X Micro Technology XWL-11BRRG X-Micro WLAN 11b Boardband Router User Manual Manual

X-Micro Technology Corp., X-Micro WLAN 11b Boardband Router Manual

Contents

Users Manual 2

Download: X Micro Technology XWL-11BRRG X-Micro WLAN 11b Boardband Router User Manual Manual
Mirror Download [FCC.gov]X Micro Technology XWL-11BRRG X-Micro WLAN 11b Boardband Router User Manual Manual
Document ID371554
Application IDPm72OZqUg0NYZX4sprXg+A==
Document DescriptionUsers Manual 2
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize218.49kB (2731080 bits)
Date Submitted2003-11-06 00:00:00
Date Available2003-11-06 00:00:00
Creation Date2003-11-05 16:46:39
Producing SoftwareAcrobat Distiller 5.0 (Windows)
Document Lastmod2003-11-05 16:47:31
Document TitleMicrosoft Word - Manual.doc
Document CreatorPScript5.dll Version 5.2
Document Author: Stacy

USER’S MANUAL OF X-MICRO WLAN BROADBAND ROUTER
Version: 1.2
be assign a IP address from the range.
Click to open the Active DHCP Client Table window that
shows the active clients with their assigned IP address,
MAC address and time expired information.
802.11d Spanning Tree Select to enable or disable the IEEE 802.1d Spanning
Tree function from pull-down menu.
Clone MAC Address Fill in the MAC address that is the MAC address to be
cloned.
Clone MAC address is designed for your special
application that request the clients to register to a server
machine with one identified MAC address.
Since that all the clients will communicate outside world
through the X-Micro WLAN Broadband Router, so have
the cloned MAC address set on the X-Micro WLAN
Broadband Router will solve the issue.
Click the Apply Changes button to complete the new
Apply Changes
configuration setting.
Click the Reset button to abort change and recover the
Reset
previous configuration setting.
Show Client
3.3.7 WAN Interface Setup
This page is used to configure the parameters for wide area network that connects
to the WAN port of your X-Micro WLAN Broadband Router. Here you may
change the setting for IP address, PPPoE and DNS, etc.
Screenshot – WAN Interface Setup - 1
15
USER’S MANUAL OF X-MICRO WLAN BROADBAND ROUTER
Version: 1.2
Screenshot – WAN Interface Setup - 2
Item
Attain IP
Automatically (DHCP)
Fixed IP
IP Address
Subnet Mask
Default Gateway
PPPoE
User Name
Password
Connection Type
Description
Click to select DHCP support on WAN interface for IP
address assigned automatically from a DHCP server.
Click to select fixed IP support on WAN interface. There
are IP address, subnet mask and default gateway settings
need to be done.
If you select the fixed IP support on WAN interface, fill
in the IP address for it.
If you select the fixed IP support on WAN interface, fill
in the subnet mask for it.
If you select the fixed IP support on WAN interface, fill
in the default gateway for WAN interface out going data
packets.
Click to select PPPoE support on WAN interface. There
are user name, password, connection type and idle time
settings need to be done.
If you select the PPPoE support on WAN interface, fill in
the user name and password to login the PPPoE server.
If you select the PPPoE support on WAN interface, fill in
the user name and password to login the PPPoE server.
Select the connection type from pull-down menu. There
are Continuous, Connect on Demand and Manual three
types to select.
Continuous connection type means to setup the
16
USER’S MANUAL OF X-MICRO WLAN BROADBAND ROUTER
Idle Time
Attain DNS
Automatically
Set DNS Manually
DNS 1
DNS 2
DNS 3
Apply Changes
Reset
Version: 1.2
connection through PPPoE protocol whenever this XMicro WLAN Broadband Router is powered on.
Connect on Demand connection type means to setup the
connection through PPPoE protocol whenever you send
the data packets out through the WAN interface; there are
a watchdog implemented to close the PPPoE connection
while there are no data sent out longer than the idle time
set.
Manual connection type means to setup the connection
through the PPPoE protocol by clicking the Connect
button manually, and clicking the Disconnect button
manually.
If you select the PPPoE and Connect on Demand
connection type, fill in the idle time for auto-disconnect
function. Value can be between 1 and 1000 minutes.
Click to select getting DNS address for DHCP, PPPoE
support. Please select Set DNS Manually if the Fixed IP
support is selected.
Click to select getting DNS address for Fixed IP support.
Fill in the IP address of Domain Name Server 1.
Fill in the IP address of Domain Name Server 2.
Fill in the IP address of Domain Name Server 3.
Click the Apply Changes button to complete the new
configuration setting.
Click the Reset button to abort change and recover the
previous configuration setting.
3.3.8 Firewall - Port Filtering
Entries in this table are used to restrict certain types of data packets from your
local network to Internet through the Gateway. Use of such filters can be helpful
in securing or restricting your local network.
17
USER’S MANUAL OF X-MICRO WLAN BROADBAND ROUTER
Version: 1.2
Screenshot – Firewall - Port Filtering
Item
Enable Port Filtering
Port Range
Protocol
Comments
Apply Changes
Reset
Delete Selected
Delete All
Reset
Description
Click to enable the port filtering security function.
To restrict data transmission from the local network on
certain ports, fill in the range of start-port and end-port,
and the protocol, also put your comments on it.
The Protocol can be TCP, UDP or Both.
Comments let you know about whys to restrict data from
the ports.
Click the Apply Changes button to register the ports to
port filtering list.
Click the Reset button to abort change and recover the
previous configuration setting.
Click to delete the selected port range that will be
removed from the port-filtering list.
Click to delete all the registered entries from the portfiltering list.
Click the Reset button to abort change and recover the
previous configuration setting.
3.3.9 Firewall - IP Filtering
Entries in this table are used to restrict certain types of data packets from your
local network to Internet through the Gateway. Use of such filters can be helpful
in securing or restricting your local network.
18
USER’S MANUAL OF X-MICRO WLAN BROADBAND ROUTER
Version: 1.2
Screenshot – Firewall - IP Filtering
Item
Enable IP Filtering
Local IP Address
Protocol
Comments
Apply Changes
Reset
Delete Selected
Delete All
Reset
Description
Click to enable the IP filtering security function.
To restrict data transmission from local network on
certain IP addresses, fill in the IP address and the
protocol, also put your comments on it.
The Protocol can be TCP, UDP or Both.
Comments let you know about whys to restrict data from
the IP address.
Click the Apply Changes button to register the IP address
to IP filtering list.
Click the Reset button to abort change and recover the
previous configuration setting.
Click to delete the selected IP address that will be
removed from the IP-filtering list.
Click to delete all the registered entries from the IPfiltering list.
Click the Reset button to abort change and recover the
previous configuration setting.
3.3.10 Firewall - MAC Filtering
Entries in this table are used to restrict certain types of data packets from your
local network to Internet through the Gateway. Use of such filters can be helpful
in securing or restricting your local network.
19
USER’S MANUAL OF X-MICRO WLAN BROADBAND ROUTER
Version: 1.2
Screenshot – Firewall - MAC Filtering
Item
Enable MAC Filtering
MAC Address
Comments
Apply Changes
Reset
Delete Selected
Delete All
Reset
Description
Click to enable the MAC filtering security function.
To restrict data transmission from local network on
certain MAC addresses, fill in the MAC address and your
comments on it.
Comments let you know about whys to restrict data from
the MAC address.
Click the Apply Changes button to register the MAC
address to MAC filtering list.
Click the Reset button to abort change and recover the
previous configuration setting.
Click to delete the selected MAC address that will be
removed from the MAC-filtering list.
Click to delete all the registered entries from the MACfiltering list.
Click the Reset button to abort change and recover the
previous configuration setting.
3.3.11 Firewall - Port Forwarding
Entries in this table allow you to automatically redirect common network services
to a specific machine behind the NAT firewall. These settings are only necessary
if you wish to host some sort of server like a web server or mail server on the
private local network behind your Gateway's NAT firewall.
20
USER’S MANUAL OF X-MICRO WLAN BROADBAND ROUTER
Version: 1.2
Screenshot – Firewall - Port Forwarding
Item
Enable Port
Forwarding
IP Address
Protocol
Port Range
Comment
Apply Changes
Reset
Delete Selected
Delete All
Reset
Description
Click to enable the Port Forwarding security function.
To forward data packets coming from WAN to a specific
IP address that hosted in local network behind the NAT
firewall, fill in the IP address, protocol, port range and
your comments.
The Protocol can be TCP, UDP or Both.
The Port Range for data transmission.
Comments let you know about whys to allow data
packets forward to the IP address and port number.
Click the Apply Changes button to register the IP address
and port number to Port forwarding list.
Click the Reset button to abort change and recover the
previous configuration setting.
Click to delete the selected IP address and port number
that will be removed from the port-forwarding list.
Click to delete all the registered entries from the portforwarding list.
Click the Reset button to abort change and recover the
previous configuration setting.
3.3.12 Firewall - DMZ
A Demilitarized Zone is used to provide Internet services without sacrificing
21
USER’S MANUAL OF X-MICRO WLAN BROADBAND ROUTER
Version: 1.2
unauthorized access to its local private network. Typically, the DMZ host contains
devices accessible to Internet traffic, such as Web (HTTP ) servers, FTP servers,
SMTP (e-mail) servers and DNS servers.
Screenshot – Firewall - DMZ
Item
Description
Click to enable the DMZ function.
Enable DMZ
DMZ Host IP Address To support DMZ in your firewall design, fill in the IP
address of DMZ host that can be access from the WAN
interface.
Click the Apply Changes button to register the IP address
Apply Changes
of DMZ host.
Click the Reset button to abort change and recover the
Reset
previous configuration setting.
3.3.13 Statistics
This page shows the packet counters for transmission and reception regarding to
wireless, Ethernet LAN and Ethernet WAN networks.
22
USER’S MANUAL OF X-MICRO WLAN BROADBAND ROUTER
Version: 1.2
Screenshot – Statistics
Item
Wireless LAN
Sent Packets
Wireless LAN
Received Packets
Ethernet LAN
Sent Packets
Ethernet LAN
Received Packets
Ethernet WAN
Sent Packets
Ethernet WAN
Received Packets
Refresh
Description
It shows the statistic count of sent packets on the wireless
LAN interface.
It shows the statistic count of received packets on the
wireless LAN interface.
It shows the statistic count of sent packets on the
Ethernet LAN interface.
It shows the statistic count of received packets on the
Ethernet LAN interface.
It shows the statistic count of sent packets on the
Ethernet WAN interface.
It shows the statistic count of received packets on the
Ethernet WAN interface.
Click the refresh the statistic counters on the screen.
3.3.14 Upgrade Firmware
This page allows you upgrade the Access Point firmware to new version. Please
note, do not power off the device during the upload because it may crash the
system.
23
USER’S MANUAL OF X-MICRO WLAN BROADBAND ROUTER
Version: 1.2
Screenshot – Upgrade Firmware
Item
Select File
Upload
Reset
Description
Click the Browse button to select the new version of web
firmware image file.
Click the Upload button to update the selected web
firmware image to the X-Micro WLAN Broadband
Router.
Click the Reset button to abort change and recover the
previous configuration setting.
3.3.15 Save/ Reload Settings
This page allows you save current settings to a file or reload the settings from the
file that was saved previously. Besides, you could reset the current configuration
to factory default.
24
USER’S MANUAL OF X-MICRO WLAN BROADBAND ROUTER
Version: 1.2
Screenshot – Save/Reload Settings
Item
Save Settings to File
Load Settings from
File
Reset Settings to
Default
Description
Click the Save button to download the configuration
parameters to your personal computer.
Click the Browse button to select the configuration files
then click the Upload button to update the selected
configuration to the X-Micro WLAN Broadband Router.
Click the Reset button to reset the configuration
parameter to factory defaults.
3.3.16 Password Setup
This page is used to set the account to access the web server of Access Point.
Empty user name and password will disable the protection.
25
USER’S MANUAL OF X-MICRO WLAN BROADBAND ROUTER
Version: 1.2
Screenshot – Password Setup
Item
User Name
New Password
Confirmed Password
Apply Changes
Reset
Description
Fill in the user name for web management login control.
Fill in the password for web management login control.
Because the password input is invisible, so please fill in
the password again for confirmation purpose.
Clear the User Name and Password fields to empty,
means to apply no web management login control.
Click the Apply Changes button to complete the new
configuration setting.
Click the Reset button to abort change and recover the
previous configuration setting.
26
USER’S MANUAL OF X-MICRO WLAN BROADBAND ROUTER
Version: 1.2
4 Frequently Asked Questions (FAQ)
4.1 What and how to find my PC’s IP and MAC address?
IP address is the identifier for a computer or device on a TCP/IP network. Networks
using the TCP/IP protocol route messages based on the IP address of the destination.
The format of an IP address is a 32-bit numeric address written as four numbers
separated by periods. Each number can be zero to 255. For example, 191.168.1.254
could be an IP address.
The MAC (Media Access Control) address is your computer's unique hardware number.
(On an Ethernet LAN, it's the same as your Ethernet address.) When you're connected to
the Internet from your computer (or host as the Internet protocol thinks of it), a
correspondence table relates your IP address to your computer's physical (MAC) address
on the LAN.
To find your PC’s IP and MAC address,
9 Open the Command program in the Microsoft Windows.
9 Type in ipconfig /all then press the Enter button.
¾
Your PC’s IP address is the one entitled IP Address and your PC’s MAC address is
the one entitled Physical Address.
4.2 What is Wireless LAN?
A wireless LAN (WLAN) is a network that allows access to Internet without the need
for any wired connections to the user’s machine.
4.3 What are ISM bands?
ISM stands for Industrial, Scientific and Medical; radio frequency bands that the Federal
Communications Commission (FCC) authorized for wireless LANs. The ISM bands are
located at 915 +/- 13 MHz, 2450 +/- 50 MHz and 5800 +/- 75 MHz.
4.4 How does wireless networking work?
The 802.11 standard define two modes: infrastructure mode and ad hoc mode. In
infrastructure mode, the wireless network consists of at least one access point connected
to the wired network infrastructure and a set of wireless end stations. This configuration
is called a Basic Service Set (BSS). An Extended Service Set (ESS) is a set of two or
more BSSs forming a single subnetwork. Since most corporate WLANs require access
27
USER’S MANUAL OF X-MICRO WLAN BROADBAND ROUTER
Version: 1.2
to the wired LAN for services (file servers, printers, Internet links) they will operate in
infrastructure mode.
Example 1: wireless Infrastructure Mode
Ad hoc mode (also called peer-to-peer mode or an Independent Basic Service Set, or
IBSS) is simply a set of 802.11 wireless stations that communicate directly with one
another without using an access point or any connection to a wired network. This mode
is useful for quickly and easily setting up a wireless network anywhere that a wireless
infrastructure does not exist or is not required for services, such as a hotel room,
convention center, or airport, or where access to the wired network is barred (such as for
consultants at a client site).
Example 2: wireless Ad Hoc Mode
4.5 What is BSSID?
A six-byte address that distinguishes a particular a particular access point from others.
Also know as just SSID. Serves as a network ID or name.
4.6 What is ESSID?
The Extended Service Set ID (ESSID) is the name of the network you want to access. It
is used to identify different wireless networks.
28
USER’S MANUAL OF X-MICRO WLAN BROADBAND ROUTER
Version: 1.2
4.7 What are potential factors that may causes interference?
Factors of interference:
¾ Obstacles: walls, ceilings, furniture… etc.
¾ Building Materials: metal door, aluminum studs.
¾ Electrical devices: microwaves, monitors and electrical motors.
Solutions to overcome the interferences:
9 Minimizing the number of walls and ceilings.
9 Position the WLAN antenna for best reception.
9 Keep WLAN devices away from other electrical devices, eg: microwaves,
monitors, electric motors, … etc.
9 Add additional WLAN Access Points if necessary.
4.8 What are the Open System and Shared Key authentications?
IEEE 802.11 supports two subtypes of network authentication services: open system and
shared key. Under open system authentication, any wireless station can request
authentication. The station that needs to authenticate with another wireless station sends
an authentication management frame that contains the identity of the sending station.
The receiving station then returns a frame that indicates whether it recognizes the
sending station. Under shared key authentication, each wireless station is assumed to
have received a secret shared key over a secure channel that is independent from the
802.11 wireless network communications channel.
4.9 What is WEP?
An optional IEEE 802.11 function that offers frame transmission privacy similar to a
wired network. The Wired Equivalent Privacy generates secret shared encryption keys
that both source and destination stations can use to alert frame bits to avoid disclosure to
eavesdroppers.
WEP relies on a secret key that is shared between a mobile station (e.g. a laptop with a
wireless Ethernet card) and an access point (i.e. a base station). The secret key is used to
encrypt packets before they are transmitted, and an integrity check is used to ensure that
packets are not modified in transit.
4.10 What is Fragment Threshold?
The proposed protocol uses the frame fragmentation mechanism defined in IEEE 802.11
to achieve parallel transmissions. A large data frame is fragmented into several
29
USER’S MANUAL OF X-MICRO WLAN BROADBAND ROUTER
Version: 1.2
fragments each of size equal to fragment threshold. By tuning the fragment threshold
value, we can get varying fragment sizes. The determination of an efficient fragment
threshold is an important issue in this scheme. If the fragment threshold is small, the
overlap part of the master and parallel transmissions is large. This means the spatial
reuse ratio of parallel transmissions is high. In contrast, with a large fragment threshold,
the overlap is small and the spatial reuse ratio is low. However high fragment threshold
leads to low fragment overhead. Hence there is a trade-off between spatial re-use and
fragment overhead.
Fragment threshold is the maximum packet size used for fragmentation. Packets larger
than the size programmed in this field will be fragmented.
If you find that your corrupted packets or asymmetric packet reception (all send packets,
for example). You may want to try lowering your fragmentation threshold. This will
cause packets to be broken into smaller fragments. These small fragments, if corrupted,
can be resent faster than a larger fragment. Fragmentation increases overhead, so you'll
want to keep this value as close to the maximum value as possible.
4.11 What is RTS (Request To Send) Threshold?
The RTS threshold is the packet size at which packet transmission is governed by the
RTS/CTS transaction. The IEEE 802.11-1997 standard allows for short packets to be
transmitted without RTS/CTS transactions. Each station can have a different RTS
threshold. RTS/CTS is used when the data packet size exceeds the defined RTS
threshold. With the CSMA/CA transmission mechanism, the transmitting station sends
out an RTS packet to the receiving station, and waits for the receiving station to send
back a CTS (Clear to Send) packet before sending the actual packet data.
This setting is useful for networks with many clients. With many clients, and a high
network load, there will be many more collisions. By lowering the RTS threshold, there
may be fewer collisions, and performance should improve. Basically, with a faster RTS
threshold, the system can recover from problems faster. RTS packets consume valuable
bandwidth, however, so setting this value too low will limit performance.
4.12 What is Beacon Interval?
In addition to data frames that carry information from higher layers, 802.11 includes
management and control frames that support data transfer. The beacon frame, which is a
type of management frame, provides the "heartbeat" of a wireless LAN, enabling
30
USER’S MANUAL OF X-MICRO WLAN BROADBAND ROUTER
Version: 1.2
stations to establish and maintain communications in an orderly fashion.
Beacon Interval represents the amount of time between beacon transmissions. Before a
station enters power save mode, the station needs the beacon interval to know when to
wake up to receive the beacon (and learn whether there are buffered frames at the access
point).
4.13 What is Preamble Type?
There are two preamble types defined in IEEE 802.11 specification. A long preamble
basically gives the decoder more time to process the preamble. All 802.11 devices
support a long preamble. The short preamble is designed to improve efficiency (for
example, for VoIP systems). The difference between the two is in the Synchronization
field. The long preamble is 128 bits, and the short is 56 bits.
4.14 What is SSID Broadcast?
Broadcast of SSID is done in access points by the beacon. This announces your access
point (including various bits of information about it) to the wireless world around it. By
disabling that feature, the SSID configured in the client must match the SSID of the
access point.
Some wireless devices don't work properly if SSID isn't broadcast (for example the Dlink DWL-120 USB 802.11b adapter). Generally if your client hardware supports
operation with SSID disabled, it's not a bad idea to run that way to enhance network
security. However it's no replacement for WEP, MAC filtering or other protections.
31
75-115100-01

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.4
Linearized                      : No
Encryption                      : Standard V1.2 (40-bit)
User Access                     : Print, Copy, Fill forms, Extract, Assemble, Print high-res
Modify Date                     : 2003:11:05 16:47:31+08:00
Create Date                     : 2003:11:05 16:46:39+08:00
Title                           : Microsoft Word - Manual.doc
Author                          : Stacy
Creator                         : PScript5.dll Version 5.2
Producer                        : Acrobat Distiller 5.0 (Windows)
Page Count                      : 18
Mod Date                        : 2003:11:05 16:47:31+08:00
Creation Date                   : 2003:11:05 16:46:39+08:00
Metadata Date                   : 2003:11:05 16:47:31+08:00
EXIF Metadata provided by EXIF.tools
FCC ID Filing: RAFXWL-11BRRG

Navigation menu