You are on page 1of 56

CWR-854 54Mbps Wireless-G Router User’s Guide

1

1 INTRODUCTION ..................................................................................................................................... 3 INSTALLING THE ROUTER .......................................................................................................................... 3 SYSTEM REQUIREMENTS .......................................................................................................................... 3 INSTALLATION INSTRUCTIONS ................................................................................................................... 3 2 PREPARING THE NETWORK.............................................................................................................. 5 PREPARING THE NETWORK ...................................................................................................................... 5 COLLECTING ISP INFORMATION ............................................................................................................... 5 CONFIGURING WINDOWS FOR IP NETWORKING ...................................................................................... 5 3 CONFIGURING THE WIRELESS-G ROUTER..................................................................................11 3.1 SETUP WIZARD ..................................................................................................................................11 3.1.1 Time Zone Settings.............................................................................................................. 12 3.1.2 LAN Interface Setup ............................................................................................................ 12 3.1.3 WAN Interface Setup ........................................................................................................... 13 3.1.4 Wireless Basic Settings...................................................................................................... 14 3.2 LAN SETTINGS ................................................................................................................................. 14 3.3 WAN SETTINGS ................................................................................................................................ 15 3.3.1 Static IP................................................................................................................................... 15 3.3.2 DHCP Client ........................................................................................................................... 16 3.3.3 PPPoE ..................................................................................................................................... 17 3.3.4 PPTP ........................................................................................................................................ 19 3.4 WIRELESS ......................................................................................................................................... 20 3.4.1 Basic Settings ....................................................................................................................... 20 3.4.2 Advanced Settings............................................................................................................... 22 3.4.3 Security................................................................................................................................... 23 3.4.4 Access Control ..................................................................................................................... 28 3.4.5 WDS ......................................................................................................................................... 29 3.4.6 Site Survey............................................................................................................................. 30 3.5 FIREWALL .......................................................................................................................................... 31 3.5.1 IP Filtering .............................................................................................................................. 31 3.5.2 Port Filtering.......................................................................................................................... 32 3.5.3 MAC Filtering......................................................................................................................... 32 3.6 VPN SETTINGS ................................................................................................................................. 33 3.7 ADVANCED ........................................................................................................................................ 37 3.7.1 Port Forwarding.................................................................................................................... 37 3.7.2 DMZ.......................................................................................................................................... 38 3.7.3 DDNS ....................................................................................................................................... 39 3.8 MANAGEMENT ................................................................................................................................... 40 3.8.1 Status ...................................................................................................................................... 40 3.8.2 DHCP Settings....................................................................................................................... 42 3.8.3 Time Zone Settings.............................................................................................................. 42 3.8.4 Password................................................................................................................................ 43 3.8.5 Upgrade Firmware................................................................................................................ 44 3.8.6 Remote Management .......................................................................................................... 44 3.8.7 Save/Reload Settings .......................................................................................................... 45 3.8.8 System Restart ..................................................................................................................... 45 3.9 EVENT LOG ....................................................................................................................................... 46 APPENDIX A: TROUBLESHOOTING .................................................................................................. 48 APPENDIX B: FREQUENTLY ASKED QUESTIONS.......................................................................... 51

2

1 Introduction

Installing the Router
In this chapter, you’ll learn how to connect to the router.

System Requirements
․One or more PCs (desktop or notebook) with an Ethernet interface ․Broadband Internet access ․Ethernet cables ․Wireless interface (if planning to go wireless )

Installation Instructions
Connecting the Router:
1. 2. Make sure all systems including the router, PC(s), and the cable or DSL modem (if applicable) are turned OFF. Connect the WAN port on the router to a cable/DSL modem, Ethernet Server, or hub.

3.

Connect one or more client PCs to the LAN port(s).

4.

Connect the power adapter to the wall outlet and the power jack on the router.

3

5.

Turn on your PC(s).

4

2 Preparing the Network

Preparing The Network
This chapter covers the things that need to be done before configuring the router. The first thing is to set all computers on the network for TCP/IP networking and also gather necessary information from the Internet Service Provider.

Collecting ISP Information
The following information needs to be gathered from the ISP before configuring the router: ․IP Assignment from ISP: Are IPs assigned dynamically or you have a fixed IP address? If fixed, what are the IP address, Subnet Mask, Default Gateway as well as the DNS addresses for this account? ․Connection Type: Is this a PPPoE or PPTP connection? If PPPoE, what are the username and password associated with this account? If PPTP, the server IP address as well as user authentication information is required. Please contact your ISP if you’re not sure of the answers to these questions.

Configuring Windows for IP Networking
Each computer on the network and connecting to the router should be configured for TCP/IP networking. The router is by default a DHCP server and if you plan to use DHCP (recommended), each computer must be configured to receive an IP address automatically. See the procedure below. If fixed IP addresses are to be used on the network, you’ll need to manually assign an IP address to each computer and make sure that they are in the same subnet as the router. Refer to your Windows documentation for instructions on IP assignment.

To configure TCP/IP in Windows:
1. Click the Start button go to Settings and click on Control Panel. In Control Panel, double-click the Network icon. 2. Under the Configuration tab, select the TCP/IP line for the applicable Ethernet adapter. Do not choose a TCP/IP entry whose name mentions DUN, PPPoE, VPN, or AOL. If the word TCP/IP appears by itself, select that line. Click the Properties button.

5

In Control Panel. 5. ( “D” is the drive letter of the CD-ROM drive). D:\win98. or insert your Windows CD-ROM into the CDROM drive and enter the correct file location. Click the Start button go to Settings and click on Control Panel.g. e. If Windows does not prompt to restart. Click the OK button again.. Click the IP Address tab. Check for the files at c:\windows\options\cabs.3. etc. restart the computer anyway. and verify that the Installed Gateways field is Blank. Click the OK button. Click the Yes button. double-click the Network and Dial-up Connections icon. Windows may ask to restart the PC. 1. Select Obtain an IP address automatically 4. 6. D:\win9x. 6 . Now click the Gateway tab. Windows may ask for original Windows installation CD or additional files.

Double-click the Local Area Connection and Click the Properties button. Select Obtain an IP address automatically and click the OK button. Select the Local Area Connection icon for the applicable Ethernet adapter (usually it is the first Local Area Connection listed). 3. Highlight Internet Protocol (TCP/IP). and click the Properties button. 4.2. 7 . Click the OK button again to complete the PC configuration. Make sure the box next to Internet Protocol (TCP/IP) is checked.

Then click the Network Connections icon. 2. please follow the instructions for Windows 2000.5. 1. 8 . Click the Network and Internet Connections icon. If you are using the Classic View (where icons and menus look similar to previous Windows versions). Restart your computer. The following instructions assume you are running Windows XP with the default interface (Control Panel looks different then previous versions of Windows). Click the Start button and then the Control Panel icon. Double-click the Local Area Connection and click the Properties button. Select the Local Area Connection icon for the applicable Ethernet adapter (usually it is the first Local Area Connection listed).

9 .3. Highlight Internet Protocol (TCP/IP). and click the Properties button.

10 . Click the OK button again to complete the PC configuration.4. Select Obtain an IP address automatically and click OK.

1 Setup Wizard After a successful log-in to the router..254” and press <ENTER>.1.3 Configuring the Wireless-G Router This chapter describes how to access the router using a web browser. 3. The router’s configuration menu provides a Setup Wizard for basic configuration of the router. 11 . Open a Web browser and type the default IP address of the router in the address box “http://192. default User name is “root”. and default Password is “1234”. Please note that in order to access the router’s admin page a computer must be connected to one of the LAN ports on the router. the setup page will be shown as in the picture below. Enter the User name and Password when prompted.168.

After completing the time zone settings. enable NTP client update and select the correct Time Zone.1. 12 . users have to choose different menu items.1.. Most Users will not need to change these values. Back: To skip the current settings and go back to the last page. 3.2 LAN Interface Setup In the LAN interface Setup page. NTP server: Select from the list of NTP servers by clicking the down arrow key or manually enter time server IP address.1 Time Zone Settings The first step in Setup Wizard is to set the Time Zone. Click “Next” to proceed with Setup Wizard. Users can synchronize the local clock on the router to an available NTP server (optional). users can change the LAN IP address and Subnet Mask of the router. 3. Cancel: To skip the current settings and jump to the Setup Wizard page. Next: Go to the next page. To complete this setting. click “Next” to proceed to the LAN Interface Setup page.For more advanced feature settings. - Enable NTP client update: Enable time zone update function Time Zone Select: Select the time zone this router is used in.

3.1.- IP Address: Current IP address of the Wireless-G Router. Back: To skip the current settings and go back to the last page. 13 . to WAN interface setup page. Subnet Mask: Current subnet mask for the Wireless-G Router.3 WAN Interface Setup In this screen users must identify and configure the connection type used for connecting to their Internet Service Provider (ISP). click “Next” to move on. Next: Go to the next page. After typing in the IP Address and Subnet Mask. Cancel: To skip the current settings and jump to the Setup Wizard page.

14 . Client. therefore.2 LAN Settings “LAN Interface Setup” allows users to configure the parameters for local area network interface of the Wireless-G Router. all wireless access points/routers and all wireless devices attempting to connect to a specific WLAN must use the same SSID. All stations communicating with this Wireless-G Router must use the same channel.11B/G. Wireless Basic Settings page. users can select the network type as “infrastructure” or “Adhoc”. 802.11G or 802. users can configure the operating “Band” and “Mode” as well as “Network Type”. After all items are set.11B Operating Mode: AP. SSID: The SSID differentiates one WLAN from another. 3. Back: To skip the current settings and go back to the last page. (Note: not supported in client mode) Enable Mac clone: when operating mode is “Client” and only one Ethernet client exists. and AP+WDS. 3. ” SSID”. Network type: when operating mode is “Client” mode. Back: To skip the current settings and go back to the last page. “Channel Number” and if required MAC address cloning.1. Cancel: To skip the current settings and jump to the Setup Wizard page. Next: Go to the next page. click “Next” to advance to the next screen.- Cancel: To skip the current settings and jump to the Setup Wizard page. After all items are set. - - Operating Band: 802. users can enable the Mac clone feature to easily connect to the wireless station. click on “Finished” button to save all the parameters you have set. It is case-sensitive and must not exceed 32 characters Channel Number: The number of channels supported depends on the region this Wireless-G Router is used in.4 Wireless Basic Settings In the Wireless Basic Settings page. WDS.

: 3. 15 . Help: To request help information. 802. Primary and Secondary DNS Server IPs should be acquired from the ISP. Apply Changes: Click on “Apply Changes” to save changes and logout. The four different access types supported on this router are: Static IP.1d Spanning Tree: On LAN side the router supports Spanning Tree Protocol to avoid network loop problem. In this case the IP address. PPPoE and PPTP. DHCP Client.3 WAN Settings “WAN Interface Setup” allows users to select the WAN connection type and configure the parameters pertaining to the WAN interface. 3. Clone MAC Address: New MAC address for external DHCP server to be cloned. Default Gateway.- IP Address: LAN IP address of the Wireless-G Router. Subnet Mask: Subnet Mask for this Wireless-G Router. Subnet Mask.1 Static IP This is the connection type used when users have a fixed IP address from their ISP.3. Default Gateway: Default Gateway for this Wireless-G Router. Reset: Click on “Reset” to undo your changes.

DNS3: This Tertiary DNS if necessary.2 DHCP Client The DHCP client also called "Dynamic IP address" is the mostly used connection type by cable broadband service providers. can discover this router automatically and access the Internet through this router without any configuration. Reset: Click on “Reset” to undo your changes.- WAN Access Type: Static IP is the connection type selected. If enabled. 16 . Enable UPnP: It allows enabling or disabling uPNP feature. Clone MAC Address: Some ISPs use the MAC address of a network card for authentication. 3.3. like Windows XP. users may use “Clone MAC Address to” duplicate the MAC address to the MAC address in the WAN port. Help: To request help information. Apply Changes: Click on “Apply Changes” to save changes and logout. In this case the user will automatically receive all IP information from the service provider.. all client systems that support uPNP. Subnet Mask: Subnet mask provided by ISP Default Gateway: Default gateway provided by ISP DNS1: Primary DNS provided by your ISP DNS2: Secondary DNS if necessary. IP Address: This is the fixed IP address received from ISP .

3.- WAN Access Type: DHCP Client connection type. Set DNS Manually: allow user to set the DNS manually. Enable UPnP: It allows enabling or disabling uPNP feature. users may use “Clone MAC Address to” duplicate the MAC address to the MAC address in the WAN port. In this connection type. Apply Changes: Click on “Apply Changes” to save changes and logout. 17 . like Windows XP. if users have static IPs through PPPoE. can discover this router automatically and access the Internet through this router without any configuration.3 PPPoE PPPoE stands for “Point-to-Point Protocol over Ethernet”.3. Attain DNS Automatically: When enabled DNS is obtained automatically. Some ISPs also require a service name to be entered. DNS3: Tertiary DNS if necessary. PPPoE works similarly except it works over a network connection. DNS2: Secondary DNS if necessary. Clone MAC Address: Some ISPs use the MAC address of a network card for authentication. DNS1: Primary DNS IP address.. Usually. PPP is the technology used for dialup Internet access. Help: To request help information. all client systems that support uPNP. Reset: Click on “Reset” to undo your changes. However. it’s not needed to enter the IP/DNS addresses. users are required to enter their PPPoE username and password. then they will need to enter IP and DNS addresses ISP provides. If enabled.

Keep the default setting.- - WAN Access Type: PPPoE connection type. Idle Time: Only active only when Connect On Demand is selected. It specifies the largest packet size permitted for Internet transmission. Clone MAC Address: Some ISPs use the MAC address of a network card for authentication. Manual: the connection to the ISP is set manually. Continuous: the connection to the ISP is always connected. MTU Size: MTU is the Maximum Transmission Unit.. Connect On Demand: the connection to the ISP is initialized only when an application is active to connect the Internet. 1452. 18 . DNS2: Secondary DNS if necessary. connect on demand and manual. User Name: User Name provided by ISP Password: Password provided by ISP Connection Type: There are three connection types – continuous. DNS3: Tertiary DNS if necessary. DNS1: Primary DNS IP address. Set DNS Manually: allow user to set the DNS manually. This is the time it takes for the router to disconnect from the ISP if no access request is received. to have the router select the best MTU for your Internet connection. Attain DNS Automatically: When enabled DNS is obtained automatically. users may use “Clone MAC Address to” duplicate the MAC address to the MAC address in the WAN port.

.. password. like Windows XP. Keep the default setting. The IP addresses. Reset: Click on “Reset” to undo your changes. - WAN Access Type: PPTP connection type IP Address: IP Address provided by ISP Subnet Mask: Subnet Mask provided by ISP Server IP Address: Server IP Address provided by ISP User Name: User Name provided by ISP Password: Password provided by ISP MTU Size: MTU is the Maximum Transmission Unit. Help: To request help information. The key is to enter the PPPTP userID. all client systems that support uPNP. subnet mask. to have the 19 . PPTP is used to join 2 networks using the Internet as an intermediary network.4 PPTP PPTP stands for “Point-to-Point Tunneling Protocol”. Apply Changes: Click on “Apply Changes” to save changes and logout. and PPTP Gateway IP address. 1452.- Enable UPnP: It allows enabling or disabling uPNP feature. 3. and default gateway may or may not be required. can discover this router automatically and access the Internet through this router without any configuration. It specifies the largest packet size permitted for Internet transmission. If enabled. It allows you to connect your home and work network over the Internet.3.

802. and AP+WDS. users can select the network type as 20 . Attain DNS Automatically: When enabled DNS is obtained automatically.1 Basic Settings The wireless basic settings include Band. Band: This Wireless-G Router can support three RF band: 802.. Set DNS Manually: allow user to set the DNS manually.11G and 802. If enabled. DNS2: Secondary DNS if necessary. Help: To request help information. Mode. . Clone MAC Address: Some ISPs use the MAC address of a network card for authentication. like Windows XP. SSID and Channel Number.- router select the best MTU for your Internet connection. Apply Changes: Click on “Apply Changes” to save changes and logout.. - Disable Wireless LAN Interface: If checked wireless interface will be disabled. client. DNS1: Primary DNS IP address.4 Wireless 3.4. Enable UPnP: It allows enabling or disabling uPNP feature. all client systems that support uPNP. Reset: Click on “Reset” to undo your changes. 3. WDS. DNS3: Tertiary DNS if necessary. can discover this router automatically and access the Internet through this router without any configuration..11B. Mode: This Wireless-G Router supports four operating modes: AP. users may use “Clone MAC Address to” duplicate the MAC address to the MAC address in the WAN port.11B/G. Network Type: In Client mode.

therefore. all associated wireless clients will be shown. SSID: The SSID differentiates one WLAN from another. all wireless access points/routers and all wireless devices attempting to connect to a specific WLAN must use the same SSID. All stations communicating with this Wireless-G Router must be on the same channel. The feature is only available in AP and AP+WDS modes. Help: To request help information. Apply Changes: Click on “Apply Changes” to save changes and logout. Channel Number: The number of channels supported depends on the region Wireless-G Router is used in. click on “Show Active Clients” button to view a list of associated wireless clients. Reset: Click on “Reset” to undo your changes. the “Wireless Site Survey” table will display as below: - Refresh: Click on “Refresh” button to renew and show the table. Help: To request help information. The table lists the MAC address. Connect: You can select any listed wireless network and then click on “Connect” button. In the Wireless Basic Settings page above. click on “Site Survey” button (only active when in client mode). users can enable this Mac clone feature to connect with wireless station easily. Associated Clients: When clicked on “Show Active Client” button. transmission. It is case-sensitive and must not exceed 32 characters.- - “Infrastructure” or “Adhoc” . In the figure above. 21 . Regulation Domain: Different countries have different Regulation Domains allowing only specific radio frequencies. Enable Mac clone: When operating mode is Client mode and only one Ethernet client exists. reception packet counters and encryption status for each associated wireless client. to establish a connection.

4. - Authentication Type: There are three Authentication Types.- Refresh: Click on “Refresh” button to show the latest information. Close: Click on “Close” button to close this window. If a wireless client often transmits large files. and Auto Fragment Threshold: Fragmentation mechanism is used for improving the efficiency when traffic is high in the wireless network. more 802.11 related parameters are tunable. you can enter new Fragment Threshold value to split the 22 . 3. Shared Key.Open System.2 Advanced Settings In Advanced Settings page.

Help: To request help information. Reset: Click on “Reset” button to undo your changes. “Hidden Node” is a situation in which two stations are within range of the same wireless access point/router. please specify the packet size.4. 802. the station needs the beacon interval to know when to wake up to receive the beacon (and learn whether there are buffered frames at the wireless router). Broadcast SSID: When enabled allows all wireless stations to detect the SSID of this wireless router. Therefore. When these two stations send data at the same time. In a “noisy” network environment. Data Rate: By default. they might collide when simultaneously arriving at the Wireless-G Router. The RTS mechanism will be activated if the data size exceeds the value you set. it selects the highest rate for transmission.- - - - packet. Preamble Type should be set to Long. Preamble Type: A preamble is a signal used in wireless environments to synchronize transmit timings including Synchronization and Start Frame Delimiter. it might not notice that the other station is already using the wireless medium.3 Security Here users define the security type and level of the wireless network. Selecting different methods provides different levels of security. If the “Hidden Node” problem is an issue. they are hidden nodes for each other.11g (using OFDM modulation) devices. and “WPA2 Mixed”. IAPP: The Inter-Access Point Protocol (IAPP) can extend multi-vendor interoperability to the roaming function. The default value is 2346.11b (using CCK modulation) and 802. 23 . ”WPA2(AES)”. “WPA (TKIP)”. The collision will most certainly result in loss of messages of both stations. The Short Preamble is intended for applications where minimum overhead and maximum performance is desired. The default value is 2347. “WEP”. There are five Encryption types supported: “None”. Before a station enters power save mode. but are not within range of each other. RTS Threshold: RTS Threshold is a mechanism implemented to prevent the “Hidden Node” problem. 3. When a station starts data transmission with the Wireless-G Router. Beacon Interval: Beacon interval is the amount of time between beacon transmissions. Please note that using any encryption may cause a significant degradation of data throughput on the wireless link. The value can be set from 256 to 2346. Apply Changes: Click on “Apply Changes” to save the setting.11g Protection: Is used to prevent packet collision and increase performance in wireless networks with both 802.

Authentication RADIUS Server: RADIUS is the Remote Access Dial-In User Service. Use 802. IP address and Password. Help: To request help information. Authentication. If authentication fails. Typically.1x Authentication and enter the RADIUS server parameters – port. After the credentials are verified. the authorization process begins.1x). an Authorization.. the router/access point will deny access to the user. An IP address is assigned for the Dial-Up client. AAA phases are described as follows: Authentication phase: Verifies a user name and password against a local database. Authorization phase: Determines whether a request is allowed access to a resource. Users can enable 802. 24 . Reset: Click on “Reset” button to undo your changes. which is used when a AAA dial-up client logs in or out of a Network Access Server. and Accounting (AAA) client-server protocol. If wireless user is authenticated (via 802. auditing. Apply Changes: Click on “Apply Changes” to save the setting. a RADIUS server is used by Internet Service Providers (ISP) to perform AAA tasks. IP address and Password. session time billing. or cost allocation Users must enter RADIUS Server’s Port number. a virtual port is opened on the router/access point allowing for communication. Accounting phase: Collects information on resource usage for the purpose of trend analysis.- - - Encryption: “None” means no encryption used.1x Authentication: Is a port access protocol for protecting networks via authentication.

Set WEP Key: Only active when “Use 802.1x Authentication” is not selected. Apply Changes: Click on “Apply Changes” to save the setting. Help: To request help information. When “Set WEP Key” is selected. Use 802. Reset: Click on “Reset” button to undo your changes. users need to enter parameters of the “RADIUS Server” and select the encryption key length to be “WEP 64bits” or “WEP 128bits”.1x Authentication: When this feature is enabled. Authentication RADIUS Server: RADIUS Server’s Port number. IP address and Password .- Encryption: “WEP” (Wired Equivalent Privacy) encryption type. the Wireless WEP Key Setup window will display as below: 25 .

Encryption Key 4: enter any key code for Encryption Key 4. Help: To request help information. Encryption Key 2: enter any key code for Encryption Key 2. 26 . Reset: Click on “Reset” button to undo your changes. Encryption Key 3: enter any key code for Encryption Key 3. Default Tx Key: Select the default encryption Key (Key1 to Key4) being transmitted. Apply Changes: Click on “Apply Changes” to save settings.- Key Length: Choose either 64-bit or 128-bit. Close: To close this window. Key Format: Select Hexadecimal or ASCII . Encryption Key 1: enter any key code for Encryption Key 1.

27 .

there are three parameters for the RADIUS server to be set – Port. Apply Changes: Click on “Apply Changes” to save the settings. there are two types of input format – ASCII and Hex. RADIUS Server: When user chooses RADIUS authentication. Help: To request help information. then add a new MAC address with a simple comment and click on “Apply Changes” to save the new addition. Users can select the access control mode. To delete a MAC address. 28 . WPA2 Mixed Mode is a Wi-Fi Certified feature. this feature allows the radius server to do the pre-authentication process.4. select its corresponding checkbox under the Select column and click on “Delete Selected” button. There are three encryption modes – TKIP. WPA Authentication Mode: There are two modes of WPA authenticationEnterprise (RADIUS) and Personal (Pre-Shared Key). 3. IP address and Password. The client selects the encryption cipher it likes to use and the selected cipher is used for encryption between the client and Wireless-G Router. TKIP: Temporal Key Integrity Protocol AES: Advanced Encryption Standard Mixed: WPA2 Mixed mode operation permits the coexistence of WPA and WPA2 clients on a common SSID. Enable Pre-Authentication: Only valid when WPA2(AES) and WPA2 (Mixed mode) encryption is selected. Reset: Click on “Reset” button to undo your changes. other) that are available for use.4 Access Control Access Control allows user to block or allow wireless clients to access this router.- - - Encryption: “WPA” stands for Wi-Fi Protected Access. AES and Mixed. During WPA2 Mixed Mode. CCMP. When user chooses Enterprise (RADIUS) authentication. the Wireless-G Router advertises the encryption ciphers (TKIP. Pre-Shared Key: When user chooses Pre-Shared Key authentication.

To accomplish this.4.- - Wireless Access Control Mode: There are three types of access control options: Disable Allow Listed: When selected. Delete All : To delete all clients in the Current Access Control List. Delete Selected : This button is used to delete a selected client. 29 .5 WDS When selected in the Basic Settings page and enabled here. Apply Changes : This button is used to apply new settings. 3. Deny Listed: When selected. Reset : To undo all changes. Comment: This field is used for adding any comments. Two Wireless-G Routers in bridge mode can communicate with each other through their wireless interfaces. MAC Address: This field is used to enter the client’s MAC address. all wireless routers should be set to the same channel and the MAC address of other AP/Routers should be entered in the table. only clients whose wireless MAC addresses are in the access control list will be able to connect to the Wireless-G Router. wireless clients on the list are blocked from accessing the Wireless-G Router. Wireless Distribution System (WDS) enables the router to be used as a wireless bridge “Bridge Mode”. Help: To request help information.

Show Statistics: Shows the MAC address. Delete Selected: Delete the selected WDS AP. Delete All : Delete all the WDS APs. Help: To request help information.6 Site Survey This key is only active when the wireless mode is set to Client. Reset: Click on “Reset” to undo changes. Add WDS AP: The other AP/router’s MAC address. The Wireless Site Survey tool will scan and display all available wireless networks. select and click on connect to start a connection. Current WDS AP List: A table showing current WDS AP’s . 3.- Enable WDS: enable WDS function. Comment: This field is used for adding any comments. transmission and reception packet counters for each configured WDS AP. Click on “Refresh” to search/re-scan for available Wireless-G Router(s) or IBSS(s).4. If any Wireless-G Router or IBSS is found. Set Security: To setup wireless security for WDS. 30 . Apply Changes: This button is used to apply new settings Reset To undo all changes.

31 . Help: To request help information. Local IP Address: IP address that is to be blocked from accessing the Internet. Current Filter Table: A table shows the list of current IP Addresses filtered.- Show Client button: A table shows the assigned IP address. Delete All: Delete all listed IP Address in the Current Filter Table. 3. MAC address and time expired for each DHCP leased client. Reset: Click on “Reset” to undo your changes.1 IP Filtering When enabled. - Enable IP Filtering: Enable the IP Filtering function.5. LAN clients are blocked/filtered from accessing the Internet based on their IP addresses. TCP or both . Apply Changes: Click on “Apply Changes” to save the settings.5 Firewall 3. Delete Selected: Select and delete any IP Address in the Current Filter Table. Protocol: Select the protocol to be blocked UDP. Comment: This field is used for adding comments for each access control entry.

filtering will be based on the MAC address of LAN computers.. - Enable Port Filtering: Enable the Port Filtering function. Port Range: Enter the Port range (1 to 65535) that are to be blocked. Apply Changes: Click on “Apply Changes” to save the settings. Comment: Allow user to add any comments for this port range. Delete Selected: Select and delete any listed port range . Help: To request help information.3 MAC Filtering When enabled. TCP or both. Current Filter Table: A table showing current port filtering. Delete All: Delete all the port ranges in the Current Filter Table. 3.2 Port Filtering When enabled packets are denied access to Internet/filtered based on their port address. 32 .5. Protocol: Protocols to be blocked UDP. Any computer with its MAC address on this list will be blocked from accessing the Internet. Reset: Click on “Reset” to undo your changes.3.5.

The technique used for creating VPNs is called tunneling. 33 . Delete All: Delete all MAC Address in the Current Filter Table. 3. Delete Selected: Select and delete any MAC Address in the Current Filter Table. Current Filter Table: A table showing current MAC Address filtering. is a private connection between two end points using a shared network like Internet.- Enable MAC Filtering: Enable the MAC Filtering function.. Help: To request help information. Reset: Click on “Reset” to undo your changes. MAC Address:MAC Address that is to be blocked. Comment: Comments for this MAC Address.6 VPN Settings A Virtual Private Network (VPN). Apply Changes: Click on “Apply Changes” to save the setting.

Show Log: To show the internal process of building VPN. the VPN Setup window will display as below: 34 . Refresh: To update the Current VPN Connection Table.- Enable IPSec VPN: Select to enable IPSec VPN function. - Current VPN Connection Table: A table showing current VPN connections. Generate RSA Key: Click to generate a new public key. Show RSA Public Key: Click to show the new public key. Enable NAT Traversal: Enable this function to detect NAT gateways between IPSec hosts and to negotiate the use of UDP encapsulation of IPSec packets. Help: To request help information. When Edit button is clicked. Edit: Select and edit any VPN connection in the Current VPN Connection Table. Delete: Select and delete any VPN connection in the Current VPN Connection Table.

Remote Site: Select a Single Address.- Enable Tunnel 1: Enable the IPSec VPN tunnel 1. Remote Secure Gateway: Enter remote site gateway. Local Site: Select a Single Address or Subnet Address for the secured local IP. Subnet Address. Auth Type: Allow user to select the method of authenticating gateways for Diffie-Hellman key negotiation. Remote IP Address/Network: Enter remote site IP Address (for Single Address) or IP network (for Subnet Address). Local IP Address/Network: IP address of the local network for VPN connection. 35 . Any Address or NAT-T Any Address for the secured remote IP. Local Subnet Mask: Subnet mask of local network for VPN connection. Connection Name: Specify a name for the VPN connection.

Key Management: There are two key management methods – IKE and Manual. 36 . Remote ID: Specify a remote ID to be used for setting up VPN connection.- Remote Subnet Mask: Enter remote site’s subnet mask. Connect: To active the VPN connection. Refresh: to update the Current VPN Connection Status. When IKE key management is selected. Local ID: Specify a local ID to be used for setting up VPN connection. Status: Show the current connection status. Help: To request help information. Back: go back to the VPN Setup page. Connection Type: There are two connection types – Initiator and Responder. Remote ID Type: Specify the remote ID types supported (IP. PreShared Key: Specify a key for IKE (Internet Key Exchange) Remote RSA Key: Allow user to select the method of authenticating gateways for Diffie-Hellman key negotiation. ESP: ESP (Encapsulating Security Payload) provides data privacy through encryption and authentication. DNS and Email). Local ID Type: Specify the local ID types supported (IP. DND and Email). Disconnect: To disconnect the VPN connection. Advanced: Advance VPN setup for IKE. Reset: Click on “Reset” to undo your changes. use Advanced button to access the Advanced VPN Settings for IKE page. Apply Changes: Click on “Apply Changes” to save settings.

. the key used to protect transmission of data must not be used to derive any additional keys.Cancel: Click on “Cancel” to skip the setting on this page.Help: To request help information. used to secure VPN communications.Negotiation Mode: This negotiation is the main process to build a VPN connection in phase 1. . DH2 and DH5.Encryption Algorithm: There are three encryption algorithm – 3DES.Active Protocol: ESP protocol is used to build a VPN connection in phase 2 . .Key Life Time: Define the life time for this key. .Authentication Algorithm: There are two authentication algorithm – MD5 and SHA1. Phase 2 . 3.7. .Authentication Algorithm: There are two authentication algorithm – MD5 and SHA1.Perfect Forward Secrecy (PFS): A key-establishment protocol.Key Life Time: Define the life time for this key. . .Key Group: There are three Key groups to be defined – DH1. .1 Port Forwarding The Port Forwarding feature allows users to create Virtual Servers by re-directing a particular range of service port numbers (from the WAN port) to a particular LAN IP address.Encryption Algorithm: There are two encryption algorithm – 3DES and AES128. .Encapsulation: Show the current encapsulation mode. For perfect forward secrecy (PFS) to exist. 37 . .Phase 1 . AES128 and Null.OK: Click on “OK” to confirm the settings. If one encryption key is compromised only data encrypted by that specific key is compromised. . .7 Advanced 3.

. 38 . Apply Changes: Click on “Apply Changes” to save the settings. Comment: Add any comments for the rule. 3. Delete All: Delete all Port Forwarding settings in the Current Port Forwarding Table. When enabled. “UDP” packet or “Both” (TCP + UDP).- Enable Port Forwarding: IP Address: This is the private IP of the server behind the NAT firewall.2 DMZ The DMZ feature allows one local user to be exposed to the Internet for special-purpose applications like Internet gaming or videoconferencing.7. Port Range: The range of ports to be forward to the private IP. You can choose to forward “TCP” packet. Delete Selected: Select and delete any of the listed rules in the Current Port Forwarding Table. Reset: Click on “Reset” to undo your changes. Help: To request help information. The port forwarding feature is more secure because it only opens the ports required by that application.) Protocol: This is the protocol type to be forwarded. this feature opens all ports to a single station and hence renders that system exposed to intrusion from outside. (Note: You need to give your LAN PC clients a fixed/static IP address for Port Forwarding to work properly. Current Port Forwarding Table: A table showing the current Port Forwarding settings.

This is the way Internet users can access the router through a domain name instead of its IP address. Help: To request help information. DMZ Host IP Address: Enter the computer’s IP address in this field.7. 3.- Enable DMZ: Enable one PC to be exposed to the Internet. (Note: You need to give your LAN PC clients a fixed/static IP address for DMZ to work properly.) 39 . Each time the router boots up. it will re-register its domain-name-to-IP-address mapping with the DDNS service provider. (Note: make sure that you have registered with a DDNS service provider before enabling this feature.3 DDNS You can assign a fixed host and domain name to a dynamic Internet IP address.) Apply Changes: Click on “Apply Changes” to save the setting. Reset: Click on “Reset” to undo your changes.

Username/Email: Enter the user name or Email address required to log into the DDNS account Password/Key: Enter the password or Key number required to log into the DDNS account.- Enable DDNS: Enable DDNS function. Apply Changes: Click on “Apply Changes” to save settings. Domain Name: Enter the Service Provider’s Domain Name if needed. LAN and WAN configuration information.8. 40 . Reset: Click on “Reset” to undo your changes. 3.8 Management 3. Service Provider: Select the DDNS Service Provider.1 Status The status page provides a brief read-only report for system. The data displayed may be changed depending on your current configuration. Help: To request help information.

Firmware Version: Show the current firmware version. . . Wireless Configuration .IP Address: Shows the router’s LAN interface IP address . .Default Gateway: Shows the defined Default Gateway on your local network. . TCP/IP Configuration .Subnet Mask: Shows subnet mask on your local network.Attain IP Protocol: Shows the IP protocol used on LAN .DHCP Server: Shows the DHCP server status. 41 .SSID: Shows the current SSID.Uptime: The date/time shows how long the router has been powered on.Channel Number: Shows the current operating channel.System . . .Mode: Shows the current operating modes.Associated Clients: Shows the number of associated clients . . .Band: Shows the current operating band. .Encryption: Shows the current encryption mode.BBSID: Shows the current BBSID on your Wireless LAN port.

MAC Address: Shows the MAC address on your LAN port.Default Gateway: Shows the defined Default Gateway on your public network. It serves dynamic IP addresses to LAN hosts running DHCP client.Subnet Mask: Shows subnet mask on your public network. Reset: Click on “Reset” to undo your changes. 3.3 Time Zone Settings This wireless router provides a NTP (Network Time Protocol) client that can synchronize time with a configured NTP server. 42 . 3.MAC Address: Shows the MAC address on your WAN port.8. Both dynamic and static DHCP leases are supported. .. . WAN Configuration . The service is turned on by default. DHCP Client Range: Enter the IP range assigned by the DHCP server. Help: To request help information. Pressing the Refresh Time button refreshes system timestamp and the Save/Time Sync buttons forces NTP client sync time with NTP server.IP Address: Shows the router’s WAN port IP address . .Attain IP Protocol: Shows the IP protocol used on WAN. - Enable DHCP Server: Select to enable the DHCP Server feature. Refresh: Click on “Refresh” button to update the latest information in the Dynamic DHCP Client List.8.2 DHCP Settings There is a DHCP server running on LAN interface. Apply Changes: Click on “Apply Changes” to save settings.

- Current Time: Show the current time and date of the router. Enable NTP client update: Enable time zone update function NTP server: Select the existing NTP servers by clicking the down arrow or manually assign time server address. - User Name: Enter the new login user name. (Note: if you empty the user 43 . Reset: Click on “Reset” to undo your changes. Time Zone Select: Select the time zone of the country where this router is located. The default User Name is “root” with Password “1234”. The user name can contain 1 to 30 characters and/or digits. Apply Changes: Click on “Apply Changes” to save settings. Refresh: Get the date/time from NTP server again.8. 3.4 Password Users can change the default User Name and Password here. Help: To request help information. and are case sensitive.

3. the password login protection will be disabled.) - Select File: Enter the location and name of the file containing the new firmware. Firmware Upgrade: Click on the Browse button to select the firmware and then click on the Upload button.8. Reset: Click on “Reset” to clear the Select File field. You can use the Browse button next to this field to browse for the file. Apply Changes: Click on “Apply Changes” to save settings.6 Remote Management Users can access and manage this router from a remote site using the router’s WAN IP. Apply Changes: Click on “Apply Changes” to save the settings. (Note: Do not power off the device while the firmware is being upgraded. 3. Confirmed Password: Enter the new login password again. Help: To request help information. .- name. the router will restart automatically. Reset: Click on “Reset” to undo your changes. After the firmware upgrade is completed. 44 . Reset: Click on “Reset” to clear all fields.) New Password: Enter the new login password.5 Upgrade Firmware The firmware on this wireless router can be easily upgraded. - Enable Web Server Access on WAN: Select to enable remote management. Upload: Click to upgrade the router’s firmware.8. Help: To request help information. The router’s current WAN IP is shown in the WAN status page. and are case sensitive. The passwords can contain 1 to 30 characters and/or digits.

- Load Settings from File: Enter the location and name “config. 3.- Help: To request help information. - Save Settings to File: Click on “Save” button to save the settings to a file “config.8. 45 . This backup file can be used to restore router settings. 3.8.7 Save/Reload Settings Users can create a backup file that contains current router settings.dat” of the file which was saved. This is specially useful in the event you need to reset the router to its default settings.8 System Restart You can restart the router from this page.dat”. Reset Settings to Default:: You can click on the “Reset” button to reset the current configuration to the factory default Help: To request help information. Upload: Click on “upload” button to upload previous settings. You can use the “Browse” button to browse to the location of the file.

Enable Remote Log: Enable the Remote Log function.9 Event Log This wireless router supports System Log information. Help: To request help information. This data is useful for monitoring and troubleshooting the network. - Enable Log: Enable the Log function. Wireless only or system all: Select to log the wireless events only or all system events. Log Server IP Address: Enter the Remote Log Server IP address when you use the Remote Log function.- Apply Changes: Click on “Apply Changes” to confirm the restart. 3. Logs can be sent to a remote server running a syslog 46 .

Refresh: Get the log data again.- daemon. Help: To request help information. Clear: Click on “Clear” to clear all log data in the message box. 47 . Apply Changes: Click on “Apply Changes” to save settings.

using an 802. client should get an IP address in the range of 192.1. 48 . 3. network configurations between the wireless client For example.Appendix A: Troubleshooting Symptom Inability to access the router Possible Causes Things to Do • Verify that the wireless • Incorrect or incompatible wireless network configuration. open system authentication •Use “Ipconfig” utility to verify • Inadvertent media access control (MAC) address filtering that the client is getting an IP address from the router: • The wireless network name 1. With default settings on the router.11 wireless network adapter are standard for wireless not using the same 802.11g wireless AP/Router) • Radio frequency (RF) • Remove the device causing interference from nearby the interference.. • Obtain and install the most recent version of the wireless network adapter driver. Click Start > Programs and is not visible select Command Prompt.11a network adapter and a 802. 2. Make sure that the client system’s network card is wireless client is attempting set to receive IP automatically. you are network adapter.XX with a default gateway IP of 192. devices such as cordless phones and Bluetooth devices • Wireless client is at the periphery of the RF range of the wireless AP/Router • Improperly functioning or outdated wireless network adapter driver • Move the wireless client closer or re-locate the wireless AP/Router.168.254. Type ipconfig /all at the command prompt.11 AP/Router and wireless standard (for example. • The wireless AP/Router and • Use the same 802. Make sure that Ethernet cables are connected properly. shared key authentication is configured on and wireless AP/Router are the wireless AP/Router and the compatible.1.168. • Cable failure (when wired to • Check the “Link” LED next to the router) the port on the router.

If all wireless clients of the same wireless AP/Router have the same problem. ensure that the Wireless Zero Configuration or Wireless . • IEEE 802.1X authentication is enabled on the wireless client and is not enabled on the wireless AP/Router • Improperly functioning or outdated wireless network adapter driver • Improperly functioning wireless AP/Router Incorrect. or stale visible networks • Improperly functioning or outdated wireless network adapter driver • Improperly functioning radio • Run diagnostic functions on equipment on wireless the wireless network adapter. Disable the authentication feature on the wireless client.• AP/Router is not power on • Check the “Power” LED. Check it again. • Obtain and install the most recent version of the wireless network adapter driver. • With the Services snap-in. AP/Router or wireless network adapter Wireless client has associated • Authentication problem but there is no valid IP address configuration or no network • Incorrect encryption key connectivity • Bad or missing certificates • Improperly functioning wireless AP • Verify that the wireless network configurations between the wireless client and wireless AP/Router are compatible. verify that it has been correctly configured. Contact CNet Technical Support • Obtain and install the most recent version of the wireless network adapter driver. check the wireless AP/Router settings. • If you are using a static WEP key.1X authentication might be failing. • The symptom of this issue is when the wireless client loses connectivity every 3 minutes or so. Wireless connection problems when performing a suspend and resume with a laptop computer • The Wireless Zero Configuration or Wireless Configuration services are not running • Improperly functioning or outdated wireless network adapter driver 49 • Check to see if the Wireless Zero Configuration or Wireless Configuration services are running with the sc query wzcsvc command. Make sure that you've plugged in the power cord. • Verify whether other computers connected to the wireless AP have the same problem. Intermittent connectivity • IEEE 802. missing.

168.253 or 192. 50 . Client can't connect to the AP/Router's configuration utility. the Configuration services are wireless radio button might be configured to start in the off position automatically. • A wireless network adapter driver failing in early stages of service startup may result in the Wireless Zero Configuration or Wireless Configuration service not initializing over that interface.168.255.0. • Wrong IP address • Make sure that your PC is using an IP address within the correct range.1.254 for the default value.255.1. • Try to use “Ping” utility to ping the AP/Router’s IP.168. the default IP should be at 192.2 to 192.168.• On a laptop computer.254 for AP and Router respectively.1. It should be 192. • Make sure that the address of the subnet mask is 255.1.

Vicomsoft's solutions support file sharing using TCP/IP. or peer-to-peer wireless network consists of a number of computers each equipped with a wireless networking interface card. Each computer can communicate directly with all of the other wireless enabled computers. users on the wireless LAN can share files and printers located on the wired LAN and vice versa. but may not offer the full range of wireless features defined in the 802.11 standard. Q2: What is a wireless network made up of? Ans: There are two kinds of wireless networks: a. There are two types of access points: I. such as Direct PPPoE support and extensive configuration flexibility. In this type of network the access point acts like a hub. With appropriate networking software support. has produced a number of affordable wireless solutions that are growing in popularity with business and schools as well as sophisticated applications where network wiring is impossible. (This is called "bridging") Figure A1: Ad-Hoc or Peer-to Peer Networking. Hardware access points offer comprehensive support of most wireless features.Appendix B: Frequently Asked Questions Q1: What is wireless networking? Ans: The term wireless networking refers to the technology that enables two or more computers to communicate using standard network protocols. Software Access Points which run on a computer equipped with a wireless network interface card as used in an ad-hoc or peer-to-peer wireless network. or base station. Each computer with a wireless interface can communicate directly with all of the others. 51 . This technology. They can share files and printers this way. unless one of the computers acts as a bridge to the wired LAN using special software. It can connect (or "bridge") the wireless LAN to a wired LAN. such as file servers or existing Internet Connectivity. ii. (See Figure A3) The Vicomsoft InterGate suites are software routers that can be used as a basic Software Access Point.11. b. any technology that does this could be called wireless networking. Dedicated hardware access points (HAP) such as Lucent's WaveLAN. and include features not commonly found in hardware solutions. but may not be able to access wired LAN resources. providing connectivity for the wireless computers. An ad-hoc. The current buzzword however generally refers to wireless LANs. Strictly speaking. but check your requirements carefully. allowing wireless computer access to LAN resources. but without network cabling. fuelled by the emergence of cross-vendor industry standards such as IEEE 802. A wireless network can also use an access point. (See Figure A2). such as in warehousing or point-of-sale handheld equipment. Apple's Airport Base Station or WebGear's AviatorPRO.

not FH types. as long as standards are followed. to become inexpensive. A software access point does not limit the type or number of network interfaces you use. It may 52 . and therefore can be used in the same way as any other network card. This provides some compatibility with different or older equipment.11 standard they can inter operate. such as Ethernet or Token Ring. a software access point may be the best solution. Software access points such as InterGate which uses the wireless interface of the host computer should have no compatibility issues with third party wireless hardware. If networking requirements go beyond just interconnecting a wired network to a small wireless network.5mbps networking. and does specify two different methods for wireless communications. This can be accomplished either with a hardware access point or a software access point. can it communicate with computers on a wired LAN as well? Ans: To do this you will need some sort of bridge between the wireless and wired network. with support for the older standard 1mbps and 2mbps speeds. Q3: Can I mix wireless equipment from different vendors? Ans: Because most wireless networking hardware vendors support the 802. Hardware access points are available with various types of network interfaces. but typically require extra hardware to be purchased if your networking requirements change. Also of note is that the latest version of the standard defines 11mbps and 5. Wireless connected computers using a Software Access Point. ubiquitous and totally interoperable. Figure A3: Software Access Point. Typically wireless hardware is identified to the software as a network interface. Frequency Hopping (FH) and Direct Sequence Spread Spectrum (DSSS or DS). Q4:If my computer is connected to a wireless LAN. which are not interoperable. we recommend verification as the standard is a fairly recent one. However. Wireless connected computers using a Hardware Access Point.Figure A2: Hardware Access Point. Within a short time we expect all new wireless cards. When purchasing wireless networking hardware from separate vendors be sure to obtain guarantees from the vendors that the hardware will interoperate and follows the standards. Note that this new standard covers DS-type Networks. like Ethernet cards.

Wireless and Token Ring networks. ensuring the data is protected at traditional wired network levels. a form of encryption which provides privacy comparable to that of a traditional wired network. Q5: What is Roaming? Ans: A wireless computer can "roam" from one access point to another. providing significant benefits to users and administrators. 802. as there is no official standard for this feature.also allow considerable flexibility in providing access to different network types. If the wireless network has information that should be secure then WEP should be used. such as different types of Ethernet. as an intruder does not need physical access to the traditional wired network in order to gain access to data communications. Also it should be noted that traditional Virtual Private Networking (VPN) techniques will work over wireless networks in the same way as traditional wired networks. The Wireless networking hardware automatically swaps to the Access Point with the best signal. usually in the form of a password dialog box. To protect against any potential security issues. they are not aware that a different access point is being used from area to area.11 wireless communications cannot be received --much less decoded-. eavesdropping is possible using special equipment. 802. Access points are required to have overlapping wireless areas to achieve this as can be seen in the following diagram: Figure A6: Roaming. Usually this is completely transparent to the user.by simple scanners. Such connections are only limited by the number of slots or interfaces in the computer used for this task.Wireless Networking and the Internet Q7: How can I use a wireless network to share an Internet connection? Ans: Once you realize that wireless cards are analogous to Ethernet cards and that empty space 53 . Q6: What about security? Ans: Wireless communications obviously provide potential security issues. A user can move from Area 1 to Area 2 transparently. Not all access points are capable of being configured to support roaming. with the software and hardware maintaining a steady network connection by monitoring the signal strength from in-range access points and locking on to the one with the best quality. Further to this the software access point may include significant additional features such as shared Internet access. Also of note is that any access points for a single vendor should be used when implementing roaming. However. short wave receivers etc. Some access point configurations require security authentication when swapping access points.11 wireless communications have a function called WEP (Wired Equivalent Privacy). However. web caching or content filtering. Section Two . This has led to the common misconception that wireless communications cannot be eavesdropped at all.

The key plus standard text is processed by the encryption operation. Enable WEP Q9: What is Virtual Private Networking? Ans: Typically. To share an Internet connection across a LAN you need two things:   (1) an Internet sharing hardware device or software program    (2) connection to a LAN If your LAN is wireless. Q8: How can I secure my wireless home network? Ans: Here are 3 quick steps to help you secure your wireless network from unauthorized access. Wireless connected computers using a Software Access Point for shared Internet access. Change your SSID and turn off SSID Broadcasting 3. Change the administrator password. the answer to this question becomes clear. You need a hardware or software access point and a wireless LAN. 2. which 54 . such as the internet: Security experts agree that VPNs include encryption. authentication of remote users or hosts.is analogous to Ethernet cabling. These steps are provided as general guidelines . the same criteria apply. Usually the mathematical operation requires that an alphanumeric key be supplied along with the standard text. Figure A9: Hardware Access Point. please contact your hardware vendor. 1. a Virtual Private Network (VPN) is defined as a group of two or more computer systems connected to a private network with limited public-network access that communicates securely over a public network. (See Figure A9) Figure A8: Software Access Point. Any computer equipped with a wireless network card running suitable Internet sharing software can be used as a software access point. and mechanisms for hiding or masking information about private network topology from potential attackers on the public network: Q10: What is encryption? Ans: Encryption is a mathematical operation that transforms data from standard text to cipher text. but does not usually provide much flexibility beyond very simple configurations. A hardware access point may provide Internet Sharing capabilities to Wired LAN computers. (See Figure A8) A number of vendors offer hardware access points. Wireless connected computers using a Hardware Access Point for shared Internet access.for detailed help.

Though the term "firewall" has been used when describing a router's ability to hide the LAN IP addresses. any of up to 253 devices located on the LAN will be hidden from internet hackers. connected as an independent wireless LAN. Q16: What is Ad-hoc? Ans: An Ad-hoc wireless LAN is a group of computers. as described in the IEEE 802.11 standard. Firewalls can also allow remote access to the private network through the use of secure login procedures and authentication certificates (VPN). An Ad-hoc wireless LAN is applicable at a departmental scale for a branch or SOHO operation. Q20: Does the Access Point function as a firewall? Ans: No. Q15: Can I run an application from a remote computer over the wireless network? Ans: This will depend on whether or not the application is designed to be used over a network. a data privacy mechanism based on a 40-bit shared-key algorithm. has made information and network security an important issue. Typical analog modems and/or the higher-speed cable/DSL modems do not provide the necessary security to prevent someone from hacking into a computer. Firewalls are used to prevent Denial of Service (DoS) attacks and can use software to provide content filtering to deny access to unwanted web sites. The Access Point is nothing more than a wireless hub. Q19: How do I reset the Access Point or Router? Ans: Press the Reset button on the back of the Access Point for about ten seconds. Firewalls give the administrator the ability to set up specific IP addresses or domain names that are allowed to be accessed. Q12: What is NAT? Ans: Network Address Translation is used in a router to prevent hacking into the local area network (LAN). while refusing any other attempt to access the LAN. See the application's user guide to determine if it supports operation over a network. Q14: Can the Access Point act as my DHCP Server? Ans: No. NAT substitutes a "private" IP address of devices located on the LAN side of the router with a new "public" IP address that is visible on the internet side of the router. By virtue of this simple implementation. each with a WLAN adapter. Q18: What is WEP? Ans: WEP is Wired Equivalent Privacy. a true firewall employs a technology called Stateful Packet Inspection (SPI). 55 . and as such cannot be configured to handle DHCP capabilities. This will reset the unit to its default settings. Infrastructure is applicable to enterprise scale for wireless access to a central database. Only the router's IP address is visible on the internet.produces secure scrambled text. it is the mathematical operation that transforms cipher text to standard text. The Access Point is only a bridge from wired Ethernet to wireless clients. Firewalls provide a greater level of security and are generally more expensive than a NAT router. Q17: What is Infrastructure? Ans: An integrated wireless and wired LAN is called an Infrastructure configuration. Q11: Why do I need a router? Ans: The increased reliance on computers to store valuable information and the development of applications that share information over the internet through networked personal computers. Q13: Isn't NAT the same as "firewall"? Ans: No. or wireless application for mobile workers. in combination with the advent of computer hacking. This is often referred to as filtering. Decryption is the opposite of encryption. Having a device that provides network address translation (NAT) capability provides a simple solution to the hacking issue.

g. via the Internet IP Sharer. Many subscribers share the same line. What can I do? Ans :You may have to remove the proxy settings on your Internet browser. click Edit. Make sure that your browser is set to connect directly and that any dial-up is disabled. The Router has DHCP server software built-in. For Netscape Navigator. If there are only 5 users on line at this moment then each user can share the bandwidth to nearly 300K (1500K/5). or Windows XP? Ans: Yes.. Windows Millennium. Check with your browser documentation. Make sure that Internet Explorer is set to Never dial a connection. provide technical support to setup. Q28: Can the Router act as my DHCP server? Ans: Yes. Advanced. the bandwidth of Cable is 1. Preferences.Q21: What is the maximum number of users the Access Point facilitates? Ans: It depends on the volume of data and may be less if many users create a large amount of network traffic. Internet users would not be able to access a server on your LAN because your Server does not have a valid external IP Address. 56 . Q22: What is the maximum number of IP addresses that the Router will support? Ans: The Router will support up to 253 IP addresses. Reset your cable or DSL modem by powering the unit off and then on. Internet Options. one subscriber shares one line. what can I do? Ans: Reset the Router by holding down the reset button until the Power LED fully turns on and off. configuration or troubleshooting of any non-Windows operating systems. If your ISP provides you a 512K account then you can enjoy the full 512Kbps on your side. But Cable is different. Q30: Why Wireless/Broadband Router always has problem under Cable connection but not ADSL connection? Ans: For ADSL. For Internet Explorer. and Proxy. For example. Netscape Navigator or Internet Explorer. Q23: Where is the Router installed on the network? Ans: In a typical environment. Plug the Router into the cable/DSL modem's Ethernet port. Or remove the dial-up settings on your browser. at this time. The access will hang up when the traffic is heavy over the Cable. The speed is just like the traditional modem connection. and make sure that your browser is set to connect directly and that any dial-up is disabled. Obtain and flash the latest firmware release that is readily available. Q27: I am not able to get the web configuration screen for the Router. the Router is installed between the cable/DSL modem and the LAN. click Tools. The Router also supports 100Mbps over the auto-sensing Fast Ethernet 10/100 switch on the LAN side of the Router. the Internet connection speed will vary depending on the speed of your broadband connection. Virtual Server feature allows Internet users to access standard Servers on your LAN. and then the Connection tab. Q26: When all else fails in the installation. Make sure that Netscape Navigator is set to direct connection to the Internet. the speed over ADSL is more stable than Cable. So. Q24: Does the Internet connection of the Router support 100Mbps Ethernet? Ans: The Router's current hardware design supports up to 100Mbps Ethernet on its Internet port. however. Q25: Does the Router support any operating system other than Windows 98. Q29: How to use Virtual Server in Wireless/Broadband Router? Ans: It’s also called Port forwarding.5Mbps. If there are 25 users accessing the Internet at the same time then the bandwidth of each user is 1500K/25 near 60K. Normally. e. It is the reason why many problems only happen over Cable. Windows 2000.