It is a unique number assigned to any Ethernet network device by the device manufacture.
It enables the network to identify the device at the hardware level.
NAT (Network Address Translation) (IP Sharing)
Network Address Translation can translate the source IP address of a LAN client to the IP
address of a WAN client before forwarding a packet from the LAN to the WAN. When
the packet returns, NAT translates the destination address from a WAN client to the
address of a LAN client before forwarding the packet back to the LAN client. When only
one WAN IP address is available, NAT can translate the only WAN IP address into
multiple LAN IP addresses for the LAN clients. Therefore the LAN clients “Share” the
only one WAN IP address, and it is called “IP Sharing”.
Port
It is a pathway of network device, such as a switch or a router. It can make connection
between the LAN and the WAN via the network device.
Port Number
In a TCP/IP network, a port number is assigned to an application program running in the
PC. The port number is included in the transmitted packets and will link the data to the
correct service. Well-known ports include port 21 for FTP and port 80 for HTTP.
PPPoE (Point to Point Protocol over Ethernet)
It enables a point-to-point connection to be established in the normally multipoint
architecture of Ethernet and is commonly implemented by xDSL box Internet Service
Provider for Dial-Up
Internet connections.
PPTP (Point to Point Tunneling Protocol)
It is a standard VPN protocol that secures a private network with encryption and
authentication of User ID and Password.
Router
It is a network device that divides a large network into small sub-networks, and that
transmits packets with a routing table.
Server
A server is the PC that enables its clients to access files stored in it, to make printing, and
to communicate within the same Ethernet network.
SMTP ( Simple Mail Transfer Protocol )
It is a standard e-mail protocol that defines the message format and manages the e-mail
transmission between e-mail servers.
Software
It is a series of instructions that tells the PC how to process the data.
Static IP Address
Static IP is also a WAN access type provided by some Internet Service Providers. You
need to enter the information of IP address, Subnet Mask, Default Gateway, Primary
DNS, and Secondary DNS IP Address.
Subnet Mask
It is a method used to split IP networks into a series of subnets.
Switch
It is a network device that transmits packets between nodes on the same network.
TCP/IP (Transmission Control Protocol / Internet Protocol)
It is a group of network standards that enable PCs of different operating systems to
communicate with each other across the network.
Telnet
Telnet is a terminal emulation protocol used commonly on the Internet and TCP/IP
network. It enables you to log on to a remote PC and to run a program on the remote PC
with an established account and password.
Virtual DMZ
Port forwarding all ports (1-65535) to a dedicated host in LAN.
Virtual Server (Port Forwarding)
A NAT Router can function as a Virtual Server that can forward the service packet
specified with a port number to the LAN host specified by the LAN IP address. In other
words, the Gateway can open the port for the service with specified port number and then
“forward” the port to a LAN host. Therefore it is called “Port Forwarding”, too.
VPN (Virtual Private Network)
It is a network security mechanism that secures the network data transmission via
tunneling, encryption, and authentication etc.
WAN (Wide Area Network)
It is a kind of network that covers a wide geographic area like a country.
WEP (Wired Equivalent Privacy)
A data privacy mechanism based on a 64-bit, or 128-bit shared key algorithm, as
described in the IEEE 802.11standard.
Wireless LAN
It is a network technology that uses the air to transmit data between wireless clients and
Access Points.

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.5
Linearized                      : No
Page Count                      : 29
Has XFA                         : No
XMP Toolkit                     : XMP toolkit 2.9.1-13, framework 1.6
About                           : uuid:e87d24f3-b96d-4a27-927a-bbd1bd8260b2
Modify Date                     : 2004:09:08 13:44:35-04:00
Create Date                     : 2004:09:08 13:44:25-04:00
Metadata Date                   : 2004:09:08 13:44:35-04:00
Document ID                     : uuid:deadb960-3b59-41c0-9aed-e425b20f4b9c
Format                          : application/pdf
Title                           : Microsoft Word - WLL-5410R manual.doc
Creator                         : ADOBEPS4.DRV Version 4.51
Author                          : linda
Producer                        : Acrobat Distiller 5.0.5 (Windows)
EXIF Metadata provided by EXIF.tools
FCC ID Filing: JCHWLL-5410R

Navigation menu