TP-Link Network Router TL-WR940N
TP-Link Network Router TL-WR940N
TP-Link Network Router TL-WR940N
Wireless N Router
Rev: 1.1.0
1910010566
No part of the specifications may be reproduced in any form or by any means or used to make any
derivative such as translation, transformation, or adaptation without permission from TP-LINK
TECHNOLOGIES CO., LTD. Copyright © 2012 TP-LINK TECHNOLOGIES CO., LTD. All rights
reserved.
http://www.tp-link.com
FCC STATEMENT
This equipment has been tested and found to comply with the limits for a Class B digital device,
pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection
against harmful interference in a residential installation. This equipment generates, uses and can
radiate radio frequency energy and, if not installed and used in accordance with the instructions,
may cause harmful interference to radio communications. However, there is no guarantee that
interference will not occur in a particular installation. If this equipment does cause harmful
interference to radio or television reception, which can be determined by turning the equipment off
and on, the user is encouraged to try to correct the interference by one or more of the following
measures:
• Connect the equipment into an outlet on a circuit different from that to which the receiver
is connected.
This device complies with part 15 of the FCC Rules. Operation is subject to the following two
conditions:
2) This device must accept any interference received, including interference that may cause
undesired operation.
Any changes or modifications not expressly approved by the party responsible for compliance
could void the user’s authority to operate the equipment.
Note: The manufacturer is not responsible for any radio or TV interference caused by
unauthorized modifications to this equipment. Such modifications could void the user’s authority
to operate the equipment.
CE Mark Warning
This is a Class B product. In a domestic environment, this product may cause radio interference,
in which case the user may be required to take adequate measures.
National restrictions
This device is intended for home and office use in all EU countries (and other countries following
the EU directive 1999/5/EC) without any limitation except for the countries mentioned below:
Outdoor use limited to 10 Military Radiolocation use. Refarming of the 2.4 GHz
France mW e.i.r.p. within the band band has been ongoing in recent years to allow current
2454-2483.5 MHz relaxed regulation. Full implementation planned 2012
II
This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to the
following two conditions:
(2)This device must accept any interference received, including interference that may cause
undesired operation.
IMPORTANT NOTE:
This equipment complies with Canada radiation exposure limits set forth for an uncontrolled
environment. This equipment should be installed and operated with minimum distance 20cm
between the radiator & your body.
Ce dispositif est conforme à la norme CNR-210 d’Industrie Canada applicable aux appareils radio
exempts de licence. Son fonctionnement est sujet aux deux conditions suivantes:
(2) Ce dispositif doit accepter tout brouillage reçu,y compris un brouillage susceptible de
provoquer un fonctionnement indésirable.
NOTE IMPORTANTE:
Cet équipement est conforme aux limites d’exposition aux rayonnements IC établies pour un
environnement non contrôlé. Cet équipement doit être installé et utilisé avec un minimum de 20
cm de distance entre la source de rayonnement et votre corps.
NCC Notice
經型式認證合格之低功率射頻電機,非經許可,公司、商號或使用者均不得擅自變更頻率、加大功
率或變更原設計之特性及功能。
低功率射頻電機之使用不得影響飛航安全及干擾合法通信;經發現有干擾現象時,應立即停用,並
改善至無干擾時方得繼續使用。前項合法通信,指依電信法規定作業之無線電通信。低功率射頻電
機須忍受合法通信或工業、科學及醫療用電波輻射性電機設備之干擾。
III
DECLARATION OF CONFORMITY
For the following equipment:
Trademark: TP-LINK
We declare under our own responsibility that the above products satisfy all the technical
regulations applicable to the product within the scope of Council Directives:
The above product is in conformity with the following standards or other normative documents
ETSI EN 300 328 V1.7.1: 2006
ETSI EN 301 489-1 V1.8.1:2008& ETSI EN 301 489-17 V2.1.1:2009
EN 55022:2006 +A1:2007
EN 55024:1998+A1:2001+A2:2003
EN 61000-3-2:2006+A1:2009+A2:2009
EN 61000-3-3:2008
EN60950-1:2006+A11:2009+A1:2010
EN62311:2008
Yang Hongliang
Chapter 1. Introduction.......................................................................................................................... 2
4.1 Login....................................................................................................................................17
4.4 QSS.....................................................................................................................................18
4.5.1 WAN........................................................................................................................25
4.6 Wireless...............................................................................................................................36
4.8.4 UPnP.......................................................................................................................54
4.11.1 Rule.........................................................................................................................63
4.11.2 Host.........................................................................................................................66
4.11.4 Schedule.................................................................................................................70
II
4.16.9 Statistics..................................................................................................................91
Appendix C: Specifications.................................................................................................................102
Appendix D: Glossary..........................................................................................................................103
III
Package Contents
• This Guide
) Note:
Make sure that the package contains the above items. If any of the listed items are damaged or
missing, please contact your distributor.
-1-
Chapter 1. Introduction
Incredible Speed
The TL-WR940N Wireless N Router provides up to 300Mbps wireless connection with other 802.11n
wireless clients. The incredible speed makes it ideal for handling multiple data streams at the same
time, which ensures your network stable and smooth. The performance of this 802.11n wireless
Router will give you the unexpected networking experience at speed 650% faster than 802.11g. It is
also compatible with all IEEE 802.11g and IEEE 802.11b products.
With multiple protection measures, including SSID broadcast control and wireless LAN
64/128/152-bit WEP encryption, Wi-Fi protected Access (WPA2-PSK, WPA-PSK), as well as
advanced Firewall protections, the TL-WR940N Wireless N Router provides complete data
privacy.
The TL-WR940N Wireless N Router provides flexible access control, so that parents or network
administrators can establish restricted access policies for children or staff. It also supports Virtual
Server and DMZ host for Port Triggering, and then the network administrators can manage and
monitor the network in real time with the remote management function.
Simple Installation
Since the Router is compatible with virtually all the major operating systems, it is very easy to
manage. Quick Setup Wizard is supported and detailed instructions are provided step by step in
this user guide. Before installing the Router, please look through this guide to know all the
Router’s functions.
1.2 Conventions
The Router or TL-WR940N mentioned in this guide stands for TL-WR940N Wireless N Router without
any explanation.
-2-
¾ One 10/100M Auto-Negotiation RJ45 WAN port, four 10/100M Auto-Negotiation RJ45 LAN
ports, supporting Auto MDI/MDIX.
¾ Shares data and Internet access for users, supporting Dynamic IP/Static IP/PPPoE Internet
access.
¾ Built-in firewall supporting IP address filtering, Domain Name filtering, and MAC address
filtering.
¾ Connects Internet on demand and disconnects from the Internet when idle for PPPoE.
¾ Provides 64/128/152-bit WEP encryption security and wireless LAN ACL (Access Control
List).
The Router’s LEDs and the QSS button are located on the front panel (View from left to right).
-3-
) Note:
After a device is successfully added to the network by QSS function, the QSS LED will keep on for
about 5 minutes and then turn off.
The following parts are located on the rear panel (View from left to right).
¾ POWER: The Power socket is where you will connect the power adapter. Please use the
power adapter provided with this TL-WR940N Wireless N Router.
-4-
¾ RESET:
1) Use the Factory Defaults function on System Tools -> Factory Defaults page in the
Router's Web-based Utility.
2) Use the Factory Default Reset button: Press the Reset button for five seconds and then
wait for the Router to reboot.
¾ WAN: This WAN port is where you will connect the DSL/cable Modem, or Ethernet.
¾ 1,2,3,4 (LAN): These ports (1, 2, 3, 4) connect the Router to the local PC(s).
-5-
¾ One DSL/Cable Modem that has an RJ45 connector (which is not necessary if the Router is
connected directly to the Ethernet.)
¾ PCs with a working Ethernet Adapter and an Ethernet cable with RJ45 connectors
¾ Web browser, such as Microsoft Internet Explorer 5.0 , Netscape Navigator 6.0 or above
2. Locate an optimum location for the Router. The best place is usually at the center of your
wireless network. The place must accord with the Installation Environment Requirements.
4. Connect the PC(s) and each Switch/Hub in your LAN to the LAN Ports on the Router, shown
in Figure 2-1. (If you have the wireless NIC and want to use the wireless function, you can
skip this step.)
5. Connect the DSL/Cable Modem to the WAN port on the Router, shown in Figure 2-1.
6. Connect the power adapter to the power socket on the Router, and the other end into an
electrical outlet. The Router will start to work automatically.
-6-
-7-
This chapter will show you how to configure the basic functions of your TL-WR940N Wireless N
Router using Quick Setup Wizard within minutes.
Connect the local PC to the LAN ports of the Router. And then you can configure the IP address
for your PC in the following two ways.
1) Set up the TCP/IP Protocol for your PC. If you need instructions as to how to do this,
please refer to Appendix B: "Configuring the PC."
2) Configure the network parameters. The IP address is 192.168.0.xxx ("xxx" is any number
from 2 to 254), Subnet Mask is 255.255.255.0, and Gateway is 192.168.0.1 (The
Router's default IP address)
1) Set up the TCP/IP Protocol in "Obtain an IP address automatically" mode on your PC.
If you need instructions as to how to do this, please refer to Appendix B: "Configuring the
PC."
2) Then the built-in DHCP server will assign IP address for the PC.
Now, you can run the Ping command in the command prompt to verify the network connection
between your PC and the Router. The following example is in Windows 2000 OS.
Open a command prompt, and type ping 192.168.0.1, and then press Enter.
¾ If the result displayed is similar to the Figure 3-1, it means the connection between your PC
and the Router has been established well.
-8-
¾ If the result displayed is similar to the Figure 3-2, it means the connection between your PC
and the Router is failed.
) Note:
The 1/2/3/4 LEDs of LAN ports which you link to on the Router and LEDs on your PC's adapter
should be lit.
-9-
) Note:
If the Router's IP address is 192.168.0.1, your PC's IP address must be within the range of
192.168.0.2 ~ 192.168.0.254.
) Note:
If the LAN IP of the modem connected with your router is 192.168.0.x, the default LAN IP of the
Router will automatically switch from 192.168.0.1 to 192.168.1.1 to avoid IP conflict. Therefore, in
order to verify the network connection between your PC and the Router, you can open a
command prompt, and type ping 192.168.1.1, and then press Enter.
1. To access the configuration utility, open a web-browser and type in the default address
http://tplinklogin.net in the address field of the browser.
After a moment, a login window will appear, similar to the Figure 3-4. Enter admin for the User
Name and Password, both in lower case letters. Then click the OK button or press the Enter key.
) Note:
If the above screen does not pop-up, it means that your Web-browser has been set to a proxy. Go
to Tools menu>Internet Options>Connections>LAN Settings, in the screen that appears, cancel
the Using Proxy checkbox, and click OK to finish it.
-10-
2. After successfully login, you can click the Quick Setup to quickly configure your Router.
3. Click Next, and then WAN Connection Type page will appear, shown in Figure 3-6.
The Router provides Auto-Detect function and supports three popular ways PPPoE,
Dynamic IP and Static IP to connect to the Internet. It’s recommended that you make use of
the Auto-Detect function. If you are sure of what kind of connection type your ISP provides,
you can select the very type and click Next to go on configuring.
4. If you select Auto-Detect, the Router will automatically detect the connection type your ISP
provides. Make sure the cable is securely plugged into the WAN port before detection. The
appropriate configuration page will be displayed when an active Internet service is
successfully detected by the Router.
1) If the connection type detected is PPPoE, the next screen will appear as shown in
Figure 3-7.
-11-
¾ User Name and Password - Enter the User Name and Password provided by your ISP.
These fields are case sensitive. If you have difficulty with this process, please contact
your ISP.
¾ Confirm Password - Re-enter the password provided by your ISP to ensure the
Password you entered is correct. If the Password is different from the Confirm Password,
the screen will appear as shown below. Click OK, and re-enter the Password and
Confirm Password.
2) If the connection type detected is Dynamic IP, the next screen will appear as shown in
Figure 3-8. Then you can go on with the wireless configuration.
¾ If you are visiting the Router from the main computer, please select Yes, and then click
Clone MAC Address.
¾ If you are visiting the Router from another computer, rather than the main computer,
please select No, and then enter the main computer’s MAC in the field WAN MAC
Address.
-12-
3) If the connection type detected is Static IP, the next screen will appear as shown in
Figure 3-10
¾ IP Address - This is the WAN IP address as seen by external users on the Internet
(including your ISP). Enter the IP address into the field.
¾ Subnet Mask - The Subnet Mask is used for the WAN IP address, it is usually
255.255.255.0.
¾ Default Gateway - Enter the gateway IP address into the box if required.
¾ Primary DNS - Enter the DNS Server IP address into the box if required.
¾ Secondary DNS - If your ISP provides another DNS server, enter it into this field.
5. Click Next to continue, the Wireless settings page will appear as shown in Figure 3-11.
-13-
¾ Wireless Radio - Enable or disable the wireless radio choosing from the pull-down list.
¾ Region - Select your region from the pull-down list. This field specifies the region where
the wireless function of the Router can be used. It may be illegal to use the wireless
function of the Router in a region other than one of those specified in this field. If your
country or region is not listed, please contact your local government agency for
assistance.
When you select your local region from the pull-down list, click the Save button, then the
Note Dialog appears. Click OK.
Note Dialog
) Note:
Limited by local law regulations, version for North America does not have region selection option.
-14-
¾ Channel - This field determines which operating frequency will be used. The default
channel is set to Auto, so the AP will choose the best channel automatically. It is not
necessary to change the wireless channel unless you notice interference problems with
another nearby access point.
¾ Mode - This field determines the wireless mode which the Router works on.
¾ Channel Width - Select any channel width from the pull-down list. The default setting is
automatic, which can adjust the channel width for your clients automatically.
¾ Max Tx Rate - You can limit the maximum transmission rate of the Router through this
field.
For ASCII, the key can be made up of any numbers 0 to 9 and any letters A to Z, the
length should be between 8 and 63 characters.
For Hexadecimal, the key can be made up of any numbers 0 to 9 and letters A to F,
the length should be between 8 and 64 characters.
Please also note the key is case sensitive, this means that upper and lower case
keys will affect the outcome. It would also be a good idea to write down the key and
all related wireless security settings.
¾ No Change - If you chose this option, wireless security configuration will not change!
These settings are only for basic wireless parameters. For advanced settings, please refer to
Section 4.6: “Wireless”.
6. Click the Next button. You will then see the Finish page.
If you don’t make any changes on the Wireless page, you will see the Finish page as shown
in Figure 3-12. Click the Finish button to finish the Quick Setup.
If there are something changed on the Wireless page, you will see the Finish page as shown in
Figure 3-13. Click the Reboot button to make your wireless configuration to take effect and finish
the Quick Setup.
-15-
-16-
This chapter will show each Web page's key functions and the configuration way.
4.1 Login
After your successful login, you will see the fifteen main menus on the left of the Web-based utility.
On the right, there are the corresponding explanations and instructions.
The detailed explanations for each Web page’s key function are listed below.
4.2 Status
The Status page provides the current status information about the Router. All information is
read-only.
-17-
4.4 QSS
This section will guide you add a new wireless device to an existing network quickly by QSS
(Quick Secure Setup) function.
-18-
a). Choose menu “QSS”, you will see the next screen (shown in Figure 4-2 ).
¾ Current PIN - The current value of the Router's PIN displayed here. The default PIN of the
Router can be found in the label or User Guide.
¾ Gen New PIN - Click this button, and then you can get a new random value for the Router's
PIN. You can ensure the network security by generating a new PIN.
¾ Add device - You can add the new device to the existing network manually by clicking this
button.
If the wireless adapter supports Wi-Fi Protected Setup (WPS), you can establish a wireless
connection between wireless adapter and Router using either Push Button Configuration (PBC)
method or PIN method.
) Note:
To build a successful connection by QSS, you should also do the corresponding configuration of
the new device for QSS function meanwhile.
For the configuration of the new device, here takes the Wireless Adapter of our company for
example.
I. By PBC
If the wireless adapter supports Wi-Fi Protected Setup and the Push Button Configuration (PBC)
method, you can add it to the network by PBC with the following two methods.
Method One:
Step 1: Press the QSS button on the front panel of the Router.
Step 2: Press and hold the QSS button of the adapter directly for 2 or 3 seconds.
-19-
Step 3: Wait for a while until the next screen appears. Click Finish to complete the QSS
configuration.
Method Two:
Step 1: Press the QSS button on the front panel of the Router.
Step 2: For the configuration of the wireless adapter, please choose Push the button on my
access point in the configuration utility of the QSS as below, and click Next.
-20-
Method Three:
Step 1: Keep the default QSS Status as Enabled and click the Add device button in Figure 4-2,
then the following screen will appear.
-21-
Step 3: For the configuration of the wireless adapter, please choose Push the button on my
access point in the configuration utility of the QSS as below, and click Next.
-22-
II. By PIN
If the new device supports Wi-Fi Protected Setup and the PIN method, you can add it to the
network by PIN with the following two methods.
Step 2: Choose Enter the new device's PIN and enter the PIN code of the wireless adapter in
the field behind PIN in the above figure. Then click Connect.
) Note:
The PIN code of the adapter is always displayed on the QSS configuration screen.
Step 3: For the configuration of the wireless adapter, please choose Enter a PIN into my access
point or a registrar in the configuration utility of the QSS as below, and click Next.
-23-
Step 1: Get the Current PIN code of the Router in Figure 4-2 (each Router has its unique PIN
code. Here takes the PIN code 12345670 of this Router for example).
Step 2: For the configuration of the wireless adapter, please choose Enter a PIN from my
access point in the configuration utility of the QSS as below, and enter the PIN code of
the Router into the field behind Access Point PIN. Then click Next.
-24-
) Note:
The default PIN code of the Router can be found in its label or the QSS configuration screen as
Figure 4-2.
c). You will see the following screen when the new device successfully connected to the
network.
) Note:
1.The status LED on the Router will light green all the time if the device has been successfully
added to the network.
2.The QSS function cannot be configured if the Wireless Function of the Router is disabled.
Please make sure the Wireless Function is enabled before configuring the QSS.
4.5 Network
There are three submenus under the Network menu (shown in Figure 4-4): LAN, WAN and MAC
Clone. Click any of them, and you will be able to configure the corresponding function.
4.5.1 WAN
Choose menu “Network→WAN”, you can configure the IP parameters of the WAN on the screen
below.
1. If your ISP provides the DHCP service, please choose Dynamic IP type, and the Router will
automatically get IP parameters from your ISP. You can see the page as follows (Figure 4-5):
-25-
This page displays the WAN IP parameters assigned dynamically by your ISP, including IP
address, Subnet Mask, Default Gateway, etc. Click the Renew button to renew the IP
parameters from your ISP. Click the Release button to release the IP parameters.
¾ MTU Size - The normal MTU (Maximum Transmission Unit) value for most Ethernet networks
is 1500 Bytes. It is not recommended that you change the default MTU Size unless required
by your ISP.
¾ Use These DNS Servers - If your ISP gives you one or two DNS addresses, select Use
These DNS Servers and enter the primary and secondary addresses into the correct fields.
Otherwise, the DNS servers will be assigned dynamically from your ISP.
) Note:
If you find error when you go to a Web site after entering the DNS addresses, it is likely that your
DNS servers are set up improperly. You should contact your ISP to get DNS server addresses.
¾ Get IP with Unicast DHCP - A few ISPs' DHCP servers do not support the broadcast
applications. If you cannot get the IP Address normally, you can choose this option. (It is
rarely required.)
2. If your ISP provides a static or fixed IP Address, Subnet Mask, Gateway and DNS setting,
select Static IP. The Static IP settings page will appear, shown in Figure 4-6.
-26-
¾ Subnet Mask - Enter the subnet Mask in dotted-decimal notation provided by your ISP,
usually is 255.255.255.0.
¾ MTU Size - The normal MTU (Maximum Transmission Unit) value for most Ethernet networks
is 1500 Bytes. It is not recommended that you change the default MTU Size unless required
by your ISP.
3. If your ISP provides a PPPoE connection, select PPPoE option. And you should enter the
following parameters (Figure 4-7):
-27-
¾ User Name/Password - Enter the User Name and Password provided by your ISP. These
fields are case-sensitive.
¾ Secondary Connection - It’s available only for PPPoE Connection. If your ISP provides an
extra Connection type such as Dynamic/Static IP to connect to a local area network, then you
can check the radio button of Dynamic/Static IP to activate this secondary connection.
z Dynamic IP - You can check this radio button to use Dynamic IP as the secondary
connection to connect to the local area network provided by ISP.
z Static IP - You can check this radio button to use Static IP as the secondary connection
to connect to the local area network provided by ISP.
¾ Connect on Demand - In this mode, the Internet connection can be terminated automatically
after a specified inactivity period (Max Idle Time) and be re-established when you attempt to
access the Internet again. If you want your Internet connection keeps active all the time,
please enter “0” in the Max Idle Time field. Otherwise, enter the number of minutes you want
to have elapsed before your Internet access disconnects.
-28-
¾ Time-based Connecting - The connection will only be established in the period from the start
time to the end time (both are in HH:MM format).
) Note:
Only when you have configured the system time on System Tools -> Time page, will the
Time-based Connecting function can take effect.
¾ Connect Manually - You can click the Connect/ Disconnect button to connect/disconnect
immediately. This mode also supports the Max Idle Time function as Connect on Demand
mode. The Internet connection can be disconnected automatically after a specified inactivity
period and re-established when you attempt to access the Internet again.
Caution: Sometimes the connection cannot be terminated although you specify a time to Max Idle
Time, since some applications are visiting the Internet continually in the background.
If you want to do some advanced configurations, please click the Advanced button, and the page
shown in Figure 4-8 will then appear:
¾ MTU Size - The default MTU size is “1480” bytes, which is usually fine. It is not
recommended that you change the default MTU Size unless required by your ISP.
¾ Service Name/AC Name - The service name and AC (Access Concentrator) name, which
should not be configured unless you are sure it is necessary for your ISP. In most cases,
leaving these fields blank will work.
¾ ISP Specified IP Address - If your ISP does not automatically assign IP addresses to the
Router during login, please click “Use IP address specified by ISP” check box and enter the
IP address provided by your ISP in dotted-decimal notation.
-29-
¾ Detect Online Interval - The Router will detect Access Concentrator online at every interval.
The default value is “0”. You can input the value between “0”and “120”. The value “0” means
no detect.
¾ DNS IP address - If your ISP does not automatically assign DNS addresses to the Router
during login, please click “Use the following DNS servers” check box and enter the IP
address in dotted-decimal notation of your ISP’s primary DNS server. If a secondary DNS
server address is available, enter it as well.
4. If your ISP provides BigPond Cable (or Heart Beat Signal) connection, please select
BigPond Cable. And you should enter the following parameters (Figure 4-9):
Figure 4-9
¾ User Name/Password - Enter the User Name and Password provided by your ISP. These
fields are case-sensitive.
¾ Auth Domain - Type in the domain suffix server name based on your location.
e.g.
-30-
QLD - qld.bigpond.net.au
¾ MTU Size - The normal MTU (Maximum Transmission Unit) value for most Ethernet networks
is 1500 Bytes. It is not recommended that you change the default MTU Size unless required
by your ISP.
¾ Connect on Demand - In this mode, the Internet connection can be terminated automatically
after a specified inactivity period (Max Idle Time) and be re-established when you attempt to
access the Internet again. If you want your Internet connection keeps active all the time,
please enter “0” in the Max Idle Time field. Otherwise, enter the number of minutes you want
to have elapsed before your Internet access disconnects.
Click the Connect button to connect immediately. Click the Disconnect button to disconnect
immediately.
Caution: Sometimes the connection cannot be terminated although you specify a time to Max Idle
Time because some applications are visiting the Internet continually in the background.
5. If your ISP provides L2TP connection, please select L2TP option. And you should enter the
following parameters (Figure 4-11):
-31-
¾ User Name/Password - Enter the User Name and Password provided by your ISP. These
fields are case-sensitive.
¾ Dynamic IP/ Static IP - Choose either as you are given by your ISP. Click the Connect button
to connect immediately. Click the Disconnect button to disconnect immediately.
¾ Connect on Demand - You can configure the Router to disconnect from your Internet
connection after a specified period of inactivity (Max Idle Time). If your Internet connection
has been terminated due to inactivity, Connect on Demand enables the Router to
automatically re-establish your connection as soon as you attempt to access the Internet
again. If you wish to activate Connect on Demand, click the radio button. If you want your
Internet connection to remain active at all times, enter 0 in the Max Idle Time field. Otherwise,
enter the number of minutes you want to have elapsed before your Internet connection
terminates.
¾ Connect Automatically - Connect automatically after the Router is disconnected. To use this
option, click the radio button.
-32-
¾ Connect Manually - You can configure the Router to make it connect or disconnect manually.
After a specified period of inactivity (Max Idle Time), the Router will disconnect from your
Internet connection, and you will not be able to re-establish your connection automatically as
soon as you attempt to access the Internet again. To use this option, click the radio button. If
you want your Internet connection to remain active at all times, enter "0" in the Max Idle Time
field. Otherwise, enter the number in minutes that you wish to have the Internet connecting
last unless a new link is requested.
Caution: Sometimes the connection cannot be disconnected although you specify a time to
Max Idle Time, since some applications is visiting the Internet continually in the background.
6. If your ISP provides PPTP connection, please select PPTP option. And you should enter the
following parameters (Figure 4-12):
¾ User Name/Password - Enter the User Name and Password provided by your ISP. These
fields are case-sensitive.
-33-
¾ Dynamic IP/ Static IP - Choose either as you are given by your ISP and enter the ISP’s IP
address or the domain name.
If you choose static IP and enter the domain name, you should also enter the DNS assigned
by your ISP. And click the Save button.
Click the Connect button to connect immediately. Click the Disconnect button to disconnect
immediately.
¾ Connect on Demand - You can configure the Router to disconnect from your Internet
connection after a specified period of inactivity (Max Idle Time). If your Internet connection
has been terminated due to inactivity, Connect on Demand enables the Router to
automatically re-establish your connection as soon as you attempt to access the Internet
again. If you wish to activate Connect on Demand, click the radio button. If you want your
Internet connection to remain active at all times, enter 0 in the Max Idle Time field. Otherwise,
enter the number of minutes you want to have elapsed before your Internet connection
terminates.
¾ Connect Automatically - Connect automatically after the Router is disconnected. To use this
option, click the radio button.
¾ Connect Manually - You can configure the Router to make it connect or disconnect manually.
After a specified period of inactivity (Max Idle Time), the Router will disconnect from your
Internet connection, and you will not be able to re-establish your connection automatically as
soon as you attempt to access the Internet again. To use this option, click the radio button. If
you want your Internet connection to remain active at all times, enter "0" in the Max Idle Time
field. Otherwise, enter the number in minutes that you wish to have the Internet connecting
last unless a new link is requested.
Caution: Sometimes the connection cannot be disconnected although you specify a time to
Max Idle Time, since some applications are visiting the Internet continually in the background.
) Note:
If you don't know how to choose the appropriate connection type, click the Detect button to allow
the Router to automatically search your Internet connection for servers and protocols. The
connection type will be reported when an active Internet service is successfully detected by the
Router. This report is for your reference only. To make sure the connection type your ISP provides,
please refer to the ISP. The various types of Internet connections that the Router can detect are
as follows:
z PPPoE - Connections which use PPPoE that requires a user name and password.
-34-
The Router can not detect PPTP/L2TP/BigPond connections with your ISP. If your ISP uses one
of these protocols, then you must configure your connection manually.
4.5.2 LAN
Choose menu “Network→LAN”, you can configure the IP parameters of the LAN on the screen
as below.
¾ MAC Address - The physical address of the Router, as seen from the LAN. The value can't
be changed.
¾ IP Address - Enter the IP address of your Router or reset it in dotted-decimal notation
(factory default: 192.168.0.1).
¾ Subnet Mask - An address code that determines the size of the network. Normally use
255.255.255.0 as the subnet mask.
) Note:
1. If you change the IP Address of LAN, you must use the new IP Address to login the Router.
2. If the new LAN IP Address you set is not in the same subnet, the IP Address pool of the DHCP
server will change accordingly at the same time,while the Virtual Server and DMZ Host will
not take effect until they are re-configured.
Choose menu “Network→MAC Clone”, you can configure the MAC address of the WAN on the
screen below, Figure 4-13:
Some ISPs require that you register the MAC Address of your adapter. Changes are rarely
needed here.
-35-
¾ WAN MAC Address - This field displays the current MAC address of the WAN port. If your
ISP requires you to register the MAC address, please enter the correct MAC address into
this field in XX-XX-XX-XX-XX-XX format(X is any hexadecimal digit).
¾ Your PC's MAC Address - This field displays the MAC address of the PC that is managing
the Router. If the MAC address is required, you can click the Clone MAC Address To
button and this MAC address will fill in the WAN MAC Address field.
Click Restore Factory MAC to restore the MAC address of WAN port to the factory default
value.
) Note:
Only the PC on your LAN can use the MAC Address Clone function.
4.6 Wireless
There are five submenus under the Wireless menu (shown in Figure 4-14): Wireless Settings,
Wireless Security, Wireless MAC Filtering, Wireless Advanced and Wireless Statistics. Click
any of them, and you will be able to configure the corresponding function.
Choose menu “Wireless→Wireless Setting”, you can configure the basic settings for the
wireless network on this page.
-36-
¾ Channel - This field determines which operating frequency will be used. The default channel
is set to Auto, so the AP will choose the best channel automatically. It is not necessary to
change the wireless channel unless you notice interference problems with another nearby
access point.
¾ Region - Select your region from the pull-down list. This field specifies the region where the
wireless function of the Router can be used. It may be illegal to use the wireless function of
the Router in a region other than one of those specified in this field. If your country or region
is not listed, please contact your local government agency for assistance.
When you select your local region from the pull-down list, click the Save button, then the
Note Dialog appears. Click OK.
Note Dialog
) Note:
Limited by local law regulations, version for North America does not have region selection option.
-37-
¾ Mode - Select the desired mode. The default setting is 11bgn mixed.
11b only - Select if all of your wireless clients are 802.11b.
11g only - Select if all of your wireless clients are 802.11g.
11n only- Select only if all of your wireless clients are 802.11n.
11bg mixed - Select if you are using both 802.11b and 802.11g wireless clients.
11bgn mixed - Select if you are using a mix of 802.11b, 11g, and 11n wireless clients.
Select the desired wireless mode. When 802.11g mode is selected, only 802.11g wireless
stations can connect to the Router. When 802.11n mode is selected, only 802.11n wireless
stations can connect to the AP. It is strongly recommended that you set the Mode to
802.11b&g&n, and all of 802.11b, 802.11g, and 802.11n wireless stations can connect to the
Router.
¾ Channel width - Select any channel width from the pull-down list. The default setting is
automatic, which can adjust the channel width for your clients automatically.
) Note:
If 11b only, 11g only, or 11bg mixed is selected in the Mode field, the Channel Width
selecting field will turn grey and the value will become 20M, which is unable to be changed.
¾ Max Tx Rate - You can limit the maximum tx rate of the Router through this field.
¾ Enable Wireless Router Radio - The wireless radio of this Router can be enabled or
disabled to allow wireless stations access.
¾ Enable SSID Broadcast - When wireless clients survey the local area for wireless networks
to associate with, they will detect the SSID broadcast by the Router. If you select the Enable
SSID Broadcast checkbox, the Wireless Router will broadcast its name (SSID) on the air.
¾ Enable WDS - Check this box to enable WDS. With this function, the Router can bridge two
or more WLANs. If this checkbox is selected, you will have to set the following parameters as
shown below. Make sure the following settings are correct
¾ SSID(to be bridged) - The SSID of the AP your Router is going to connect to as a client.
You can also use the search function to select the SSID to join.
¾ Survey - Click this button, you can search the AP which runs in the current channel.
-38-
¾ Key type - This option should be chosen according to the AP's security configuration.It
is recommended that the security type is the same as your AP's security type
¾ WEP Index - This option should be chosen if the key type is WEP(ASCII) or
WEP(HEX).It indicates the index of the WEP key.
¾ Auth Type - This option should be chosen if the key type is WEP(ASCII) or
WEP(HEX).It indicates the authorization type of the Root AP.
¾ Password - If the AP your Router is going to connect needs password, you need to fill
the password in this blank.
Choose menu “Wireless→Wireless Security”, you can configure the security settings of your
wireless network.
There are five wireless security modes supported by the Router: WEP (Wired Equivalent Privacy),
WPA (Wi-Fi Protected Access), WPA2 (Wi-Fi Protected Access 2), WPA2-PSK (Pre-Shared Key),
WPA-PSK (Pre-Shared Key).
Figure 4-16
-39-
¾ Disable Security - If you do not want to use wireless security, select this check box, but it’s
strongly recommended to choose one of the following modes to enable security.
¾ WEP - It is based on the IEEE 802.11 standard. If you select this check box, you will find a
notice in red as show in Figure 4-17.
Figure 4-17
• Type - you can choose the type for the WEP security on the pull-down list. The default
setting is Automatic, which can select Open System or Shared Key authentication type
automatically based on the wireless station's capability and request.
• WEP Key Format - Hexadecimal and ASCII formats are provided. Hexadecimal format
stands for any combination of hexadecimal digits (0-9, a-f, A-F) in the specified length.
ASCII format stands for any combination of keyboard characters in the specified length.
• WEP Key- Select which of the four keys will be used and enter the matching WEP key that
you create. Make sure these values are identical on all wireless stations in your network.
• Key Type - You can select the WEP key length (64-bit, or 128-bit, or 152-bit.) for
encryption. "Disabled" means this WEP key entry is invalid.
64-bit - You can enter 10 hexadecimal digits (any combination of 0-9, a-f, A-F, zero key is
not promoted) or 5 ASCII characters.
128-bit - You can enter 26 hexadecimal digits (any combination of 0-9, a-f, A-F, zero key is
not promoted) or 13 ASCII characters.
152-bit - You can enter 32 hexadecimal digits (any combination of 0-9, a-f, A-F, zero key is
not promoted) or 16 ASCII characters.
) Note:
If you do not set the key, the wireless security function is still disabled even if you have
selected Shared Key as Authentication Type.
• Version - you can choose the version of the WPA security on the pull-down list. The default
setting is Automatic, which can select WPA (Wi-Fi Protected Access) or WPA2 (WPA
-40-
) Note:
If you check the WPA/WPA2 radio button and choose TKIP encryption, you will find a
notice in red as shown in Figure 4-18
Figure 4-18
• Group Key Update Period - Specify the group key update interval in seconds. The value
should be 30 or above. Enter 0 to disable the update.
• Version - you can choose the version of the WPA-PSK security on the drop-down list. The
default setting is Automatic, which can select WPA-PSK (Pre-shared key of WPA) or
WPA2-PSK (Pre-shared key of WPA) automatically based on the wireless station's
capability and request.
• Encryption - When WPA-PSK or WPA is set as the Authentication Type, you can select
either Automatic, or TKIP or AES as Encryption.
) Note:
If you check the WPA-PSK/WPA2-PSk – Personal (Recommended) radio button and
choose TKIP encryption, you will find a notice in red as shown in Figure 4-19.
-41-
Figure 4-19
• PSK Passphrase - You can enter ASCII characters between 8 and 63 characters or 8 to
64 Hexadecimal characters.
• Group Key Update Period - Specify the group key update interval in seconds. The value
should be 30 or above. Enter 0 to disable the update.
Be sure to click the Save button to save your settings on this page.
Choose menu “Wireless→MAC Filtering”, you can control the wireless access by configuring the
Wireless MAC Address Filtering function, shown in Figure 4-20.
To filter wireless users by MAC Address, click Enable. The default setting is Disable.
¾ MAC Address - The wireless station's MAC address that you want to filter.
To Add a Wireless MAC Address filtering entry, click the Add New… button. The "Add or Modify
Wireless MAC Address Filtering entry" page will appear, shown in Figure 4-21:
-42-
1. Enter the appropriate MAC Address into the MAC Address field. The format of the MAC
Address is XX-XX-XX-XX-XX-XX (X is any hexadecimal digit). For example:
00-0A-EB-00-07-8A.
2. Enter a simple description of the wireless station in the Description field. For example:
Wireless station A.
3. Status - Select Enabled or Disabled for this entry on the Status pull-down list.
1. Click the Modify in the entry you want to modify. If you want to delete the entry, click the
Delete.
2. Modify the information.
3. Click the Save button.
For example: If you desire that the wireless station A with MAC address 00-0A-EB-00-07-8A and
the wireless station B with MAC address 00-0A-EB-00-23-11 are able to access the Router, but all
the other wireless stations cannot access the Router, you can configure the Wireless MAC
Address Filtering list by following these steps:
2. Select the radio button: Deny the stations not specified by any enabled entries in the list
-43-
3. Delete all or disable all entries if there are any entries already.
4. Click the Add New... button and enter the MAC address 00-0A-EB-00-07-8A
/00-0A-EB-00-23-11 in the MAC Address field, then enter wireless station A/B in the
Description field, while select Enabled in the Status pull-down list. Finally, click the Save
and the Back button.
The filtering rules that configured should be similar to the following list:
Choose menu “Wireless→Wireless Advanced”, you can configure the advanced settings of your
wireless network.
¾ Transmit Power - Here you can specify the transmit power of Router. You can select
High, Middle or Low which you would like. High is the default setting and is
recommended.
¾ Beacon Interval - Enter a value between 20-1000 milliseconds for Beacon Interval here.
The beacons are the packets sent by the router to synchronize a wireless network.
Beacon Interval value determines the time interval of the beacons. The default value is
100.
-44-
¾ RTS Threshold - Here you can specify the RTS (Request to Send) Threshold. If the
packet is larger than the specified RTS Threshold size, the router will send RTS frames
to a particular receiving station and negotiate the sending of a data frame. The default
value is 2346.
¾ DTIM Interval - This value determines the interval of the Delivery Traffic Indication
Message (DTIM). A DTIM field is a countdown field informing clients of the next window
for listening to broadcast and multicast messages. When the Router has buffered
broadcast or multicast messages for associated clients, it sends the next DTIM with a
DTIM Interval value. You can specify the value between 1-255 Beacon Intervals. The
default value is 1, which indicates the DTIM Interval is the same as Beacon Interval.
¾ Enable WMM - WMM function can guarantee the packets with high- priority messages
being transmitted preferentially. It is strongly recommended enabled.
¾ Enable Short GI - This function is recommended for it will increase the data capacity by
reducing the guard interval time.
¾ Enabled AP Isolation - This function can isolate wireless stations on your network from
each other. Wireless devices will be able to communicate with the Router but not with
each other. To use this function, check this box. AP Isolation is disabled by default.
) Note:
If you are not familiar with the setting items in this page, it's strongly recommended to keep
the provided default values; otherwise it may result in lower wireless network performance.
Choose menu “Wireless→Wireless Statistics”, you can see the MAC Address, Current Status,
Received Packets and Sent Packets for each connected wireless station.
-45-
¾ Current Status - The connected wireless station's running status, one of STA-AUTH /
STA-ASSOC / STA-JOINED / WPA / WPA-PSK / WPA2 / WPA2-PSK / AP-UP / AP-DOWN /
Disconnected
You cannot change any of the values on this page. To update this page and to show the current
connected wireless stations, click on the Refresh button.
If the numbers of connected wireless stations go beyond one page, click the Next button to go to
the next page and click the Previous button to return the previous page.
) Note:
This page will be refreshed automatically every 5 seconds.
4.7 DHCP
There are three submenus under the DHCP menu (shown in Figure 4-24): DHCP Settings, DHCP
Clients List and Address Reservation. Click any of them, and you will be able to configure the
corresponding function.
Choose menu “DHCP→DHCP Settings”, you can configure the DHCP Server on the page
(shown in Figure 4-25).The Router is set up by default as a DHCP (Dynamic Host Configuration
Protocol) server, which provides the TCP/IP configuration for all the PC(s) that are connected to
the Router on the LAN.
-46-
¾ DHCP Server - Enable or Disable the DHCP server. If you disable the Server, you must
have another DHCP server within your network or else you must configure the computer
manually.
¾ Start IP Address - Specify an IP address for the DHCP Server to start with when assigning
IP addresses. 192.168.0.100 is the default start address.
¾ End IP Address - Specify an IP address for the DHCP Server to end with when assigning IP
addresses. 192.168.0.199 is the default end address.
¾ Address Lease Time - The Address Lease Time is the amount of time a network user will
be allowed connection to the Router with their current dynamic IP Address. Enter the
amount of time in minutes and the user will be "leased" this dynamic IP Address. After the
time is up, the user will be automatically assigned a new dynamic IP address. The range of
the time is 1 ~ 2880 minutes. The default value is 120 minutes.
¾ Default Gateway - (Optional.) Suggest to input the IP address of the LAN port of the Router,
default value is 192.168.0.1
¾ Default Domain - (Optional.) Input the domain name of your network.
¾ Primary DNS - (Optional.) Input the DNS IP address provided by your ISP. Or consult your
ISP.
¾ Secondary DNS - (Optional.) Input the IP address of another DNS server if your ISP
provides two DNS servers.
) Note:
To use the DHCP server function of the Router, you must configure all computers on the LAN as
"Obtain an IP Address automatically" mode.
-47-
Choose menu “DHCP→DHCP Clients List”, you can view the information about the clients
attached to the Router in the next screen (shown in Figure 4-26).
¾ Assigned IP - The IP address that the Router has allocated to the DHCP client.
¾ Lease Time - The time of the DHCP client leased. After the dynamic IP address has expired,
a new dynamic IP address will be automatically assigned to the user.
You cannot change any of the values on this page. To update this page and to show the current
attached devices, click the Refresh button.
Choose menu “DHCP→Address Reservation”, you can view and add a reserved addresses for
clients via the next screen (shown in Figure 4-27).When you specify a reserved IP address for a
PC on the LAN, that PC will always receive the same IP address each time when it accesses the
DHCP server. Reserved IP addresses should be assigned to the servers that require permanent
IP settings.
-48-
¾ MAC Address - The MAC address of the PC for which you want to reserve IP address.
¾ Assigned IP Address - The IP address of the Router reserved.
¾ Status - The status of this entry either Enabled or Disabled.
To Reserve IP addresses:
2. Enter the MAC address (in XX-XX-XX-XX-XX-XX format.) and IP address in dotted-decimal
notation of the computer you wish to add.
1. Click the Modify in the entry you want to modify. If you want to delete the entry, click the
Delete.
2. Modify the information.
3. Click the Save button.
Click the Enable/ Disabled All button to make all entries enabled/disabled
Click the Delete All button to delete all entries
Click the Next button to go to the next page and Click the Previous button to return the previous
page.
4.8 Forwarding
There are four submenus under the Forwarding menu (shown in Figure 4-29): Virtual Servers,
-49-
Port Triggering, DMZ and UPnP. Click any of them, and you will be able to configure the
corresponding function.
Choose menu “Forwarding→Virtual Servers”, you can view and add virtual servers in the next
screen (shown in Figure 4-30). Virtual servers can be used for setting up public services on your
LAN, such as DNS, Email and FTP. A virtual server is defined as a service port, and all requests
from the Internet to this service port will be redirected to the computer specified by the server IP.
Any PC that was used for a virtual server must have a static or reserved IP Address because its
IP Address may be changed when using the DHCP function.
¾ Service Port - The numbers of External Ports. You can type a service port or a range of
service ports (in XXX – YYY format, XXX is the start port number, YYY is the end port
number).
¾ IP Address - The IP Address of the PC providing the service application.
¾ Protocol - The protocol used for this application, either TCP, UDP, or All (all protocols
supported by the Router).
¾ Status - The status of this entry either Enabled or Disabled.
2. Select the service you want to use from the Common Service Port list. If the Common
Service Port list does not have the service that you want to use, type the number of the
service port or service port range in the Service Port box.
4. Select the protocol used for this application, either TCP or UDP, or All.
-50-
) Note:
If your computer or server has more than one type of available service, please select another
service, and enter the same IP Address for that computer or server.
1. Click the Modify in the entry you want to modify. If you want to delete the entry, click the
Delete.
2. Modify the information.
Click the Enable/ Disabled All button to make all entries enabled/ disabled.
Click the Delete All button to delete all entries.
Click the Next button to go to the next page and click the Previous button to return the previous
page.
) Note:
If you set the service port of the virtual server as 80, you must set the Web management port on
System Tools –> Remote Management page to be any other value except 80 such as 8080.
Otherwise there will be a conflict to disable the virtual server.
Choose menu “Forwarding→Port Triggering”, you can view and add port triggering in the next
screen (shown in Figure 4-32). Some applications require multiple connections, like Internet
games, video conferencing, Internet calling and so on. These applications cannot work with a
pure NAT Router. Port Triggering is used for some of these applications that can work with an NAT
Router.
-51-
1. A local host makes an outgoing connection using a destination port number defined in the
Trigger Port field.
2. The Router records this connection, opens the incoming port or ports associated with this
entry in the Port Triggering table, and associates them with the local host.
3. When necessary the external host will be able to connect to the local host using one of the
ports defined in the Incoming Ports field.
¾ Trigger Port - The port for outgoing traffic. An outgoing connection using this port will
"Trigger" this rule.
¾ Trigger Protocol - The protocol used for Trigger Ports, either TCP, UDP, or All (all
protocols supported by the Router).
¾ Incoming Ports Range - The port or port range used by the remote system when it
responds to the outgoing request. A response using one of these ports will be forwarded to
the PC that triggered this rule. You can input at most 5 groups of ports (or port section).
Every group of ports must be set apart with ",". For example, 2000-2038, 2050-2051, 2085,
3010-3030.
¾ Incoming Protocol - The protocol used for Incoming Ports Range, either TCP or UDP, or
ALL (all protocols supported by the Router).
¾ Status - The status of this entry either Enabled or Disabled.
-52-
) Note:
1. When the trigger connection is released, the according opening ports will be closed.
2. Each rule allowed to be used only by one host on LAN synchronously. The trigger connection
of other hosts on LAN will be refused.
4.8.3 DMZ
Choose menu “Forwarding→DMZ”, you can view and configure DMZ host in the screen (shown
in Figure 4-34).The DMZ host feature allows one local host to be exposed to the Internet for a
special-purpose service such as Internet gaming or videoconferencing. DMZ host forwards all the
ports at the same time. Any PC whose port is being forwarded must have its DHCP client function
disabled and should have a new static IP Address assigned to it because its IP Address may be
changed when using the DHCP function.
-53-
2. Enter the local host IP Address in the DMZ Host IP Address field
) Note:
After you set the DMZ host, the firewall related to the host will not work.
4.8.4 UPnP
Choose menu “Forwarding→UPnP”, you can view the information about UPnP(Universal Plug
and Play) in the screen (shown in Figure 4-35).The UPnP feature allows the devices, such as
Internet computers, to access the local host resources or devices as needed. UPnP devices can
be automatically discovered by the UPnP service application on the LAN.
¾ Current UPnP Status - UPnP can be enabled or disabled by clicking the Enable or
Disable button. As allowing this may present a risk to security, this feature is enabled by
default.
¾ Current UPnP Settings List - This table displays the current UPnP information.
• App Description -The description provided by the application in the UPnP request
-54-
• External Port - External port, which the router opened for the application.
• Internal Port - Internal port, which the router opened for local host.
• Status - The port’s status displayed here. “Enabled” means that port is still active.
Otherwise, the port is inactive.
4.9 Security
There are four submenus under the Security menu as shown in Figure 4-36: Basic Security,
Advanced Security, Local Management and Remote Management. Click any of them, and you
will be able to configure the corresponding function.
Choose menu “Security → Basic Security”, you can configure the basic security in the screen
as shown in Figure 4-37.
-55-
z SPI Firewall - SPI (Stateful Packet Inspection, also known as dynamic packet filtering)
helps to prevent cyber attacks by tracking more state per session. It validates that the
traffic passing through the session conforms to the protocol. SPI Firewall is enabled by
factory default. If you want all the computers on the LAN exposed to the outside world,
you can disable it.
¾ VPN - VPN Passthrough must be enabled if you want to allow VPN tunnels using IPSec,
PPTP, or L2TP protocols to pass through the Router’s firewall.
z L2TP Passthrough - Layer 2 Tunneling Protocol (L2TP) is the method used to enable
Point-to-Point sessions via the Internet on the Layer 2 level. To allow L2TP tunnels to
pass through the Router, keep the default, Enabled.
-56-
¾ ALG - It is recommended to enable Application Layer Gateway (ALG) because ALG allows
customized Network Address Translation (NAT) traversal filters to be plugged into the
gateway to support address and port translation for certain application layer "control/data"
protocols such as FTP, TFTP, H323 etc.
z FTP ALG - To allow FTP clients and servers to transfer data across NAT, keep the
default Enable.
z TFTP ALG - To allow TFTP clients and servers to transfer data across NAT, keep the
default Enable.
z H323 ALG - To allow Microsoft NetMeeting clients to communicate across NAT, keep
the default Enable.
Choose menu “Security → Advanced Security”, you can protect the Router from being
attacked by TCP-SYN Flood, UDP Flood and ICMP-Flood in the screen as shown in Figure 4-38.
¾ Packets Statistics Interval (5~60) - The default value is 10. Select a value between 5 and
60 seconds from the drop-down list. The Packets Statistics Interval value indicates the time
section of the packets statistics. The result of the statistics is used for analysis by SYN Flood,
-57-
¾ DoS Protection - Denial of Service protection. Check the Enable or Disable button to
enable or disable the DoS protection function. Only when it is enabled, will the flood filters be
enabled.
) Note:
Dos Protection will take effect only when the Traffic Statistics in “System Tool → Traffic
Statistics” is enabled.
¾ ICMP-FLOOD Packets Threshold (5~3600) - The default value is 50. Enter a value
between 5 ~ 3600. When the current ICMP-FLOOD Packets number is beyond the set value,
the Router will startup the blocking function immediately.
¾ UDP-FLOOD Packets Threshold (5~3600) - The default value is 500. Enter a value
between 5 ~ 3600. When the current UPD-FLOOD Packets number is beyond the set value,
the Router will startup the blocking function immediately.
¾ TCP-SYN-FLOOD Packets Threshold (5~3600) - The default value is 50. Enter a value
between 5 ~ 3600. When the current TCP-SYN-FLOOD Packets numbers is beyond the set
value, the Router will startup the blocking function immediately.
¾ Ignore Ping Packet From WAN Port - Enable or Disable Ignore Ping Packet From WAN
Port. The default setting is disabled. If enabled, the ping packet from the Internet cannot
access the Router.
¾ Forbid Ping Packet From LAN Port - Enable or Disable Forbid Ping Packet From LAN Port.
The default setting is disabled. If enabled, the ping packet from LAN cannot access the
Router. This function can be used to defend against some viruses.
Click the Blocked DoS Host List button to display the DoS host table by blocking.
Choose menu “Security → Local Management”, you can configure the management rule in the
screen as shown in Figure 4-39. The management feature allows you to deny computers in LAN
from accessing the Router.
-58-
By default, the radio button “All the PCs on the LAN are allowed to access the Router's
Web-Based Utility” is checked. If you want to allow PCs with specific MAC Addresses to access
the Setup page of the Router's Web-Based Utility locally from inside the network, check the radio
button “Only the PCs listed can browse the built-in web pages to perform Administrator
tasks”, and then enter each MAC Address in a separate field. The format for the MAC Address is
XX-XX-XX-XX-XX-XX (X is any hexadecimal digit). Only the PCs with MAC address listed can
use the password to browse the built-in web pages to perform Administrator tasks while all the
others will be blocked.
After click the Add button, your PC's MAC Address will be placed in the list above.
) Note:
If your PC is blocked but you want to access the Router again, use a pin to press and hold the
Reset Button (hole) on the back panel for about 5 seconds to reset the Router’s factory defaults
on the Router’s Web-Based Utility.
Choose menu “Security → Remote Management”, you can configure the Remote Management
function in the screen as shown in Figure 4-40. This feature allows you to manage your Router
from a remote location via the Internet.
-59-
¾ Web Management Port - Web browser access normally uses the standard HTTP service
port 80. This Router's default remote management web port number is 80. For greater
security, you can change the remote management web port to a custom port by entering that
number in the box provided. Choose a number between 1 and 65534 but do not use the
number of any common service port.
¾ Remote Management IP Address - This is the current address you will use when accessing
your Router from the Internet. This function is disabled when the IP address is set to the
default value of 0.0.0.0. To enable this function change 0.0.0.0 to a valid IP address. If set to
255.255.255.255, then all the hosts can access the Router from internet.
) Note:
1. To access the Router, you should type your Router's WAN IP address into your browser's
address (in IE) or Location (in Navigator) box, followed by a colon and the custom port
number. For example, if your Router's WAN address is 202.96.12.8, and the port number
used is 8080, please enter http://202.96.12.8:8080 in your browser. Later, you may be
asked for the Router's password. After successfully entering the username and password,
you will be able to access the Router's web-based utility.
2. Be sure to change the Router's default password to a very secure password.
-60-
¾ Parental Control - Check Enable if you want this function to take effect, otherwise check
Disable.
¾ MAC Address of Parental PC - In this field, enter the MAC address of the controlling PC, or
you can make use of the Copy To Above button below.
¾ MAC Address of Your PC - This field displays the MAC address of the PC that is managing
this Router. If the MAC Address of your adapter is registered, you can click the Copy To
Above button to fill this address to the MAC Address of Parental PC field above.
¾ Website Description - Description of the allowed website for the PC controlled.
¾ Schedule - The time period allowed for the PC controlled to access the Internet. For detailed
information, please go to “Access Control → Schedule”.
¾ Modify - Here you can edit or delete an existing entry.
1. Click the Add New… button and the next screen will pop-up as shown in Figure 4-42.
2. Enter the MAC address of the PC (e.g. 00-11-22-33-44-AA) you’d like to control in the MAC
Address of Child PC field. Or you can choose the MAC address from the All Address in
Current LAN drop-down list.
3. Give a description (e.g. Allow Google) for the website allowed to be accessed in the Website
Description field.
4. Enter the allowed domain name of the website, either the full name or the keywords (e.g.
TP-LINK) in the Allowed Domain Name field. Any domain name with keywords in it
(http://www.tp-link.com) will be allowed.
5. Select from the Effective Time drop-down list the schedule (e.g. Schedule_1) you want the
entry to take effect. If there are not suitable schedules for you, click the Schedule in red
below to go to the Advance Schedule Settings page and create the schedule you need.
-61-
6. In the Status field, you can select Enabled or Disabled to enable or disable your entry.
Click the Enable All button to enable all the rules in the list.
Click the Disable All button to disable all the rules in the list.
Click the Delete All button to delete all the entries in the table.
Click the Next button to go to the next page, or click the Previous button return to the previous
page.
For example: If you desire that the child PC with MAC address 00-11-22-33-44-AA can access
www.google.com on Saturday only while the parent PC with MAC address 00-11-22-33-44-BB is
without any restriction, you should follow the settings below.
1. Click “Parental Control” menu on the left to enter the Parental Control Settings page.
Check Enable and enter the MAC address 00-11-22-33-44-BB in the MAC Address of
Parental PC field.
2. Click “Access Control → Schedule” on the left to enter the Schedule Settings page.
Click Add New... button to create a new schedule with Schedule Description is
Schedule_1, Day is Sat and Time is all day-24 hours.
-62-
3. Click “Parental Control” menu on the left to go back to the Add or Modify Parental
Control Entry page:
Then you will go back to the Parental Control Settings page and see the following list, as
shown in Figure 4-43.
There are four submenus under the Access Control menu as shown in Figure 4-44: Rule, Host,
Target and Schedule. Click any of them, and you will be able to configure the corresponding
function.
4.11.1 Rule
Choose menu “Access Control → Rule”, you can view and set Access Control rules in the
screen as shown in Figure 4-45.
-63-
¾ Enable Internet Access Control - Select the check box to enable the Internet Access
Control function, so the Default Filter Policy can take effect.
¾ Rule Name - Here displays the name of the rule and this name is unique.
¾ Action - Here displays the action the Router takes to deal with the packets. It could be Allow
or Deny. Allow means that the Router permits the packets to go through the Router. Deny
means that the Router rejects the packets to go through the Router.
¾ Status - This field displays the status of the rule. Enabled means the rule will take effect,
Disabled means the rule will not take effect.
1. Click the Add New… button and the next screen will pop-up as shown in Figure 4-46.
2. Give a name (e.g. Rule_1) for the rule in the Rule Name field.
3. Select a host from the Host drop-down list or choose “Click Here To Add New Host List”.
4. Select a target from the Target drop-sown list or choose “Click Here To Add New Target
List”.
5. Select a schedule from the Schedule drop-down list or choose “Click Here To Add New
Schedule”.
-64-
Click the Enable All button to enable all the rules in the list.
Click the Disable All button to disable all the rules in the list.
Click the Delete All button to delete all the entries in the table.
You can change the entry’s order as desired. Fore entries are before hind entries. Enter the ID
number in the first box you want to move and another ID number in second box you want to move
to, and then click the Move button to change the entry’s order.
Click the Next button to go to the next page, or click the Previous button return to the previous
page.
For example: If you desire to allow the host with MAC address 00-11-22-33-44-AA to access
www.google.com only from 18:00 to 20:00 on Saturday and Sunday, and forbid other hosts in
the LAN to access the Internet, you should follow the settings below:
1. Click “Access Control → Host” in the left to enter the Host Settings page. Add a new
entry with the Host Description is Host_1 and MAC Address is 00-11-22-33-44-AA.
2. Click “Access Control → Target” in the left to enter the Target Settings page. Add a
new entry with the Target Description is Target_1 and Domain Name is
www.google.com.
3. Click “Access Control → Schedule” in the left to enter the Schedule Settings page.
Add a new entry with the Schedule Description is Schedule_1, Day is Sat and Sun, Start
Time is 1800 and Stop Time is 2000.
-65-
4. Click “Access Control → Rule” in the left to return to the Access Control Rule
Management page. Select “Enable Internet Access Control” and choose "Deny the
packets not specified by any access control policy to pass through the Router".
z In Rule Name field, create a name for the rule. Note that this name should be
unique, for example Rule_1.
Then you will go back to the Access Control Rule Management page and see the following list.
4.11.2 Host
Choose menu “Access Control → Host”, you can view and set a Host list in the screen as
shown in Figure 4-47. The host list is necessary for the Access Control Rule.
¾ Host Description - Here displays the description of the host and this description is unique.
¾ Information - Here displays the information about the host. It can be IP or MAC.
-66-
Click the Delete All button to delete all the entries in the table.
Click the Next button to go to the next page, or click the Previous button return to the previous
page.
For example: If you desire to restrict the internet activities of host with MAC address
00-11-22-33-44-AA, you should first follow the settings below:
1. Click Add New... button in Figure 4-47 to enter the Add or Modify a Host Entry page.
2. In Mode field, select MAC Address from the drop-down list.
3. In Host Description field, create a unique description for the host (e.g. Host_1).
4. In MAC Address field, enter 00-11-22-33-44-AA.
5. Click Save to complete the settings.
Then you will go back to the Host Settings page and see the following list.
-67-
4.11.3 Target
Choose menu “Access Control → Target”, you can view and set a Target list in the screen as
shown in Figure 4-50. The target list is necessary for the Access Control Rule.
¾ Target Description - Here displays the description about the target and this description is
unique.
¾ Information - The target can be IP address, port, or domain name.
¾ Modify - To modify or delete an existing entry.
2) In Domain Name field, enter the domain name, either the full name or the keywords
(for example google) in the blank. Any domain name with keywords in it
(www.google.com, www.google.cn) will be blocked or allowed. You can enter 4
domain names.
Click the Delete All button to delete all the entries in the table.
-68-
Click the Next button to go to the next page, or click the Previous button return to the previous
page.
For example: If you desire to restrict the internet activities of host with MAC address
00-11-22-33-44-AA in the LAN to access www.google.com only, you should first follow the
settings below:
1. Click Add New… button in Figure 4-50 to enter the Add or Modify an Access Target
Entry page.
2. In Mode field, select Domain Name from the drop-down list.
3. In Target Description field, create a unique description for the target (e.g. Target_1).
4. In Domain Name field, enter www.google.com.
5. Click Save to complete the settings.
Then you will go back to the Target Settings page and see the following list.
-69-
4.11.4 Schedule
Choose menu “Access Control → Schedule”, you can view and set a Schedule list in the next
screen as shown in Figure 4-53. The Schedule list is necessary for the Access Control Rule.
¾ Schedule Description - Here displays the description of the schedule and this description is
unique.
1. Click Add New... button shown in Figure 4-53 and the next screen will pop-up as shown in
Figure 4-54.
2. In Schedule Description field, create a unique description for the schedule (e.g.
Schedule_1).
Click the Delete All button to delete all the entries in the table.
Click the Next button to go to the next page, or click the Previous button return to the previous
page.
-70-
For example: If you desire to restrict the internet activities of host with MAC address
00-11-22-33-44-AA to access www.google.com only from 18:00 to 20:00 on Saturday and
Sunday, you should first follow the settings below:
1. Click Add New... button shown in Figure 4-53 to enter the Advanced Schedule Settings
page.
2. In Schedule Description field, create a unique description for the schedule (e.g.
Schedule_1).
3. In Day field, check the Select Days radio button and then select Sat and Sun.
4. In Time field, enter 1800 in Start Time field and 2000 in Stop Time field.
There are two submenus under the Advanced Routing menu as shown in Figure 4-55: Static
Routing List and System Routing Table. Click any of them, and you will be able to configure the
corresponding function.
-71-
Choose menu “Advanced Routing → Static Routing List”, and then you can configure the
static route in the next screen (shown in Figure 4-56). A static route is a pre-determined path that
network information must travel to reach a specific host or network.
1. Click Add New… shown in Figure 4-56, you will see the following screen.
¾ Destination Network - The Destination Network is the address of the network or host that
you want to assign to a static route.
¾ Subnet Mask - The Subnet Mask determines which portion of an IP Address is the
network portion, and which portion is the host portion.
¾ Default Gateway - This is the IP Address of the gateway device that allows for contact
between the Router and the network or host.
3. Select Enabled or Disabled for this entry on the Status drop-down list.
-72-
Click the Previous button to view the information in the previous screen, click the Next button to
view the information in the next screen.
Choose menu “Advanced Routing → System Routing Table”, and then you can view the
System Routing Table in the next screen (shown in Figure 4-58). System routing table views all of
the valid route entries in use. The Destination IP address, Subnet Mask, Gateway, and Interface
will be displayed for each entry.
¾ Destination Network - The Destination Network is the address of the network or host to
which the static route is assigned.
¾ Subnet Mask - The Subnet Mask determines which portion of an IP address is the network
portion, and which portion is the host portion.
¾ Gateway - This is the IP address of the gateway device that allows for contact between the
Router and the network or host.
¾ Interface - This interface tells you either the Destination IP Address is on the LAN & WLAN
(internal wired and wireless networks), or on the WAN (Internet).
Figure 4-59
-73-
There are two submenus under the Bandwidth Control menu as shown in Figure 4-59. Click any
of them, and you will be able to configure the corresponding function. The detailed explanations
for each submenu are provided below.
¾ Enable Bandwidth Control - Check this box so that the Bandwidth Control settings can
take effect.
¾ Line Type - Select the right type for you network connection. If you don’t know how to
choose, please ask your ISP for the information.
Choose menu “Bandwidth Control → Rules List”, you can view and configure the Bandwidth
Control rules in the screen below.
¾ Description - This is the information about the rules such as address range.
-74-
¾ Egress bandwidth - This field displays the max and mix upload bandwidth through the WAN
port, the default is 0.
¾ Ingress bandwidth - This field displays the max and mix download bandwidth through the
WAN port, the default is 0.
¾ Modify - Click Modify to edit the rule. Click Delete to delete the rule.
Step 1: Click Add New… shown in Figure 4-61, you will see a new screen shown in Figure 4-62.
There are two submenus under the IP &MAC Binding menu (shown in Figure 4-63): Binding
Setting and ARP List. Click any of them, and you will be able to scan or configure the
corresponding function. The detailed explanations for each submenu are provided below.
-75-
¾ MAC Address - The MAC address of the controlled computer in the LAN.
¾ Bind - Check this option to enable ARP binding for a specific device.
When you want to add or modify an IP & MAC Binding entry, you can click the Add New button
or Modify button, and then you will go to the next page. This page is used for adding or
modifying an IP & MAC Binding entry (shown in Figure 4-65).
-76-
To manage the computer, you could observe the computers in the LAN by checking the
relationship of MAC address and IP address on the ARP list, and you could configure the items on
the ARP list also. This page displays the ARP List; it shows all the existing IP & MAC Binding
entries (shown in Figure 4-67).
¾ MAC Address - The MAC address of the controlled computer in the LAN.
¾ Status - Indicates whether or not the MAC and IP addresses are bound.
-77-
Click the Bind All button to bind all the current items, available after enable.
Click the Load All button to load all items to the IP & MAC Binding list.
) Note:
An item could not be loaded to the IP & MAC Binding list if the IP address of the item has been
loaded before. Error warning will prompt as well. Likewise, "Load All" only loads the items without
interference to the IP & MAC Binding list.
The Router offers the DDNS (Dynamic Domain Name System) feature, which allows the hosting
of a website, FTP server, or e-mail server with a fixed domain name (named by yourself) and a
dynamic IP address, and then your friends can connect to your server by entering your domain
name no matter what your IP address is. Before using this feature, you need to sign up for DDNS
service providers such as www.comexe.cn, www.dyndns.org, or www.no-ip.com. The Dynamic
DNS client service provider will give you a password or key.
If the dynamic DNS Service Provider you select is www.comexe.cn, the page will appear as
shown in Figure 4-68.
-78-
1. Type the Domain Name received from your dynamic DNS service provider.
Connection Status -The status of the DDNS service connection is displayed here.
If the dynamic DNS Service Provider you select is www.dyndns.org, the page will appear as
shown in Figure 4-69.
-79-
3. Type the Domain Name you received from dynamic DNS service provider here.
Connection Status -The status of the DDNS service connection is displayed here.
If the dynamic DNS Service Provider you select is www.no-ip.com, the page will appear as
shown in Figure 4-68..
-80-
3. Type the Domain Name you received from dynamic DNS service provider.
Connection Status - The status of the DDNS service connection is displayed here.
Choose menu “System Tools”, and you can see the submenus under the main menu: Time
Settings, Diagnostic, Firmware Upgrade, Factory Defaults, Backup & Restore, Reboot,
-81-
Password, System Log and Statistics. Click any of them, and you will be able to configure the
corresponding function. The detailed explanations for each submenu are provided below.
¾ Time Zone - Select your local time zone from this drop-down list.
¾ Date - Enter your local date in MM/DD/YY into the right blanks.
¾ Time - Enter your local time in HH/MM/SS into the right blanks.
¾ NTP Server I / NTP Server II - Enter the address or domain of the NTP Server I or NTP
Server II, and then the Router will get the time from the NTP Server preferentially. In addition,
the Router built-in some common NTP Servers, so it can get time automatically once it
connects the Internet.
¾ Enable Daylight Saving - Check the box to enable the Daylight Saving function.
¾ Start - The time to start the Daylight Saving. Select the month in the first field, the week in the
second field, the day in the third field and the time in the last field.
¾ End - The time to end the Daylight Saving. Select the month in the first field, the week in the
second field, the day in the third field and the time in the last field.
¾ Daylight Saving Status - Displays the status whether the Daylight Saving is in use.
-82-
) Note:
1. This setting will be used for some time-based functions such as firewall. You must specify
your time zone once you login to the router successfully, otherwise, these functions will not
take effect.
2. The time will be lost if the router is turned off.
3. The Router will automatically obtain GMT from the Internet if it is configured accordingly.
4. The Daylight Saving will take effect one minute after the configurations are completed.
4.16.2 Diagnostic
Choose menu “System Tools → Diagnostic”, you can transact Ping or Traceroute function to
check connectivity of your network in the following screen.
-83-
¾ Diagnostic Tool - Check the radio button to select one diagnostic too.
z Ping - This diagnostic tool troubleshoots connectivity, reachability, and name resolution
to a given host or gateway.
) Note:
You can use ping/traceroute to test both numeric IP address or domain name. If
pinging/tracerouting the IP address is successful, but pinging/tracerouting the domain name
is not, you might have a name resolution problem. In this case, ensure that the domain name
you are specifying can be resolved by using Domain Name System (DNS) queries.
¾ Ping Timeout - Set the waiting time for the reply of each Ping packet. If there is no reply in
the specified time, the connection is overtime.
¾ Traceroute Max TTL - The max number of hops for a Traceroute connection.
-84-
If the result is similar to the following screen, the connectivity of the Internet is fine.
) Note:
Only one user can use this tool at one time. Options “Number of Pings”, “Ping Size” and “Ping
Timeout” are used for Ping function. Option “Tracert Hops” are used for Tracert function.
Choose menu “System Tools → Firmware Upgrade”, you can update the latest version of
firmware for the Router on the following screen.
¾ Hardware Version - This displays the current hardware version. The hardware version of the
upgrade file must accord with the Router’s current hardware version.
2. Type the path and file name of the update file into the File field. Or click the Browse button to
locate the update file.
-85-
) Note:
1. New firmware versions are posted at http://www.tp-link.com and can be downloaded for free.
There is no need to upgrade the firmware unless the new firmware has a new feature you
want to use. However, when experiencing problems caused by the Router rather than the
configuration, you can try to upgrade the firmware.
2. When you upgrade the Router's firmware, you may lose its current configurations, so before
upgrading the firmware please write down some of your customized settings to avoid losing
important settings.
3. Do not turn off the Router or press the Reset button while the firmware is being upgraded,
otherwise, the Router may be damaged.
4. The Router will reboot after the upgrading has been finished.
Choose menu “System Tools → Factory Defaults”, and you can restore the configurations of
the Router to factory defaults on the following screen
Click the Restore button to reset all configuration settings to their default values.
• The default User Name: admin
• The default Password: admin
• The default IP Address: 192.168.0.1
• The default Subnet Mask: 255.255.255.0
) Note:
Any settings you have saved will be lost when the default settings are restored.
Choose menu “System Tools → Backup & Restore”, you can save the current configuration of
the Router as a backup file and restore the configuration via a backup file as shown in Figure
4-75.
-86-
¾ Click the Backup button to save all configuration settings as a backup file in your local
computer.
) Note:
The current configuration will be covered by the uploading configuration file. The upgrade process
lasts for 20 seconds and the Router will restart automatically. Keep the Router on during the
upgrading process to prevent any damage.
4.16.6 Reboot
Choose menu “System Tools → Reboot”, you can click the Reboot button to reboot the Router
via the next screen.
Some settings of the Router will take effect only after rebooting, which include
• Restore the Router's settings to factory defaults (system will reboot automatically).
• Update the configuration with the file (system will reboot automatically).
-87-
4.16.7 Password
Choose menu “System Tools → Password”, you can change the factory default user name and
password of the Router in the next screen as shown in Figure 4-77.
It is strongly recommended that you should change the factory default user name and password
of the Router, because all users who try to access the Router's Web-based utility or Quick Setup
will be prompted for the Router's default user name and password.
) Note:
The new user name and password must not exceed 14 characters in length and not include any
spaces. Enter the new Password twice to confirm.
Choose menu “System Tools → System Log”, you can view the logs of the Router.
-88-
¾ Auto Mail Feature - Indicates whether auto mail feature is enabled or not.
¾ Mail Settings - Set the receiving and sending mailbox address, server address, validation
information as well as the timetable for Auto Mail Feature, as shown in Figure 4-81.
-89-
z From - Your mail box address. The Router would connect it to send logs.
z To - Recipient’s address. The destination mailbox where the logs would be received.
z SMTP Server - Your smtp server. It corresponds with the mailbox filled in the From
field. You can log on the relevant website for Help if you are not clear with the
address.
) Note:
Only when you select Authentication, do you have to enter the User Name and
Password in the following fields.
z User Name - Your mail account name filled in the From field. The part behind @ is
excluded.
z Enable Auto Mail Feature - Select it to mail logs automatically. You could mail the
current logs either at a specified time everyday or by intervals, but only one could be
the current effective rule. Enter the desired time or intervals in the corresponding field
as shown in Figure 4-81.
¾ Log Type - By selecting the log type, only logs of this type will be shown.
¾ Log Level - By selecting the log level, only logs of this level will be shown.
¾ Refresh - Refresh the page to show the latest log list.
-90-
Click the Next button to go to the next page, or click the Previous button return to the previous
page.
4.16.9 Statistics
Choose menu “System Tools → Statistics”, you can view the network traffic of each PC on the
LAN, including total traffic and the value of the last Packets Statistic interval in seconds.
¾ Current Statistics Status - Enable or Disable. The default value is disabled. To enable, click
the Enable button. If disabled, the function of DoS protection in Security settings will be
disabled.
¾ Packets Statistics Interval (5-60) - The default value is 10. Select a value between 5 and
60 seconds in the pull-down list. The Packets Statistic interval indicates the time section of
the packets statistic.
Click Reset All to reset the values of all the entries to zero.
-91-
Statistics Table:
The IP Address and MAC address are displayed with related
IP Addess/MAC Address
statistics
There would be 5 entries on each page. Click Previous to return to the previous page and Next to
the next page.
-92-
Appendix A: FAQ
2) Connect the Ethernet cable from your ADSL Modem to the WAN port on the Router. The
telephone cord plugs into the Line port of the ADSL Modem.
3) Login to the Router, click the “Network” menu on the left of your browser, and click
"WAN" submenu. On the WAN page, select “PPPoE” for WAN Connection Type. Type
user name in the “User Name” field and password in the “Password” field, finish by
clicking “Connect”.
) Note:
1. Sometimes the connection cannot be disconnected although you specify a time to Max
Idle Time, since some applications is visiting the Internet continually in the background.
2. If you are a Cable user, please configure the Router following the above steps.
1) Login to the Router, click the “Network” menu on the left of your browser, and click
-93-
"WAN" submenu. On the WAN page, select “Dynamic IP” for "WAN Connection Type",
finish by clicking “Save”.
2) Some ISPs require that you register the MAC Address of your adapter, which is
connected to your cable/DSL Modem during installation. If your ISP requires MAC
register, login to the Router and click the "Network" menu link on the left of your browser,
and then click "MAC Clone" submenu link. On the "MAC Clone" page, if your PC’s MAC
address is proper MAC address, click the "Clone MAC Address" button and your PC’s
MAC address will fill in the "WAN MAC Address" field. Or else, type the MAC Address
into the "WAN MAC Address" field. The format for the MAC Address is
XX-XX-XX-XX-XX-XX. Then click the "Save" button. It will take effect after rebooting.
1) If you start Netmeeting as a host, you don’t need to do anything with the Router.
2) If you start as a response, you need to configure Virtual Server or DMZ Host and make
sure the H323 ALG is enabled.
3) How to configure Virtual Server: Log in to the Router, click the “Forwarding” menu on
the left of your browser, and click "Virtual Servers" submenu. On the "Virtual Servers"
page, click Add New…. Then on the “Add or Modify a Virtual Server Entry” page,
enter “11130” for the “Service Port” blank, and your IP address for the “IP Address” blank,
taking 192.168.0.198 for an example, remember to Enable and Save.
-94-
) Note:
Your opposite side should call your WAN IP, which is displayed on the “Status” page.
4) How to enable DMZ Host: Log in to the Router, click the “Forwarding” menu on the left
of your browser, and click "DMZ" submenu. On the "DMZ" page, click Enable radio
button and type your IP address into the “DMZ Host IP Address” field, using
192.168.0.198 as an example, remember to click the Save button.
5) How to enable H323 ALG: Log in to the Router, click the “Security” menu on the left of
your browser, and click “Basic Security” submenu. On the “Basic Security” page,
check the Enable radio button next to H323 ALG. Remember to click the Save button.
-95-
1) Because the WEB Server port 80 will interfere with the WEB management port 80 on the
Router, you must change the WEB management port number to avoid interference.
2) To change the WEB management port number: Log in to the Router, click the “Security”
menu on the left of your browser, and click "Remote Management" submenu. On the
"Remote Management" page, type a port number except 80, such as 88, into the "Web
Management Port" field. Click Save and reboot the Router.
) Note:
If the above configuration takes effect, to configure to the Router by typing
http://192.168.0.1:88 (the Router’s LAN IP address: Web Management Port) in the address
-96-
3) Log in to the Router, click the “Forwarding” menu on the left of your browser, and click
the "Virtual Servers" submenu. On the "Virtual Servers" page, click Add New…, then
on the “Add or Modify a Virtual Server” page, enter “80” into the blank next to the
“Service Port”, and your IP address next to the “IP Address”, assuming 192.168.0.188
for an example, remember to Enable and Save.
2) Make sure that the wireless stations' SSID accord with the Router's SSID.
3) Make sure the wireless stations have right KEY for encryption when the Router is
encrypted.
4) If the wireless connection is ready, but you can’t access the Router, check the IP Address
of your wireless stations.
-97-
In this section, we’ll introduce how to install and configure the TCP/IP correctly in Windows XP.
First make sure your Ethernet Adapter is working, refer to the adapter’s manual if needed.
1) On the Windows taskbar, click the Start button, point to Settings, and then click Control
Panel.
2) Click the Network and Internet Connections icon, and then click on the Network
Connections tab in the appearing window.
3) Right click the icon that showed below, select Properties on the prompt page.
Figure B-1
4) In the prompt page that showed below, double click on the Internet Protocol (TCP/IP).
-98-
Figure B-2
5) The following TCP/IP Properties window will display and the IP Address tab is open on
this window by default.
Now you have two ways to configure the TCP/IP protocol below:
-99-
Figure B-3
1 Select Use the following IP address radio button. And the following items available
2 If the Router's LAN IP address is 192.168.0.1, specify the IP address as 192.168.0.x (x is
from 2 to 254), and Subnet mask is 255.255.255.0.
3 Type the Router’s LAN IP address (the default IP is 192.168.0.1) into the Default gateway
field.
4 Select Use the following DNS server addresses radio button. In the Preferred DNS
Server field you can type the DNS server IP address, which has been provided by your ISP
-100-
Figure B-4
-101-
Appendix C: Specifications
General
Standards IEEE 802.3, 802.3u, 802.11b, 802.11g and 802.11n
Protocols TCP/IP, PPPoE, DHCP, ICMP, NAT, SNTP
One 10/100M Auto-Negotiation WAN RJ45 port, Four 10/100M
Ports
Auto-Negotiation LAN RJ45 ports supporting Auto MDI/MDIX
-102-
Appendix D: Glossary
¾ 802.11n - 802.11n builds upon previous 802.11 standards by adding MIMO (multiple-input
multiple-output). MIMO uses multiple transmitter and receiver antennas to allow for increased
data throughput via spatial multiplexing and increased range by exploiting the spatial diversity,
perhaps through coding schemes like Alamouti coding. The Enhanced Wireless Consortium
(EWC) [3] was formed to help accelerate the IEEE 802.11n development process and
promote a technology specification for interoperability of next-generation wireless local area
networking (WLAN) products.
¾ DDNS (Dynamic Domain Name System) - The capability of assigning a fixed host and
domain name to a dynamic Internet IP Address.
¾ DHCP (Dynamic Host Configuration Protocol) - A protocol that automatically configure the
TCP/IP parameters for the all the PC(s) that are connected to a DHCP server.
¾ DMZ (Demilitarized Zone) - A Demilitarized Zone allows one local host to be exposed to the
Internet for a special-purpose service such as Internet gaming or videoconferencing.
¾ DNS (Domain Name System) - An Internet Service that translates the names of websites into
IP addresses.
¾ Domain Name - A descriptive name for an address or group of addresses on the Internet.
¾ DSL (Digital Subscriber Line) - A technology that allows data to be sent or received over
existing traditional phone lines.
¾ ISP (Internet Service Provider) - A company that provides access to the Internet.
¾ MTU (Maximum Transmission Unit) - The size in bytes of the largest packet that can be
transmitted.
¾ NAT (Network Address Translation) - NAT technology translates IP addresses of a local area
network to a different IP address for the Internet.
¾ PPPoE (Point to Point Protocol over Ethernet) - PPPoE is a protocol for connecting remote
hosts to the Internet over an always-on connection by simulating a dial-up connection.
-103-
identifying a wireless local area network. For the wireless devices in a network to
communicate with each other, all devices must be configured with the same SSID. This is
typically the configuration parameter for a wireless PC card. It corresponds to the ESSID in
the wireless Access Point and to the wireless network name.
¾ WEP (Wired Equivalent Privacy) - A data privacy mechanism based on a 64-bit or 128-bit or
152-bit shared key algorithm, as described in the IEEE 802.11 standard.
¾ Wi-Fi - A trade name for the 802.11b wireless networking standard, given by the Wireless
Ethernet Compatibility Alliance (WECA, see http://www.wi-fi.net), an industry standards
group promoting interoperability among 802.11b devices.
¾ WLAN (Wireless Local Area Network) - A group of computers and associated devices
communicate with each other wirelessly, which network serving users are limited in a local
area.
-104-