X Micro Technology XWL-11BRRG X-Micro WLAN 11b Boardband Router User Manual Manual

X-Micro Technology Corp., X-Micro WLAN 11b Boardband Router Manual

Contents

Users Manual 2

USER’S MANUAL OF X-MICRO WLAN BROADBAND ROUTER Version: 1.215be assign a IP address from the range.Show Client Click to open the Active DHCP Client Table window thatshows the active clients with their assigned IP address,MAC address and time expired information.802.11d Spanning Tree Select to enable or disable the IEEE 802.1d SpanningTree function from pull-down menu.Clone MAC Address Fill in the MAC address that is the MAC address to becloned.Clone MAC address is designed for your specialapplication that request the clients to register to a servermachine with one identified MAC address.Since that all the clients will communicate outside worldthrough the X-Micro WLAN Broadband Router, so havethe cloned MAC address set on the X-Micro WLANBroadband Router will solve the issue.Apply Changes Click the Apply Changes button to complete the newconfiguration setting.Reset Click the Reset button to abort change and recover theprevious configuration setting.3.3.7 WAN Interface SetupThis page is used to configure the parameters for wide area network that connectsto the WAN port of your X-Micro WLAN Broadband Router. Here you maychange the setting for IP address, PPPoE and DNS, etc.Screenshot – WAN Interface Setup - 1
USER’S MANUAL OF X-MICRO WLAN BROADBAND ROUTER Version: 1.216Screenshot – WAN Interface Setup - 2Item DescriptionAttain IPAutomatically (DHCP)Click to select DHCP support on WAN interface for IPaddress assigned automatically from a DHCP server.Fixed IP Click to select fixed IP support on WAN interface. Thereare IP address, subnet mask and default gateway settingsneed to be done.IP Address If you select the fixed IP support on WAN interface, fillin the IP address for it.Subnet Mask If you select the fixed IP support on WAN interface, fillin the subnet mask for it.Default Gateway If you select the fixed IP support on WAN interface, fillin the default gateway for WAN interface out going datapackets.PPPoE Click to select PPPoE support on WAN interface. Thereare user name, password, connection type and idle timesettings need to be done.User Name If you select the PPPoE support on WAN interface, fill inthe user name and password to login the PPPoE server.Password If you select the PPPoE support on WAN interface, fill inthe user name and password to login the PPPoE server.Connection Type Select the connection type from pull-down menu. Thereare Continuous, Connect on Demand and Manual threetypes to select.Continuous connection type means to setup the
USER’S MANUAL OF X-MICRO WLAN BROADBAND ROUTER Version: 1.217connection through PPPoE protocol whenever this X-Micro WLAN Broadband Router is powered on.Connect on Demand connection type means to setup theconnection through PPPoE protocol whenever you sendthe data packets out through the WAN interface; there area watchdog implemented to close the PPPoE connectionwhile there are no data sent out longer than the idle timeset.Manual connection type means to setup the connectionthrough the PPPoE protocol by clicking the Connectbutton manually, and clicking the Disconnect buttonmanually.Idle Time If you select the PPPoE and Connect on Demandconnection type, fill in the idle time for auto-disconnectfunction. Value can be between 1 and 1000 minutes.Attain DNSAutomaticallyClick to select getting DNS address for DHCP, PPPoEsupport. Please select Set DNS Manually if the Fixed IPsupport is selected.Set DNS Manually Click to select getting DNS address for Fixed IP support.DNS 1 Fill in the IP address of Domain Name Server 1.DNS 2 Fill in the IP address of Domain Name Server 2.DNS 3 Fill in the IP address of Domain Name Server 3.Apply Changes Click the Apply Changes button to complete the newconfiguration setting.Reset Click the Reset button to abort change and recover theprevious configuration setting.3.3.8 Firewall - Port FilteringEntries in this table are used to restrict certain types of data packets from yourlocal network to Internet through the Gateway. Use of such filters can be helpfulin securing or restricting your local network.
USER’S MANUAL OF X-MICRO WLAN BROADBAND ROUTER Version: 1.218Screenshot – Firewall - Port FilteringItem DescriptionEnable Port Filtering Click to enable the port filtering security function.Port RangeProtocolCommentsTo restrict data transmission from the local network oncertain ports, fill in the range of start-port and end-port,and the protocol, also put your comments on it.The Protocol can be TCP, UDP or Both.Comments let you know about whys to restrict data fromthe ports.Apply Changes Click the Apply Changes button to register the ports toport filtering list.Reset Click the Reset button to abort change and recover theprevious configuration setting.Delete Selected Click to delete the selected port range that will beremoved from the port-filtering list.Delete All Click to delete all the registered entries from the port-filtering list.Reset Click the Reset button to abort change and recover theprevious configuration setting.3.3.9 Firewall - IP FilteringEntries in this table are used to restrict certain types of data packets from yourlocal network to Internet through the Gateway. Use of such filters can be helpfulin securing or restricting your local network.
USER’S MANUAL OF X-MICRO WLAN BROADBAND ROUTER Version: 1.219Screenshot – Firewall - IP FilteringItem DescriptionEnable IP Filtering Click to enable the IP filtering security function.Local IP AddressProtocolCommentsTo restrict data transmission from local network oncertain IP addresses, fill in the IP address and theprotocol, also put your comments on it.The Protocol can be TCP, UDP or Both.Comments let you know about whys to restrict data fromthe IP address.Apply Changes Click the Apply Changes button to register the IP addressto IP filtering list.Reset Click the Reset button to abort change and recover theprevious configuration setting.Delete Selected Click to delete the selected IP address that will beremoved from the IP-filtering list.Delete All Click to delete all the registered entries from the IP-filtering list.Reset Click the Reset button to abort change and recover theprevious configuration setting.3.3.10 Firewall - MAC FilteringEntries in this table are used to restrict certain types of data packets from yourlocal network to Internet through the Gateway. Use of such filters can be helpfulin securing or restricting your local network.
USER’S MANUAL OF X-MICRO WLAN BROADBAND ROUTER Version: 1.220Screenshot – Firewall - MAC FilteringItem DescriptionEnable MAC Filtering Click to enable the MAC filtering security function.MAC AddressCommentsTo restrict data transmission from local network oncertain MAC addresses, fill in the MAC address and yourcomments on it.Comments let you know about whys to restrict data fromthe MAC address.Apply Changes Click the Apply Changes button to register the MACaddress to MAC filtering list.Reset Click the Reset button to abort change and recover theprevious configuration setting.Delete Selected Click to delete the selected MAC address that will beremoved from the MAC-filtering list.Delete All Click to delete all the registered entries from the MAC-filtering list.Reset Click the Reset button to abort change and recover theprevious configuration setting.3.3.11 Firewall - Port ForwardingEntries in this table allow you to automatically redirect common network servicesto a specific machine behind the NAT firewall. These settings are only necessaryif you wish to host some sort of server like a web server or mail server on theprivate local network behind your Gateway's NAT firewall.
USER’S MANUAL OF X-MICRO WLAN BROADBAND ROUTER Version: 1.221Screenshot – Firewall - Port ForwardingItem DescriptionEnable PortForwardingClick to enable the Port Forwarding security function.IP AddressProtocolPort RangeCommentTo forward data packets coming from WAN to a specificIP address that hosted in local network behind the NATfirewall, fill in the IP address, protocol, port range andyour comments.The Protocol can be TCP, UDP or Both.The Port Range for data transmission.Comments let you know about whys to allow datapackets forward to the IP address and port number.Apply Changes Click the Apply Changes button to register the IP addressand port number to Port forwarding list.Reset Click the Reset button to abort change and recover theprevious configuration setting.Delete Selected Click to delete the selected IP address and port numberthat will be removed from the port-forwarding list.Delete All Click to delete all the registered entries from the port-forwarding list.Reset Click the Reset button to abort change and recover theprevious configuration setting.3.3.12 Firewall - DMZA Demilitarized Zone is used to provide Internet services without sacrificing
USER’S MANUAL OF X-MICRO WLAN BROADBAND ROUTER Version: 1.222unauthorized access to its local private network. Typically, the DMZ host containsdevices accessible to Internet traffic, such as Web (HTTP ) servers, FTP servers,SMTP (e-mail) servers and DNS servers.Screenshot – Firewall - DMZItem DescriptionEnable DMZ Click to enable the DMZ function.DMZ Host IP Address To support DMZ in your firewall design, fill in the IPaddress of DMZ host that can be access from the WANinterface.Apply Changes Click the Apply Changes button to register the IP addressof DMZ host.Reset Click the Reset button to abort change and recover theprevious configuration setting.3.3.13 StatisticsThis page shows the packet counters for transmission and reception regarding towireless, Ethernet LAN and Ethernet WAN networks.
USER’S MANUAL OF X-MICRO WLAN BROADBAND ROUTER Version: 1.223Screenshot – StatisticsItem DescriptionWireless LANSent PacketsIt shows the statistic count of sent packets on the wirelessLAN interface.Wireless LANReceived PacketsIt shows the statistic count of received packets on thewireless LAN interface.Ethernet LANSent PacketsIt shows the statistic count of sent packets on theEthernet LAN interface.Ethernet LANReceived PacketsIt shows the statistic count of received packets on theEthernet LAN interface.Ethernet WANSent PacketsIt shows the statistic count of sent packets on theEthernet WAN interface.Ethernet WANReceived PacketsIt shows the statistic count of received packets on theEthernet WAN interface.Refresh Click the refresh the statistic counters on the screen.3.3.14 Upgrade FirmwareThis page allows you upgrade the Access Point firmware to new version. Pleasenote, do not power off the device during the upload because it may crash thesystem.
USER’S MANUAL OF X-MICRO WLAN BROADBAND ROUTER Version: 1.224Screenshot – Upgrade FirmwareItem DescriptionSelect File Click the Browse button to select the new version of webfirmware image file.Upload Click the Upload button to update the selected webfirmware image to the X-Micro WLAN BroadbandRouter.Reset Click the Reset button to abort change and recover theprevious configuration setting.3.3.15 Save/ Reload SettingsThis page allows you save current settings to a file or reload the settings from thefile that was saved previously. Besides, you could reset the current configurationto factory default.
USER’S MANUAL OF X-MICRO WLAN BROADBAND ROUTER Version: 1.225Screenshot – Save/Reload SettingsItem DescriptionSave Settings to File Click the Save button to download the configurationparameters to your personal computer.Load Settings fromFileClick the Browse button to select the configuration filesthen click the Upload button to update the selectedconfiguration to the X-Micro WLAN Broadband Router.Reset Settings toDefaultClick the Reset button to reset the configurationparameter to factory defaults.3.3.16 Password SetupThis page is used to set the account to access the web server of Access Point.Empty user name and password will disable the protection.
USER’S MANUAL OF X-MICRO WLAN BROADBAND ROUTER Version: 1.226Screenshot – Password SetupItem DescriptionUser Name Fill in the user name for web management login control.New Password Fill in the password for web management login control.Confirmed Password Because the password input is invisible, so please fill inthe password again for confirmation purpose.Apply Changes Clear the User Name and Password fields to empty,means to apply no web management login control.Click the Apply Changes button to complete the newconfiguration setting.Reset Click the Reset button to abort change and recover theprevious configuration setting.
USER’S MANUAL OF X-MICRO WLAN BROADBAND ROUTER Version: 1.2274 Frequently Asked Questions (FAQ)4.1 What and how to find my PC’s IP and MAC address?IP address is the identifier for a computer or device on a TCP/IP network. Networksusing the TCP/IP protocol route messages based on the IP address of the destination.The format of an IP address is a 32-bit numeric address written as four numbersseparated by periods. Each number can be zero to 255. For example, 191.168.1.254could be an IP address.The MAC (Media Access Control) address is your computer's unique hardware number.(On an Ethernet LAN, it's the same as your Ethernet address.) When you're connected tothe Internet from your computer (or host as the Internet protocol thinks of it), acorrespondence table relates your IP address to your computer's physical (MAC) addresson the LAN.To find your PC’s IP and MAC address,9 Open the Command program in the Microsoft Windows.9 Type in ipconfig /all then press the Enter button.¾ Your PC’s IP address is the one entitled IP Address and your PC’s MAC address isthe one entitled Physical Address.4.2 What is Wireless LAN?A wireless LAN (WLAN) is a network that allows access to Internet without the needfor any wired connections to the user’s machine.4.3 What are ISM bands?ISM stands for Industrial, Scientific and Medical; radio frequency bands that the FederalCommunications Commission (FCC) authorized for wireless LANs. The ISM bands arelocated at 915 +/- 13 MHz, 2450 +/- 50 MHz and 5800 +/- 75 MHz.4.4 How does wireless networking work?The 802.11 standard define two modes: infrastructure mode and ad hoc mode. Ininfrastructure mode, the wireless network consists of at least one access point connectedto the wired network infrastructure and a set of wireless end stations. This configurationis called a Basic Service Set (BSS). An Extended Service Set (ESS) is a set of two ormore BSSs forming a single subnetwork. Since most corporate WLANs require access
USER’S MANUAL OF X-MICRO WLAN BROADBAND ROUTER Version: 1.228to the wired LAN for services (file servers, printers, Internet links) they will operate ininfrastructure mode.Example 1: wireless Infrastructure ModeAd hoc mode (also called peer-to-peer mode or an Independent Basic Service Set, orIBSS) is simply a set of 802.11 wireless stations that communicate directly with oneanother without using an access point or any connection to a wired network. This modeis useful for quickly and easily setting up a wireless network anywhere that a wirelessinfrastructure does not exist or is not required for services, such as a hotel room,convention center, or airport, or where access to the wired network is barred (such as forconsultants at a client site).Example 2: wireless Ad Hoc Mode4.5 What is BSSID?A six-byte address that distinguishes a particular a particular access point from others.Also know as just SSID. Serves as a network ID or name.4.6 What is ESSID?The Extended Service Set ID (ESSID) is the name of the network you want to access. Itis used to identify different wireless networks.
USER’S MANUAL OF X-MICRO WLAN BROADBAND ROUTER Version: 1.2294.7 What are potential factors that may causes interference?Factors of interference:¾ Obstacles: walls, ceilings, furniture… etc.¾ Building Materials: metal door, aluminum studs.¾ Electrical devices: microwaves, monitors and electrical motors.Solutions to overcome the interferences:9 Minimizing the number of walls and ceilings.9 Position the WLAN antenna for best reception.9 Keep WLAN devices away from other electrical devices, eg: microwaves,monitors, electric motors, … etc.9 Add additional WLAN Access Points if necessary.4.8 What are the Open System and Shared Key authentications?IEEE 802.11 supports two subtypes of network authentication services: open system andshared key. Under open system authentication, any wireless station can requestauthentication. The station that needs to authenticate with another wireless station sendsan authentication management frame that contains the identity of the sending station.The receiving station then returns a frame that indicates whether it recognizes thesending station. Under shared key authentication, each wireless station is assumed tohave received a secret shared key over a secure channel that is independent from the802.11 wireless network communications channel.4.9 What is WEP?An optional IEEE 802.11 function that offers frame transmission privacy similar to awired network. The Wired Equivalent Privacy generates secret shared encryption keysthat both source and destination stations can use to alert frame bits to avoid disclosure toeavesdroppers.WEP relies on a secret key that is shared between a mobile station (e.g. a laptop with awireless Ethernet card) and an access point (i.e. a base station). The secret key is used toencrypt packets before they are transmitted, and an integrity check is used to ensure thatpackets are not modified in transit.4.10 What is Fragment Threshold?The proposed protocol uses the frame fragmentation mechanism defined in IEEE 802.11to achieve parallel transmissions. A large data frame is fragmented into several
USER’S MANUAL OF X-MICRO WLAN BROADBAND ROUTER Version: 1.230fragments each of size equal to fragment threshold. By tuning the fragment thresholdvalue, we can get varying fragment sizes. The determination of an efficient fragmentthreshold is an important issue in this scheme. If the fragment threshold is small, theoverlap part of the master and parallel transmissions is large. This means the spatialreuse ratio of parallel transmissions is high. In contrast, with a large fragment threshold,the overlap is small and the spatial reuse ratio is low. However high fragment thresholdleads to low fragment overhead. Hence there is a trade-off between spatial re-use andfragment overhead.Fragment threshold is the maximum packet size used for fragmentation. Packets largerthan the size programmed in this field will be fragmented.If you find that your corrupted packets or asymmetric packet reception (all send packets,for example). You may want to try lowering your fragmentation threshold. This willcause packets to be broken into smaller fragments. These small fragments, if corrupted,can be resent faster than a larger fragment. Fragmentation increases overhead, so you'llwant to keep this value as close to the maximum value as possible.4.11 What is RTS (Request To Send) Threshold?The RTS threshold is the packet size at which packet transmission is governed by theRTS/CTS transaction. The IEEE 802.11-1997 standard allows for short packets to betransmitted without RTS/CTS transactions. Each station can have a different RTSthreshold. RTS/CTS is used when the data packet size exceeds the defined RTSthreshold. With the CSMA/CA transmission mechanism, the transmitting station sendsout an RTS packet to the receiving station, and waits for the receiving station to sendback a CTS (Clear to Send) packet before sending the actual packet data.This setting is useful for networks with many clients. With many clients, and a highnetwork load, there will be many more collisions. By lowering the RTS threshold, theremay be fewer collisions, and performance should improve. Basically, with a faster RTSthreshold, the system can recover from problems faster. RTS packets consume valuablebandwidth, however, so setting this value too low will limit performance.4.12 What is Beacon Interval?In addition to data frames that carry information from higher layers, 802.11 includesmanagement and control frames that support data transfer. The beacon frame, which is atype of management frame, provides the "heartbeat" of a wireless LAN, enabling
USER’S MANUAL OF X-MICRO WLAN BROADBAND ROUTER Version: 1.231stations to establish and maintain communications in an orderly fashion.Beacon Interval represents the amount of time between beacon transmissions. Before astation enters power save mode, the station needs the beacon interval to know when towake up to receive the beacon (and learn whether there are buffered frames at the accesspoint).4.13 What is Preamble Type?There are two preamble types defined in IEEE 802.11 specification. A long preamblebasically gives the decoder more time to process the preamble. All 802.11 devicessupport a long preamble. The short preamble is designed to improve efficiency (forexample, for VoIP systems). The difference between the two is in the Synchronizationfield. The long preamble is 128 bits, and the short is 56 bits.4.14 What is SSID Broadcast?Broadcast of SSID is done in access points by the beacon. This announces your accesspoint (including various bits of information about it) to the wireless world around it. Bydisabling that feature, the SSID configured in the client must match the SSID of theaccess point.Some wireless devices don't work properly if SSID isn't broadcast (for example the D-link DWL-120 USB 802.11b adapter). Generally if your client hardware supportsoperation with SSID disabled, it's not a bad idea to run that way to enhance networksecurity. However it's no replacement for WEP, MAC filtering or other protections.
75-115100-01

Navigation menu