Table of Contents 1. ABOUT THIS GUIDE ................................................................................................................... 3 1.1 Navigation of the User’s Guide ............................................................................................................. 3 2. PRODUCT OVERVIEW .............................................................................................................. 3 2.1 Introduction...........................................................
4.7.1 Basic Settings .................................................................................................................................................. 34 4.7.2 Wireless AP1 ................................................................................................................................................... 37 4.7.3 Wireless AP2 ...................................................................................................................................................
1. ABOUT THIS GUIDE Thank you very much for purchasing the wireless N router. This guide will introduce the features of this router and tell you how to connect, use and configure the router to access Internet. Please follow the instructions in this guide to avoid affecting the router’s performance by improper operation. 1.1 Navigation of the User’s Guide Product Overview: Describes the router’s function and its features.
Universal repeater and WDS make WiFi extension simple. 2.3 Panel Layout 2.3.1 Front Panel The front panel of this router consists of 10 LEDs, which is designed to indicate connection status. POWER This indicator lights blue when the router powered on, otherwise it is off. CPU When the router powered on, this indicator keeps lighting blue. 2.4G This indicator lights blue when the 2.4G wireless connection enabled. 5G This indicator lights blue when the 5G wireless connection enabled.
DC IN This socket is used to connect the power adapter. ON/OFF This slide switch is used to power on or off the wireless router. 1/2/3/4 LAN This port is used to connect the router to local PC. WAN This port is used to connect the router to the Internet. RST-WPS There is a RST-WPS button on the rear panel. Press the button for more than 5 seconds, the router will restore factory settings. If press the button less than 5 seconds, the router will establish Wi-Fi protected settings automatically. 3.
3.3 Set up the Computer The default IP address of the router is 192.168.1.1, the default Subnet Mask is 255.255.255.0. Both of these parameters can be changed as you want. In this guide, we will use the default values for description. Connect the local PC to the LAN port on the router. There are then two ways to configure the IP address for your PC. Configure the IP address manually Configure the network parameters. The IP address is 192.168.1.xxx (“xxx” range from 2 to 254). The Subnet Mask is 255.255.255.
Figure 3-2 Failure Ping command If the result displayed is similar to the figure 3-2, it means that your PC has not connected to the router successfully. Please check it following below steps: 1. Is the connection between your PC and the router correct? If correct, the LAN port on the router and LED on your PC’s adapter should be lit. 2. Is the TCP/IP configuration for your PC correct? Since the router’s IP address is 192.168.1.1, your PC’s IP address must be within the range of 192.168.1.2 ~ 192.168.1.
Enter admin for User Name and Password, both in lower case letters. Then click OK button or press Enter key. Now you will get into the web interface of the device. The Main screen will appear. Note: If the above screen does not prompt, it means that your web-browser has been set to using a proxy. Go to Tools menu>Internet Options>Connections>LAN Settings, in the screen that appears, cancel the Using Proxy checkbox, and click OK to finish it. Now you have logged into the web interface of the router.
4.2 Changing Password Now, we recommend that you change the password to protect the security of your router. Please go to Management—Password to change the password required to log in your router. User Name: type in the name that you use to login the web interface of the router. New Password: new password is used for administrator authentication. Confirm Password: new password should be re-entered to verify its accuracy.
4.4 Operation Mode This parameter specifies the operating network modes for the Router. This router provides three modes: Gateway Mode, Bridge Mode and Wireless ISP. You could refer to the following description to choose the right one. 1. Wireless ISP Client Router In this mode, it will wirelessly connect to WISP station/hotspot to share Internet to local wireless and wired network. 2.
4.5 Network 4.5.1 WAN Settings This part allows you to configure the WAN port parameters so that your computer can access Internet. Enable UPNP: the UPNP (Universal Plug and play) protocol is supported to bring to network connected devices the ease of installation and configuration which is already available for directly connected PC peripherals with the existing Windows “Plug and Play” system. You can enable this function so that the router doesn’t need to work out which port need to be opened.
Enable IPsec pass through on VPN connection: IPsec pass through is a technique for allowing IPsec packets to pass through a NAT router. Enable PPTP pass through on VPN connection: PPTP pass through is a technique for allowing PPTP packets to pass through a NAT router. Enable L2TP pass through on VPN connection: L2TP pass through is a technique for allowing L2TP packets to pass through a NAT router. Clone MAC Address: MAC address is the physical address of your computer’s network card.
be a DSL modem, Cable modem, or a WISP gateway router. The router will direct all the packets to the gateway if the destination host is not within the local network. MTU: it means Max Transmit Unit for packet. When using slow links, large packets can cause some delays thereby increasing lag and latency. DNS: The Domain Name System (DNS) is an Internet “phone book”, which translates domain names to IP addresses.
User Name/Password: enter the User Name and Password provided by your ISP. Service Name (AC): this is optional. It describes the service name your ISP provided to you. Generally, leaving these fields blank will work. DNS: Domain Name System. If you select Set DNS Manually, you will have to type in the DNS address by yourself. It is chosen to Attain DNS by default. Connection Type: provides three modes to connect to the Internet. Continuous: the connection can be re-established automatically.
parameters. Please refer to PPPoE configuration if there are the same parameters. MPPE: You can enable MPPE Encryption or MPPC compression here. MPPE provides link encryption. Link encryption encrypts data as it passes between the calling and answering routers. MPPC provides a method to negotiate and utilize compression protocols over PPP encapsulated links. WAN DHCP type: it’s available only for PPTP connection.
parameters. Please refer to PPPoE configuration if there are the same parameters. 4.5.2 LAN Settings Local Area Network (LAN) is a group of subnets regulated and ruled by router. The design of network structure is related to what type of public IP addresses coming from your ISP. This part allows you to configure the parameters for LAN which connects to the LAN port of your Access Point.
IP Address: This is the IP addresses to be represented by the LAN (including WLAN) interface that is connected to the internal network. This IP will be used for the routing of the internal network (it will be the Gateway IP for all the devices connected on the internal network). Subnet Mask: This is used to define the device IP classification for the chosen IP address range. 255.255.255.0 is a typical netmask value for Class C networks which support IP address range from 192.0.0.x to 223.255.255.x.
4.5.4 VLAN Settings VLAN means Virtual Local Area Network, this function provides you a very convenient way to manage hosts by grouping them based on the physical port. You can also manage the in/out rate of each port. VLANs are created to provide the segmentation services traditionally provided by routers. VLANs address issues such as scalability, security, and network management.
Enabled: this option enables VLAN function. Ethernet/Wireless: specifies the WAN port and wireless AP. WAN/LAN: defines the WAN port or LAN port. Forwarding Rule: VLAN feature also support forwarding rule as bridge and NAT between LAN port and WAN port. Tag: enable the function of VLAN with tag. The router will add specific VLAN number to all packets on the LAN while sending them out. Please type the tag value and specify the priority for the packets sending by LAN.
4.6 Wireless 5GHZ 4.6.1 Basic Settings On this page, you could configure the parameters for Wireless LAN client that may connect to your Access Point. Since we have discussed wireless settings on Setup Wizard, here we will focus on the encryption, WMM function and Data Rate. Encryption: This router supports Disabled, WEP, WPA, WPA2, WPA-Mixed security options. By default, it is disabled. Please select one according to the Access Point security policy for a secure network.
1) WEP WEP (Wired Equivalent Privacy) is based on the IEEE 802.11 standard and uses the RC4 encryption algorithm. Enabling WEP allows you to increase security by encryption data being transferred over your wireless network. WEP is the oldest security algorithm, and there are few applications that can decrypt the WEP key in less than 10 minutes. Key Length: 64-bit/128-bit, by default it is 64-bit.
RADIUS Server IP Address: Enter the IP address of RADIUS server. RADIUS Server Port: the UDP port number that the RADIUS server that is used to authenticate the messages sent between them. RADIUS Server Password: enter the password. RADIUS: Remote Authentication Dial-In User Service (RADIUS) is a security authentication client/server protocol that supports authentication, authorization and accounting, which is widely used by Internet Service Provider.
Note: Since WEP has been proved vulnerable, you may consider using WPA2 for the most secure connection. You should select the appropriate security mechanism according to your needs. No matter which security suite you select, they all will enhance the over-the-air data protection and/or privacy on your wireless network. Enable Universal Repeater Mode: enable the repeater mode and search for wireless networks in range on all the supported channels while device is operating in Access Point. 4.6.
1) WEP WEP (Wired Equivalent Privacy) is based on the IEEE 802.11 standard and uses the RC4 encryption algorithm. Enabling WEP allows you to increase security by encryption data being transferred over your wireless network. WEP is the oldest security algorithm, and there are few applications that can decrypt the WEP key in less than 10 minutes. Key Length: 64-bit/128-bit, by default it is 64-bit.
Pre-Shared Key Format/Pre-Shared Key: This is a pre-defined key used for encryption during data transmission. It has two formats: Passphrase and Hex (64 characters). Then you need to enter the Pre-Shared Key, either 8~63 ASCII characters, such as 012345678 (or 64 Hexadecimal digits leading by 0x, such as “0x321253abcde…”). 3) WPA Mixed This option mixes WPA/WPA2 together. It will provide the best security for your router.
Encryption: This router supports WEP, WPA, WPA2, WPA-Mixed security options. Please select one according to the Access Point security policy. 1) WEP WEP (Wired Equivalent Privacy) is based on the IEEE 802.11 standard and uses the RC4 encryption algorithm. Enabling WEP allows you to increase security by encryption data being transferred over your wireless network. WEP is the oldest security algorithm, and there are few applications that can decrypt the WEP key in less than 10 minutes.
characters) and Hex (10 characters). If 128-bit, the Key Formats should comply with ASCII (13 characters) or Hex (26 characters) Encryption Key: Please refer to Key Length to set this parameter. 2) WPA/WPA2 Wi-Fi Protected Access (WPA) is the most dominating security mechanism in industry. It is separated into two categories: WPA-personal and WPA-Enterprise, it is the current most secure method of wireless security and required for 802.11n performance.
4.6.4 Wireless Repeater The Repeater methods can help you to expand the wireless coverage and allow more terminals to access Internet. Wireless Repeater Network Name (SSID): Click Scan AP to choose the SSID you want to implement the repeater function. Encryption: please refer to Wireless Basic Settings. 4.6.5 Advanced Settings On this page, you could configure the parameters for Wireless LAN client that may connect to your Access Point.
Band: This option allows you to choose the radio standard for operation of your Router. 802.11b and 802.11g are old 2.4GHz mode, while 802.11n is the latest standard based on faster Orthogonal Frequency Division Multiplexing (OFDM) modulation. Channel Width: This is the spectral width of the radio channel. Supported wireless channel spectrum widths: 20MHz is the standard channel spectrum width. 40MHz is the channel spectrum with the width of 40MHz.
which means that RTS is disabled. Beacon Interval: By default, it is set to 100ms. Higher Beacon interval will improve the device’s wireless performance and is also power-saving for client side. If this value set lower than 100ms, it will speed up the wireless client connection. Preamble Type: this option is to define the length of the sync field in an 802.11 packet. Most modern wireless network uses shot preamble with 56 bit sync filed instead of long preamble with 128 bit sync filed.
Enable WDS: by default, you can’t select the checkbox to enable WDS. MAC Address: the other AP’s MAC Address that you want to communicate with. Comment: describes the reason why you want to communicate with others. The WDS Security Setup allows you to set encryption for your WDS connection. You can refer to the Wireless Security Setup. 4.6.7 Access Control By default, Wireless Access Control Mode is disabled. There are two ways to set the Access Control List: 1.
4.6.8 WPS Settings WPS (Wi-Fi Protected Setup) provides easy procedure to make network connection between wireless station and wireless access point with the encryption of WPA and WPA2. Self-PIN Number: it will show the PIN Number of your device. Push Button Configuration: click Start PBC button to invoke Push-Button style WPS setup procedure. The router will wait for WPS requests from wireless clients about two minutes. The WPS LED on the router will blink fast when WPS is in progress.
4.7 Wireless 2.4GHZ 4.7.1 Basic Settings On this page, you could configure the parameters for Wireless LAN client that may connect to your Access Point. Since we have discussed wireless settings on Setup Wizard, here we will focus on the encryption, WMM function and Data Rate.
Encryption: This router supports Disabled, WEP, WPA, WPA2, WPA-Mixed security options. By default, it is disabled. Please select one according to the Access Point security policy for a secure network. 1) WEP WEP (Wired Equivalent Privacy) is based on the IEEE 802.11 standard and uses the RC4 encryption algorithm. Enabling WEP allows you to increase security by encryption data being transferred over your wireless network.
64-bit—For 64 bits WEP key, either 5 ASCII characters, such as 12345 (or 10 hexadecimal digitals leading by 0x, such as 0x414234445.) 128-bit—For 128 bits WEP key, either 13 ASCII characters, such as ABCDEFGHIJKLM (or 26 hexadecimal digits leading by 0x, such as 0x4142434445464748494A4B4C4D). Key Format: If you choose 64 bit, there will be two Key Formats selectable: ASCII (5 characters) and Hex (10 characters).
Pre-Shared Key Format/Pre-Shared Key: This is a pre-defined key used for encryption during data transmission. It has two formats: Passphrase and Hex (64 characters). Then you need to enter the Pre-Shared Key, either 8~63 ASCII characters, such as 012345678 (or 64 Hexadecimal digits leading by 0x, such as “0x321253abcde…”). 4) WPA Mixed This option mixes WPA/WPA2 together. It will provide the best security for your router.
Encryption: This router supports WEP, WPA, WPA2, WPA-Mixed security options. Please select one according to the Access Point security policy. 1) WEP WEP (Wired Equivalent Privacy) is based on the IEEE 802.11 standard and uses the RC4 encryption algorithm. Enabling WEP allows you to increase security by encryption data being transferred over your wireless network. WEP is the oldest security algorithm, and there are few applications that can decrypt the WEP key in less than 10 minutes.
Key Format: If you choose 64 bit, there will be two Key Formats selectable: ASCII (5 characters) and Hex (10 characters). If 128-bit, the Key Formats should comply with ASCII (13 characters) or Hex (26 characters) Encryption Key: Please refer to Key Length to set this parameter. 2) WPA/WPA2 Wi-Fi Protected Access (WPA) is the most dominating security mechanism in industry.
4.7.3 Wireless AP2 This page allows you to setup wireless encryption to protect your wireless network from unauthorized access. Encryption: This router supports WEP, WPA, WPA2, WPA-Mixed security options. Please select one according to the Access Point security policy. 1) WEP WEP (Wired Equivalent Privacy) is based on the IEEE 802.11 standard and uses the RC4 encryption algorithm. Enabling WEP allows you to increase security by encryption data being transferred over your wireless network.
Key Length: 64-bit/128-bit, by default it is 64-bit. 64-bit—For 64 bits WEP key, either 5 ASCII characters, such as 12345 (or 10 hexadecimal digitals leading by 0x, such as 0x414234445.) 128-bit—For 128 bits WEP key, either 13 ASCII characters, such as ABCDEFGHIJKLM (or 26 hexadecimal digits leading by 0x, such as 0x4142434445464748494A4B4C4D). Key Format: If you choose 64 bit, there will be two Key Formats selectable: ASCII (5 characters) and Hex (10 characters).
Note: Since WEP has been proved vulnerable, you may consider using WPA2 for the most secure connection. You should select the appropriate security mechanism according to your needs. No matter which security suite you select, they all will enhance the over-the-air data protection and/or privacy on your wireless network. 4.7.4 Wireless Repeater The Repeater methods can help you to expand the wireless coverage and allow more terminals to access Internet.
the changes will have on your Access Point. Band: This option allows you to choose the radio standard for operation of your Router. 802.11b and 802.11g are old 2.4GHz mode, while 802.11n is the latest standard based on faster Orthogonal Frequency Division Multiplexing (OFDM) modulation. Channel Width: This is the spectral width of the radio channel. Supported wireless channel spectrum widths: 20MHz is the standard channel spectrum width. 40MHz is the channel spectrum with the width of 40MHz.
RTS Threshold: determines the packet size of a transmission and, through the use of an access point, helps control traffic flow. The range is 0-2347bytes. The default value is 2347, which means that RTS is disabled. Beacon Interval: By default, it is set to 100ms. Higher Beacon interval will improve the device’s wireless performance and is also power-saving for client side. If this value set lower than 100ms, it will speed up the wireless client connection.
Enable WDS: by default, you can’t select the checkbox to enable WDS. MAC Address: the other AP’s MAC Address that you want to communicate with. Comment: describes the reason why you want to communicate with others. The WDS Security Setup allows you to set encryption for your WDS connection. You can refer to the Wireless Security Setup. 4.7.7 Access Control By default, Wireless Access Control Mode is disabled. There are two ways to set the Access Control List: 3.
4.7.8 WPS Settings WPS (Wi-Fi Protected Setup) provides easy procedure to make network connection between wireless station and wireless access point with the encryption of WPA and WPA2. Self-PIN Number: it will show the PIN Number of your device. Push Button Configuration: click Start PBC button to invoke Push-Button style WPS setup procedure. The router will wait for WPS requests from wireless clients about two minutes. The WPS LED on the router will blink fast when WPS is in progress.
4.8 QoS QoS means Quality of Service. Deploying QoS management to guarantee that all applications receive the service levels required and sufficient bandwidth to meet performance expectations is indeed one important aspect of modern enterprise network.
4.9 Firewall The firewall of this router helps to protect you local network against attack from unauthorized outsiders. It also restricts users in the local network from accessing the Internet. Furthermore, it can filter out specific packets that trigger the router to build an unwanted outgoing connection. 4.9.1 IP Filtering IP filtering On/Off: you can select this checkbox to enable IP Filtering function. Local IP Address: the IP address that you want to filter.
4.9.2 Port Filtering Port Filtering On/Off: you can select this checkbox to enable Port Filtering function. Port Range: the port range that you want to filter. Protocol: choose which particular protocol type should be filtered. Here you can choose UDP/TCP/Both. Comment: describe the reason why you want to filter these ports. Just few words are saved there usually. Current Port Filter List: this table will list the detailed information about the Port that will be filtered. 4.9.
Comment: describe the reason why you want to filter the MAC address. Just few words are saved there usually. Current MAC Filter List: this table will list the detailed information about the MAC address that will be filtered. 4.9.4 URL Filtering URL Filtering On/Off: you can select this checkbox to enable URL filtering function. URL Addresses: type in the keywords contained in URLs that you don’t allow LAN users to access.
Port Forwarding On/Off: you can select this checkbox to enable Port Forwarding function. IP Address: enter the Port’s IP address. Protocol: choose which particular protocol type should be forwarding. Here you can choose Both/UDP/TCP. Port Range: set the range that the port forward to. Comment: describe the reason why you want to use port forward function. Just few words are saved there usually. 4.9.6 DMZ DMZ means Demilitarized Zone.
4.10.2 Upgrade Firmware New version of firmware will be released to improve the various efficiency or to fix some bugs. Following the steps show below so as to realize upgrading. This page allows you to upgrade the Access Point firmware to new version. Please note: DO NOT power off the device during the upload because it may crash the system. Firmware version: shows the current firmware version. Select File: select the firmware version you want to upgrade on your computer.
4.10.4 Password Settings User Name: type in the name that you use to login the web interface of the router. New Password: new password is used for administrator authentication. Confirm Password: new password should be re-entered to verify its accuracy. Note: password length is 8 characters maximum, characters after the 8th position will be truncated. 4.10.5 Time Zone Setting This page allows you to maintain the system time by synchronizing with a public time server over the Internet.
SNTP server: Please choose the corresponding SNTP server to get right time. 4.10.6 Reboot Router Please click this Reboot button to reboot your router quickly. 4.10.7 Schedule Reboot The schedule function allows you to setup the time that the router will reboot automatically. 4.10.8 System Log This page can be used to set remote log server and show the system log. Enable Log: this option enables the registration routine of the system log messages.
default it is disabled. Below items including system all, wireless, Dos allows you to choose the log type. Enable Remote Log: enables the syslog remote sending function while System log messages are sent to a remote server. Log Server IP Address: this is the host IP address where syslog messages should be sent. After finished, please click Apply Changes to go to next part.