Advanced Settings These settings are only for more technically advanced users who have sufficient knowledge about wireless LAN. These settings should not be changed unless you know what effect the changes will have on your device. The default setting is optimized for the normal operation. For specific application, setting configuration will required highly attention to reach optimistic condition. Note: Any unreasonable value change to default setting will reduce the throughput of the device.
can be useful in areas where many client devices are associating with the device, or in areas where the clients are far apart and can detect only the device and not each other. You can enter a setting ranging from 0 to 2347 bytes. Data Rate The standard IEEE 802.11b/11g supports 1, 2, 5.5, 11 / 6, 9, 12, 18, 24, 36, 48 and 54 Mbps data rates. You can choose the rate that the device uses for data transmission. The default value is “auto”. The device will use the highest possible selected transmission rate.
Block WLAN Relay (Isolate Client) The device supports isolation function. If you are building a public Wireless Network, enable this function can provide better security. The device will block packets between wireless clients (relay). All the wireless clients connected to the device can’t see each other. Transmit Power The device supports four transmission output power levels 250, 200, 150 and 100mW for CCK (802.11b) mode and two transmission output power levels 100 and 50mW for OFDM (802.11g) mode.
Configuring Wireless Security This device provides complete wireless security function include WEP, 802.1x, WPA-TKIP, WPA2-AES and WPA2-Mixed in different mode (see the Security Support Table). The default security setting of the encryption function is disabled. Choose your preferred security setting depending on what security function you need. WEP Encryption Setting Wired Equivalent Privacy (WEP) is implemented in this device to prevent unauthorized access to your wireless network.
refer to the following setting of the WEP encryption: z 64-bit WEP Encryption:64-bit WEP keys are as same as the encryption method of 40-bit WEP. You can input 10 hexadecimal digits (0~9, a~f or A~F) or 5 ACSII chars. z 128-bit WEP Encryption:128-bit WEP keys are as same as the encryption method of 104-bit WEP. You can input 26 hexadecimal digits (0~9, a~f or A~F) or 10 ACSII chars. z The Default Tx Key field decides which of the four keys you want to use in your WLAN environment.
WPA Encryption Setting WPA feature provides a high level of assurance for end-users and administrators that their data will remain private and access to their network restricted to authorized users. You can choose the WPA encryption and select the Authentication Mode. WPA Authentication Mode This device supports two WPA modes. For personal user, you can use the Pre-shared Key to enhance your security setting. This mode requires only an access point and client station that supports WPA-PSK.
Configuring as WLAN Client Adapter This device can be configured as a wireless Ethernet adapter. In this mode, the device can connect to the other wireless stations (Ad-Hoc network type) or Access Point (Infrastructure network type) and you don’t need to install any driver. Quick start to configure Step 1. In “Basic Settings” page, change the Mode to “Client” mode. And key in the SSID of the AP you want to connect then press “Apply Changes” button to apply the change. Step 2.
The alternative way to configure as following: Step 1. In “Wireless Site Survey” page, select one of the SSIDs you want to connect and then press “Connect” button to establish the link. Step 2. If the linking is established successfully. It will show the message “Connect successfully”. Then press “OK”. Step 3. Then you can check the linking information in “Status” page.
Note : If the available network requires authentication and data encryption, you need to setup the authentication and encryption before step1 and all the settings must be as same as the Access Point or Station. About the detail authentication and data encryption settings, please refer the security section. Authentication Type In client mode, the device also supports two Authentication Types “Open system” and “Shared Key”.
Ch 3. Configuring WDS Wireless Distribution System (WDS) uses wireless media to communicate with the other devices, like the Ethernet does. This function allows one or more remote LANs connect with the local LAN. To do this, you must set these devices in the same channel and set MAC address of other devices you want to communicate with in the WDS AP List and then enable the WDS. When you decide to use the WDS to extend your WLAN, please refer the following instructions for configuration.
Star topology: Device Entries of WDS AP List WDS1 The MAC Addresses of WDS2, WDS3, WDS4 and WDS5 The MAC Address of WDS1 The MAC Address of WDS1 The MAC Address of WDS1 The MAC Address of WDS1 WDS2 WDS3 WDS4 WDS5 Spanning Tree Protocol Required No No No No No Ring topology: Device WDS1 WDS2 WDS3 WDS4 WDS5 Entries of WDS AP List The MAC Addresses of WDS2 and WDS5 The MAC Addresses of WDS1 and WDS3 The MAC Addresses of WDS2 and WDS4 The MAC Addresses of WDS3 and WDS5 The MAC Addresses of WDS4 and WDS
Mesh topology: LAN 1 WDS #1 LAN 5 LAN 2 WDS #2 WDS #5 WDS #4 LAN 4 WDS #3 LAN3 Device Entries of WDS AP List WDS1 WDS2 WDS3 WDS4 WDS5 The MAC Addresses of WDS2, WDS3, WDS4 and WDS5 The MAC Addresses of WDS1, WDS3, WDS4 and WDS5 The MAC Addresses of WDS1, WDS2, WDS4 and WDS5 The MAC Addresses of WDS1, WDS2, WDS3 and WDS5 The MAC Addresses of WDS1, WDS2, WDS3 and WDS4 Spanning Tree Protocol Required Yes Yes Yes Yes Yes WDS Application Wireless Repeater Wireless Repeater can be used to increase
Ethernet Wireless station AP Description Access Point Repeater Repeater Entries of WDS AP List The MAC Address of Repeater The MAC Address of Access Point Spanning Tree Protocol Required Yes Yes Wireless Bridge Wireless Bridge can establish a wireless connection between two or more Wired LANs. When you decide to use the WDS as a Wireless Bridge, please refer the following instructions for configuration. z In AP mode, enable the WDS function.
Ch 4. Advanced Configurations Configuring LAN to WAN Firewall Filtering function is used to block packets from LAN to WAN. The device supports three kinds of filter Port Filtering, IP Filtering and MAC Filtering. All the entries in current filter table are used to restrict certain types of packets from your local network to through the device. Use of such filters can be helpful in securing or restricting your local network.
MAC Filtering When you enable the MAC Filtering function, you can specify the MAC Addresses in current filter table. Once the source MAC Address of outgoing packets match the MAC Addresses in the table, the firewall will block this packet from LAN to WAN. Configuring Port Forwarding (Virtual Server) This function allows you to automatically redirect common network services to a specific machine behind the NAT firewall.
POP3 (Post Protocol) NNTP (Network News Transport Protocol) SNMP (Simple Network Management Protocol) SNMP trap SIP (Session Initiation Protocol) PPTP (Point-to-Point Tunneling Protocol) 110 119 161 162 5060 1723 Multiple Servers behind NAT Example: In this case, there are two PCs in the local network accessible for outside users. Configuring DMZ A Demilitarized Zone is used to provide Internet services without sacrificing unauthorized access to its local private network.
Enable DMZ: DMZ Host IP Address: Enable the “Enable DMZ”, and then click “Apply Changes” button to save the changes. Input the IP Address of the computer that you want to expose to Internet. Configuring WAN Interface The device supports four kinds of IP configuration for WAN interface, including Static IP, DHCP Client, PPPoE and PPTP. You can select one of the WAN Access Types depend on your ISP required. The default WAN Access Type is “Static IP”.
Static IP You can get the IP configuration data of Static-IP from your ISP. And you will need to fill the fields of IP address, subnet mask, gateway address, and one of the DNS addresses. IP Address: Subnet Mask: Default Gateway: DNS 1~3: Clone MAC Address: Enable uPnP: The Internet Protocol (IP) address of WAN interface provided by your ISP or MIS. The address will be your network identifier besides your local network.
DHCP Client (Dynamic IP) All IP configuration data besides DNS will obtain from the DHCP server when DHCP-Client WAN Access Type is selected. DNS1~3: The IP addresses of DNS provided by your ISP. DNS (Domain Name Server) is used to map domain names to IP addresses. DNS maintain central lists of domain name/IP addresses and map the domain names in your Internet requests to other servers on the Internet until the specified web site is found.
User Name: The account provided by your ISP Password: The password for your account. Connect Type: “Continuous “ : connect to ISP permanently “Manual” : Manual connect/disconnect to ISP “On-Demand” : Automatically connect to ISP when user need to access the Internet. Idle Time: The number of inactivity minutes to disconnect from ISP. This setting is only available when “Connect on Demand” connection type is selected.
IP Address: Subnet Mask: Server IP Address: (Default Gateway) User Name: Password: MTU Size: DNS1~3: Clone MAC Address: Enable uPnP: The Internet Protocol (IP) address of WAN interface provided by your ISP or MIS. The address will be your network identifier besides your local network. The number used to identify the IP subnet network, indicating whether the IP address can be recognized on the LAN or if it must be reached through a gateway.
2. Clone MAC address for Static IP WAN access type 3.
4. Clone MAC address for PPTP WAN access type 5. Physical LAN interface MAC address clone Configuring DHCP Server 1. 2. 3. To use the DHCP server inside the device, please make sure there is no other DHCP server existed in the same network as the device. Enable the DHCP Server option and assign the client range of IP addresses as following page.
then the default gateway for all the DHCP client hosts will set to the IP address of device. Using CLI Menu Start a SSH(Secure Shell) client session to login the device The SSH server daemon inside device uses well-known TCP port 22. User must use SSH client utility such like Putty to login the device. The default password for user “root” is “qwert”, once user login the device then can change the password by CLI command.
To disable the Web-Browser password protection just leave the “User Name” field to blank then click “Apply Changes” button. To change the password of user “root” for SSH session, please use the CLI menu item G. System SettingÆA. Root Password About SNMP Agent This device is compatible with SNMP v1/v2c and provide standard MIB II. Currently only the “public” community string is available and the modified settings by SNMP SET request will be lost after rebooting the device.
To upgrade firmware, just assign the file name with full path then click “Upload” button as the following page. Memory Limitation To make sure the device have enough memory to upload firmware, the system will check the capacity of free memory, if the device lack of memory to upload firmware, please temporarily turn-off some functions then reboot the device to get enough memory for firmware uploading.
You are cautioned that changes or modifications not expressly approved by the party responsible for compliance could void your authority to operate the equipment. This equipment has been tested and found to comply with the limits for a class B digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide to provide reasonable protection against harmful interference in a residential installation.