) Set PC3 and PC4 to Obtain an IP address automatically.
) When the two PCs get IP addresses, 53
Try below steps to verify the WDS connection: 1. Click Start-> Run on PC3, input cmd on the appearing window and then click OK. 2.
Input ping 192.168.0.1 and press Enter. If you get a screen as seen below, you have successfully implemented WDS. Note: 1. WDS feature can only be implemented between 2 WDS-capable wireless devices. Plus, SSID, channel, security settings and security key must be exactly the same on both such devices. 2. To ensure a proper wireless connection, do not change any settings on the two devices after WDS is successfully implemented.
4.2 Wireless Security This section allows you to secure your wireless network and block unauthorized accesses and malicious packet sniffing. To encrypt your wireless network, do as follows: 1. Select the wireless network (SSID) you wish to encrypt. 2. Disable WPS. (WPS is enabled on the router by default. If you want to use other security modes, you must first disable the WPS.) 3. Select a proper security mode and cipher type (also known as WPA Algorithm or WPA Encryption Type).
WPS Wi-Fi Protected Setup makes it easy for home users who know little of wireless security to establish a home network, as well as to add new devices to an existing network without entering long passphrases or configuring complicated settings. Simply enter a PIN code or press the software PBC button or hardware WPS button (if any) and a secure wireless connection is established. Operation Instructions: PBC: To use WPS-PBC, try two ways below: 1.
PIN: On the wireless security page, enable WPS, select PIN and enter the 8-digit PIN code from network adapter; then, within 2 minutes, enable WPS/PIN on the client device; Note: 1. With WPS successfully enabled, the WPS LED on the router keeps blinking for about 2 minutes, and during this time, you can enable WPS on a wireless adapter; if the adapter successfully joins the wireless network, the WPS LED will display a solid light. Repeat steps above if you want to add more wireless adapters to the router.
Note: 1. To use the WPS security, the wireless client must be also WPS-capable. 2. Before you press the hardware WPS button on the device for WPS/PBC connection, making sure the WPS feature has been enabled on the device.
4.3 Wireless Access Control The Access Control feature allows you to specify a list of devices to Permit (Allow) or Forbid (Deny) a connection to your wireless network via the devices’ MAC addresses. All other devices not listed as Permitted will be Forbidden and vice versa. 1. MAC Address Filter: Select Permit or Forbid from the drop-down list. 2. To permit a wireless device to connect to your wireless network, select Permit (or Allow), enter its MAC address, click Add and then OK.
Step1. Select Forbid (or Deny) from the corresponding drop-down menu. Step2. Enter C8:3A:35:C6:B3:D1 in the MAC address box and click Add. Step3. Click OK to save your settings. You can add more wireless MAC addresses you wish to forbid.
4.4 Wireless Client Here you can see a list of wireless devices connected to the router, including their MAC addresses and bandwidth Note: The bandwidth here refers to the channel bandwidth instead of wireless connection rate.
Chapter 5 Bandwidth Control 5.1 Bandwidth Control Use this section to manage bandwidth allocation to devices on your LAN. If there are multiple PCs behind your router competing for limited bandwidth resource, then you can use this feature to specify a reasonable amount of bandwidth for each such PC, so that no one will be over stuffed or starved to death. 1. Enable Bandwidth Control: Check or uncheck the box to 2. Enable or disable the bandwidth control feature. 3.
5. Bandwidth Range: Specify an upload/download bandwidth range limit on specified PC(s). The unit is KByte/s. 1M=128KByte/s. Note that maximum upload/download bandwidth should not exceed your router's WAN bandwidth limit. (Consult your ISP if you are not clear.). 6. Enable: Check to enable current rule. (When disabled, corresponding entry will not take effect though existing in fact.) 7. Add to List: Click to add current rule to the rule list. 8. OK: Click to activate your settings.
5.2 Traffic Statistics Traffic Statistics allows you to see at a glance how much traffic each device in your network is using. 1. Enable Traffic Statistics: Check/uncheck the box to enable/disable the Traffic Statistics feature. To see at a glance how much traffic each device in your network is using, enable this option. However usually, disabling it may boost your network performance. This option is disabled by default. However, once enabled the page refreshes every five minutes. 2.
Sent Bytes: Displays the number of Bytes sent by a corresponding PC via the device since Statistics is enabled. The unit is MByte. Received Message: Displays the number of packets received by a corresponding PC via the device since Statistics is enabled. Received Bytes: Displays the number of Bytes received by a corresponding PC via the device since Statistics is enabled. The unit is MByte.
Chapter 6 Special Applications 6.1 Port Range Forwarding Port range forwarding is useful for web servers, ftp servers, e-mail servers, gaming and other specialized Internet applications. When you enable port forwarding, the communication requests from the Internet to your router’s WAN port will be forwarded to the specified LAN IP address. As seen in the figure above, to let PC3 access service ports on PC1, you must first configure port forwarding settings on the router to which PC1 is uplinked.
1. Start/End Port: Specify a range of ports between 1~65535 (for a single port, enter the port number in both Start and End fields, say, 21 for FTP). Contact corresponding service provider if you don't know the port number of the service to use. 2. LAN IP: Specify the internal host’s IP address. Be sure to statically assign the host’s IP address to make this function constant.
3. Protocol: Specify the protocol required for the service utilizing the port(s). 4. Enable: Check to enable current settings. 5. OK: Click to activate your settings. Now, your friends only need to enter ftp://xxx.xxx.xxx.xxx:21 in their browsers to access your FTP server xxx.xxx.xxx.xxx is the router's WAN IP address. Assuming it is 172.16.102.89, and then your friends need to enter ftp://172.16.102.89:21 in their browsers.
6.2 DMZ Host The DMZ (De-Militarized Zone) function disables the firewall on the router for one device for a special purpose service such as Internet gaming or video conferencing. Enabling DMZ host may expose your local network to potential attacks. So it is advisable to use it with caution. 1. DMZ Host IP Address: The IP Address of the device for which the router’s firewall will be disabled. Be sure to statically set the IP address of that device for this function to be consistent. 2.
6.3 DDNS Dynamic DNS or DDNS is a term used for the updating in real time of Internet Domain Name System (DNS) name servers. Dynamic DNS or DDNS is a term used for the updating in real time of Internet Domain Name System (DNS) name servers. We use a numeric IP address allocated by Internet Service Provider (ISP) to connect to Internet; the address may either be stable ("static"), or may change from one session on the Internet to the next ("dynamic").
1. DDNS Service: Select to enable/disable the DDNS feature. 2. Service Provider: Select your DDNS service provider from the drop-down menu. (Here you can see a list of available service providers. Note that service providers not listed here are not available for use.) 3. User Name: Enter the registered user name. 4. Password: Enter the registered password. 5. Domain Name: Enter the domain name you register, say, wilink.dyndns.org. 6. OK: Click to activate your settings.
6.4 UPNP The Universal Plug and Play (UPnP) feature allows network devices, such as computers from Internet, to access resources on local host or devices as needed. UPnP-enabled devices can be discovered automatically by the UPnP service application on the LAN. This feature is enabled by default. No settings are required. Enable UPnP: Check/uncheck to enable/disable the UPnP feature. OK: Click to complete your settings.
6.5 Static Routing When there are several routers in the network, you may want to set up static routing. Static routing determines the path of the data in your network. You can use this feature to allow users on different IP domains to access the Internet via this device. It is not recommended to use this setting unless you are familiar with static routing.
1. Gateway must be on the same IP net segment as device's LAN/WAN IP address. 2. Subnet Mask must be entered 255.255.255.255 if destination IP address is a host. 3. Subnet Mask must be entered accordingly if destination IP address represents an IP network segment. It must correspond to the specified IP address. For example, for IP address of 10.0.0.0, you may enter a subnet mask of 255.0.0.0. 6.
Chapter 7 Security 7.1 URL Filter To better control LAN PCs, you can use the URL filter functionality to allow or disallow such PCs to access certain websites within a specified time range. 1. Filter Mode: Select a proper filter mode, say, Forbid Only (or Forbid/Deny). 2. Access Policy: Select an access policy number, say, 1, from the drop-down list. 3. Policy Name: Briefly describe the current rule, say, youtube, (It can only consist of numbers, letters, or underscore).
4. Start IP/End IP: Enter the same IP address or 2 different IP addresses in both boxes to specify a single PC or a range of PCs for the current rule to apply to. 5. URL Character String: Enter the domain name you wish to filter out, say, youtube. 6. Time: Specify a time period for a current rule to take effect. If the field is set to 0:00-0:00, the rule will be applied 24hrs/day. 7. Day(s): Select a day or several days for a current rule to take effect.
1. Filter Mode: Select Forbid Only. 2. Access Policy: Select an access policy number, say, 1, from the drop-down list. 3. Policy Name: Briefly describe the current rule, say, youtube, (It can only consist of numbers, letters, or underscore). 4. Start IP/End IP: Enter 2-254. 5. URL Character String: Enter youtube. 6. Time: Select 8:00-18:00.Day(s): Select Monday to Friday. 7. Enable: Check the Enable box. 8. OK: Click to save your settings. Note: Each rule can only include one domain name.
more rules accordingly, if you want to filter multiple domain names. 7.2 MAC Filter This section allows you to set the times specific clients can or cannot access the Internet via the devices’ MAC Addresses. Forbid Only (or Forbid or Deny): Specify a list of devices to Forbid (Deny) access to Internet. All other devices not listed as Forbidden (Denied) will be permitted. Permit Only (or Permit or Allow): Specify a list of devices to Permit (or Allow) access to Internet.
5. 6. 7. 8. filter rule to apply to. Time: Specify a time period for a current rule to take effect. If the field is set to 0:00-0:00, the rule will be applied 24hrs/day. Day(s): Select a day or several days for a current rule to take effect. If Sun-Sat is selected, the rule will apply 7days/week. Enable: Check/uncheck to enable/disable the feature. OK: Click to activate your settings. For Example: To allow a PC at the MAC address of 00:E4:A5:44:35:69 to access Internet from Monday to Friday. 1.
4. 5. 6. 7. 8. MAC Address: Enter 00:E4:A5:44:35:69. Time: Select 0 for all fields to apply the rule 24hrs/day. Day(s): Select Monday to Friday. Enable: Check the Enable box. OK: Click to save your settings. 7.3 Client Filter This section allows you to set the times specific clients can or cannot access the Internet via the devices’ assigned IP addresses and service port.
1. Filter Mode: Select Permit Only. 2. Access Policy: Select an access policy number, say, 1, from the drop-down list. 3. Policy Name: Briefly describe the current rule, say, 80. 4. Start IP/End IP: Enter the same IP address, say, 110, or 2 different IP addresses, say, 110 and 120 in both boxes to specify a single PC or a range of PCs for the current rule to apply to. 5. Port: Specify TCP/UDP protocol port number (s), say, 80. 6. Type (or Protocol): Select Both. 7.
8. Day(s): Specify a day or several days for a current rule to take effect. 9. Enable: Check/uncheck to enable/disable the feature. 10. OK: Click to activate your settings. For example: If you want to prohibit PCs within the IP address range of 192.168.0.100--192.168.0.120 from accessing Internet, do as follows: 1. Filter Mode: Select Forbid Only. 2. Access Policy: Select an access policy number, say, 1, from the drop-down list. 3. Policy Name: Briefly describe the current rule, say, 123. 4.
5. End IP: Enter 120. 6. Port: Enter 1-65535 to forbid all Internet services and applications. 7. Type (or Protocol): Select Both. 8. Time: Select 0 for all fields to apply the rule 24hrs/day. 9. Day(s): Select Sun-Sat to apply the rule 7days/week. 10. Enable: Check the Enable box. 11. OK: Click to activate your settings.
Chapter 8 Tools 8.1 Reboot Reboot the device to activate your settings. WAN connection will be disconnected during reboot. 8.2. Restore to Factory Default Settings Click the Restore to Factory Default button to reset device to factory default settings. You need to reconfigure the device for Internet access as well as many other settings including wireless settings. The factory default settings are listed below: IP Address: 192.168.0.1 Subnet mask: 255.255.255.0.
after you reset it. 8.3 Back/Restore Backup: Once you have configured the device the way you want it, you can save these settings to a configuration file on your local hard drive that can later be imported to your device in case that the device is restored to factory default settings. To do so, follow below instructions: 1. Click the Backup button and specify a directory to save settings on your local hardware. 2. Click Save to save the configuration file.
To restore previous settings, do as follows: Click the Browse button to locate and select a configuration file that is saved previously to your local hard drive. Click the Restore button to reset your device to previous settings.
88
8.4 Syslog Here you can view the history of the device’s actions. After 150 entries, the earliest logs will clear automatically.
8.5 Remote Web-based Management The Remote management allows the device to be configured and managed remotely from the Internet via a web browser. 1. Enable: Check/uncheck to enable/disable the DMZ host feature. 2. Port: This is the management port to be open to outside access. The default setting is 8080. Do NOT change it unless instructed by your ISP. 3. IP Address: Here you can specify the IP Address Range for remote management (When set to 0.0.0.
2. Leaving the IP address field at "0.0.0.0" makes the device remotely accessible to all the PCs on Internet or other external networks; populating it with a specific IP address, say, 218.88.93.33, makes the device only remotely accessible to the PC at the specified IP address. 8.6 Time This page is used to set the router’s system time. You can choose to set the time manually or get the GMT time from the Internet and the system will automatically connect to NTP server to synchronize the time.
8.7 Login Password This section allows you to change login password for accessing device’s Web-based interface for better security. 1. New Password: Enter a new password, say, 12345 (Note that the password can only be alphanumeric). 2. Confirm New Password: Re-enter the new password for confirmation. 3. OK: Click to activate your settings. Note: For security purpose, it is highly recommended that you change Device's default login password.
8.8 Firmware Upgrade Firmware upgrade is released periodically to improve the functionality of your device and also to add new features. If you run into a problem with a specific feature of the device, log on to our website (www.wilinklat.com) to download the latest firmware to update your device. 1. Browse: Click to locate and select the firmware. 2. Upgrade (or Update): Click to update firmware. Device will restart automatically when update completes. Note: 1.
Appendix 1 Glossary Channel A communication channel, also known as channel, refers either to a physical transmission medium such as a wire or to a logical connection over a multiplexed medium such as a radio channel. It is used to transfer an information signal, such as a digital bit stream, from one or more transmitters to one or more receivers. If there is only one AP in the range, select any channel you like. The default is Auto.
provided by WEP or WPA. Currently, WPA is supported by Windows XP SP1. IEEE 802.1X Authentication IEEE 802.1X Authentication is an IEEE Standard for port-based Network Access Control (PNAC). It is part of the IEEE 802.1 group of networking protocols. It provides an authentication mechanism to devices wishing to attach to a LAN or WLAN.IEEE 802.1X defines the encapsulation of EAP over LAN or EAPOL. 802.1X authentication involves three parties: a supplicant, an authenticator, and an authentication server.
PPPOE The Point-to-Point Protocol over Ethernet (PPPoE) is a network protocol for encapsulating PPP frames inside Ethernet frames. Integrated PPP protocol implements authentication, encryption, and compression functions that traditional Ethernet cannot provide and can also be used in the cable modem and digital subscriber line (DSL) and Ethernet that provide access service to the users.
be considered a repeater mode because it appears to bridge and accept wireless clients at the same time (unlike traditional bridging).WDS may be incompatible between different products (even occasionally from the same vendor) since it is not certified by the Wi-Fi Alliance. WDS may provide two modes of wireless AP-to-AP connectivity: Wireless bridging, in which WDS APs communicate only with each other and don't allow wireless clients or stations (STA) to access them.
Appendix 2 FAQs This section provides solutions to problems that may occur during installation and operation of the device. Read the following if you are running into problems. If your problem is not covered here, please feel free to go to www.wilinklat.com to find a solution or email your problems to: soporte@wilinklat.com. We will be more than happy to help you out as soon as possible. 1. Q: I entered the device’s LAN IP address in the web browser but cannot access the utility.
immediately. 2) The default IP address of the device is 192.168.0.1; make sure this address is not used by another PC or device. In case that two computers or devices share the same IP addresses, change either to a different address. 4. Q: I cannot access Internet and send/receive emails; what should I do? This problem mainly happens to users who use the PPPoE or Dynamic IP Internet connection type. You need to change the MTU size (1492 by default).
Server Web Server FTP Server Telnet Net Meeting Protoco l TCP TCP TCP TCP MSN Messenger TCP/UD P PPTP VPN Iphone5.
Appendix 3: Remove Wireless Network from Your PC If you change wireless settings on your wireless device, you must remove them accordingly your PC; otherwise, you may not be able to wirelessly connect to the device. Below describes how to do remove a wireless network from your PC. If you are using Windows XP, do as follows: 1. Right click "My Network Places" and select "Properties". 2. Click “Wireless Network Connection” and then select “Properties”.
3. Click "Wireless Networks", select the item under "Preferred networks" and then click the Remove button. If you are using Windows 7, do as follows: 1. Click Network from your desktop and select Properties.
2. Select "Manage Wireless Networks". 3. Click the wireless connection and select "Remove network".
Appendix 4 Safety and Emission Statement CE Mark Warning This is a Class B product in a domestic environment, this product may cause radio interference, in which case the user may be required to take adequate measures. This device complies with EU 1999/5/EC. FCC Statement This device complies with Part 15 of the FCC Rules.
protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation.
2. interference caused by unauthorized modifications to this equipment.