3. Making Configuration Download Status At this page, you could check the download jobs of HTTP and FTP. How to access data on the NAS? Windows User By network place Then start your “file manager”, type the IP with “\\” on the beginning, as follow picture shown. Then press enter. You could find a folder named “Storage”. It is what you are looking for.
3. Making Configuration By Web HDD This Web HDD can allow you to enter HDD by web UI, and also can allow you to let ‘guest’ to enter the ‘public’ area only. Unix User We do not provide NFS support, so the only way for UNIX to get files is FTP. Use your FTP client to connect the FTP server. 3.
. Making Configuration Virtual Server This product’s NAT firewall filters out unrecognized packets to protect your Intranet, so all hosts behind this product are invisible to the outside world. If you wish, you can make some of them accessible by enabling the Virtual Server Mapping. A virtual server is defined as a Service Port, and all requests to this port will be redirected to the computer specified by the Server IP.
3. Making Configuration Special AP Some applications require multiple connections, like Internet games, Video conferencing, Internet telephony, etc. Because of the firewall function, these applications cannot work with a pure NAT router. The Special Applications feature allows some of these applications to work with this product. If the mechanism of Special Applications fails to make an application work, try setting your computer as the DMZ host instead. This device provides some predefined settings.
3. Making Configuration IP Address of DMZ Host DMZ (Demilitarized Zone) Host is a host without the protection of firewall. It allows a computer to be exposed to unrestricted 2-way communication for Internet games, Video conferencing, Internet telephony and other special applications. UPnP Setting The device supports the UPnP function.
3. Making Configuration Packet Filters Packet Filter includes both outbound filter and inbound filter. And they have same way to setting. It enables you to control what packets are allowed to pass the router. Outbound filter applies on all outbound packets. However, inbound filter applies on packets that destined to Virtual Servers or DMZ host only. You can select one of the two filtering policies: Allow all to pass except those match the specified rules.
3. Making Configuration For source or destination port, you can define a single port (80) or a range of ports (1000-1999). Add prefix "T" or "U" to specify TCP or UDP protocol. For example, T80, U53, U2000-2999, No prefix indicates both TCP and UDP are defined. An empty implies all port addresses. Packet Filter can work with Scheduling Rules, and give user more flexibility on Access control. For Detail, please refer to Scheduling Rule. Each rule can be enabled or disabled individually.
3. Making Configuration Privilege IP Address Range: Setting a group of hosts and privilege these hosts to access network without restriction. Domain Suffix: A suffix of URL can be restricted, for example, ".com", "xxx.com". Action: When someone is accessing the URL met the domain-suffix, what kind of action you want. Check “Drop” to block the access. Check “Log” to log these access. Enable: Check to enable each rule. Afterwards, click on “Save” to store your settings or click “Undo” to give up the changes.
3. Making Configuration URL Blocking: Check if you want to enable URL Blocking. URL: If any part of the Website's URL matches the pre-defined word, the connection will be blocked. For example, you can use pre-defined word "sex" to block all websites if their URLs contain pre-defined word "sex". Enable: Check to enable each rule. Afterwards, click on “Save” to store your settings or click “Undo” to give up the changes.
3. Making Configuration Connection control: Check "Connection control" to enable the controlling of which wired and wireless clients can connect with this device. If a client is denied to connect with this device, it means the client can't access to the Internet either. Choose "allow" or "deny" to allow or deny the clients, whose MAC addresses are not in the "Control table" (please see below), to connect with this device.
3. Making Configuration DoS Attack Detection: When this feature is enabled, the router will detect and log the DoS attack coming from the Internet. Currently, the router can detect the following DoS attack: SYN Attack, WinNuke, Port Scan, Ping of Death, Land Attack etc. Afterwards, click on “Save” to store your settings or click “Undo” to give up the changes. 3.
3. Making Configuration System Log This page supports two methods to export system logs to specific destination by means of syslog (UDP) and SMTP(TCP). The items you have to setup include: IP Address for Syslog: Host IP of destination where syslog will be sent to. Check Enable to enable this function. Setting of Email alert: Check if you want to enable Email alert (send syslog via email). SMTP Server: Port: Input the SMTP server IP and port, which are connected with ':'.
3. Making Configuration Before you enable Dynamic DNS, you need to register an account on one of these Dynamic DNS servers that we list in Provider field. DDNS: Select enable if you would like to trigger this function. Provider: The DDNS provider supports service for you to bind your IP(even private IP) with a certain Domain name. You could choose your favorite provider. Host Name: Register a domain name to the DDNS provider.
3. Making Configuration QoS QoS provide different priority to different users or data flows, or guarantee a certain level of performance. QoS Control: Check Enable to enable this function. Bandwidth of Upstream: Set the limitation of upstream bandwidth. Local IP : Ports: Define the Local IP address and ports of packets. Remote IP : Ports: Define the Remote IP address and ports of packets. QoS Priority : This defines the priority level of the current Policy Configuration.
3. Making Configuration Afterwards, Click on “Save” to store your settings or click “Undo” to give up the changes. SNMP In brief, SNMP, the Simple Network Management Protocol, is a protocol designed to give a user the capability to remotely manage a computer network by polling and setting terminal values and monitoring network events. Enable SNMP: You must check “Local”, “Remote” or both to enable SNMP function. If “Local” is checked, this device will respond request from LAN.
3. Making Configuration Routing If you have more than one routers and subnets, you will need to enable routing table to allow packets to find proper routing path and allow different subnets to communicate with each other. The routing table allows you to determine which physical interface addresses are utilized for outgoing IP data grams. Dynamic Routing: Routing Information Protocol (RIP) will exchange information about destinations for computing routes throughout the network.
3. Making Configuration System Time Time Zone: Select a time zone where this device locates. Auto-Synchronization: Check the “Enable” checkbox to enable this function. Besides, you can select a NTP time server to consult UTC time. Sync with Time Server: Click on the button if you want to set Date and Time by NTP Protocol . Sync with my PC: Click on the button if you want to set Date and Time using PC’s Date and Time.
3. Making Configuration Schedule: Check to enable the schedule rule settings. Add New Rule: To create a schedule rule, click the “New Add” button. You can edit the Name of Rule, Policy, and set the schedule time (Week day, Start Time, and End Time). The following example configures “wake-up time“ everyday from 06:00 to 07:00.
3. Making Configuration Afterwards, click save” to store your settings or click “Undo” to give up the changes.
3. Making Configuration System Info You can view the System Information and System log, and download/clear the System log, in this page.
3. Making Configuration Firmware Upgrade You can upgrade firmware by clicking “Upgrade” button. Backup Setting You can backup your settings by clicking the “Backup Setting” function item and save it as a bin file. Once you want to restore these settings, please click Firmware Upgrade button and use the bin file you saved.
3. Making Configuration Reset to Default You can also reset this device to factory default settings by clicking the Reset to default function item. Reboot You can also reboot this device by clicking the Reboot function item.
3. Making Configuration Miscellaneous MAC Address for Wake-on-LAN: It enables you to power up a networked device remotely. If you would like to trigger this function, you have to know the MAC address of this device. For instance if the MAC address is 00-11-22-33-44-55, enter it into the blank of MAC Address for Wake-on-LAN. Afterwards. Afterwards, click "Wake up" button which makes the router to send the wake-up frame to the target device immediately.
4. Troubleshooting 4 4.Troubleshooting This Chapter provides solutions to problems for the installation and operation of the WiFi Broadband Router. You can refer to the following if you are having problems. Why can’t I configure the router even the cable is plugged and the LED is lit? Do a Ping test to make sure that the WiFi Broadband Router is responding. Note: It is recommended that you use an Ethernet connection to configure it Go to Start > Run. Type cmd. Press OK.
4. Troubleshooting Go to Start > Right click on “My Computer” > Properties. Select the Hardware Tab. Click Device Manager. Double-click on “Network Adapters”. Right-click on Wireless Card bus Adapter or your specific network adapter. Select Properties to ensure that all drivers are installed properly. Look under Device Status to see if the device is working properly. Click “OK”. What can I do if my Ethernet connection does not work properly? Make sure the RJ45 cable connects with the router.
4. Troubleshooting Why does my wireless connection keep dropping? Antenna Orientation. Try different antenna orientations for the WiFi Broadband Router. Try to keep the antenna at least 6 inches away from the wall or other objects. Try changing the channel on the WiFi Broadband Router, and your Access Point and Wireless adapter to a different channel to avoid interference. Keep your product away from electrical devices that generate RF noise, like microwaves, monitors, electric motors, etc.
Appendix A. Spec Summary Table Appendix A. Spec Summary Table Device Interface Ethernet WAN RJ-45 port, 10/100/1000Mbps, auto-MDI/MDIX Ethernet LAN RJ-45 port, 10/100/1000Mbps, auto-MDI/MDIX USB Sharing USB 2.0 for file sharing Antenna 3.23 dBi detachable antenna WPS / USB For WPS connection and USB storage remove OFF Button button Reset Button Reset router setting to factory default Power/Status / USB/ WAN / LAN1 ~ LAN4/ LED Indication WiFi Power Jack DC 12V/1.
Appendix A.
Appendix B. Licensing information Appendix B. Licensing information This product includes copyrighted third-party software licensed under the terms of the GNU General Public License. Please refer to the GNU General Public License below to check the detailed terms of this license. The following parts of this product are subject to the GNU GPL, and those software packages are copyright by their respective authors. Linux Kernel GPLv2 | Linux-2.6.21 Busybox GPLv2 | busybox_1.3.
Appendix B. Licensing information GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it.
Appendix B. Licensing information Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow.
Appendix B. Licensing information You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License.
Appendix B. Licensing information The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable.
Appendix B. Licensing information If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances.
Appendix B. Licensing information NO WARRANTY 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
פ܅ሽंᘿ୴ࢤሽᖲጥᙄऄ ʳ รԼԲයʳ ীڤᎁᢞٽհפ܅୴᙮ሽᖲΔॺᆖױΔֆΕᇆࢨ ࠌ݁ृشլᖐ۞᧢ޓ᙮ΕףՕפࢨ᧢ޓૠհࢤ ֗פ౨Ζ รԼයʳ פ܅୴᙮ሽᖲհࠌشլᐙଆڜ٤֗եឫٽऄຏ ॾΙᆖ࿇ڶեឫွழΔᚨܛمೖشΔࠀޏ۟ྤեឫழ ֱᤉᥛࠌشΖ ছႈٽऄຏॾΔਐࠉሽॾऄࡳ܂ᄐհྤᒵሽຏॾΖ פ܅୴᙮ሽᖲႊٽ࠹ݴऄຏॾࢨՠᄐΕઝᖂ֗᠔᛭شሽं ᘿ୴ࢤሽᖲໂհեឫΖ ʳုѾΚᐗנڇᐗழΔᄎشܓຌ᧯᠙ࡳ᙮ሐΔᨃึጤࠌृشʳʳ ྤऄٚრᙇᖗ᙮ሐΖ ုѿΚڼข᙮ሐᙇᖗΔ̂̇̈˔ࠎ༼Ε˄Ε˅ˁˁˁˁ˄˄˄˄ଡ᙮ሐΖʳ