2.4GHz Wireless 802.11n(DRAFT) GbE Router WRT-390U Rev 0.
Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
Copyright This publication, including all photographs, illustrations and software, is protected under international copyright laws, with all rights reserved. Neither this manual, nor any of the material contained herein, may be reproduced without written consent of the author. Copyright 2006 Trademark recognition All product names used in this manual are the properties of their respective owners and are acknowledged.
Table of Contents Getting Started with the WRT-390U Package Contents Minimum System Requirements 3 4 4 Wireless LAN Networking Introduction Features 5 9 9 Hardware Overview LED Indications Rear Panel Installation Considerations Getting Started 11 11 11 12 12 Using the Configuration Menu Basic Advanced Tools Status 13 14 26 56 71 Glossary 82 3
Getting Started with the WRT-390U Congratulations on purchasing the WRT-390U! This manual provides information for setting up and configuring the WRT-390U. This manual is intended for both home users and professionals. The following conventions are used in this manual: THE NOTE SYMBOL INDICATES ADDITIONAL INFORMATION ON THE TOPIC AT HAND. THE TIP SYMBOL INDICATES HELPFULL INFORMATION AND TIPS TO IMPROVE YOUR NETWORK EXPERIENCE.
Package Contents WRT-390U 11n(Draft) Wireless GbE Router CAT-5 Ethernet Cable (All the WRT-390U’s Ethernet ports are Auto-MDIX) Power Adapter (12V, 1A) CD-ROM with Software and Manual Quick Installation Guide Using a power supply with a different voltage than the one included with your product will cause damage and void the warranty for this product.
Wireless LAN Networking This section provides background information on wireless LAN networking technology. Consult the Glossary for definitions of the terminology used in this section. THE INFORMATION IN THIS SECTION IS FOR YOUR REFERENCE. CHANGING NETWORK SETTINGS AND PARTICULARLY SECURITY SETTTINGS SHOULD ONLY BE DONE BY AN AUTHORIZED ADMINISTRATOR. Transmission Rate (Transfer Rate) The WRT-390U provides various transmission (data) rate options for you to select.
7
When a number of wireless stations are connected using a single access point, you have a Basic Service Set (BSS). In the ESS diagram below, communication is done through the access points, which relay data packets to other wireless stations or devices connected to the wired network. Wireless stations can then access resources, such as a printer, on the wired network.
In an ESS environment, users are able to move from one access point to another without losing the connection. In the diagram below, when the user moves from BSS (1) to BSS (2) the WLAN client devices automatically switches to the channel used in BSS (2).
Introduction The WRT-390U 11n (Draft) Wireless GbE Router is an high-performance, wireless router that supports high-speed wireless networking at home, at work or in public places. Unlike most routers, the WRT-390U provides data transfers at up to 300Mbps when using 11n (Draft) connection. This router is also back compatible with 802.11g or 11b devices. This means that you do not need to change your entire network to maintain connectivity.
Work with IE6.0 and above, FireFox, Opera, Netescape web browsers. Support 4 x 10/100/1000Mbps Auto-MDIX LAN Port and 1 x 10/100/1000Mbps WAN Port (Internet) Built-in 3 External Antennas to support high speed performance and great coverage.
Hardware Overview LED Indications: (from bottom to top) PWR WAN LAN1 LAN2 LAN3 LAN4 Wireless WPS Reserve Reserve Rear panel: (from bottom to top) • DC-IN • RESET • WAN • LAN1 • LAN2 • LAN3 • LAN4 12
Installation Considerations The WRT-390U 11n (Draft) Wireless Router lets you access your network, using a wireless connection, from virtually anywhere within its operating range. Keep in mind, however, that the number, thickness and location of walls, ceilings, or other objects that the wireless signals must pass through, may limit the range. Typical ranges vary depending on the types of materials and background RF (radio frequency) noise in your home or business.
Using the Configuration Menu Whenever you want to configure your WRT-390U, you can access the Configuration Menu through your PC by opening the Web-browser and typing in the IP Address of the WRT-390U. The WRT-390U’s default IP Address is http://192.168.0.1 Open the Web browser. Type in the IP Address of the Router (http://192.168.0.1). If you have changed the default IP Address assigned to the WRT-390U, make sure to enter the correct IP Address. Select admin in the User Name field.
Basic The Basic tab provides the following configuration options: Internet, Wireless and Network Settings. Basic_Internet Internet Connection Setup Wizard If you are new to networking and have never configured a router before, click on Setup Wizard and the router will guide you through a few simple steps to get your network up and running.
Basic_Wireless The wireless section is used to configure the wireless settings for your router. Note that changes made in this section may also need to be duplicated on wireless clients that you want to connect to your wireless network. To protect your privacy, use the wireless security mode to configure the wireless security features. This device supports three wireless security modes including: WEP, WPA-Personal, and WPA-Enterprise. WEP is the original wireless encryption standard.
Wireless Channel A wireless network uses specific channels in the wireless spectrum to handle communication between clients. Some channels in your area may have interference from other electronic devices. Choose the clearest channel to help optimize the performance and coverage of your wireless network. 802.11 Mode If all of the wireless devices you want to connect with this router can connect in the same transmission mode, you can improve performance slightly by choosing the appropriate "Only" mode.
64-bit ASCII keys are up to 5 characters in length (DMODE is a valid string of 5 characters for 64-bit encryption.) 128-bit ASCII keys are up to 13 characters in length (2002HALOSWIN1 is a valid string of 13 characters for 128-bit encryption.) Note that, if you enter fewer characters in the WEP key than required, the remainder of the key is automatically padded with zeros.
RADIUS Server IP Address: The IP address of the authentication server. RADIUS Server Port: The port number used to connect to the authentication server. RADIUS Server Shared Secret: A pass-phrase that must match with the authentication server. MAC Address Authentication: If this is selected, the user must connect from the same computer whenever logging into the wireless network. Advanced: Optional Backup RADIUS Server This option enables configuration of an optional second RADIUS server.
Basic_Network Settings Use this section to configure the internal network settings of your router. The IP Address that is configured here is the IP Address that you use to access the Web-based management interface. If you change the IP Address here, you may need to adjust your PC’s network settings to access the network again.
Router Settings These are the settings of the LAN (Local Area Network) interface for the router. The router's local network (LAN) settings are configured based on the IP Address and Subnet Mask assigned in this section. The IP address is also used to access this Web-based management interface. It is recommended that you use the default settings if you do not have an existing network. IP Address The IP address of your router on the local area network.
the range of IP addresses available for the LAN. For example, 192.168.0.101. Subnet Mask The subnet mask of the local area network. Gateway The IP address of the router on the local area network. For example, 192.168.0.1. Primary DNS Server, Secondary DNS Server Enter the IP addresses of the DNS Servers. Leave the field for the secondary server empty if not used. DHCP Server Settings DHCP stands for Dynamic Host Configuration Protocol.
addresses from these ranges are to be manually configured. Suppose you have a web server computer that has a manually configured address of 192.168.0.100. Because this falls within the "managed range" be sure to create a reservation for this address and match it to the relevant computer (see Static DHCP Client below). DHCP Lease Time The amount of time that a computer may have an IP address before it is required to renew the lease. The lease functions just as a lease on an apartment would.
servers are reachable by a slow network link and the majority of network services such as servers and printers are local to the LAN. P-Node, this indicates to use WINS servers ONLY. This setting is useful to force all NetBIOS operation to the configured WINS servers. You must have configured at least the primary WINS server IP to point to a working WINS server. B-Node, this indicates to use local network broadcast ONLY.
Specifies whether the entry will be active or inactive. Save/Update Record the changes you have made into the following list. Clear Re-initialize this area of the screen, discarding any changes you have made. DHCP Reservations List This shows clients that you have specified to have reserved DHCP addresses. Click the Enable checkbox at the left to directly activate or de-activate the entry. An entry can be changed by clicking the Edit icon or can be deleted by clicking the Delete icon.
Advanced The Advanced tab provides the following configuration options: Virtual Server, Port Forwarding, Application Rules, StreamEngine, Routing, Access Control, Website Filter, Network Filter, Firewall Settings, Inbound Filter, Advanced Wireless, WISH, Wi-Fi Protected Setup, and Advanced Network Advanced_Virtual Server The Virtual Server option gives Internet users access to services on your LAN. This feature is useful for hosting online services such as FTP, Web, or game servers.
Example: You are hosting a Web Server on a PC that has LAN IP Address of 192.168.0.50 and your ISP is blocking Port 80. 1. Name the Virtual Server (for example: Web Server) 2. Enter the IP Address of the machine on your LAN (for example: 192.168.0.50) 3. Enter the Private Port as [80] 4. Enter the Public Port as [8888] 5. Select the Protocol (for example TCP). 6. Ensure the schedule is set to Always 7. Click Save to add the settings to the Virtual Servers List 8.
Inbound Filter Select a filter that controls access as needed for this virtual server. If you do not see the filter you need in the list of filters, go to the Advanced → Inbound Filter screen and create a new filter. Save/Update Record the changes you have made into the following list. Clear Re-initialize this area of the screen, discarding any changes you have made. Virtual Server List This is a list of the defined Virtual Servers.
Advanced_Special Applications An application rule is used to open single or multiple ports on your router when the router senses data sent to the Internet on a "trigger" port or port range. An application rule applies to all computers on your internal network. Add/Edit Application Rule Example: You need to configure your router to allow a software application running on any computer on your network to connect to a web-based server or another user on the Internet.
Firewall Traffic Type Select the protocol used by the Internet traffic coming back into the router through the opened port range (for example Both). Schedule Select a schedule for when this rule is in effect. If you do not see the schedule you need in the list of schedules, go to the Tools → Schedules screen and create a new schedule. Save/Update Record the changes you have made into the following list. Clear Re-initialize this area of the screen, discarding any changes you have made.
Advanced_ Port Forwarding Multiple connections are required by some applications, such as internet games, video conferencing, Internet telephony, and others. These applications have difficulties working through NAT (Network Address Translation). This section is used to open multiple ports or a range of ports in your router and redirect data through those ports to a single PC on your network.
IP Address Enter the local network IP address of the system hosting the server, for example 192.168.0.50. You can select a computer from the list of DHCP clients in the "Computer Name" drop-down menu, or you can manually enter the IP address of the server computer. TCP Ports Enter the TCP ports to open (for example 6159-6180, 99). UDP Ports Enter the UDP ports to open (for example 6159-6180, 99). Schedule Select a schedule for the times when this rule is in effect.
Advanced_ StreamEngine The StreamEngine feature helps improve your network performance by prioritizing applications. WAN Traffic Shaping Enable Traffic Shaping When this option is enabled, the router restricts the flow of outbound traffic so as not to exceed the WAN uplink bandwidth. Automatic Uplink Speed When enabled, this option causes the router to automatically measure the useful uplink bandwidth each time the WAN interface is re-established (after a reboot, for example).
Manual Uplink Speed If Automatic Uplink Speed is disabled, this options allows you to set the uplink speed manually. Uplink speed is the speed at which data can be transferred from the router to your ISP. This is determined by your ISP. ISPs often specify speed as a downlink/uplink pair; for example, 1.5Mbps/284kbps. For this example, you would enter "284". Alternatively you can test your uplink speed with a service such as www.dslreports.com.
Name Create a name for the rule that is meaningful to you. Priority The priority of the message flow is entered here -- 0 receives the highest priority (most urgent) and 255 receives the lowest priority (least urgent). Protocol The protocol used by the messages. Local IP Range The rule applies to a flow of messages whose LAN-side IP address falls within the range set here. Local Port Range The rule applies to a flow of messages whose LAN-side port number is within the range set here.
Advanced_Routing Add/Edit Route Adds a new route to the IP routing table or edits an existing route. Enable Specifies whether the entry will be enabled or disabled. Destination IP The IP address of packets that will take this route. Netmask One bits in the mask specify which bits of the IP address must match. Gateway Specifies the next hop to be taken if this route is used. A gateway of 0.0.0.
Clear Re-initialize this area of the screen, discarding any changes you have made. Routes List The section shows the current routing table entries. Certain required routes are predefined and cannot be changed. Routes that you add can be changed by clicking the Edit icon or can be deleted by clicking the Delete icon. When you click the Edit icon, the item is highlighted, and the "Edit Route" section is activated for editing. Click the Enable checkbox at the left to directly activate or de-activate the entry.
Advanced_Access Control The Access Control section allows you to control access in and out of devices on your network. Use this feature as Parental Controls to only grant access to approved sites, limit web access based on time or dates, and/or block access from applications such as peer-to-peer utilities or games. Enable By default, the Access Control feature is disabled. If you need Access Control, check this option.
Advanced_WEB Filter This section is where you add the Web sites to be used for Access Control. The Web sites listed here are used when the Web Filter option is enabled in Access Control. Add Web Filtering Rule This section is where you add the Web sites to be used for Access Control. Website URL/Domain Enter the URL (address) of the Web Site that you want to allow; for example: google.com. Do not enter the http:// preceding the URL. Enter the most inclusive domain; for example, enter ubicom.
Advanced_ MAC Address Filter (Network Filter) The MAC address filter section can be used to filter network access by machines based on the unique MAC addresses of their network adapter(s). It is most useful to prevent unauthorized wireless devices from connecting to your network. A MAC address is a unique ID assigned by the manufacturer of the network adapter. MAC Filtering Setup Choose the type of MAC filtering needed.
Advanced_ Firewall Settings The router provides a tight firewall by virtue of the way NAT works. Unless you configure the router to the contrary, the NAT does not respond to unsolicited incoming requests on any port, thereby making your LAN invisible to Internet cyberattackers. However, some network applications cannot run with a tight firewall. Those applications need to selectively open ports in the firewall to function correctly.
Firewall Settings Enable SPI SPI ("stateful packet inspection" also known as "dynamic packet filtering") helps to prevent cyberattacks by tracking more state per session. It validates that the traffic passing through that session conforms to the protocol. When the protocol is TCP, SPI checks that packet sequence numbers are within the valid range for the session, discarding those packets that do not have valid sequence numbers.
UDP Endpoint Filtering Controls endpoint filtering for packets of the UDP protocol. TCP Endpoint Filtering Controls endpoint filtering for packets of the TCP protocol. Formerly, the terms "Full Cone", "Restricted Cone", "Port Restricted Cone" and "Symmetric" were used to refer to different variations of NATs. These terms are purposely not used here, because they do not fully describe the behavior of this router's NAT.
rather like a selective DMZ, where incoming traffic targeted at one or more ports is forwarded to a specific LAN host (thereby not exposing as many ports as a DMZ host). Port triggering is a special form of port forwarding, which is activated by outgoing traffic, and for which ports are only forwarded while the trigger is active. Few applications truly require the use of the DMZ host.
advantage of disabling the PPTP ALG is to increase VPN performance. Enabling the PPTP ALG also allows incoming VPN connections to a LAN side VPN server (refer to Advanced → Virtual Server). IPSec (VPN) Allows multiple VPN clients to connect to their corporate networks using IPSec. Some VPN clients support traversal of IPSec through NAT. This option may interfere with the operation of such VPN clients. If you are having trouble connecting with your corporate network, try disabling this option.
Advanced_ Inbound Filter When you use the Virtual Server, Port Forwarding, or Remote Administration features to open specific ports to traffic from the Internet, you could be increasing the exposure of your LAN to cyberattacks from the Internet. In these cases, you can use Inbound Filters to limit that exposure by specifying the IP addresses of internet hosts that you trust to access your LAN through the ports that you have opened.
Remote IP Range Define the ranges of Internet addresses this rule applies to. For a single IP address, enter the same address in both the Start and End boxes. Up to eight ranges can be entered. The Enable checkbox allows you to turn on or off specific entries in the list of ranges. Save/Update Record the changes you have made into the following list. Clear Re-initialize this area of the screen, discarding any changes you have made.
Advanced_ Advanced Wireless Transmit Power Normally the wireless transmitter operates at 100% power. In some circumstances, however, there might be a need to isolate specific frequencies to a smaller area. By reducing the power of the radio, you can prevent transmissions from reaching beyond your corporate/home office or designated wireless area. Beacon Period Beacons are packets sent by a wireless router to synchronize wireless devices. Specify a Beacon Period value between 20 and 1000.
Wireless Isolation Enabling Wireless Isolation prevents associated wireless clients from communicating with each other. WMM Enable Enabling WMM can help control latency and jitter when transmitting multimedia content over a wireless connection. Short GI Using a short (400ns) guard interval can increase throughput. However, it can also increase error rate in some installations, due to increased sensitivity to radio-frequency reflections. Select the option that works best for your installation.
Advanced_ WISH WISH is short for Wireless Intelligent Stream Handling, a technology developed to enhance your experience of using a wireless network by prioritizing the traffic of different applications. WISH Enable WISH Enable this option if you want to allow WISH to prioritize your traffic. Priority Classifiers HTTP Allows the router to recognize HTTP transfers for many common audio and video streams and prioritize them above other traffic. Such streams are frequently used by digital media players.
This acts to deprioritize streams that exhibit bulk transfer characteristics, such as file transfers, while leaving interactive traffic, such as gaming or VoIP, running at a normal priority. Add/Edit WISH Rule A WISH Rule identifies a specific message flow and assigns a priority to that flow. For most applications, the priority classifiers ensure the right priorities and specific WISH Rules are not required. WISH supports overlaps between rules.
WISH Rules This section lists the defined WISH Rules. Click the Enable checkbox at the left to directly activate or de-activate the entry. An entry can be changed by clicking the Edit icon or can be deleted by clicking the Delete icon. When you click the Edit icon, the item is highlighted, and the "Edit WISH Rule" section is activated for editing.
Advanced_ Wi-Fi Protected Setup Wi-Fi Protected Setup Enable Enable the Wi-Fi Protected Setup feature. Lock Wireless Security Settings Locking the wireless security settings prevents the settings from being changed by any new external registrar using its PIN. Devices can still be added to the wireless network using Wi-Fi Protected Setup. It is still possible to change wireless network settings with Manual Wireless Network Setup, Wireless Network Setup Wizard, or an existing external WLAN Manager Registrar.
The wizard will either display the wireless network settings to guide you through manual configuration, prompt you to enter the PIN for the device, or ask you to press the configuration button on the device. If the device supports Wi-Fi Protected Setup and has a configuration button, you can add it to the network by pressing the configuration button on the device and then the on the router within 60 seconds.
Advanced_ Advanced Network UPnP UPnP is short for Universal Plug and Play, which is a networking architecture that provides compatibility among networking equipment, software, and peripherals. This router has optional UPnP capability, and can work with other UPnP devices and software. Enable UPnP If you need to use the UPnP functionality, you can enable it here. Allow Users to disable Internet Access Disabling this option prevents UPnP clients from terminating the WAN connection.
If you leave this option unchecked, you are causing the router to ignore ping commands for the public WAN IP address of the router. WAN Ping Inbound Filter Select a filter that controls which WAN computers can use the ping feature. If you do not see the filter you need in the list of filters, go to the Advanced → Inbound Filter screen and create a new filter. WAN Port Speed Normally, this is set to "auto". If you have trouble connecting to the WAN, try the other settings.
Tools The Tools tab provides the following configuration options: Admin, Time, Syslog, Email Settings, System, Firmware, Dynamic DNS, Windows Connect Now, System Check & Schedules. Tools_Admin (Administrator Settings) The Administrator Settings section is used to set-up secure access to the Web-based management. By default no password is configured. It is highly recommended that you create a password to keep your new router secure.
Gateway Name The name of the router can be changed here. Inactivity Time Out If the router does not detect any administrative activity (from WAN or LAN) during this number of minutes, it logs the adminstrator off. Enable HTTPS Server Enabling this option makes it possible to perform remote management with the Secure HTTP (HTTPS) protocol. Enable Remote Management Enabling Remote Management allows you to manage the router from anywhere on the Internet.
Tools_Time The Time Configuration option allows you to configure, update, and maintain the correct time on the router's internal system clock. From this section you can set the time zone that you are in and set the Time Server. Daylight saving can also be configured to automatically adjust the time when needed. Time Configuration Current Router Time Displays the time currently maintained by the router. If this is not correct, use the following options to configure the time correctly.
Time="2am". This is the same as saying: "Daylight saving starts on the third Sunday of October at 2:00 AM." Time Configuration Current Router Time Displays the time currently maintained by the router. If this is not correct, use the following options to configure the time correctly. Time Zone Select your local time zone from pull down menu. Enable Daylight Saving Check this option if your location observes daylight saving time.
Tools_Syslog This section allows you to archive your log files to a Syslog Server. Enable Logging to Syslog Server Enable this option if you have a syslog server currently running on the LAN and wish to send log messages to it. Syslog Server IP Address Enter the LAN IP address of the Syslog Server.
Tools_Email Settings The Email feature can be used to send the system log files, router alert messages, and firmware update notification to your email address. Enable Enable Email Notification When this option is enabled, router activity logs or firmware upgrade notifications can be emailed to a designated email address, and the following parameters are displayed.
Enter your account for sending email. Password Enter the password associated with the account. Verify Password Re-type the password associated with the account. Email Log When Full or on Schedule On Log Full Select this option if you want logs to be sent by email when the log is full. On Schedule Select this option if you want logs to be sent by email according to a schedule. Schedule If you selected the On Schedule option, select one of the defined schedule rules.
Tools_System This section allows you to manage the router's configuration settings, reboot the router, and restore the router to the factory default settings. Restoring the unit to the factory default settings will erase all settings, including any rules that you've created. Save To Local Hard Drive This option allows you to save the router's configuration to a file on your computer. Be sure to save the configuration before performing a firmware upgrade.
Tools_Firmware Use the Firmware section to install the latest firmware to improve functionality and performance. If you would like to be notified when new firmware is released, place a checkmark in the box next to Email Notification of Newer Firmware Version. To upgrade the firmware, follow these steps: 1. Click the Browse button to locate the upgrade file on your computer. 2. Once you have found the file to be used, click the Upload button below to start the firmware upgrade process.
Some firmware upgrades reset the configuration options to the factory defaults. Before performing an upgrade, be sure to save the current configuration from the Tools → System screen. Upload Once you have a firmware update on your computer, use this option to browse for the file and then upload the information into the router.
Tools_Dynamic DNS The Dynamic DNS feature allows you to host a server (Web, FTP, Game Server, etc.) using a domain name that you have purchased (www.whateveryournameis.com) with your dynamically assigned IP address. Most broadband Internet Service Providers assign dynamic (changing) IP addresses. When you use a Dynamic DNS service provider, your friends can enter your host name to connect to your server, no matter what your IP address is.
If a dynamic DNS update fails for any reason (for example, when incorrect parameters are entered), the router automatically disables the Dynamic DNS feature and records the failure in the log. After configuring the router for dynamic DNS, you can open a browser and navigate to the URL for your domain (for example http://www.mydomain.info) and the router will attempt to forward the request to port 80 on your LAN.
Tools_System Check Ping Test "Ping" is an Internet utility function that sends a series of short messages to a target computer and reports the results. You can use it to test whether a computer is running, and to get an idea of the quality of the connection to that computer, based on the speed of the responses. Host Name or IP Address Enter either the IP address of the target computer or enter its fully qualified domain name. Ping Start pinging the specified host.
Tools_Schedules Schedules can be created for use with enforcing rules. For example, if you want to restrict web access to Mon-Fri from 3pm to 8pm, you could create a schedule selecting Mon, Tue, Wed, Thu, and Fri and enter a Start Time of 3pm and End Time of 8pm. Add/Edit Schedule Rule In this section you can add entries to the Schedule Rules List below or edit existing entries. Name Give the schedule a name that is meaningful to you, such as "Weekday rule".
Re-initialize this area of the screen, discarding any changes you have made. Schedule Rules List This section shows the currently defined Schedule Rules. An entry can be changed by clicking the Edit icon or can be deleted by clicking the Delete icon. When you click the Edit icon, the item is highlighted, and the "Edit Schedule Rule" section is activated for editing.
Status The Status tab provides the following configuration options: Device Info, Wireless, Logs, Statistics, Internet Sessions and WISH Sessions. Status_Device info All of your Internet and network connection details are displayed on the Device Info page. The firmware version is also displayed here. Note: Some browsers have limitations that make it impossible to update the WAN status display when the status changes. Some browsers require that you refresh the display to obtain updated status.
Depending on the type of WAN connection, you can take one of the following sets of actions: DHCP Connection Clicking the DHCP Release button unassigns the router's IP address. The router will not respond to IP messages from the WAN side until you click the DHCP Renew button or power-up the router again. Clicking the DHCP Renew button causes the router to request a new IP address from the ISP's server.
Status_Wireless The wireless section allows you to view the wireless clients that are connected to your wireless router. MAC Address The Ethernet ID (MAC address) of the wireless client. IP Address The LAN-side IP address of the client. Mode The transmission standard being used by the client. Values are 11b, 11g, or 11n for 802.11b, 802.11g, or 802.11n respectively. Rate The actual transmission rate of the client in megabits per second. Signal This is a relative measure of signal quality.
Status_Routing The routing section displays all of the routing details configured for your router. A value of 0.0.0.0 for gateway means there is no next hop, and the IP address is directly connected to the router on the interface specified: LAN or WAN. A value of 0.0.0.0 in both the destination IP and netmask means that this is the default route.
Status_Logs The router automatically logs (records) events of possible interest in its internal memory. If there is not enough internal memory for all events, logs of older events are deleted, but logs of the latest events are retained. The Logs option allows you to view the router logs. You can define what types of events you want to view and the level of events to view.
Clicking this button refreshes the display of log entries. There may be new events since the last time you accessed the log. Clear Clicking this button erases all log entries. Email Now If you provided email information with the Tools → Email Settings screen, clicking the Email Now button sends the router log to the configured email address. Save Log Select this option to save the router log to a file on your computer.
Status_Statistics The Statistics page displays all of the LAN, WAN, and Wireless packet transmit and receive statistics. Sent The number of packets sent from the router. Received The number of packets received by the router. TX Packets Dropped The number of packets that were dropped while being sent, due to errors, collisions, or router resource limitations. RX Packets Dropped The number of packets that were dropped while being received, due to errors, collisions, or router resource limitations.
Status_ Internet Sessions The Internet Sessions page displays full details of active Internet sessions through your router. An Internet session is a conversation between a program or application on a LAN-side computer and a program or application on a WAN-side computer. Local The IP address and, where appropriate, port number of the local application. NAT The port number of the LAN-side application as viewed by the WAN-side application.
Out Initiated from LAN to WAN. In Initiated from WAN to LAN. Priority The preference given to outbound packets of this conversation by the QoS Engine logic. Smaller numbers represent higher priority. Time Out The number of seconds of idle time until the router considers the session terminated. The initial value of Time Out depends on the type and state of the connection. 300 seconds UDP connections. 240 seconds Reset or closed TCP connections.
Status_WISH Sessions The WISH Sessions page displays full details of active local wireless sessions through your router when WISH has been enabled. A WISH session is a conversation between a program or application on a wirelessly connected LAN-side computer and another computer, however connected. Originator The IP address and, where appropriate, port number of the computer that originated a network connection.
• BE: Best Effort. • VI: Video. • VO: Voice (most urgent). Time Out The number of seconds of idle time until the router considers the session terminated. The initial value of Time Out depends on the type and state of the connection. 300 seconds UDP connections. 240 seconds Reset or closed TCP connections. The connection does not close instantly so that lingering packets can pass or the connection can be re-established. 7800 seconds Established or closing TCP connections.
Glossary 8 802.11 A family of specifications for wireless local area networks (WLANs) developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE). A Access Control List ACL. This is a database of network devices that are allowed to access resources on the network. Access Point AP. Device that allows wireless clients to connect to it and access the network ActiveX A Microsoft specification for the interaction of software components. Address Resolution Protocol ARP.
ASCII American Standard Code for Information Interchange. This system of characters is most commonly used for text files Attenuation The loss in strength of digital and analog signals. The loss is greater when the signal is being transmitted over long distances. Authentication To provide credentials, like a Password, in order to verify that the person or device is really who they are claiming to be Automatic Private IP Addressing APIPA.
A wide band of frequencies available for transmitting data Broadcast Transmitting data in all directions at once Browser A program that allows you to access resources on the web and provides them to you graphically C Cable modem A device that allows you to connect a computer up to a coaxial cable and receive Internet access from your Cable provider CardBus A newer version of the PC Card or PCMCIA interface. It supports a 32-bit data path, DMA, and consumes less voltage CAT 5 Category 5.
DB-25 A 25 ping male connector for attaching External modems or RS-232 serial devices DB-9 A 9 pin connector for RS-232 connections dBd Decibels related to dipole antenna dBi Decibels relative to isotropic radiator dBm Decibels relative to one milliwatt Decrypt To unscramble an encrypted message back into plain text Default A predetermined value or setting that is used by a program when no user input has been entered for this value or setting Demilitarized zone DMZ: A single computer or group of computers t
To send a request from one computer to another and have the file transmitted back to the requesting computer DSL Digital Subscriber Line. High bandwidth Internet connection over telephone lines Duplex Sending and Receiving data transmissions at the sane time Dynamic DNS service Dynamic DNS is provided by companies to allow users with Dynamic IP addresses to obtain a Domain Name that will always by linked to their changing IP address.
Programming that is inserted into a hardware device that tells it how to function Fragmentation Breaking up data into smaller pieces to make it easier to store FTP File Transfer Protocol.
Hypertext Transfer Protocol is used to transfer files from HTTP servers (web servers) to HTTP clients (web browsers) HTTPS HTTP over SSL is used to encrypt and decrypt HTTP transmissions Hub A networking device that connects multiple devices together I ICMP Internet Control Message Protocol IEEE Institute of Electrical and Electronics Engineers IGMP Internet Group Management Protocol is used to make sure that computers can report their multicast group membership to adjacent routers IIS Internet Information
A type of security that scans a network to detect attacks coming from inside and outside of the network IP Internet Protocol IP address A 32-bit number, when talking about Internet Protocol Version 4, that identifies each computer that transmits data on the Internet or on an Intranet IPsec Internet Protocol Security IPX Internetwork Packet Exchange is a networking protocol developed by Novel to enable their Netware clients and servers to communicate ISP Internet Service Provider J Java A programming langua
Local Area Network A group of computers in a building that usually access files from a server LPR/LPD "Line Printer Requestor"/"Line Printer Daemon". A TCP/IP protocol for transmitting streams of printer data. M MAC Address A unique hardware ID assigned to every Ethernet adapter by the manufacturer.
NetBIOS Network Basic Input/Output System Netmask Determines what portion of an IP address designates the Network and which part designates the Host Network Interface Card A card installed in a computer or built onto the motherboard that allows the computer to connect to a network Network Layer The third layer of the OSI model which handles the routing of traffic on a network Network Time Protocol Used to synchronize the time of all the computers in a network NIC Network Interface Card NTP Network Time Prot
A utility program that verifies that a given Internet address exists and can receive messages. The utility sends a control packet to the given address and waits for a response. PoE Power over Ethernet is the means of transmitting electricity over the unused pairs in a category 5 Ethernet cable POP3 Post Office Protocol 3 is used for receiving email Port A logical channel endpoint in a network.
Routing Information Protocol is used to synchronize the routing table of all the routers on a network RJ-11 The most commonly used connection method for telephones RJ-45 The most commonly used connection method for Ethernet RS-232C The interface for serial communication between computers and other related devices RSA Algorithm used for encryption and authentication S Server A computer on a network that provides services and resources to other computers on the network Session key An encryption and decryptio
SSH Secure Shell is a command line interface that allows for secure connections to remote computers SSID Service Set Identifier is a name for a wireless network Stateful inspection A feature of a firewall that monitors outgoing and incoming traffic to make sure that only valid responses to outgoing requests are allowed to pass though the firewall Subnet mask Determines what portion of an IP address designates the Network and which part designates the Host Syslog System Logger -- a distributed logging interf
A standard that allows network devices to discover each other and configure themselves to be a part of the network Upgrade To install a more recent version of a software or firmware product Upload To send a request from one computer to another and have a file transmitted from the requesting computer to the other UPnP Universal Plug and Play URL Uniform Resource Locator is a unique address for files accessible on the Internet USB Universal Serial Bus UTP Unshielded Twisted Pair V Virtual Private Network VPN
Wireless Distribution System. A system that enables the interconnection of access points wirelessly.