User Manual TOTOLINK Wireless-N Router
TABLE OF CONTENT 1. ABOUT THIS GUIDE.......................................................................................................3 1DYLJDWLRQ RI WKH 8VHU¶V *XLGH........................................................................................... 3 2. PRODUCT OVERVIEW...................................................................................................3 2.1 Introduction..........................................................................................................
5.2.3 Site Survey...................................................................................................................................... 36 5.2.4 WDS................................................................................................................................................ 37 5.2.5 Advanced Settings .......................................................................................................................... 38 5.2.6 Access Control .............................
1. ABOUT THIS GUIDE Thank you very much for purchasing this router. This guide will introduce the features of this router and tell you how to connect, use and configure the router to access Internet. Please IROORZ WKH LQVWUXFWLRQV LQ WKLV JXLGH WR DYRLG DIIHFWLQJ WKH URXWHU¶V SHUIRUPDQFH E\ LPSURSHU operation. 1DYLJDWLRQ RI WKH 8VHU¶V *XLGH Product Overview: Describes the router¶V IXQFWLRQ and its features. Hardware Installation: Describes the hardware installation and settings on XVHU¶V computer.
¾ VLAN function for IPTV or other internet services. ¾ Supports IP, Port, MAC, URL filtering and Port Forwarding. ¾ QoS function allocates network bandwidth reasonably. ¾ Supports SSH Server function to ensure the security of remote login. ¾ Setup Wizard simplifies the basic settings of the router. 2.3 Panel Layout 2.3.1 Front Panel The front panel of this router consists of 8 LEDs, which is designed to indicate connection status.
1/2/3/4 LAN On When the LAN port has a successful connection, the corresponding indicator lights blue. Blink During transmitting or receiving data through the LAN port the corresponding indicator blinks blue. Off There is no device linked to the LAN port. 2.3.2 Rear Panel The figure below shows the rear panel of this router. Power ON/OFF Turn on or turn off the router by the switch. DC IN The Power socket is where you will connect the power adapter.
3. HARDWARE INSTALLATION 3.1 Hardware Installation For those computers you wish to connect with Internet by this router, each of the computers must be properly connected with the router through provided UTP LAN Cables. 1. &RQQHFW WKH SURYLGHG 873 /$1 FDEOH WR RQH RI WKH URXWHU¶V /$1 SRUW 2. &RQQHFW WKH RWKHU HQG RI WKH 873 /$1 FDEOH WR \RXU FRPSXWHU¶V /$1 SRUW 3. &RQQHFW WKH VHFRQG 873 /$1 FDEOH WR URXWHU¶V :$1 SRUW 4. Connect the other end of the UTP LAN cable to ADSL or Modem port. 5.
Figure 3-1 Successful Ping command If the result displayed is similar to the figure 3-1, it means that the connection between your PC and the router has been established. Figure 3-2 Failure Ping command If the result displayed is similar to the figure 3-2, it means that your PC has not connected to the router successfully. Please check it following below steps: 1. Is the connection between your PC and the router correct? If correct, the LAN port on the rRXWHU DQG /(' RQ \RXU 3&¶s adapter should be lit. 2.
4. CONNECTING TO INTERNET This chapter introduces how to configure the basic functions of your router so that you can surf the Internet. 4.1 Accessing Web page Connect to the router by typing 192.168.1.1 in the address field of web browser. Then press Enter key. Then below window will pop up that requires you to enter valid User Name and Password. Enter admin for User Name and Password, both in lower case letters. Then click OK button or press Enter key.
4.2 Changing Password Now, we recommend that you change the password to protect the security of your router. Please go to Management²Web Login Password change the password required to log in your router. User Name: type in the name that you use to login the web interface of the router. New Password: new password is used for administrator authentication. Confirm Password: new password should be re-entered to verify its accuracy.
4.3 Setup Wizard Setup Wizard is provided as part of the web configuration utility. Users can simply finish the settings on this page to access Internet. 1. Click on the Setup Wizard on the left navigation menu, then the following screen will appear. Click Next to continue. 2. This router provides six operation modes: Wireless ISP Client Router, Wireless Client and Repeater (Range Extender), Router, Bridge with AP and Client.
A: Wireless ISP Client Router In this mode, it will wirelessly connect to WISP station/hotspot to share Internet to local wireless and wired network. B: Wireless Client In this mode, all Ethernet ports are bridged together and the wireless client will connect to ISP access point. The NAT is enabled and PCs in Ethernet ports share the same IP to ISP through wireless LAN. You can connect to the ISP AP in Site-Survey page.
same one via wireless connections, especially for a home or office where separated networks FDQ¶W be connected easily together with a cable. F: Client In this mode, the device can be connected to another device via Ethernet port and act as a "Wireless Adapter" to connect your wired device to a wireless network. 4.3.1 Router Mode After selecting the Router mode in the last step, click next to continue the other settings. 1.
network). Subnet Mask: this is used to define the device IP classification for the chosen IP address range. 255.255.255.0 is a typical netmask value for Class C networks which support IP address range from 192.0.0.x to 223.255.255.x. Class C network netmask uses 24 bits to identify the network and 8 bits to identify the host. 3. This interface is used to configure the parameters for Internet network which connects to the WAN port of your Access Point.
(3). PPPoE Point-to-Point Protocol over Ethernet (PPPoE) is a virtual private and secure connection between two systems that enables encapsulated data transport. It replied on two widely accepted standards: PPP and Ethernet. The router supports dual access in this WAN type, you could choose the proper one according to what your ISP provides for you. User Name: a specific valid ADSL user name provided by your ISP. Password: the corresponding valid password provided by your ISP. (4).
4. The general wireless settings, such as wireless mode, SSID and channel can be configured in this section. Band˖ In fact, this option allows you to choose the radio standard for operation of your router. 802.11b and 802.11g are old 2.4GHz mode, while 802.11n (2.4GHz and/or 5GHz, in this case, only supports 2.4GHz) is the latest standard based on faster Orthogonal Frequency Division Multiplexing (OFDM) modulation. Here, you can choose the last one 2.4GHz (B+G+N), this mode offers better compatibility.
SSID---Service Set Identifier used to identify your 802.11 wireless LAN should be specified while operating in AP or AP+WDS mode. All the client devices within the range will receive broadcast messages from the access point advertising this SSID. Channel Width---This is the spectral width of the radio channel. Supported wireless channel spectrum widths: 20MHz is the standard channel spectrum width. 40MHz is the channel spectrum with the width of 40MHz (selected by default).
4.3.2 Wireless ISP Client Mode 1. In the Wireless ISP Client Mode, the Time Zone Setting is the same with the Router mode. 2. The LAN and WAN Interface Setting is the same with the Router mode too. 3. The wireless basic setting interface is obviously different from the Router mode. In this mode, you can enable Universal Repeater in this page. ,I \RX GRQ¶W ZDQW WR HQDEOH WKH 8QLYHUVDO 5HSHDWHU 0RGH VHH EHORZ Click Here 17
After that disable the Universal Repeater Mode, the page will change, see below: 4. The settings will take effect soon. Then it will come back to the system status interface, and you can see the WISP status. The signal strength is also shown here. 4.3.3 Wireless Client Mode The first three steps are the same with Router mode too. Wireless Basic Setting interface is also different with the Router mode. See below.
After configuration, it will also come back to the system status interface, and you can see the Wi-Fi Configuration column. The signal strength is also shown here. 4.3.4 Repeater Mode 1. In the Repeater Mode, the Time Zone Setting is the same with the Router Mode. 2. The LAN Interface Setting is the same with the Router Mode too. 3. The WAN interface setting is unvalued in Repeater Mode. See Below: 4. Wireless Basic Setting interface is also different with the Router mode.
5. Click Find Wi-Fi networks Button, the site survey interface will appear. You should click Site Survey button to scan the wireless network, and then choose one as upper AP. After selection please click next to continue the setup wizard. 6. When there comes to this page, you should enter the correct Pre-Shared Key to connect to the network if the network has enabled encryption. Then click Connect button.
7. Just wait for minutes when it comes out this page. The settings will take effect after few minutes. 4.3.5 Bridge with AP In Bridge with AP mode, the first three steps are also the same with the Repeater mode.
4.3.6 Client Mode The first three steps are the same with the Repeater Mode. The Wireless Basic Setting is different from Repeater Mode. See below: It will come back to status interface, and you can see the Wi-Fi Configuration column in the system status page. If you have setup Client mode successfully, you will see that the Mode is Infrastructure Client here, and the signal strength is also shown in this page. 4.
4.4.1 System status The System Status provides basic network settings of this router, including LAN, WAN and Wireless configuration. Also, you could get the current running firmware version or firmware related information from this presentation. Signal strength will show on this page in Wireless ISP Client Router mode, Client Router mode, Repeater mode and Client mode. As below: 4.4.2 Statistics This page shows the counter for sent and received packets regarding to wireless and Ethernet networks.
4.4.3 System log This page can be used to set remote log server and show the system log. Enable Log: this option enables the registration routine of the system log messages. By default it is disabled. Below items including system all, wireless, Dos allows you to choose the log type. Enable Remote Log: enables remote log sending function while System log messages are sent to a remote server. Log Server IP Address: this is the host IP address where system log messages should be sent.
5. ADVANCED SETTINGS This chapter allows users to configure advanced settings includes TCP/IP settings, Wireless, Route Setup, Firewall and System Management. These settings are only for more technically advanced users who have sufficient knowledge about wireless LAN. Also they should not be changed unless you know what effect the changes will have on your wireless router. 5.1 TCP/IP Settings 5.1.1 LAN Interface Local Area Network (LAN) is a group of subnets regulated and ruled by router.
Note: If this IP address changed, you can log into the WEB configuration interface only using the new IP address. AND if the new IP address and the original IP address are not in the same segment, the Virtual Server and DMZ Host service will not work. If you need to enable these functions, you will have to reset this IP address. Subnet Mask: This is used to define the device IP classification for the chosen IP address range. 255.255.255.
5.1.2 WAN Interface This part allows you to configure the WAN port parameters so that your computer can access Internet. Since we have discussed WAN Access Type on Setup Wizard, we will mainly explain PPPoE, PPTP, L2TP and the other settings here. MTU: it means Max Transmit Unit for packet. When using slow links, large packets can cause some delays thereby increasing lag and latency. DNS: Domain Name System.
server converts the user-friendly name into its equivalent IP address. Clone MAC Address: MAC address is the SK\VLFDO DGGUHVV RI \RXU FRPSXWHU¶V QHWZRUN card. Generally, every network card has one unique Mac address. Since many ISPs only allow one computer in LAN to access Internet, users can enable this function to make more computers surf Internet.
User Name/Password: enter the User Name and Password provided by your ISP. WAN DHCP type: iW¶V DYDLODEOH RQO\ IRU 333R( connection. If your ISP provides an extra type to connect to a local area network such as DHCP Client/Static IP/normal PPPoE, you should select the type and enter the right parameters provided by ISP to enable the secondary connection. DNS: Domain Name System. If you select Set DNS Manually, you will have to type in the DNS address by yourself. It is chosen to Attain DNS by default.
WAN DHCP type: it¶V DYDLODEOH RQO\ IRU 3373 connection. If your ISP provides an extra type to connect to a local area network such as DHCP Client/Static IP, you should select the type and enter the right parameters provided by ISP to enable the secondary connection. MPPE: You can enable MPPE Encryption or MPPC compression here. MPPE provides link encryption. Link encryption encrypts data as it passes between the calling and answering routers.
5.1.3 VLAN Settings VLAN means Virtual Local Area Network, this function provides you a very convenient way to manage hosts by grouping them based on the physical port. You can also manage the in/out rate of each port. VLANs are created to provide the segmentation services traditionally provided by routers. VLANs address issues such as scalability, security, and QHWZRUN PDQDJHPHQW ,W FDQ HIIHFWLYHO\ VDWLVI\ XVHU¶V LQGLYLGXDO UHTXLUHPHQW WKDW LI RQH RI your family members want to watch IPTV but others want
Priority: Type the packet priority number for such VLAN. The range is from 0 to 7. CFI: enable the CFI function which indicates whether MAC is encapsulated by standard format. After the VLAN settings, please click Apply Changes to finish TCP/IP Settings. 5.2 Wireless 5.2.1 Basic Settings On this page, you could configure the parameters for Wireless LAN client that may connect to your Access Point.
66,' IRU GLIIHUHQW QHHGV :KDW¶V PRUH \RX FDQ VHWXS different encryption for different SSIDs in Security Settings section. We will introduce in 5.2.2 Security Settings WMM is an abbreviation of Wi-Fi Multimedia. It defines the priority levels for four access categories derived from 802.1d (prioritization tabs). The categories are designed with specific types of traffic, voice, video, best effort and low priority data. Note 7KLV RSWLRQ ZLOO NHHS (QDEOHG DQG FDQ¶W EH FKDQJHG E\ GHIDXOW Data Rate This def
Encryption: This router supports Disabled, WEP, WPA, WPA2, WPA-Mixed security options. Please select one according to the Access Point security policy. 1) WEP WEP (Wired Equivalent Privacy) is based on the IEEE 802.11 standard and uses the RC4 encryption algorithm. Enabling WEP allows you to increase security by encryption data being transferred over your wireless network. WEP is the oldest security algorithm, and there are few applications that can decrypt the WEP key in less than 10 minutes.
RADIUS Server IP Address: Enter the IP address of RADIUS server. RADIUS Server Port: the UDP port number that the RADIUS server that is used to authenticate the messages sent between them. RADIUS Server Password: enter the password. RADIUS: Remote Authentication Dial-In User Service (RADIUS) is a security authentication client/server protocol that supports authentication, authorization and accounting, which is widely used by Internet Service Provider.
Note: Since WEP has been proved vulnerable, you may consider using WPA2 for the most secure connection. You should select the appropriate security mechanism according to your needs. No matter which security suite you select, they all will enhance the over-the-air data protection and/or privacy on your wireless network. Enable Universal Repeater Mode: enable the repeater mode and search for wireless networks in range on all the supported channels while device is operating in Access Point. 5.2.
Please click Site Survey button to search for any Access Point or IBSS. Then they will be showed in the form. Site Survey reports SSID, BSSID, wireless channel, type, encryption type (if any) and Signal Strength of all the surrounding Access Points which can be found by this device. 5.2.4 WDS WDS means Wireless Distribution System. It is a protocol for connecting two access points wirelessly. Usually, it can be used for the following application: 1. Provide bridge traffic between two LANs though the air.
5.2.5 Advanced Settings This page handles advanced wireless settings that are only for more technically advanced users who have a sufficient knowledge about wireless LAN technology. These settings should not be changed unless you know what effect the changes will have on your Access Point. Fragment Threshold: specifies the maximum size for a packet before data is fragmented into multiple packets. The range is 256-2346 bytes. Setting the Fragment Threshold too low may result in poor network performance.
Preamble Type: this option is to define the length of the sync field in an 802.11 packet. Most modern wireless network uses shot preamble with 56 bit sync filed instead of long preamble with 128 bit sync filed. However, some original 11b wireless network devices only support long preamble. By default, Long Preamble is selected. IAPP˖Inter-Access Point Protocol is designed for the enforcement of unique association WKURXJKRXW DQ (66 ([WHQGHG 6HUYLFH 6HW DQG IRU VHFXUH H[FKDQJH RI VWDWLRQ¶V VHFXULW\ context
You need to click Apply Changes to make your setting work. Current Access Control List: this list will show all the current access control that you have VHW $QG \RX¶UH DEOH WR GHOHWH VRPH RU DOO RI WKHP XVLQJ WKH Delete Selected or Delete All button. 5.2.7 WPS Settings WPS (Wi-Fi Protected Setup) provides easy procedure to make network connection between wireless station and wireless access point with the encryption of WPA and WPA2. Self-PIN Number: it will show the PIN Number of your device.
Enable Dynamic Route You may want to set up your router to route computers or devices on your network to other local networks through other routers. If other routers support dynamic routing such as RIP (Routing Information Protocol), you can enable this feature on your router to automatically learn the required routes to reach those networks.
Subnet Mask: type in the Netmask. Gateway: type in the Gateway IP. Metric: enter the metric or priority of the route. The metric range is 1 to 15, the lowest number 1 being the highest priority. Interface: click the drop-down list and select the interface on your router where the route is active. Static Route Table: this table will list the detailed information about the target network IP. 5.3.2 Routing Table This table shows detail information of all the routing entry. 5.
5.4.1 IP Filtering Enable IP filtering: you can select this checkbox to enable IP Filtering function. Local IP Address: the IP address that you want to filter. Protocol: choose which particular protocol type should be filtered. Here you can choose UDP/TCP. Comment: describe the reason why you want to filter the IP address. Just few words are saved there usually. IP Filter Table: this table will list the detailed information about the IP addresses that will be filtered. 5.4.
5.4.3 MAC Filtering Enable MAC Filtering: you can check the box to enable MAC Filtering function. MAC Address: the MAC address that you want to filter. Comment: describe the reason why you want to filter the MAC address. Just few words are saved there usually. MAC Filter Table: this table will list the detailed information about the MAC addresses that will be filtered. 5.4.4 URL Filtering Enable URL Filtering: you can select this checkbox to enable URL filtering function. URL Addresses: W\SH LQ WKH NH\ZR
5.4.5 Port Forwarding Port Forwarding creates a transparent tunnel through a firewall/NAT, granting an access from the WAN side to the particular network service running on the LAN side. These settings are only necessary if you wish to host some sort of server like a web server or mail VHUYHU RQ WKH SULYDWH ORFDO QHWZRUN EHKLQG \RXU *DWHZD\¶V 1$7 ILUHZDOO Enable Port Forwarding: you can select this checkbox to enable Port Forwarding function. IP Address: enter the PorW¶V IP address.
5.4.7 Denial-of-Service The DoS Prevention functionality helps you to detect and mitigate the DoS attack. The attacks are usually categorized into two types, the flooding-type attacks and the vulnerability attacks. The flooding-type attacks will attempt to exhaust all your systeP¶V resource while the vulnerability attacks will try to paralyze the system by offending the vulnerabilities of the protocol or operation system.
Whole System Flood: ICMP IP TearDrop Per-Source IP Flood: SYN PingofDeath Per-Source IP Flood: FIN TCP Scan Per-Source IP Flood: UDP TCP SynWithData Per-Source IP Flood: ICMP UDP Bomb TCP/UDP PortScan UDP EchoChargen Sensitivity: you can select Low or High sensitivity. You can click Select ALL or Clear ALL to select prevention type. 5.5 Management 5.5.1 Upgrade Firmware New version of firmware will be released to improve the various efficiency or to fix some bugs.
default. Save Settings to File: click 6DYH« button to download the current settings of the Access Point to your computer. Load Settings from File: if you want to reload the settings from the file saved before, you could click Choose File button to choose the right file then click Upload button. Reset Settings to Default: this Reset button is provided to allow you to restore the router settings to the default factory settings. 5.5.
ACS: URL: enter the URL of ACS which is provided by your ISP User Name & Password: provided by your ISP. Enable periodic information: choose On to enable the periodic information. Interval periodic updates: the interval of periodic inform (only if you enable the periodic information does it take effect) Connection Request User Name: enter the CPE Connection Request User Name. Password: enter CPE Connection Request Password. Port: enter the CPE connection port number for connecting to ACS. 5.5.
Enable DDNS: please select this checkbox to enable DDNS function. Service Provider: choose one service provider where you have applied for free DDNS service. Domain Name: type in the domain name you registered from the DDNS provider. User Name/Email: enter the User Name or Email you registered from the DDNS provider. Password/Key: enter the Password or Key you set for the User Name. Click Save Changes to finish the setting. 5.6.2 QoS QoS means Quality of Service.
Automatic Uplink Speed: this option allows you to set the total uplink speed automatically. Manual Uplink Speed (Kbps): set the uplink speed by entering a number in the blank. Automatic Downlink Speed: this allows you to set the total downlink. By default, it is 4096Kbps as well. Manual Downlink Speed (Kbps): set the uplink speed by entering a number in the blank. QoS Rule Setting Address type: it allows users control the bandwidth by IP or MAC.
5.6.4 SSH Server Enable SSH Server: SSH means Secure Share. It is the most secure protocol specially used for remote login and other web service. Server User: type in a name for the SSH server. SSH Password: type in the password for security.
FCC Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.