Router R110-HP
Router R110-HP
Router R110-HP
Acknowledgments
Microsoft and Windows are U.S. trademarks of the Microsoft group of companies. Google Chrome browser is a trademark of
Google Inc.
Warranty
WARRANTY STATEMENT: See the warranty information sheet provided in the product box and available online.
14 Tools.................................................................................................... 121
Viewing tools status ................................................................................................................................ 121
Updating software ................................................................................................................................. 121
Saving configuration settings ...................................................................................................................122
Ping .....................................................................................................................................................124
Nslookup..............................................................................................................................................125
Traceroute.............................................................................................................................................125
Email alert ............................................................................................................................................126
Scheduling............................................................................................................................................128
Support file ...........................................................................................................................................129
Viewing the EULA ..................................................................................................................................129
Wireless community
High security wireless network for
employees using WPA/WPA2.
DSL/Cable modem
R110/R120
With its wireless community feature, the R110 can be configured to provide up to four separate
wireless networks (all on the same wireless channel), and the R120 up to eight wireless
networks (split between two radios), each with its own configuration settings for security, VLAN
support, and more.
DSL/Cable modem
Employees with secure access
to all network resources
Wireless community 1
and the Internet
High security wireless network
(WPA/WPA2) for employees VLAN 1
VLAN 2
Wireless community 2 R110/R120
Low security wireless network Guests with access to a network
for guests printer and the Internet
In this scenario, employees connect to wireless community 1, which is protected with WPA/
WPA2. All employee traffic exits the HP R110/R120 on VLAN 1, providing access to private
resources on the company network and on the Internet.
Guests connect to wireless community 2, which is protected with WEP. All guest traffic exits the
HP R110/R120 on VLAN 2, providing access only to the Internet.
For offices that need Ethernet ports for wired connectivity, the R110/R120 has a built-in 4-port
Gigabit switch. It can also be used to extend the reach of the network to areas that are difficult
or impossible to reach with traditional cabling.
Wireless community
File server
DHCP server Employee
computers R110/R120 R110/R120
#2 #3
Wireless community
R110/R120
#1
VPN VPN
Internet
LAN WAN
Remote Client
R110/R120
Server
Branch 1
VPN
LAN
WAN
R110/R120
#2
VPN VPN
Internet LAN
LAN WAN WAN
R110/R120 R110/R120
#1 #3
Server
Branch 3
VPN
LAN
WAN
R110/R120
#4
Overview
The Wizard Setup provides an easy way to quickly configure basic settings on the R110/R120
and make the router operational.
Automatically running the Wizard Setup the first time you log in
The first time you log in to the management interface (see the HP R100-Series Wireless VPN
Routers Quickstart for first time login procedure), the HP end user license agreement displays.
When you accept the agreement, a page displays to enable you to select your country so that
wireless radio settings are configured appropriately. Select the country in which the router is
operating, and then click Save. The first page in the Wizard Setup appears.
See also the HP R100-Series Wireless VPN Routers Quickstart, which describes the
configuration procedure for a basic wireless network.
Wizard Setup
To start the Wizard Setup, select Home > Wizard Setup, and then click Start:
Current System Time: Displays the current time setting of the router.
Time Server Address: The IP address or name of an NTP server.
Set Time Zone: The local time zone where the router is installed.
Daylight saving
Enable: Enables daylight saving for the system time. The router automatically sets daylight
saving start and end dates based on the time zone selected.
Manually Set Time For Daylight Savings: Sets the dates for starting and ending the
daylight saving.
Static IP Address
The Static IP addresses mode sets the router to operate with a fixed IP address to connect to the
Internet. If your ISP uses static IP addressing, you need an IP address, subnet mask, and ISP
gateway address. This information is available from your ISP or on the paperwork that your ISP
left with you. Enter your information in the provided spaces, and then click Next.
Wizard Setup 13
Enter the PPPoE information in the provided spaces, and then click Next to activate your
settings.
Username: Enter your ISP-assigned user name. (Do not use characters ` " & ' # \)
Password: Enter your password (usually assigned by your ISP). (Do not use characters ` "
& ' # \)
PPTP
The Point-to-Point Tunneling Protocol (PPTP) is a common WAN protocol used for Virtual Private
Networks (VPNs) that provides a secure tunnel connection between the service provider and
the local network.
Therefore, the wireless settings differ for the R110 and R120 routers. The R110 router has a
single configuration page for 2.4 GHz or 5 GHz operation. The R120 router includes separate
configuration pages for 2.4 GHz and 5 GHz operation.
Wizard Setup 15
Mode
For 2.4 GHz, the R110 and R120 routers support 802.11b, 802.11g, and 802.11n wireless
standards. This option allows the user to select whether the router will operate in 802.11b/g
mode, 802.11b/g/n mode, or 802.11n mode only.
For 5 GHz, the R110 router supports 802.11a and 802.11n wireless standards. This option
allows the user to select whether the router will operate in 802.11a only mode, 802.11n only
mode, or 802.11a/n mode. The R120 router also supports the 802.11ac wireless standard and
allows the selection of an 802.11ac operating mode.
Select a 2.4 GHz radio mode for the R110 and R120 routers.
11b/g Mixed: (Compatibility mode.) Up to 11 Mbps for 802.11b and 54 Mbps for
802.11g.
A default wireless community is defined on the R110/R120. Its name (or SSID) is HP1 on the
R110, HP1_2G and HP1_5G on the R120, and it is assigned to VLAN 1. The settings that
initially display in the wireless community settings pertain to the default community.
The SSID can be changed if desired. The SSID name is case-sensitive and can contain up to 32
standard alphanumeric characters, including spaces. The following are not allowed:
only spaces
space as the first character
space as the last character
If there are other wireless networks in your area, make sure that you give your wireless network
a unique name. Click on the SSID box and enter a new name. Click Next to make the change.
MAC Authentication
You can control access to the wireless network based on the MAC address of a user's wireless
device. You can either block access or allow access, depending on your requirements.
Select whether to disable MAC authentication, use a MAC authentication list stored locally on
the router, or use a list stored on a RADIUS server. If local MAC authentication is selected,
configure your MAC address list on the Wireless > MAC Authentication page.
Note that MAC authentication occurs after other authentication methods have been applied.
WEP: Wired Equivalent Privacy (WEP) is the security protocol initially specified in the IEEE
802.11 standard for wireless communications. WEP provides a basic level of security,
preventing unauthorized access to the network, and encrypting data transmitted between
wireless clients and the router. WEP uses static shared keys (fixed-length hexadecimal or
alphanumeric strings) that are manually distributed to all clients that want to use the network.
WEP is not as secure as the other security methods available.
Wizard Setup 17
The router provides the following Authentication Mode and Encryption Type options:
Open: Allows a client to associate with the router without any authentication, but provides
the option of using WEP for encrypting data. If WEP encryption is used, clients must have
the correct WEP key to exchange traffic with the router. Selecting WEP encryption also
provides the option of using 802.1X for user authentication from a RADIUS server, which
dynamically generates WEP keys and distributes them to all clients.
WPA2: The Enterprise mode of WPA2 using AES encryption. If all clients in the network
are WPA2 compatible, select this option for maximum security. This mode requires the use
of a RADIUS server.
WPA2-PSK: The Personal (pre-shared key) mode of WPA2 using AES encryption. The pre-
shared key mode uses a common password phrase for user authentication that is manually
entered on the router and all wireless clients. Data encryption keys are automatically
generated by the router and distributed to all clients connected to the network.
WPA/WPA2 Enterprise: The WPA2 Enterprise mode for mixed clients, that is, when
there are some wireless clients in the network that support only WPA (TKIP encryption). This
setting enables both WPA and WPA2 clients to associate and authenticate, but uses the
more robust AES encryption (WPA2) for clients that support it. This option allows more
interoperability at the expense of some security. This mode requires the use of a RADIUS
server.
WPA/WPA2-PSK Mixed: The WPA2 Personal mode for mixed clients, that is, when
there are some wireless clients in the network that support only WPA (TKIP encryption). This
setting enables both WPA and WPA2 clients to associate and authenticate, but uses the
more robust AES encryption (WPA2) for clients that support it. This option allows more
interoperability at the expense of some security.
WEP Keys: To configure WEP keys on the router you must first specify the key length and
type. You must configure at least one key, although up to four keys can be entered. Only
four WEP keys are supported for each radio, that is, the four keys are shared by all SSIDs
using a static WEP security configuration. Therefore, you must have a consistent WEP key
setup for all SSIDs. Note that the number of keys, the key index (1-4), type, and length must
match those configured on the clients.
Key Length:
64-bit
128-bit
Default Key: You can enter up to four keys (Key 1 to Key 4). Select the key number
from the list that is used to transmit data.
Re-Key Interval: When using 802.1X dynamic WEP keys, enter the interval at which
the router refreshes the keys for each associated client. Specify a value in the range of
60 to 86400 seconds.
WPA/WPA2 Pre-Shared Key: The router uses the pre-shared key (PSK) you specify to
generate the WPA (TKIP) or WPA2 (AES) keys that are used for data encryption. Each client
that connects to the network must use the same pre-shared key.
Key Type:
Hexadecimal (characters 0-9, a-f, and A-F)
ASCII (alphanumeric characters 0-9, a-z, and A-Z, plus spaces and symbols)
Passphrase: Enter the key according to the type selected; in ASCII passphrase style
(8-63 alphanumeric characters), or in exactly 64 hexadecimal characters. For an ASCII
key, it is recommended that the key be at least 20 characters long, and be a mix of
letters and numbers. The passphrase key cannot begin or end with spaces.
RADIUS Settings: When using WPA2, WPA/WPA2 Enterprise, or WEP with 802.1X,
the RADIUS server details must be configured.
Group Key Interval: Enter the interval at which the broadcast (group) key is
refreshed for clients associated with the router. Specify a value of 0 to disable
refreshing of broadcast keys.
Session Key Interval: Enter the interval at which the router refreshes session
(unicast) keys for each associated client. Specify a value of 0 to disable refreshing of
unicast keys.
Primary RADIUS Server: Enter the IPv4 address for the primary RADIUS server that
the router uses by default, for example 192.168.1.23.
RADIUS Key: The RADIUS key is the shared secret key for the RADIUS server. You
can use up to 64 alphanumeric and special characters (do not use characters ` " & ' #
\). Do not use blank spaces in the key. The key is case-sensitive, and you must
configure the same key on the router and on the RADIUS server.
Wizard Setup 19
Accounting Enable: Select this option to track and measure the resources a
particular user has consumed, such as system time, amount of data transmitted and
received, and so on. If you enable RADIUS accounting, it is enabled for the primary
and secondary RADIUS servers.
Step 4: Summary
After you complete the Wizard Setup, the Summary page displays.
Confirm the settings, and then click Finish. The router reboots and the HP R110/R120 is
operational.
NTP
Indicates if the router is using NTP to synchronize the system clock to global Internet time.
Time Zone
The configured local time zone where the router is installed.
Daylight Saving
Shows if the router is applying daylight saving to the time setting.
Connection Type
The connection method used for the WAN port.
Radio Band
The operating band of the R110. The R110 includes one radio that can operate at 2.4 GHz or
5 GHz.
Mode
The wireless standard operating mode of the radio.
SSID
The primary wireless network SSID.
MAC Authentication
The configured MAC authentication setting used for the primary SSID.
Authentication Mode
The configured wireless security mode used for the primary SSID.
Encryption Type
The configured encryption type used for the primary SSID.
Wizard Setup 21
For information on launching the web-based management interface for the first time, see the HP
R100-Series Wireless VPN Routers Quickstart.
Device Information
Shows the router's software version, hardware serial number, host name, device description,
and country selection.
Resource Utilization
Indicates the status of the router's resources, including CPU and memory usage.
Security
Displays the current settings for Denial of Service (DoS) and Stateful Packet Inspection (SPI)
features.
Wireless
Displays the current settings for the wireless interface, including radio enable, operating
frequency, mode, channel, SSID, MAC address, authentication, and encryption.
WAN
Displays the WAN connection type, status, and IP address assignment.
LAN
Displays the router's local network IP address, MAC address, and DHCP server status.
USB
Displays the current status of a device attached to the router's USB port.
SNMP
Displays the status of the Simple Network Management Protocol feature.
Router Mode: The normal router mode that allows connections between a wired LAN and
wireless clients to the WAN Internet connection, such as a cable or DSL modem. This is the
factory set default mode.
Bridge Mode: The router operates like an access point, extending a wired LAN to wireless
clients. In this mode there is no WAN configuration, including routing, VPN, NAT, firewall,
and QoS settings; all Internet access features are disabled. In fact, all four LAN ports and
WAN port are bridged together, so the WAN port operates like another LAN port.
Caution Incorrectly selecting the country can result in illegal operation and can cause harmful
interference to other systems. You must ensure that the router is operating in accordance with
channel, power, indoor/outdoor restrictions, and license requirements for the intended country.
If you fail to heed this caution, you might be held liable for violating the local regulatory
compliance.
Session Timeout
Configure the Session Timeout for automatic log out from the web interface. If there is no
activity on the management session for the specified time, then the administrator will be
automatically logged off.
Select System > System time to open the System Time page. This page enables you to
configure time server and time zone information.
Manually
Select the date, time (in 24-hour notation), and timezone.
When you select this option, a field displays for you to specify the NTP server. You can specify
the NTP hostname or IP address, although using the IP address is not recommended, as these
are more likely to change. If you specify a hostname, note the following requirements:
A actual NTP server host name, pool.ntp.org, is configured by default and will provide the
time when the AP is connected to the Internet.
The DST offset specifies how many minutes to move the clock forward or backward.
Configuring SNMP
The Simple Network Management Protocol (SNMP) enables the remote management of the HP
R110/R120 router by a computer that has SNMP management software installed. The HP
R110/R120 provides a robust SNMP v1/v2c implementation supporting both industry-standard
MIB II objects and HP-specific MIB objects. Read-only and read-write access are supported.
Enable SNMP: Use this checkbox to enable/disable the SNMP agent. By default, the
SNMP agent is disabled. When the agent is disabled, the HP R110/R120 does not
respond to SNMP requests.
Read Community: The password that controls read-only access to SNMP information on
the router. A network management program must supply this name when attempting to get
SNMP information from the router. By default, the name is set to public. (Do not use
characters ` " & ' # \)
Write Community: The password that controls read/write access to SNMP information
on the router. A network management program must supply this name when attempting to
The router can also be configured to send status messages to an SNMP server if a problem
occurs on the network. This is done by setting the Trap Receiver option. To configure an SNMP
Trap Receiver, set the following options:
Trap Receiver IP Address: The IP address of the computer to which the status messages
are to be sent.
Trap Receiver Port: The port number of the computer to which the status messages are
to be sent.
Trap Community: The computer network management program must supply this name
to receive the trap messages. (Do not use characters ` " & ' # \)
Emergency indicates that the system is unusable. It is the highest level of severity.
Alert indicates action must be taken immediately.
Critical indicates critical conditions.
Error indicates error conditions.
Warning indicates warning conditions.
Max Size
Specifies the maximum number of log entries to store in the router's volatile memory. When the
maximum number is reached, the old log messages are overwritten by new messages.
Log Prefix
A text identification string that is added to the log messages. This is useful for quickly
identifying events you are interested in when using a remote syslog server.
Log Level: When Remote Syslog is enabled, messages of the selected Log Level or higher
are sent to the configured syslog server.
Events
The Events section of the System log page shows real-time system events on the router, such as
wireless clients associating with the router and being authenticated. The log shows the date the
event occurred, its severity level, the software program or process that caused the event
message, and the message text.
You can select Refresh to display the most recent data from the router, or Clear to remove all
entries from the list. Click Download to save all entries to a file on the management computer.
Name
A text name (1-31 alphanumeric or special characters) that describes the Proxy ARP service. (Do
not use characters ` " & ' # \)
Popular Services
Selects common protocols that identify traffic that can be forwarded through the router to a host
computer on the local LAN.
Type
Selects TCP or UDP as the protocol type, or other special protocols. When Special Protocol is
selected, the protocol numbers can be entered in the Protocol field.
Port(s)
Specifies the TCP/UDP port numbers. More than one number can be entered separated by
commas.
Protocol(s)
Specifies special protocol numbers, separated by commas.
Rules Name
Applies a schedule rule to the Proxy ARP service. The schedule rules are configured on the
Tools > Scheduling page.
The process may take several minutes during which time the AP is unavailable. The HP R110/
R120 resumes normal operation with the same configuration settings it had before the reboot.
Set the poll interval for updating statistics on the page and click Start. You can also click
Refresh anytime to immediately update values. Click Reset Counters to set all statistics
values back to zero.
Connection Type
The routers method of connection to the ISP.
Connection Time
The time elapsed since the Internet connection was established.
IP Address
The IP address assigned to the routers WAN port by the ISP.
Subnet Mask
The IP subnet mask assigned to the routers WAN port by the ISP.
Gateway
The IP address of the ISPs gateway.
MAC Clone
Indicates if the WAN port MAC address has been copied from a LAN computer.
Settings
The WAN settings page configures the method that the router uses to connect to an ISP through
the WAN port. The router supports five Internet connection methods.
DHCP IP address
A dynamic connection type is the most common method used with cable modems. In many
cases, setting the connection type to dynamic is enough to complete the connection to your ISP.
Some dynamic connection types may require a Host Name. Enter the Host Name in the space
provided if you were assigned one by your ISP (do not use characters ` " & ' # \).
Some dynamic connections require that you clone the MAC address of the PC that was
originally connected to the modem. To do so, click on WAN > MAC Clone to set the WAN
MAC address. For more information, see MAC clone on page 42.
Connection Type
Select DHCP as the routers method of connecting to the ISP.
Host Name
The host name of the DHCP client. The host name is optional, but may be required by some
ISPs.
Static IP address
The Static IP address mode sets the router to operate with a fixed IP address to connect to the
Internet. If your ISP uses static IP addressing, you need an IP address, subnet mask, and ISP
gateway address. This information is available from your ISP or on the paperwork that your ISP
left with you. Enter your information in the provided spaces, and then click Save.
36 WAN configuration
Connection Type
Select Static IP Address as the routers method of connecting to the ISP.
IP Address
Enter the IP address assigned to the routers WAN port by the ISP.
Subnet Mask
Enter the IP subnet mask assigned to the routers WAN port by the ISP.
Gateway
Enter the IP address of the ISPs gateway.
PPPoE
The Point-to-Point Protocol over Ethernet (PPPoE) is a common WAN protocol that provides a
secure tunnel connection between the service provider and the local network.
Enter the PPPoE information in the provided spaces, and then click Save to activate your
settings.
Settings 37
Connection Type
Select PPPoE as the routers method of connecting to the ISP.
Username
Enter your ISP-assigned user name. (Do not use characters ` " & ' # \)
Password
Enter your password (usually assigned by your ISP). (Do not use characters ` " & ' # \)
Confirm Password
Enter the password again to confirm it.
Service Name
The service name is normally optional, but may be required by some service providers. The
service name defines the attributes used to set up a dynamic PPPoE subscriber interface.
Idle Time
Select the number of minutes to elapse without activity before the PPPoE connection is
disconnected. Or, you can leave the default setting of Always On so that the connection is
kept open regardless of any activity. (Options: 1, 2, 5, 10, 30, 120 minutes and Always On)
38 WAN configuration
Manual Connection:
You can click Connect and Disconnect to connect or disconnect the PPPoE connection
immediately.
Multiple-PPPoE
Allows you to configure a second PPPoE session to run over the same connection. The second
session connects to another PPPoE server and the configuration allows routing rules to be
defined so that different traffic can be routed through either PPPoE channel.
Routing Table
The routing table contains rules that are used to route PPPoE traffic by source IP, destination IP,
TCP/UDP protocol, source port, or destination port. A maximum of eight rules can be defined.
Source network: The source IPv4 address and mask that identfies traffic to be routed
through the specified PPP channel.
Destination network: The destination IPv4 address and mask that identfies traffic to be
routed through the specified PPP channel.
PPTP
The Point-to-Point Tunneling Protocol (PPTP) is a common WAN protocol used for Virtual Private
Networks (VPNs) that provides a secure "tunnel" connection between the service provider and
the local network.
Connection Type
Select PPTP as the routers method of connecting to the ISP.
Settings 39
Username
Enter your ISP-assigned user name. (Do not use characters ` " & ' # \)
Password
Enter your password (usually assigned by your ISP). (Do not use characters ` " & ' # \)
Confirm Password
Enter the password again to confirm it.
Idle Time
Select the number of minutes to elapse without activity before the PPTP connection is
disconnected. Or, you can leave the default setting of Always On so that the connection is
kept open regardless of any activity. (Options: 1, 2, 5, 10, 30, 120 minutes and Always On)
DHCP Enable
Enables DHCP for the dynamic assignment of the WAN IP address from the ISP. You can click
Release and Renew to refresh the DHCP assignment. If you disable DHCP, enter the static
IPv4 address, subnet mask, gateway address, as well as primary and secondary DNS server
addresses, as provided by the ISP.
L2TP
The Layer 2 Tunneling Protocol (L2TP) is a common WAN protocol used for Virtual Private
Networks (VPNs) that provides a secure "tunnel" connection between the service provider and
the local network
Connection Type
Select L2TP as the routers method of connecting to the ISP.
Server IP
Enter the L2TP server IPv4 address as assigned by your ISP.
Username
Enter your ISP-assigned user name. (Do not use characters ` " & ' # \)
40 WAN configuration
Confirm Password
Enter the password again to confirm it.
Idle Time
Select the number of minutes to elapse without activity before the L2TP connection is
disconnected. Or, you can leave the default setting of Always On so that the connection is
kept open regardless of any activity. (Options: 1, 2, 5, 10, 30, 120 minutes and Always On)
DHCP Enable
Enables DHCP for the dynamic assignment of the WAN IP address from the ISP. You can click
Release and Renew to refresh the DHCP assignment. If you disable DHCP, enter the static
IPv4 address, subnet mask, gateway address, as well as primary and secondary DNS server
addresses, as provided by the ISP.
DDNS
Dynamic DNS (DDNS) is a system for allowing an Internet domain name to be assigned to a
varying IP address. This makes it possible for other sites on the Internet to establish connections
to the server without needing to track the IP address themselves. A common use is for running
server software on a computer that has a dynamic IP address (for example, a dialup connection
where a new address is assigned at each connection or a DSL service where the address is
changed by the ISP occasionally). To implement Dynamic DNS, you must set the maximum
caching time of the domain to an unusually short period (typically a few minutes). This prevents
other sites on the Internet from retaining the old address in their cache, so that they have to
contact the name server of the domain for each new connection. Some "client" programs
operate in the background and check the IP address of the computer every few minutes. If it has
changed, then it sends an update request to the service.
The router provides pre-configured settings to commonly used DDNS services, such as
www.dyndns.org, zoneedit, noip, DtDNS, or 3322.org. You should first register with a DDNS
service and obtain an account. This is for users with a dynamic IP from their ISP or DHCP server
that would still like to have a domain name. The Dynamic DNS service provider provides a
password or key to be entered here.
DDNS 41
Enable DDNS
Select to use a Dynamic DNS service.
DDNS Server
This is the name of your Dynamic DNS service provider.
Domain Name
The name of your host domain.
Username
Enter the user name assigned by your DDNS service. (Do not use characters ` " & ' # \)
Password
Enter your password. (Do not use characters ` " & ' # \)
Confirm Password
Enter the password again to confirm it.
MAC clone
Some ISPs limit Internet connections to a specified MAC address of one computer. This setting
allows you to manually change the MAC address of the routers WAN interface to match the
computers MAC address provided to your ISP for registration. If you are unsure of the
computer MAC address originally registered by your ISP, call your ISP and request to register a
new MAC address for your account. Register the default MAC address of the routers WAN
port.
You can enter the registered MAC address by manually entering it in the boxes provided.
Otherwise, connect the computer with the registered MAC address to the router, and select the
computers name from the Use Client List. Click Save. The computers MAC address is now
copied to the routers WAN interface.
To restore the default MAC address to the WAN port, click Reset.
42 WAN configuration
LAN
Displays current settings for the default VLAN.
Version: Indicates if the Spanning Tree Protocol (STP) or Rapid Spanning Tree Protocol
(RSTP) are enabled for the default VLAN.
Root Port: The port on the router that is connected to the Spanning Tree root device. If
there is no root port, then this router has been accepted as the root device of the Spanning
Tree network.
Root MAC Address: The MAC address of the root device in the Spanning Tree network.
LAN1LAN4: Displays the state of the routers port interfaces in the Spanning Tree
network; Disabled, Learning, Forwarding, or Blocking.
VLAN
The table includes all VLANs currently configured on the router.
LAN Settings
The router must have a valid IP address for management using a web browser and to support
other features. The router has a default IP address of 192.168.1.1. You can use this IP address or
assign another address that is compatible with an existing local network.
44 LAN configuration
IP Address
The IPv4 address of the router for the default VLAN.
Subnet Mask
There should be no need to change the subnet mask; however, it is possible to change the
subnet mask if necessary. Only make changes to the subnet mask if you have a specific reason
to do so.
Lease Time
The length of time the DHCP server reserves an IP address for each computer in the VLAN.
VLAN ID
The ID number for the default VLAN. The default VLAN ID is 1. For more information on
configuring VLANs, see VLAN settings on page 47.
LAN Settings 45
Spanning Tree
The Spanning Tree Protocol (STP) can be used to detect and disable network loops, and to
provide backup links between switches and routers. Enabling STP allows the router to interact
with other STP-compliant switches and routers in the network to ensure that only one route exists
between any two stations on the network, and provide backup links which automatically take
over when a primary link goes down. The STP versions supported by this router include STP
(IEEE 802.1D) and Rapid STP (IEEE 802.1w).
Spanning Tree Protocol: STP uses a distributed algorithm to select a switch or router that
serves as the root of the spanning tree network. It selects a root port on each device (except
for the root device) that incurs the lowest path cost when forwarding a packet from that
device to the root device. Then it selects a designated device from each LAN that incurs the
lowest path cost when forwarding a packet from that LAN to the root device. All ports
connected to designated devices are assigned as designated ports. After determining the
lowest cost spanning tree, it enables all root ports and designated ports, and disables all
other ports. Network packets are therefore only forwarded between root ports and
designated ports, eliminating any possible network loops.
Once a stable network topology has been established, all devices listen for Hello BPDUs
(Bridge Protocol Data Units) transmitted from the root device (Root Bridge). If a device does
not get a Hello BPDU after a predefined interval (Maximum Age), the device assumes that
the link to the Root Bridge is down. This device will then initiate negotiations with other
devices to reconfigure the network to reestablish a valid network topology.
Rapid Spanning Tree Protocol: RSTP is designed as a general replacement for the slower,
legacy STP. RSTP achieves much faster reconfiguration (around 1 to 3 seconds, compared
to 30 seconds or more for STP) by reducing the number of state changes before active ports
start learning, predefining an alternate route that can be used when a node or port fails,
and retaining the forwarding database for ports insensitive to changes in the tree structure
when reconfiguration occurs.
Note The router includes some fixed (not configurable) STP parameters, including the Hello Time (set
to 2 seconds) and Forward Delay (set to 4 seconds).
46 LAN configuration
Only clients that have requested an IP address since the routers last reboot and fixed
associations are displayed in this list. Click Manual Assignment to reserve the dynamically
assigned IP address for a specific computer. A maximum of 32 static-lease rules can be
defined.
VLAN settings
VLANs on the router are organized and controlled by VLAN profiles. Up to four VLAN profiles
can be created. After a new VLAN profile is created, LAN or WLAN interfaces must be added
to the VLAN by changing the VLAN settings of the interfaces. An interface can be a member of
only one VLAN, either tagged or untagged. Add an interface as a VLAN tagged port if any
connected network devices support VLANs, otherwise add the port as untagged. To prevent the
forwarding of traffic between VLANs for security, select Block routing between VLANs.
Note that the default VLAN profile is read only and cannot be deleted. To create a new VLAN
profile, click Add. To modify or delete a VLAN profile, click the edit or delete icons in the
Action column of each VLAN profile entry. Note that there is no delete icon for the default
VLAN profile because the default VLAN cannot be deleted.
Name
A text description of the VLAN. (Do not use characters ` " & ' # \)
IP Address
The IP address of the VLAN interface.
Subnet Mask
The subnet mask of the VLAN interface.
Enable NAT
Enables the NAT function for the VLAN interface.
48 LAN configuration
Lease Time
The time interval that clients can use assigned IP addresses.
VLAN ID
The ID number of the VLAN.
IGMP settings
The Internet Group Management Protocol (IGMP) is a communications protocol used by hosts
and adjacent routers on IP networks to establish multicast group memberships. IGMP can be
used for one-to-many networking applications, such as on line streaming video and gaming,
and allows more efficient use of resources when supporting these types of applications.
IGMP settings 49
The R110 router supports a dual-band single radio for 2.4 GHz and 5 GHz operation. The
R120 router suppports two radios, one for 2.4 GHz and one for 5 GHz. This means that the
R110 can operate at 2.4 GHz or 5 GHz, but not both at the same time. The R120 can operate
concurrently at 2.4 GHz and 5 GHz.
Therefore, the wireless settings differ for the R110 and R120 routers. The R110 router has a
single configuration page for 2.4 GHz or 5 GHz operation. The R120 router includes separate
configuration pages for 2.4 GHz and 5 GHz operation.
Note The web interface examples in this chapter show the R110, the web pages for the R120 are
slightly different.
Wireless
Displays the basic radio settings and the status of other features.
SSID: The service set identifier, or network name, of the VAP interface.
MAC Address: The physical layer address of the VAP interface.
Authentication Mode: The wireless security method configured for the VAP.
Encryption Type: The data encryption configured for the VAP.
WPS: Indicates if WPS is enabled for the VAP.
WDS: Indicates if WDS is enabled for the VAP.
52 Wireless configuration
Enable Radio
Enables the wireless section of your LAN. When disabled, no wireless clients can have access
to either the Internet or other clients on your wired or wireless LAN.
Radio Band
(Applies to the R110 only) Allows you to select the band of your wireless network. The R110 can
operate in the 2.4 GHz band (for 802.11b/g/n) or the 5 GHz band (for 802.11a/n). The R110
does not support concurrent operation at 2.4 GHz and 5 GHz.
Radio Mode
For 2.4 GHz, the R110 and R120 support 802.11b, 802.11g, and 802.11n wireless standards.
This option allows the user to select whether the router will operate in 802.11b/g mode,
802.11b/g/n mode, or 802.11n mode only.
For 5 GHz, the R110 supports 802.11a and 802.11n wireless standards. This option allows the
user to select whether the router will operate in 802.11a only mode, 802.11n only mode, or
802.11a/n mode. The R120 also supports the 802.11ac wireless standard and allows the
selection of an 802.11ac/n/a operating mode.
Select a 2.4 GHz radio mode for the R110 and R120.
11b/g Mixed: (Compatibility mode.) Up to 11 Mbps for 802.11b and 54 Mbps for
802.11g.
Current Channel
When the channel setting is Auto, this displays the automatically selected channel number.
Bandwidth
A single channel bandwidth is 20 MHz. When two channels are bonded the bandwidth is a
total of 40 MHz. It is possible to use either 20MHz or 40MHz channels with 802.11n.
Rules Name: Select the name of a configured schedule from the list. The schedule rules
are configured on the Tools > Scheduling page.
54 Wireless configuration
Enable
Enables secondary VAP interfaces. By default, only the primary VAP interface is enabled
(under the basic radio settings), but up to four VAP interfaces can be enabled and configured
on the R110. The R120 supports four VAPs per radio, or a total of eight VAPs.
SSID
The SSID is equivalent to the wireless network name and it can be changed if needed. The SSID
can contain any standard letters and should be a maximum of 32 characters in length. If there
are other wireless networks in your area, you need to give your wireless network a unique
name. Enter a new name in the SSID box and click Save to make the change.
Station Isolation
This function prevents wireless clients connected to the router from communicating with one
another. When enabled, this creates a separate virtual network for your wireless network. Your
wireless clients are in their own virtual network and are not able to communicate with each
other.
Broadcast
By default, the router always broadcasts SSIDs in its beacon signal. When disabled, the router
does not include SSIDs in beacon messages, nor does it respond to probe requests from clients
that do not include a valid SSID. Disabling the SSID broadcast increases security of the network
because wireless clients need to know the SSID before attempting to connect to the network. If
you decide to disable the SSID broadcast, ensure that your clients know the name of the
network first.
Encryption
Click the edit icon for a VAP interface to configure security settings. The settings are displayed
below the table. See the following section for more information on wireless security settings.
The router supports supports a number of security mechanisms that provide various levels of
authentication and encryption, depending on the requirements of the network.
MAC Authentication
You can control access to the wireless network based on the MAC address of a users wireless
device. You can either block access or allow access, depending on your requirements.
Select whether to disable MAC authentication, use a MAC authentication list stored locally on
the router, or use a list stored on a RADIUS server. If local MAC authentication is selected,
configure your MAC address list on the Wireless > MAC Authentication page. See MAC
authentication settings on page 70.
Note that MAC authentication occurs after other authentication methods have been applied.
Open: Allows a client to associate with the router without any authentication, but provides
the option of using WEP for encrypting data. If WEP encryption is used, clients must have
the correct WEP key to exchange traffic with the router. Selecting WEP encryption also
provides the option of using 802.1X for user authentication from a RADIUS server, which
dynamically generates WEP keys and distributes them to all clients.
56 Wireless configuration
WPA2-PSK: The Personal (pre-shared key) mode of WPA2 using AES encryption. The
pre-shared key mode uses a common password phrase for user authentication that is
manually entered on the router and all wireless clients. Data encryption keys are
automatically generated by the router and distributed to all clients connected to the
network. See WPA2-PSK on page 60.
WPA/WPA2 Enterprise: The WPA2 Enterprise mode for mixed clients, that is, when
there are some wireless clients in the network that support only WPA (TKIP encryption). This
setting enables both WPA and WPA2 clients to associate and authenticate, but uses the
more robust AES encryption (WPA2) for clients that support it. This option allows more
interoperability at the expense of some security. This mode requires the use of a RADIUS
server. See WPA/WPA2 enterprise on page 61.
WPA/WPA2-PSK Mixed: The WPA2 Personal mode for mixed clients, that is, when
there are some wireless clients in the network that support only WPA (TKIP encryption). This
setting enables both WPA and WPA2 clients to associate and authenticate, but uses the
more robust AES encryption (WPA2) for clients that support it. This option allows more
interoperability at the expense of some security. See WPA/WPA2-PSK mixed on
page 61.
WEP security
Wired Equivalent Privacy (WEP) is the security protocol initially specified in the IEEE 802.11
standard for wireless communications. WEP provides a basic level of security, preventing
unauthorized access to the network, and encrypting data transmitted between wireless clients
and the router. WEP uses static shared keys (fixed-length hexadecimal or alphanumeric strings)
that are manually distributed to all clients that want to use the network. The static WEP security
on the router enables wireless data encryption, but does not provide for user authentication.
WEP is not as secure as the other security methods available.
To configure WEP keys on the router you must first specify the key length and type. You must
configure at least one key, although up to four keys can be entered. Only four WEP keys are
supported for each radio, that is, the four keys are shared by all SSIDs using a static WEP
security configuration. Therefore, you must have a consistent WEP key setup for all SSIDs. Note
that the number of keys, the key index (1-4), type, and length must match those configured on
the clients.
Authentication Mode
Leave as OPEN to configure WEP security. The static WEP security does not support user
authentication.
Encryption Type
Select WEP to display the security options and to configure the keys.
802.1X
Enables dynamic WEP security on the router. IEEE 802.1X enables you to authenticate wireless
clients via user accounts stored on a third-party RADIUS server. The RADIUS server is also able
to dynamically generate WEP keys and distribute them to all authenticated clients. If you
enable dynamic WEP security, be sure to also configure the RADIUS server settings. See
Configuring RADIUS settings on page 62.
Key Length
The number of characters you specify for the key determines the level of encryption.
64-bit
128-bit
Key Type
Select the format used to specify the encryption keys. The definition for the encryption keys must
be the same on the router and all wireless clients.
Hexadecimal: Enter keys as 10 hexadecimal characters (0-9 and A-F) for 64 bit keys, or 26
hexadecimal characters for 128 bit keys.
Default Key
You can enter up to four keys (Key 1 to Key 4). Select the key number from the list that is used
to transmit data.
58 Wireless configuration
WPA2
The enterprise mode of WPA2 that provides the maximum security. You must set up at least one
configured RADIUS server in your network before enabling WPA2 security.
For RADIUS server settings, see Configuring RADIUS settings on page 62.
Authentication Mode
Select WPA2 to display all settings for WPA2 security.
Encryption Type
AES is the specified encryption for WPA2. All wireless clients must be capable of supporting
AES encryption to be able to associate with the router.
WPA2-PSK
If your network does not have a RADIUS server, select the WPA2 preshared key (PSK) option.
The WPA2-PSK security option is typically used for home or small business networks.
Authentication Mode
Select WPA2-PSK to display all settings for WPA2-PSK security.
Encryption Type
AES is the specified encryption for WPA2-PSK. All wireless clients must be capable of
supporting AES encryption to be able to associate with the router.
Key Type
The WPA preshared key can be input as an ASCII string (an easy-to-remember form of letters
and numbers that can include spaces) or Hexadecimal format.
Hexadecimal: Enter exactly 64 Hexadecimal characters (characters 0-9, a-f, and A-F).
ASCII: Enter 8-63 characters (alphanumeric characters 0-9, a-z, and A-Z, plus spaces and
symbols).
Passphrase
Enter the key according to the type selected; in ASCII passphrase style (8-63 alphanumeric
characters), or in exactly 64 Hexadecimal characters. For an ASCII key, HP recommends that
the key be at least 20 characters long, and be a mix of letters and numbers. The passphrase
key cannot begin or end with spaces.
60 Wireless configuration
You must set up at least one configured RADIUS server in your network before enabling WPA/
WPA2 security. For RADIUS server settings, see Configuring RADIUS settings on page 62.
Authentication Mode
Select WPA/WPA2 Enterprise to display all settings for mixed WPA/WPA2 security.
Encryption Type
The TKIP/AES type is the only encryption available for mixed WPA/WPA2 security. In mixed
mode, the unicast encryption (TKIP or AES) is negotiated for each client as they associate with
the network.
WPA/WPA2-PSK mixed
If your network does not have a RADIUS server, and you need to support a mix of wireless
clients, some of which support WPA2 (AES) and others which support only the original WPA
(TKIP), select the WPA/WPA2-PSK security option. The WPA/WPA2-PSK option is typically
used for home or small business networks.
This setting enables both WPA and WPA2 wireless clients to associate to the router, but uses
the more robust WPA2 for clients that support it. This security option allows more
interoperability, at the expense of some security.
Authentication Mode
Select WPA/WPA2-PSK Mixed to display all settings for WPA/WPA2-PSK security.
Encryption Type
The TKIP/AES type is the only encryption available for mixed WPA/WPA2 security. In mixed
mode, the unicast encryption (TKIP or AES) is negotiated for each client as they associate with
the network.
Key Type
The WPA/WPA2 preshared key can be input as an ASCII string (an easy-to-remember form of
letters and numbers that can include spaces) or Hexadecimal format.
Hexadecimal: Enter exactly 64 Hexadecimal characters (characters 0-9, a-f, and A-F).
ASCII: Enter 8-63 characters (alphanumeric characters 0-9, a-z, and A-Z, plus spaces and
symbols).
Passphrase
Enter the key according to the type selected; in ASCII passphrase style (8-63 alphanumeric
characters), or in exactly 64 Hexadecimal characters. For an ASCII key, HP recommends that
the key be at least 20 characters long, and be a mix of letters and numbers. The passphrase
key cannot begin or end with spaces.
When using WPA2 or WPA/WPA2 enterprise security, both of which use 802.1X as the
method of user authentication, or WEP with 802.1X, a RADIUS server must be configured and
available on the connected wired network.
62 Wireless configuration
RADIUS Key
The RADIUS key is the shared secret key for the RADIUS server. You can use up to 64
alphanumeric and special characters (do not use characters ` " & ' # \). Do not use blank
spaces in the key. The key is case-sensitive, and you must configure the same key on the router
and on the RADIUS server.
Accounting Enable
Select this option to track and measure the resources a particular user has consumed, such as
system time, amount of data transmitted and received, and so on. If you enable RADIUS
accounting, it is enabled for the primary and secondary RADIUS servers.
Interim Interval
The interval between transmitting accounting updates to the RADIUS server. The valid range is
30 to 3600 seconds and the default is 300 seconds.
Beacon Interval
The Beacon Interval value indicates the frequency interval of the beacon. A beacon is a packet
broadcast by the router to synchronize the wireless network.
DTIM Interval
The DTIM Interval indicates the interval of the Delivery Traffic Indication Message (DTIM). A
DTIM field is a countdown field informing clients of the next window for listening to broadcast
and multicast messages. When the router has buffered broadcast or multicast messages for
associated clients, it sends the next DTIM with a DTIM Interval value. Its clients hear the
beacons and awaken to receive the broadcast and multicast messages. The DTIM value is
decremented every time a beacon is sent at the beacon interval.
RTS Threshold
Sets the packet size threshold at which a Request to Send (RTS) signal must be sent to a
receiving station prior to the sending station starting communications. The router sends RTS
frames to a receiving station to negotiate the sending of a data frame. After receiving an RTS
frame, the station sends a CTS (clear to send) frame to notify the sending station that it can start
sending data.
If the RTS threshold is set to 256, the router always sends RTS signals. If set to 2347, the router
never sends RTS signals. If set to any other value, and the packet size equals or exceeds the RTS
threshold, the RTS/CTS (Request to Send / Clear to Send) mechanism will be enabled. The
stations contending for the wireless medium may not be aware of each other. The RTS/CTS
mechanism can solve this Hidden Node Problem.
64 Wireless configuration
CTS to Self: The AP that wants to send a frame sends a CTS frame to itself.
RTS/CTS: The AP that wants to send frame first sends a Request-To-Send frame and waits
for a Clear-To-Send frame from the intended destination. By seeing the RTS or CTS
frames, 802.11-compliant devices know that somebody is about to transmit and therefore do
not initiate transmission themselves.
Extension Channel Protection Mode
With 802.11n, there is the option to use a 40 (2x20) MHz bandwidth to double the data rate.
One is the primary channel, and the other is the extension channel. The primary channel is
used for communications with clients incapable of the 40 MHz mode. If the extension channel
is used, the 802.11 standard provides a way to protect transmission against other device
transmission by using the RTS/CTS protocol. There are two types of protection:
CTS to Self: The AP that wants to send a frame sends a CTS frame to itself.
RTS/CTS: The AP that wants to send frame first sends a Request-To-Send frame and waits
for a Clear-To-Send frame from the intended destination. By seeing the RTS or CTS
frames, 802.11-compliant devices know that somebody is about to transmit and therefore do
not initiate transmission themselves.
Preamble Mode
Sets the length of the signal preamble that is used at the start of a data transmission. Using a
short preamble increases data throughput when it is supported by all connected clients. Using
a long preamble ensures that 802.11b clients can connect to the network. (Default: Auto)
Max TX Power
Adjusts the power of the radio signals transmitted from the router. The higher the transmission
power, the farther the transmission range. Power selection is not just a tradeoff between
coverage area and maximum supported clients. You also have to ensure that high-power
signals do not interfere with the operation of other radio devices in the area. (Range -
Percentage mode: min, 12.5%, 25%, 50%, 100%; Default: 100%)
Note that WDS implementations can vary from product to product. Hence, there is no
guarantee that different products will interoperate. In addition, the security settings for WDS
links are the same as those set up for your wireless clients.
VAP
The VAP interface number on the router.
WDS Mode
Enables and sets the operating mode for the VAP interface.
Disable: Wireless clients can access the VAP interface as a normal access point service.
WDS-AP: The VAP interface uses WDS to connect to another AP or router. Wireless
clients can associate to this VAP interface.
WDS-STA: The VAP interface uses WDS to connect to another AP or router. Only wired
clients can connect to the router.
Parent SSID
The SSID of the WDS network. The VAP interface associates with other APs using this SSID.
Parent MAC
For WDS-STA mode, optionally enter a specific MAC address of a parent AP with which the
VAP interface should associate.
66 Wireless configuration
WPS enable
Enables the WPS function on the router.
Configuration state
Allows the wireless security to be set manually for the router, or selected automatically by WPS.
WPS Method
Selects the WPS method for clients wanting to join the network:
PIN: Uses the PIN setting method. Make sure the WPS function has been enabled on the
device. On the client side, start the WPS utility that is provided by your Wi-Fi cards vendor
and select the PIN method. You should have an 8-digit PIN number with the WPS utility.
WPS settings 67
PBC: Uses the push-button method. Make sure the WPS function has been enabled on the
device. On the client side, start the WPS utility that is provided by your Wi-Fi cards vendor
and select the PBC method. Follow the instruction of your WPS utility. Push the WPS button
on the router; the WPS LED begins blinking. While the LED is blinking, do not push the
button again. If the WPS function is working correctly, the WPS LED lights up.
Status
Displays the following WPS status information:
WMM settings
Wi-Fi Multimedia (WMM) is a Wi-Fi Alliance interoperability certification based on the IEEE
802.11e draft standard. WMM provides basic Quality of service (QoS) features for IEEE 802.11
networks. WMM prioritizes traffic according to four Access Categories (AC), however it does
not provide guaranteed throughput. It is suitable for simple applications that require QoS, such
as Wi-Fi Voice over IP (VoIP) phones.
Enable WMM
Select the checkbox to enable the WMM QoS features on the router.
68 Wireless configuration
WMM Parameters
The WMM table includes these parameters:
AC_BK: Access Category - Background. Lowest priority. Data with no delay or throughput
requirement, such as bulk data transfers.
AC_BE: Access Category - Best Effort. Normal priority, medium delay and throughput.
Data only affected by long delays. Data from applications or devices that lack QoS
capabilities.
AC_VI: Access Category - Video. High priority, minimum delay. Time-sensitive data such
as streaming video.
AC_VO: Access Category - Voice. Highest priority, minimum delay. Time-sensitive data
such as VoIP (Voice over IP) calls.
CWmin: Minimum Contention Window. The initial upper limit of the random backoff wait
time before wireless medium access can be attempted. The initial wait time is a random
value between zero and the CWMin value. Specify the CWMin value in the range 0-15
microseconds. Note that the CWMin value must be equal or less than CWMax value.
CWmax: Maximum Contention Window. The maximum upper limit of the random backoff
wait time before wireless medium can be attempted. The contention window is doubled
after each detected collision up to the CWMax value. Specify the CWMax value in the
range 0-15 microseconds. Note that the CWMax must be greater or equal to the CWMin
value.
AIFSN: Arbitration Inter-Frame Space Number. The minimum amount of wait time before
the next transmission attempt. Specify the AIFSN value in the range 0-15 microseconds.
TXOP: Transmit Opportunity. The maximum time an AC transmit queue has access to the
wireless medium. When an AC queue is granted a transmit opportunity, it can transmit
data for a time up to the TXOP. This data bursting greatly improves the efficiency for high
data-rate traffic. Specify a value in the range 0-8192 microseconds.
ACM: The admission control mode for the access category. When enabled, clients are
blocked from using the access category.
AckPolicy: Acknowledge Policy. By default, all wireless data transmission requires the
sender to wait for an acknowledge message from the receiver. WMM allows the
acknowledgement wait time to be turned off for each Access Category (AC). Although this
increases data throughput, it can also result in a high number of errors when traffic levels
are heavy.
WMM settings 69
MAC Authentication is a powerful security feature that allows you to specify which wireless
computers are allowed on the network. By setting the access rule to Allow only stations in
list, any wireless computer attempting to access the network that is not specified in the filter list
is denied access. When you enable this feature, you must enter the MAC address of each client
in your network to allow network access, or copy the MAC address by selecting the name of
the computer from Choose a PC. By setting the access rule to Block all stations in list,
you can block specific wireless computers from accessing the network by adding them to the
filter list. A maximum of 20 rules can be defined.
Filter
Select Allow only stations in list to configure only known device MAC addresses that are
permited access to the network. Select Block all stations in list to configure known MAC
addresses that are denied access to the network.
SSID
Select the VAP interface from the SSID list for which you want to configure MAC
authentication.
MAC Address
Specify a wireless client MAC address to add to the filter table.
70 Wireless configuration
The table of associated clients lists the MAC address, Receive Signal Strength Indicator (RSSI)
value, wireless mode, and traffic statistics.
Tunnel type
The tunnel type configured; either IPSec, L2TP over IPSec, or PPTP.
Tunnel name
The descriptive name that identifies the configured tunnel.
Tunnel status
Indicates the status of the tunnel.
When you click Add on this page, the VPN connection page opens where the connection
details can be configured. The VPN connection details depend on the protocol selected.
IPSec settings
The router supports the IPSec tunneling protocol. It allows users to create multiple secure IPSec
tunnels to remote end points. To establish an IPSec tunnel, the user needs to enable the feature,
and enter inbound and outbound addresses for the IPsec tunnel. This router supports MD5 and
SHA1 hash algorithm, and DES, 3DES, AES128, AES192, and AES 256 encryption algorithms.
Note Enabling IPSec VPN disables pass-through to IPSec and L2TP over IPSec Virtual Servers on the
LAN. Pass-through outbound from clients on the LAN to servers on the Internet is unaffected.
The VPN connection page displays when you click the Add button on the VPN Settings page.
From the VPN connection page you can configure detailed parameters for your IPSec VPN
connection. A maximum of five IPSec connections can be defined.
74 VPN configuration
Remote VPN Gateway: Enter the IP address or host name of the remote VPN server, or
select ANY if there is no specific server.
IP Address / Host Name: The IP address or host name of the remote VPN server.
Remote Secure Group
Remote Party ID: Select either ID_IPV4_ADDR, ID_FQDN, or ID_USER_FQDN.
This information must be entered identically on the IPSec software installed on the clients
machine.
If ID_IPV4_ADDR is selected, enter the IPv4 address and subnet mask in the Remote
Network Address, and Remote Subnet Mask fields. The remote network address is
usually the network address of the LAN connected to the remote server.
VPN settings 75
Remote Network Address: Enter the IPv4 address of the remote network.
Remote Subnet Mask: Enter the subnet mask for the remote network.
Local Secure Group
Local Party ID: Enter the identifier of the local secure group.
Network Address: The network address of the local secure group is usually the network
address of the local network.
Subnet Mask: Enter the subnet mask for the local network.
Phase I IKE Parameters
Key Management: Select either IKE Main Mode or IKE Aggressive Mode as the
Internet Key Exchange (IKE) method. Note that the Main Mode is more secure but slower,
and Aggressive Mode is less secure but faster.
Hash Algorithm: Select either MD5 or SHA1 as the algorithm to use for IPSec
authentication.
Encrypt Algorithm: Select an encryption algorithm from the list. Both authentication and
encryption algorithms must be the same on the router and remote host.
Key lifetime: Sets a time for the keys to be valid, after which they are renewed.
Diffie-Hellman Group: Select one of the groups to use for the Diffie-Hellman key
exchange.
Pre-shared Key: Enter the same key on the router and the remote VPN gateway or
client. (Do not use characters ` " & ' # \)
Encrypt Algorithm: Select an encryption algorithm from the list. Both authentication and
encryption algorithms must be the same on the router and remote host.
Key lifetime: Sets a time for the keys to be valid, after which they are renewed.
PFS: Select for Perfect Forward Secrecy (PFS). The Diffie-Hellman Group options then
become available. The use of PFS is optional, enabling PFS adds another layer of
encryption security.
Diffie-Hellman Group: Select one of the groups to use for the Diffie-Hellman key
exchange.
IKE Keep Alive: Enables the router to send IKE keep-alive packets so that the VPN
connection remains open even when there is no activity.
76 VPN configuration
The VPN connections page displays when you click Add on the VPN Settings page. From the
VPN connection page you can configure detailed parameters for your L2TP over IPSec VPN
connection. A maximum of five L2TP connections can be defined.
Username: Enter the user name for L2TP tunnel. (Do not use characters ` " & ' # \)
Password: Enter the password for the L2TP tunnel. (Do not use characters ` " & ' # \)
Confirm Password: Confirm the L2TP tunnel password.
Idle Timeout: Set the time after which the tunnel is closed when there is no activity.
L2TP Type Setting
L2TP Type: Sets the router to act as the L2TP server or client. When you set the type as
L2TP Client, you can then enter the Remote Server IP address.
VPN settings 77
Remote Party ID: When set to server mode, select either ID_IPV4_ADDR or
ID_USER_FQDN.
If ID_IPV4_ADDR is selected, enter the IPv4 address in the text box next to the list.
If ID_USER_FQDN (fully qualified domain name) is selected, enter the name in the text
box next to the list. For example, a user FQDN could be a mail address, such as
"[email protected]."
PPTP settings
The Point-to-Point Tunneling Protocol is used by some providers in Europe. This router allows
computers to use the Internet to remotely log into the LAN using the PPTP tunneling protocol.
You can configure the detailed PPTP tunnel settings on the VPN connection page by clicking
Add. You can specify the Idle Timeout, which defines the time period without traffic after which
the PPTP session is terminated. You can also configure the tunnel to behave as either a client or
server. For a client tunnel, both the host mode and network mode (LAN-to-LAN) are supported.
The tunnel can also be configured to automatically reconnect to the server when Internet traffic
is generated.
The VPN connection page displays when you click Add on the VPN Settings page. From the
VPN connection page you can configure detailed parameters for your PPTP VPN connection. A
maximum of five PPTP connections can be defined.
78 VPN configuration
Username: Enter the user name for PPTP tunnel. (Do not use characters ` " & ' # \)
Password: Enter the password for the PPTP tunnel. (Do not use characters ` " & ' # \)
Confirm Password: Confirm the PPTP tunnel password.
Idle Timeout: Set the time after which the tunnel is closed when there is no activity.
PPTP Type Setting
PPTP Type: Sets the router to act as the PPTP server or client. When you set the type as a
PPTP Client, you can then enter the Remote Server IP address.
Enable Auto Reconnect: For PPTP client connections, you can automatically reconnect
when there is activity after a disconnection.
Alternatively, you can enable dynamic routing using RIP for IPv4 or RIPng for IPv6. The Routing
Information Protocol (RIP) is the most common used method for dynamically maintaining routing
tables in small networks. RIP uses a distance vector-based approach to routing. Routes are
chosen to minimize the distance vector, or hop count, which serves as a rough estimate of
transmission cost.
The routing tables include the information necessary to forward a packet along the best path
toward its destination. Each packet contains information about its origin and destination. When
a packet is received, a network device examines the packet and matches it to the routing table
entry providing the best match for its destination. The table then provides the device with
instructions for sending the packet to the next hop on its route across the network.
Status
RIP: The current status of RIP on the router.
RIPng: The current status of RIPng on the router.
IPv4 routing table
Displays the IPv4 routes statically configured or dynamically learned by the router. For a
detailed description, see Viewing the IPv4 routing table on page 82.
Flags
Indicates the type of route:
Gateway
Displays the IP address of the router at the next hop to which matching frames are forwarded.
Subnet Mask
Displays the subnetwork associated with the destination.
82 Routing configuration
Metric
A number used to indicate the cost of a route so that the best route, among potentially multiple
routes to the same destination, can be selected.
Interface
The VLAN or WAN interface on the router for which RIP can be enabled.
Operation Mode
The router offers two modes of RIP operation.
Silent: RIP is enabled, however the router only receives RIP update messages, it will not
transmit any of its own.
Version
Use this field to select RIPv1 or RIPv2.
Poison Reverse
This enables RIP Poison Reverse on the router interface. Poison Reverse is a method that
propagates routes back to an interface port from which they have been acquired, but sets the
distance-vector metrics to infinity. This prevents data loops.
Authentication Required
The router offers two modes of authentication for RIPv2.
Password
This field is used to enter the password required when password authentication is selected. (Do
not use characters ` " & ' # \)
Enable
Enables static routes on the router.
84 Routing configuration
Subnet Mask
Enter the IPv4 subnet mask for the destination host or network. For example, for Class C IP
domains, the subnet mask is 255.255.255.0.
Gateway
Enter the IP address of the gateway through which the destination host or network can be
reached. If this router is used to connect your network to the Internet, your gateway IP is the
router's IP address. If you have another router handing your network's Internet connection,
enter the IP address of that router instead. The gateway IP address must also be routable,
otherwise the static route does not appear in the routing table.
Metric
A number used to indicate the cost of a route so that the best route, among potentially multiple
routes to the same destination, can be selected.
Interface
The interface used to route data to the network specified by the network address.
Flags
Indicates the type of route:
Gateway
Displays the IP address of the router at the next hop to which matching frames are forwarded.
Metric
A number used to indicate the cost of a route so that the best route, among potentially multiple
routes to the same destination, can be selected.
Destination
Enter the IPv6 address of the destination host or network to which the route leads.
86 Routing configuration
Gateway
Enter the IP address of the gateway through which the destination host or network can be
reached. If this router is used to connect your network to the Internet, your gateway IP is the
router's IP address. If you have another router handing your network's Internet connection,
enter the IP address of that router instead. The gateway IP address must also be routable,
otherwise the static route does not appear in the routing table.
Interface
The interface used to route data to the network specified by the network address.
Metric
A number used to indicate the cost of a route so that the best route, among potentially multiple
routes to the same destination, can be selected.
In addition to the extensive firewall protection, the router can block access to the Internet from
clients on the local network based on IP addresses, MAC addresses, or network service. The
router can also block access to specific websites or web page content.
90 Firewall configuration
Remote Administration
Remote administration allows you to make changes to your routers settings from anywhere on
the Internet. To remotely manage the router, the remote user must type the following into their
browser: http://<router WAN IP address>:8000 or 8001 if using HTTPS (unless the default
port has been changed).
Note Before you enable this function, make sure you have set the administrator password.
DoS
The router is equipped with a firewall that protects your network from a wide array of common
Denial of Service (DoS) attacks. A DoS attack is an attempt by a hacker to disrupt the normal
functioning of a target server, making it unavailable to users. A Distributed DoS (DDoS) attack
is a coordinated DoS attack from multiple source machines that flood a target server with
disruptive traffic until it fails. Turning off the DDoS Attack Filter does not leave your network
completely vulnerable to hacker attacks. HP recommends that you enable the DoS detecting
function whenever possible.
IP Spoofing: Prevents a hacker from creating an alias (spoof) of the units IP address to
which all traffic is redirected.
Ping of Death: Prevents the receival of an oversized ping packet that the unit cannot
handle. Normal ping packets are 56 bytes, or 84 bytes with the IP header attached. The
Ping of Death will exceed the maximum IP packet size of 65,535 bytes.
IP with zero length: Prevents received IP packets with zero data length from causing the
router system to crash.
Smurf Attack: Prevents a hacker from forging the IP address of the unit and sending
repeated ping requests to it flooding the network.
UDP port loopback: Prevents UDP ports 7 (echo) and 19 (chargen) being used to send
data to each other causing an infinite loop that leads to a loss of performance and high
consumption of network bandwidth.
Snork Attack: Prevents attacks on Windows computers that send UDP packets with a
source port of 7 (echo) or 19 (chargen) to destination port 135, causing unnecessary
system activity that can significantly slow performance or crash the system.
Syn flooding: Prevents a synchronized (SYN) attack in which the process of the common
three way TCP handshake is interrupted and the acknowledge response gets sent to a
malicious IP address, or the system is flooded with false SYN requests.
Security settings 91
Client PC IP
The IPv4 address of a computer on the local network.
Popular Services
Selects a common network service from the list instead of entering the protocol and ports
numbers manually.
Protocol
Selects the TCP or UDP protocol of a service to filter.
Port
The TCP or UDP port number of the service to filter.
Comment
A text comment that describes the filter. (Do not use characters ` " & ' # \)
92 Firewall configuration
MAC Address
The MAC address of a computer on the local network.
MAC filtering 93
String
The URL text or keywords that match websites to block.
URL Exclusion
Configures specific computers on the local LAN that are excluded from the URL filtering.
Exclusion Host: The IPv4 address, or range of addresses, of computers on the local
network to exclude from the URL filtering.
Use Client List: Selects a computer name or IP address from the list of clients already
assigned an IP address by the router.
94 Firewall configuration
Exclusion List
The list of computers on the local LAN that are excluded from the URL filtering.
Content filtering
Based on keywords contained on web pages, you can use this screen to restrict access to
certain websites that you do not want users in your network to open. Note that web page
content that is compressed is not filtered. A maximum of 10 rules can be defined.
Content String
The text or keywords that match web page content to block. (Do not use characters ` " & ' # \)
SPI settings
Stateful Packet Inspection (SPI) is the intrusion detection feature of the router that limits access
for incoming traffic. This feature is called stateful because it examines the contents of packets
to determine the state of the communications; that is, it ensures that the stated destination
computer has previously requested the current communication. This is a way of ensuring that all
communications are initiated by the recipient computer and are taking place only with sources
that are known and trusted from previous interactions.
When an SPI violation occurs, the offending client is disconnected from the router for 30
minutes. When DoS attacks occur, the routers Alert LED flashes until the attack ends.
Content filtering 95
Enable
Enables the SPI features on the router.
Connection Policy
Fragmentation half-open wait: Configures the number of seconds that a packet state
structure remains active. When the timeout value expires, the router drops the un-assembled
packet, freeing that structure for use by another packet.
TCP SYN wait: Defines how long the software waits for a TCP session to synchronize
before dropping the session.
TCP FIN wait: Specifies how long a TCP session is maintained after the firewall detects a
FIN packet.
TCP connection idle timeout: The length of time for which a TCP session is managed if
there is no activity.
UDP session idle timeout: The length of time for which a UDP session is managed if
there is no activity.
H.323 data channel timeout: The length of time for which an H.323 session is
managed if there is no activity.
96 Firewall configuration
Total incomplete TCP/UDP sessions LOW: Defines the rate of new unestablished
sessions that cause the software to stop deleting half-open sessions.
Incomplete TCP/UDP sessions detect sensitive time period: The length of time
before an incomplete TCP/UDP session is detected as incomplete.
Flooding cracker block time: Length of time from detecting a flood attack to blocking
the attack.
SPI settings 97
Private IP
The IPv4 address of the computer on the local network.
Popular Services
Select one of the services to automatically configure the correct protocol and port numbers. The
ports for well known services are listed below:
FTP port 21
SSH port 22
Telnet port 23
DNS port 53
Protocol
The protocol used by the service. Either TCP, UDP, TCP+UDP, ICMP, GRE, ESP, AH, or IPv6-
ICMP.
Private Port
The port number of the service used by the host computer on the local network.
Public Port
The port number of the service used by a client on the Internet.
Comment
A text string that describes the virtual server setting. (Do not use characters ` " & ' # \)
Caution Use this feature on a temporary basis. The computer in the DMZ is not protected from hacker
attacks.
To put a computer in the DMZ, enter the last digits of its LAN IP address in the Client PC IP
Address field. Enter the IP address (if known) on the Internet that will be used to access the
DMZ computer into the Public IP Address field. This allows the computer on the Internet to
access the DMZ computer through this address without firewall protection.
For the first line setting (line 1), the Public IP address is set to 0.0.0.0, which means it uses the
routers default WAN IP address. The router only allows one DMZ server to be accessed by all
public IPs (many to one NAT). For all other line settings, if you have more than one DMZ server,
you have to set the public IP address and specify the IP address of the DMZ server on the local
network (one to one NAT).
Enable
Enables the DMZ feature for the router.
Public IP
The IP address for the DMZ computer that is used to access it from the Internet. When using the
0.0.0.0 setting, the routers default WAN IP address is used.
ALG settings
The Application-Layer Gateway (ALG) feature enables Session Initiation Protocol (SIP) and
H323 VoIP traffic to pass through the router without being blocked by its firewall features.
The ALG feature works with the router's NAT feature to control and monitor SIP and H323
sessions, dynamically opening ports as required between SIP/H323 servers on the Internet and
clients on the local network. Note that only SIP server ports can be configured on the router. A
maximum of eight SIP server ports can be defined.
Port number
Specifies a SIP port number to add to the server port list.
Caution Opening ports in your firewall can pose a security risk. You can enable and disable settings
easily. HP recommends that you disable the settings when you are not using a specific
application.
A list of popular applications has been included to choose from. Select your application from
the Popular Applications list, and then click Add. The settings are transferred to a row in
the Port Trigger table. Click Save to save the settings for that application. If your application is
not listed, you can consult the application vendor to determine which ports need to be
configured. You can then manually enter the port information into the router. Multiple ports can
be entered by separating the port numbers by commas (for example; 10, 20, 30), or ranges of
ports can be specified by using dashes (for example; 20-30).
Enable
Enables the port trigger feature on the router.
Rule Enable
Enables the configured port trigger rule.
Popular Applications
Lists a number of popular applications to automatically configure the settings.
Trigger Port
Specifies application port numbers to open on the LAN. Multiple ports can be entered by
separating the port numbers by commas (for example; 10, 20, 30), or ranges of ports can be
specified by using dashes (for example; 20-30).
Trigger Protocol
Selects the TCP or UDP protocol.
Public Port
Specifies port numbers to open for the WAN.
Public Protocol
Selects the TCP or UDP protocol.
IPv6 includes two distinct address types, link-local unicast and global unicast. A link-local
address makes the router accessible over IPv6 for all devices attached to the local LAN. Traffic
using this kind of address cannot be passed by any router outside of the LAN. A link-local
address is easy to set up and is useful in small networks. However, to connect to a network
outside of the LAN, the routers WAN port must be configured with a global unicast address.
Connection Type
Displays the method used for IPv6 configuration.
WAN IP Address
The configured IPv6 addresses for the routers WAN port.
Default Gateway
The IPv6 address of the default next-hop router to use when no routing information is known
about an IPv6 address.
DNS
The IPv6 address of a known Domain Name Server.
MLD Proxy
The status of the Multicast Listener Discovery (MLD) proxy feature.
IPv6 settings
The router supports static, stateless address autoconfiguration (SLAAC), DHCPv6, and PPPoE
modes for IPv6 settings for the WAN port. Select the method to use as instructed by your ISP,
and then enter the required information and click Save.
Static IPv6
The Static IP addresses mode sets the router to operate with a fixed IP address to connect to the
Internet. If your ISP uses static IP addressing, you need an IP address, subnet mask, and ISP
gateway address. This information is available from your ISP or on the paperwork that your ISP
left with you.
Connection Settings
Sets basic IPv6 address configuration settings.
IPv6 Connection: Select Static for the IPv6 address connection mode.
IPv6 Address: The IPv6 address of the router. IPv6 addresses are 16 bytes long (128
bits), written as eight groups of hexadecimal quartets separated by colons. The initial bits
in an IPv6 address represent the network prefix and are the same for all devices in the
network. For example, an IPv6 address could be written as
2001:adca:0000:0000:0000:0000:123a:4567. Note that one double colon may be used
in the address to indicate the appropriate number of zeros required to fill the undefined
Subnet Prefix Length: The length of the IPv6 address prefix. For unicast addresses, the
prefix is typically the first 64 bits, with the following 64 bits being the host identifier.
IPv6 Gateway: The IPv6 address of the default next hop router to use when no routing
information is known about an IPv6 address.
DNS Settings
Configures IPv6 DNS settings:
Obtain IPv6 DNS servers automatically: Sets the IPv6 addresses for primary and
secondary DNS servers automatically. (Not selectable for a static IPv6 address.)
Use the following IPv6 DNS servers: Enter the primary and secondary DNS server
IPv6 addresses.
IPv6 Address: The IPv6 address of the router for the local LAN.
Subnet Prefix Length: The prefix length of the IPv6 address.
Auto Configuration: Select Stateless (RADVD) or Stateful (DHCPv6).
Disable: Disables the automatic assignment of IPv6 addresses to local hosts.
Stateless (RADVD): Enables the automatic assignment of IPv6 addresses by hosts on
the local network. The network portion of the address is based on prefixes received in
IPv6 router advertisement messages, and the host portion is automatically generated
using the modified EUI-64 form of the client identifier (that is, the client MAC address).
Connection Settings
Sets basic IPv6 address configuration settings.
IPv6 Connection: Select SLAAC for the IPv6 address connection mode.
DNS Settings
Configures IPv6 DNS settings:
Obtain IPv6 DNS servers automatically: Sets the IPv6 addresses for primary and
secondary DNS servers automatically.
Use the following IPv6 DNS servers: Enter the primary and secondary DNS server
IPv6 addresses.
Enable DHCP-PD: Enables the Prefix Delegation feature that automatically uses an IPv6
prefix for the local LAN defined by the ISP. When disabled, the IPv6 address and prefix
length need to be manually defined.
IPv6 Address: The IPv6 address of the router for the local LAN.
Subnet Prefix Length: The prefix length of the IPv6 address.
DHCPv6
Dynamic Host Configuration Protocol version 6 (DHCPv6) automatically assigns IPv6 settings to
hosts in an IPv6 network. A dynamic connection type is the most common connection method
used by ISPs with cable/DSL modems. If your ISP supports a DHCPv6 server and recommends
using this option, select DHCPv6 from the Connections Settings list.
Connection Settings
Sets basic IPv6 address configuration settings.
IPv6 Connection: Select DHCPv6 for the IPv6 address connection mode.
DNS Settings
Configures IPv6 DNS settings:
Obtain IPv6 DNS servers automatically: Sets the IPv6 addresses for primary and
secondary DNS servers automatically.
Use the following IPv6 DNS servers: Enter the primary and secondary DNS server
IPv6 addresses.
Enable DHCP-PD: Enables the Prefix Delegation feature that automatically uses an IPv6
prefix for the local LAN defined by the ISP. When disabled, the IPv6 address and prefix
length need to be manually defined.
IPv6 Address: The IPv6 address of the router for the local LAN.
Subnet Prefix Length: The prefix length of the IPv6 address.
Auto Configuration: Select Stateless (RADVD) or Stateful (DHCPv6).
Disable: Disables the automatic assignment of IPv6 addresses to local hosts.
Stateless (RADVD): Enables the automatic assignment of IPv6 addresses by hosts on
the local network. The network portion of the address is based on prefixes received in
IPv6 router advertisement messages, and the host portion is automatically generated
using the modified EUI-64 form of the client identifier (that is, the client MAC address).
PPPoE
If your ISP uses Point-to-Point Protocol over Ethernet (PPPoE) as the IPv6 connection type, enter
the PPPoE information in the provided spaces, and then click Save to activate your setting.
Connection Settings
Sets basic IPv6 address configuration settings.
IPv6 Connection: Select PPPoE for the IPv6 address connection mode.
Obtain IPv6 DNS servers automatically: Sets the IPv6 addresses for primary and
secondary DNS servers automatically.
Use the following IPv6 DNS servers: Enter the primary and secondary DNS server
IPv6 addresses. (Not selectable for a PPPoE IPv6 connection setting.)
Enable DHCP-PD: Enables the Prefix Delegation feature that automatically uses an IPv6
prefix for the local LAN defined by the ISP. When disabled, the IPv6 address and prefix
length need to be manually defined.
IPv6 Address: The IPv6 address of the router for the local LAN.
Subnet Prefix Length: The prefix length of the IPv6 address.
Auto Configuration: Select Stateless (RADVD) or Stateful (DHCPv6).
Disable: Disables the automatic assignment of IPv6 addresses to local hosts.
Stateless (RADVD): Enables the automatic assignment of IPv6 addresses by hosts on
the local network. The network portion of the address is based on prefixes received in
IPv6 router advertisement messages, and the host portion is automatically generated
using the modified EUI-64 form of the client identifier (that is, the client MAC address).
The QoS feature allows you to specify which data packets have greater priority when traffic is
transmitted from the WAN port. This router supports QoS with four priority queues on the
WAN port. Data packets in the WAN ports high-priority queue will be transmitted before
those in the lower-priority queues. You can set the maximum bandwidth for each priority queue
(trafffic shaping), as well as classify traffic types, and then map them to the WAN port priority
queues (traffic mapping).
General
Enables the traffic shaping settings on the router.
Diffserv
Displays the table of bandwidth settings for the WAN ports four output queues.
Name
Identifies the port queue (numbered 1 to 4).
Priority
Indicates that queue 1 is the lowest-priority queue and queue 4 the highest-priority queue.
Bandwidth Allocation
Sets the bandwidth for each output queue in Kbps. By default, the maximum of 1024000 Kbps
is the full bandwidth of the WAN port. You can specify any value for a queues maximum
bandwidth in the range 0 to 1024000 Kbps.
Rule Name
A name to identify the traffic mapping rule. (Do not use characters ` " & ' # \)
Source Address
Select Any, or a specific LAN host MAC address or IP subnet.
Destination Address
Select Any or a specific IP subnet as the traffic destination.
Popular Services
Select a popular service from the list to automatically configure the traffic type and IP protocol.
Traffic Type
Specifies UDP, TCP, or other IP protocol.
IP Protocol: Specifies the protocol type number when an application is not included in
the popular services list.
802.1p Priority
Identifies traffic by the 802.1p priority tag value.
DSCP/TOS
Identifies traffic by the IP DSCP or TOS value.
Remark DSCP as
Before the identified traffic is sent to the forwarding queue, the IP DSCP can be set to the
specified value.
User Account
A File Sharing user can use Windows Network Neighborhood to access files on a USB drive.
An FTP user can log into the FTP server using an FTP client. A maximum of eight File Sharing
accounts and eight FTP accounts can be defined (total 16 accounts maximum).
USB Type
Selects a user account for access to USB files through File Sharing or FTP.
Username
Enter a name containing 6 to 32 characters (do not use characters ! # $ % ^ & * ( ) + ~ ` " ' {
} [ ] | \ / : ; ? > < , = or space).
Password
Enter a password containing 6 to 32 characters (do not use two or more successive spaces, or
characters ` " & ' # \).
Confirm Password
Enter the same password for confirmation.
Enable
Select Yes to enable the user account for USB access.
Host Name: A name that identifies the router in the Windows network. Enter 1-15
characters (do not use characters ` " & ' # \.)
Folder Sharing
Folder: A name of a folder on the USB drive that you want to share. Click in the field to
browse and select the folder on the USB drive from the pop-up tree-browser window.
Allowable Users: Selects a user account that is permitted to access the shared folder.
Folder Access: Select Read and Write or Read access to the folder. A File Sharing
user with Read access can only download files from the shared folder. A File Sharing user
FTP settings
The router can be presented as an FTP server to provide a file transfer service (depending on a
users access rights to the shared folders). Users can set up the FTP server to share or download
files to local or remote users through the router. A maximum of 32 shared folders can be
defined.
Global Setting
Max Client: Set the maximum number of FTP connections (different IP addresses)
permitted at one time (range: 1 to 5). Only one connection from the same user (same IP
address) is allowed at one time.
Network Sharing
Folder: A name of a folder on the USB drive that you want to share. Click in the field to
browse and select the folder on the USB drive from the pop-up tree-browser window.
Allowable Users: Selects a user account that is permitted to access the shared folder.
Updating software
The Software page displays the current software versions installed on the router. You can
upgrade the software installed on the router to a new version downloaded from the HP support
website.
The router supports a dual-image function, which means that if the router fails to boot the active
image, it automatically boots from the backup image. Upgrading the software replaces the
backup image and reboots the router.
Firmware Version
Displays the software versions installed on the router.
Active Image: The version number of the software currently running on the router.
Backup image: The version number of the software installed as a backup on the router.
Switch to Backup: Selecting this option and clicking Start reboots the router using the
backup software image.
Update
To upgrade the software on the router, browse to the location of the software upgrade file on
your computer by clicking Browse, and then click Start.
Reset Configuration: Select this option if you want to reset all settings to factory
defaults after updating the software.
Transfer Method: Select either HTTP (web browser) or TFTP (requires server). If you
select HTTP, you can download the software file from your computer. The TFTP option
requires the software file to be placed on a computer running a TFTP server utility. The TFTP
server IPv4 address and software file name must be entered.
Firmware File: Locates the software file on the local computer when using the HTTP
transfer method.
122 Tools
Restore settings
Select to restore the routers settings and choose HTTP or TFTP as the transfer method. For HTTP,
browse button to the location of the saved configuration file on the management computer. For
TFTP, specify the file path and name on the TFTP server and enter the IPv4 server address. Click
Save to restore the saved settings.
IP Address/Domain Name
You can specify an IPv4 address, an IPv6 address, or a hostname.
Ping Count
Specify the number of pings to send (1, 3, 5, 10, or 20).
Results
The results window shows the size and number of each packet sent and, if the host is reached,
the size and number of each packet received in response and its round-trip time. It also displays
statistics about packet loss and, if the host is reached, the average round-trip time for all
packets.
124 Tools
Traceroute
Traceroute is a network tool that sends packets to a destination and produces a list of hosts that
the packets have traversed to the destination. Traceroute works by increasing the "time-to-live"
value of each successive batch of packets sent. The first three packets have a time-to-live (TTL)
value of one (implying that they make a single hop). The next three packets have a TTL value of
2, and so on. When a packet passes through a host, typically the host decrements the TTL value
by one, and forwards the packet to the next host. When a packet with a TTL of one reaches a
host, the host discards the packet and sends an ICMP time exceeded (type 11) packet to the
sender. The Traceroute utility uses these returning packets to produce a list of hosts that the
packets have traversed to the destination. Traceroute does not list the real hosts, it indicates that
the first host is at one hop, the second host at two hops. The IP protocol does not guarantee that
all the packets take the same route.
Nslookup 125
126 Tools
Encryption
If you choose to use secure connection to the mail server, select TLS/SSL and then enter the
required user name and password.
Username
The user name to connect with the mail server. (Do not use characters ` " & ' # \)
Password
The password to use for the mail server. (Do not use characters ` " & ' # \)
Confirm Password
Enter the password again to confirm it.
Alert Level
Sets the syslog severity threshold level used to trigger alert messages. The alert levels from the
lowest to the highest are Debug, Informational, Notice, Warning, Error, Critical, Alert, and
Emergency. All events at the set level and higher will be sent to the configured email recipient.
For example, setting the Warning level will report all events from Warning to Emergency.
Caution Setting the Alert Level too low can result in a very high number of emails being sent to the
recipient. HP recommends to only set the highest two or three levels.
Rules Name
A name for the scheduling rule. (Do not use the characters ` & # \.)
Comment
A comment of up to 31 characters that describes the scheduling rule. (Do not use the characters
` & # \.)
Date
Selects a day of the week, or daily.
Start/End Time
Specify the start and end times for the schedule in the standard 24 hour format.
Rules List
This table includes all the configured schedules on the router.
128 Tools
Online documentation
You can download documentation from the HP Support Center website at:
www.hp.com/support/manuals. Search by product number or name.
Contacting HP
For worldwide technical support information, see the HP Networking Support website:
www.hp.com/networking/support
Error messages
HP websites
For additional information, see the following HP websites:
www.hp.com/networking
www.hp.com
Management tool
This guide uses specific syntax when directing you to interact with the web management user
interface. Refer to the following image for identification of key user-interface elements and then
the table below for example directions:
Main
Sub-menu
Caution Resetting the router to factory defaults deletes all configuration settings, resets the manager user
name and password to admin, and sets the IPv4 address to 192.168.1.1.
3. Select Restore All Settings to Factory Default, and then click Save.
136
137
138
139
140
141