High-Performance Wireless Router User’s Manual 2003/06/10
Broadband Security Router User Guide FCC Interference Statement This device complies with Part 15 of FCC rule. Operation is subject to the following two conditions: This device may not cause harmful interference. This device must accept any interference received, including interference that may cause undesired operation. This High-Performance Wireless Router has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules.
Broadband Security Router User Guide Table of Contents Preface ....................................................................................................................................... 1 Chapter 1: Introduction........................................................................................................... 3 About The High-Performance Wireless Router ......................................................... 3 Features ................................................................
Broadband Security Router User Guide Chapter 7: Trouble Shooting ................................................................................................ 51 Hardware .................................................................................................................. 51 Client Side (Computers)........................................................................................... 52 Appendix A: Technical Specifications.................................................................
Broadband Security Router User Guide Preface Congratulations on your purchase of this High-Performance Wireless Router. This router is the perfect design product combining wireless and Ethernet network technology together. Fully compatible with IEEE 802.11b wireless standard, this device not only allows you to take advantage of mobility, but also to have fast Ethernet connection with built-in four 10/100 auto-sensing switch Ethernet ports.
Broadband Security Router User Guide applications illustrations of the High-Performance Wireless Router. Chapter 2: Hardware Installation & Setup This chapter describes the steps for the hardware installation of the High-Performance Wireless Router. Chapter 3: Internet Access This chapter describes the steps for the basic configuration and start up of the High-Performance Wireless Router.
Broadband Security Router User Guide Chapter 1: Introduction This chapter describes the package contents and provides a list of features and application illustrations of the High-Performance Wireless Router. About The High-Performance Wireless Router High-Performance Wireless Router is a hybrid design product which combines Ethernet technology and wireless access into a single stand-alone unit. The device allows you take advantages of both mobility and fast connection.
Broadband Security Router User Guide solution for mobile workers to access network resource and for setting a temporary LAN when necessary Wireless LANs can be set as “Aad-hoc” network and “Infrastructure” network. Unlike the “Aad-hoc network”, where users on the LAN send data directly to each other, the “Infrastructure” network includes an access point and users on the “Infrastructure” network send data to that dedicated access point.
Broadband Security Router User Guide Package Contents After carefully unpacking the shipping carton, check the contents listed below.
Broadband Security Router User Guide -6-
Broadband Security Router User Guide Chapter 2: Installation This chapter provides information about your High-Performance Wireless Router’s physical features and gives step-by-step installation instructions for hardware installation and software configuration. Front Panel The following figure shows the front view of the High-Performance Wireless Router. The LEDs on the front panel indicate the status of the unit. You can easily view the operation of your High-Performance Wireless Router from this panel.
Broadband Security Router User Guide Rear Panel & Connections The following figure shows the rear view of the High-Performance Wireless Router and illustrates how the cables connect to the interfaces on the rear panel. 1. Plug one end of the UTP cable into the WAN port, the other into the RJ45 Ethernet jack on your ADSL or Cable modem. 2. Connect a PC, which must has an Ethernet NIC (Network Interface Card) installed, to one of the LAN Ports. 3.
Broadband Security Router User Guide Setting Up the TCP/IP Protocol If you are not sure whether the TCP/IP Protocol has been installed, follow these steps to check, and if necessary, install TCP/IP onto your PCs. 1. Click the “Start” button. Choose “Settings”, then “Control Panel”. Double-click the “Network” icon. Your Network window should appear as follows: 2. Select the “Configuration” tab.
Broadband Security Router User Guide In the “Local Area Connection Status” window, click the “Properties” button then your Network window will appear. There is only one tab, “General”, in the Network window. 3. Check whether the TCP/IP Protocol has already been installed onto your computer’s Ethernet card. Note that TCP/IP Protocol can be installed for a computer’s Dial-Up Adapter as well as for the Ethernet card. - If yes, go to step 7. - If no, click the “Add” button. 4.
Broadband Security Router User Guide 5. Highlight “Microsoft” under the list of manufacturers. Double-click “TCP/IP” from the list on the right or highlight “TCP/IP” then click “OK” to install TCP/IP. 6. After a few seconds, you will be returned to the Network window. The TCP/IP Protocol should now be on the list of installed network components (see 3 above). 7. Click the “Properties” button. The TCP/IP Properties window consists of several tabs. Choose the “IP Address” tab. 8.
Broadband Security Router User Guide Fixed IP Addresses Configuration Fixed IP addresses may be assigned to network devices for many reasons, such as the server PCs or printers which are consistently accessed by multiple users. To set up computers with fixed IP Addresses, go to the “IP Address” tab of the “TCP/IP Properties” window as shown above. Select “Specify an IP address” and enter “192.168.1.
Broadband Security Router User Guide Click on the “DNS Configuration” tab and select “Enable DNS”. Enter the “DNS IP Address” obtained from your ISP in the “Server Search Order” location. Then click the “Add” button. Click on the “Gateway” tab and enter the High-Performance Wireless Router’s default gateway value 192.168.1.1 in the “New gateway” field, then click “Add” Button.
Broadband Security Router User Guide Click “OK”. Restart your PC to complete the TCP/IP installation.
Broadband Security Router User Guide Chapter 3: Internet Access This chapter describes the procedures necessary to configure the basic functions and begin using your High-Performance Wireless Router. If you follow these procedures correctly, there should be no problem in accessing the Internet via your High-Performance Wireless Router.
Broadband Security Router User Guide The “Username and Password Required” prompt box will appear. Leave the Username field empty and type “admin” (default password) in the Password field. Click “OK”. The setup screen will then appear. Basic Configuration – Setup The “OnePage Setup” screen is the first screen you will see when you access the Utility. If the router has already been successfully installed and set up, this screen’s values will already be properly configured.
Broadband Security Router User Guide exceed 32 characters. Channel: Select the appropriate channel number from the drop-down. The permissible channels are different from Regulatory Domains. Make sure that all nodes in the same wireless LAN network use the same channel, or the channel usage is automatic when a connection between client and access point are made. WEP: As the acronym for Wired Equivalent Privacy, WEP is an encryption mechanism used to protect your wireless data communications.
Broadband Security Router User Guide administrator. Default TX Key Select one of the four keys to be the encryption key you are going to use in the wireless network. To be sure that all the points in a same wireless network have to have the same encryption key. WAN Connection Type There are four options for WAN connection types, Obtain IP automatically, Static IP, PPPoE, and PPTP. The connection type you need to choose is dependent upon the settings assigned by your ISP.
Broadband Security Router User Guide Address: Address. Domain Name Server (DNS): Your ISP will provide you with at least one DNS IP Address. Multiple DNS IP settings are common. The first available DNS entry is used in most cases. PPPoE PPPoE is a dial-up connection type provided by some ISPs. It is a cost–effective way for a user to access this connection type. If your ISP provides PPPoE connectivity, you should choose this item from the drop-down list.
Broadband Security Router User Guide RAS(for SingTel) If your ISP uses RAS to establish the connection, you should select this item and follow the steps below. User Name: Enter the user name your ISP provides you. Password: Enter the password your ISP provides you. RAS Plan: Choose the connection method that you want to use. Connect-on-demand: It is a utility used to trigger the RAS session when there is a packet being sent through the WAN port while it is on disconnected situation.
Broadband Security Router User Guide PPTP PPTP is the acronym of Point to Point Tunneling Protocol. Usually, it is used to encapsulate other protocols’ packets for transmission over IP network. Some ISPs use this protocol as way to establish the initial connection between the CPE (end-user side) and DSLAM (ISP side). If your ISP uses PPTP to establish the connection, you should select this item and follow the steps below. Specify WAN IP Address: Enter the IP address provided by your ISP.
Broadband Security Router User Guide this information in the “Redial Period” field. HBS If your ISP uses HBS to establish the connection, you should select this item and follow the steps below. User Name: Enter the user name provided by your ISP. Password: Enter the password provided by your ISP. Heart Beat Server: Enter the IP address provided by your ISP. This setting is available only for some areas. Check your ISP for more detailed information.
Broadband Security Router User Guide Chapter 4: Advanced Applications In general, after finishing the steps listed in chapter 3, you can connect to Internet with ease. Yet, you might want to have advanced configuration for some reasons. This chapter provides information on how to set up and use the advanced functions of your High-Performance Wireless Router. DHCP Configuration A DHCP (Dynamic Host Configuration Protocol) Server can automatically assign IP Addresses to each computer in your network.
Broadband Security Router User Guide LAN side) can use the IP Addresses assigned by Router’s DHCP server. Before the time is up, DHCP clients have to request to renew the DHCP information. DNS: The IP Address of the Domain Name Server, which is currently used. Multiple DNS IP settings are common. The first DNS entry will be use in most cases. WINS: Windows Internet Naming Service converts NETBIOS name to IP address.
Broadband Security Router User Guide IP Access Setting This function allows network administrators to restrict up to five groups of specified network users/computers from accessing the certain applications Protocol: Select the protocol type as “TCP” or “UDP” from the drop down list. If you are not sure which one to choose, select “Both”. Filter Group/LAN IP Range: Enter the range of IP addresses which you want them to be a controlled group to have the same access limitation.
Broadband Security Router User Guide URL Access Limit: Check “Enable” or “Disable” to make this function active or inactive. Website Access: Check “Allow” to allow users on the network to access specific website listed on the location only. In contrast, to restrict users on the network to access the website listed on the location, check “Block” in this item. Block Access Website: Enter the website addresses to be accessed/blocked on the locations.
Broadband Security Router User Guide Virtual Server Settings The Virtual Server Settings application allows you to set up a maximum of ten public services that can be accessed by external users of the Internet, such as a Web Address, Email, FTP etc.. Each service is provided by a dedicated network computer (server) configured with a fixed IP Address.
Broadband Security Router User Guide Ports: Enter the desired service port numbers in the “Ports” fields. You can specify the protocol type as “TCP” or “UDP” from the drop-down list. If you are not sure which one to select, choose “Both”. A selection of well-known service port numbers is provided on this screen. Redirect IP Address: Enter the appropriate IP Addresses of the service computers in the “Redirect IP Address” locations.
Broadband Security Router User Guide Quake III UDP 27660 (first player) "C:\Program Files\Quake III Arena\quake3.exe" +set net_port 27660 Telnet Server Web Server TCP TCP 27661 (second player) 23 80 UPnP Forwarding UPnP (Universal Plug and Play) is a standard introduced from Microsoft and UPnP Forum for interoperability. Currently, this function supported by this device allows you to set virtual server from Windows OS that supports UPnP, such as Windows XP.
Broadband Security Router User Guide 192.168.1.1. If a fixed Public IP Address is to be used, select “Specify an IP address” and enter the IP Address and other necessary information provided by your ISP. Application Name: UPnP has ten pre-setting forwarding rules, which are well-known applications. You can enter any name to present the additional settings beside those pre-setting rules. Ext. Port: Most of applications usually use their individual port number for its incoming and outgoing data packets.
Broadband Security Router User Guide in the “DMZ Host”field. The Multi DMZ allows you to map the public IP addresses to your LAN PCs, should you get more than one public IP address from your ISP. This function is useful to set up your servers, such as an FTP server, web server, and so on, with public IP addresses, but still keep them within your LAN group.
Broadband Security Router User Guide 2. Click the “Apply” button after making any changes, or click the “Cancel” button to exit the screen without saving any changes. Dynamic Routing The Dynamic Routing feature allows your High-Performance Wireless Router to exchange routing information with other routers in the network. Enabling this feature is likely to enhance performance of your High-Performance Wireless Router.
Broadband Security Router User Guide Static Routing The Static Routing feature allows PCs that are connected to the High-Performance Wireless Router, either directly or through a hub/switch (in the immediate LAN), to communicate with other PCs in the respective LAN segment which are connected to the High-Performance Wireless Router through another router (destination LAN). Up to 20 route entries may be input into the High-Performance Wireless Router.
Broadband Security Router User Guide Select Route entry: Select the route entry number from 1 to 20 that you wish to configure. Delete this entry Delete the selected route entry information. Destination LAN IP and Enter the IP Address and Subnet Mask of the destination LAN that the immediate LAN is to communicate with. Subnet Mask: Taking the above diagram as an example, enter 192.168.2.0 in the “Destination LAN IP” field and 255.255.255.0 in the “Subnet Mask” field.
Broadband Security Router User Guide Special Applications Some applications use multiple TCP/UDP ports to transmit data. Due to the NAT, these applications cannot work with the High-Performance Wireless Router. Port Triggering allows some of these applications to work properly. Note that only one PC can use each Port Triggering setting at any time. Application name: Enter the name of application you wish to configure in the Name column to identify this setting.
Broadband Security Router User Guide MSN Gaming Zone PC to Phone Quick Time4 wowcall 47624 12053 554 8000 2069, 2085,3010-3030 2300-2400, 28800-29000 12120,12122, 24150-24220 6970-6999 4000-4020 Wireless This setting page allows you to configure advanced wireless functions. To set those items needs more technology background. Unless you really understand those technical terms, it would be better to leave them as default setting.
Broadband Security Router User Guide Basic Rates: Select either 1~2 Mbps or 1~2~5.5~11Mbps auto fallback. TX Rates: Select either 1~2 Mbps or 1~2~5.5~11Mbps auto fallback. Preamble Type: Preamble is used in the frames to provide time for the receiving station to synchronize to the incoming data stream. Authentication Type: Select either Open System or Share Key as authentication type. If you are not sure, select both.
Broadband Security Router User Guide Wireless MAC Entry There are 32 sets divided into four groups in this function. You can choose each group by selecting from the pop-down list. Enter the MAC addresses of the wireless clients, which you wish to block in the columns and click the Filter field beside the MAC address, and then those wireless clients will be blocked to access Internet. If the Filter field isn´t checked, that MAC address won’t be blocked.
Broadband Security Router User Guide side PCs. Internet users may not be able to reach your servers because your WAN side IP address may change each time you initiate the connection to your ISP. The DDNS function will help to map your IP address to your domain name when your ISP assigns a new dynamic IP Address. Note that this DDNS function acts as the client appliance of DDNS service and is only able to be use in conjunction with the service provided by DynDNS.org.
Broadband Security Router User Guide settings. Update: After clicking Apply to invoke the DDNS settings, you have to click this button to refresh the settings..
Broadband Security Router User Guide Chapter 5: Management This chapter allows administrator to manage the router such as upgrading the firmware, backup & restore settings, setting log information and so on. Device Administration Settings This feature allows the administrator to manage the High-Performance Wireless Router by setting certain parameters.
Broadband Security Router User Guide Administrator Password: Enter the password you want to use into the “Password Change” field and re-enter it into the “Password Confirm” field for confirmation. Be sure that the password is less than 64 characters long and without any special characters or spaces.. SNMP Function: As with the Password, SNMP community allows authorized persons to access this router through the SNMP Management tool. The Wireless Router provides three fields to enter these communities.
Broadband Security Router User Guide Reset Device: Select “Yes” if you want to clear a connection, reboot, and re-initialize the unit without affecting any of your configuration setting. Factory Defaults: Select “Yes” if you want to return all the router’s current settings to their factory defaults. Note that do not restore the factory defaults unless it is absolutely necessary. Apply: Click this button after making any changes for activating the settings.
Broadband Security Router User Guide disconnection by clicking the appropriate buttons. Be aware that, if you make a disconnection here, “Connect-ondemand” will not function until the connection button is clicked. Note that “Login” won’t show any information if you selected “Obtain IP automatically” or “Static IP” on the OnePage Setup page. Internet: This section shows the IP settings status of the router as seen by external users of the Internet.
Broadband Security Router User Guide Access Log: Check the “Enable” option if you want to activate this function. Send Log To: Enter the IP address of the PC that you wish to use to view the Log information. View Log: Click this button to view the log on-line. Send Log via E-mail: The Firewall log can be sent via e-mail. Denial of Service Thresholds: The threshold is used to determine the attempt of establishing connection is DoS attack or not.
Broadband Security Router User Guide which day in a week to send the alert e-mail. Apply: Click this button after making any changes for activating the settings. Undo: Click this button if you are not satisfied with the settings in this page before clicking “Apply”. Backup & Restore This function allows you to save router’s configuration as backup, or retrieve the configuration file you saved before to turn the setting back.
Broadband Security Router User Guide Browse.. Browse.. To select a file to upgrade, you have to enter path of the latest firmware you saved on the PC. You can choose “Browse” to view the folders and select the firmware. Upgrade: After you enter or select the path, click “Upgrade” to proceed firmware upgrade process. Please note that don’t power off the router during the firmware upgrading.
Broadband Security Router User Guide selecting Router’s private IP Address or from the WAN side by selecting Router’s WAN IP Address. Destination IP: Enter the IP Address of destination device you want to ping. If Router’s LAN IP address is selected as Source IP, you only can ping LAN side device and vice versa. Packet Number: Enter the packet numbers you wish to use to ping the destination device. The maximum numbers are four.
Broadband Security Router User Guide Chapter 6: Macintosh Setup This chapter provides information on using Macintosh computers in your network. The instructions given here are for system software version 8.0 or above, which comes with the TCP/IP Protocol preloaded and supports DHCP Addressing. Hardware Connections Connect your Macintosh computer to your High-Performance Wireless Router. If you have a newer computer, there will be an Ethernet port on the back.
Broadband Security Router User Guide Wireless Router’s default IP Address) in the “Router Address” location. 5. Enter the ISP’s IP Address in the “Name Server” location if your ISP has provided the information. And close the window. 6. Click “Save” from the file menu then “Quit” TCP/IP. 7. Restart the computer.
Broadband Security Router User Guide Chapter 7: Trouble Shooting This chapter provides solutions to problems you may encounter during installation and operation of your High-Performance Wireless Router. Hardware Q: The Power LED is off. A: Check that the power cable is properly connected to the High-Performance Wireless Router, the power adapter and the socket. Q: The LAN Link LED is off.
Broadband Security Router User Guide network segment. If you are not sure, initiate the DHCP function and set you PC to obtain an IP address automatically. Ensure that your PC is using an IP Address within the range 192.168.1.2 to 192.168.1.254 and thus compatible with the High-Performance Wireless Router default IP address of 192.168.1.1 Finally, use the Ping command in MS-DOS mode to verify the network connection: Ping 127.0.0.1 to check the TCP/IP stack of your computer Ping gateway IP (Default: 192.
Broadband Security Router User Guide Q: I get a time out error when I enter a URL or IP address. A: Check if other computers work. If they do, ensure the computer’s IP settings are correct (IP Address, Subnet Mask, Gateway IP Address and DNS). Then, check if the High-Performance Wireless Router’s settings are correct. Q: What is the maximum number of IP Addresses the High-Performance Wireless Router can support? A: The High-Performance Wireless Router can support up to 253 IP Addresses in the range of 192.
Broadband Security Router User Guide Router? A: Yes, you can. Some people think having one Internet account mean that they can only have one E-mail account. However, E-mail is set by mailbox accounts and is different to the account you use to connect to your ISP. If you want more E-mail accounts, you should contact your ISP or you can browse the Internet to apply for a free E-mail account. Q: Can Internet users access LAN computers? A: High-Performance Wireless Router uses NAT to router all in/out packets.
Broadband Security Router User Guide Appendix A: Technical Specifications Standards Compliance IEEE 802.3 10BASE-T IEEE 802.3u 100BASE-TX IEEE 802.
Broadband Security Router User Guide Mounting Desktop Wall-mounting - 56 -
Broadband Security Router User Guide Appendix B: Glossary 10Base-T / 100Base-T The adaptation of the Ethernet standard for Local Area Networks (LANs). 10Base-T uses a twisted pair cable with maximum lengths of 100 meters and transmits data at 10Mbps maximum. 100Base-T is similar, but uses two different twisted pair configurations and transmits at 100Mbps maximun.
Broadband Security Router User Guide Communication Protocols Communication between devices requires they agree on the format in which the data is to be transmitted, sent and received. The communications protocols are a set of rules that define the data format. Cookie A Cookie is a piece of data stored on your PC while a web server can retrieve late to identify your machine. It is normally a text with ID number, but cab include other information.
Broadband Security Router User Guide into their respective IP Addresses. Addressing systems using Domain name, like www.yahoo.com, is easier to use than an IP address, such as 204.71.177.70. DSSS Also known as Direct Sequence Spread Spectrum, it is a radio transmission method that continuously changes frequencies. Ethernet One of the most common Local Area Network (LAN) protocols. Ethernet uses a bus topology which supports a data transfer rate of 10 Mbps.
Broadband Security Router User Guide to access an existing wired network to take advantage of sharing the wired networks resources, such as files, printers, and Internet access. IP Address An identifier for a computer or device on a TCP/IP network. Networks using the TCP/IP Protocol route messages based on the IP Address of the destination. The format of an IP address is a 32-bit numeric address written as four numbers separated by periods. Each number can be from zero to 255.
Broadband Security Router User Guide Network Protocol Network protocols encapsulate and forward data packets from one interface to another. PAP/CHAP ISP Short for Password Authentication Protocol and Challenge Handshake Authentication Protocol. Most ISPs use either one for user identification. If your ISP doesn’t support these two protocols, contact your ISP for an authentication script.
Broadband Security Router User Guide SPI SPI is an acronym for Stateful Packet Inspection. The SPI engine examines not just the headers of the packet, but also the packet contents, it can then determine more about the packet than just its source and destination information. Moreover, stateful inspection firewalls also close off ports until a connection to the specific port is requested.
FCC Caution 1. The device complies with Part 15 of the FCC rules. Operation is subject to the following two conditions: (1)This device may not cause harmful interference. (2)This device must accept any interference received, including interference that may cause undesired operation. 2. FCC RF Radiation Exposure Statement: The equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment.