Ibwra 150 N
Ibwra 150 N
Ibwra 150 N
User Manual
Ver. 1.0.0
FCC STATEMENT
This equipment has been tested and found to comply with the limits for a Class B digital device,
pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection
against harmful interference in a residential installation. This equipment generates, uses and can
radiate radio frequency energy and, if not installed and used in accordance with the instructions,
may cause harmful interference to radio communications. However, there is no guarantee that
interference will not occur in a particular installation. If this equipment does cause harmful
interference to radio or television reception, which can be determined by turning the equipment off
and on, the user is encouraged to try to correct the interference by one or more of the following
measures:
• Reorient or relocate the receiving antenna.
• Increase the separation between the equipment and receiver.
• Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected.
• Consult the dealer or an experienced radio/ TV technician for help.
This device complies with part 15 of the FCC Rules. Operation is subject to the following two
conditions:
1) This device may not cause harmful interference.
2) This device must accept any interference received, including interference that may cause
undesired operation.
Any changes or modifications not expressly approved by the party responsible for compliance could
void the user’s authority to operate the equipment.
Note: The manufacturer is not responsible for any radio or tv interference caused by unauthorized
modifications to this equipment. Such modifications could void the user’s authority to operate the
equipment.
CE Mark Warning
This is a class B product. In a domestic environment, this product may cause radio interference, in
which case the user may be required to take adequate measures.
Package Contents
The following contents should be found in your package:
) Note:
Make sure that the package contains the above items. If any of the listed items are damaged or
missing, please contact with your distributor.
Conventions
The ADSL Router or iB-WRA150N or device mentioned in this User guide stands for iBall Baton
150M Wireless-N ADSL2+ Router without any explanations.
Parameters provided in the pictures are just references for setting up the product, which may differ
from the actual situation. You can set the parameters according to your demand.
The iB-WRA150N 150M Wireless-N ADSL2+ Router utilizes integrated ADSL2+ transceiver and
high speed MIPS CPU. The Router supports full-rate ADSL2+ connectivity conforming to the ITU
and ANSI specifications.
In addition to the basic DMT physical layer functions, the ADSL2+ PHY supports dual latency
ADSL2+ framing (fast and interleaved) and the I.432 ATM Physical Layer.
Incredible Speed
The router provides up to 150Mbps wireless connection with other 802.11n wireless clients. The
incredible speed makes it ideal for handling multiple data streams at the same time, which ensures
your network stable and smooth.
The performance of this 802.11n wireless Router will give you the unexpected networking experience
at speed faster than 802.11g. It is also compatible with all IEEE 802.11g and IEEE 802.11b products.
With multiple protection measures, including SSID broadcast control and wireless LAN 64/128
WEP encryption, Wi-Fi protected Access (WPA2-PSK, WPA-PSK), as well as advanced Firewall
protections, the iB-WRA150N 150M Wireless-N ADSL2+ Router provides complete data privacy.
The Router provides flexible access control, so that parents or network administrators can
establish restricted access policies for children or staff.
The Router provides flexible access control, so that parents or network administrators can
establish restricted access policies for children or staff. It also supports Virtual Server and DMZ
host for Port Triggering, and then the network administrators can manage and monitor the network
in real time with the remote management function.
Simple Installation
It supports an easy, web-based setup for installation and management. Quick Setup Wizard is
supported and detailed instructions are provided step by step in QIG. Before installing the Router,
please look through this guide to know all the Router’s functions.
Figure 1-1
The Router’s LEDs and the WPS button are located on the front panel (View from left to right).
On Power is on
Power
Off Power is off
On The LINE port has connected to ISP’s network
ADSL Flashing The LINE port is connecting to the ISP’s network
Off The LINE port is disconnected
On A successful PPP connection has been established
) Note:
After a device is successfully added to the network by WPS function, the WPS LED will keep on
for about 5 minutes and then turn off.
Figure 1-2
¾ LINE: Connect to the Modem Port of Splitter or to the telephone line.
¾ RESET: There are two ways to reset the Router's factory defaults.
1) Use the Restore Default function on “System Tools/Maintenance→ Settings→ Factory
Default” page in the router's Web-based Utility.
2) Use the Factory Default RESET button: With the Router powered on, use a pin to press and
hold the RESET button for at least 5 seconds. And the Router will reboot to its factory default
settings.
¾ POWER: The Power plug is where you will connect the power adapter.
¾ ON/OFF: The switch for the power.
¾ 1, 2, 3, 4 (LAN): The ports (1, 2, 3, 4) connect the Router to the local PC(s).
¾ Wireless Antennas: To receive and transmit the wireless data.
Figure 2-1
¾ If the result displayed is similar to the Figure 3-2, it means the connection between your PC
and the Router is failed.
) Note:
The 1/2/3/4 LEDs of LAN ports which you link to on the Router and LEDs on your PC's adapter
should be lit.
2. Is the TCP/IP configuration for your PC correct?
) Note:
If the Router's IP address is 192.168.1.1, your PC's IP address must be within the range of
192.168.1.2 ~ 192.168.1.254.
Figure 3-3
After a moment, a login window will appear, similar to the Figure 3-4. Enter admin for the User
Name and Password, both in lower case letters. Then click the OK button or press the Enter
key.
Figure 3-4
Default Settings:
User Name: admin Password: admin
SSID: iBall-Baton Wireless mode: Automatic (802.11b/g/n)
) Note:
1) Do not mix up the user name and password with your ADSL account user name and password
which are needed for PPP connections.
2) If the above screen does not pop up, it means that your Web-browser has been set to a proxy.
Go to Tools menu→ Internet Options→ Connections→ LAN Settings, in the screen that
appears, cancel the Using Proxy checkbox, and click OK to finish it.
2. After your successful login, you will see the Login screen as shown in Figure 3-5. Click Quick
Setup menu to access Quick Setup Wizard.
Figure 3-5
3. Change the VPI or VCI values which are used to define a unique path for your connection. If
you have been given specific settings for this to configuration, type in the correct values
assigned by your ISP, and then click Next.
10
Figure 3-6
4. The Connection Type page will display. Here we select PPPoE WAN Link Type for example.
Figure 3-7
5. Enter the Username and Password given by your ISP and click Next to continue.
11
Figure 3-8
6. The following page will display. Keep the default settings and click Next to continue.
Figure 3-9
12
Figure 3-10
8. You will see the Summary screen below, click Save/Reboot to save these settings.
Figure 3-11
9. Now, your ADSL Modem Router has been configured and is rebooting. Please do not power
off the Router while it’s rebooting. After successfully rebooting, the Router will return to the
Device Info page.
Figure 3-12
) Note:
The Quick Setup Wizard will guide you to configure the WAN Service over ATM interface.
13
4.1 Login
After your successful login, you will see the nine main menus on the left of the Web-based utility.
On the right, there are the corresponding explanations and instructions.
The detailed explanations for each Web page’s key function are listed below.
4.2 Status
Choose “Status” menu, there are six submenus under the main menu: Summary, WAN, Statistics,
Route, ARP and DHCP. This Device Info section mainly introduces the elementary information
about the Router and its current settings in use. Click any of them, and you will be able to view the
corresponding information.
Choose “Status→Summary”, you will see the Summary screen (shown in Figure 4-1). The first
table indicates the information about the version including Software and Hardware. The second
table displays the current status of the connection. This information will vary depending on the
settings of the Router configured on the Advanced Setup screen.
14
Figure 4-1
) Note:
Click the other submenus under the main menu Device Info, and you will be able to view the
corresponding information about WAN, Statistics, Route, ARP and DHCP.
4.4 WPS
This section will guide you add a new wireless device to an existing network quickly by WPS
function.
a). Choose menu “WPS”, you will see the next screen (shown in Figure 4-2 ).
15
) Note:
To build a successful connection by WPS, you should also do the corresponding configuration of
the new device for WPS function meanwhile.
For the configuration of the new device, here takes the Wireless Adapter of our company for
example.
Step 2: Press and hold the WPS button of the adapter directly for 2 or 3 seconds.
WPS
Step 3: Wait for a while until the next screen of adapter appears. Click Finish to complete the
WPS configuration.
16
Figure 4-3
Step 2: For the configuration of the wireless adapter, please choose “Push the button on my
access point” in the configuration utility of the WPS as below, and click Next.
Figure 4-4
Step 3: Wait for a while until the next screen appears. Click Finish to complete the WPS
configuration.
17
Figure 4-5
Step 2: Choose Press the button of the new device in two minutes and click Connect.
Step 3: For the configuration of the wireless adapter, please choose Push the button on my
access point in the configuration utility of the WPS as below, and click Next.
18
Step 4: Wait for a while until the next screen appears. Click Finish to complete the WPS
configuration.
b. Click Add device, please select Enter the new device’s PIN and enter the PIN code of the
adapter. Then click Connect.
19
c. Message will appear shown as above, Connect successfully in the router WPS link menu
Interface.
b. Double click the icon on the desktop to open the WPS Utility and then you can see the
welcome screen shown. Click Next to continue.
c. Please choose Enter a PIN from my access point in the WPS configuration utility as shown
below, enter the PIN code of the Router into the field of Access Point PIN, and then click
Next.
20
d. You will see the Wireless Configuration completed screen when the new device is
successfully connected to the network.
Step 1: Keep the default WPS Status as Enabled and click the Add device button in Figure 4-2,
then the following screen will appear.
) Note:
The default PIN code of the Router can be found in its label or the WPS configuration screen as
Figure 4-2.
You will see the following screen when the new device successfully connected to the network.
) Note:
1) The status LED on the Router will light green all the time if the device has been successfully
added to the network.
2) The WPS function cannot be configured if the Wireless Function of the Router is disabled.
Please make sure the Wireless Function is enabled before configuring the WPS.
21
Figure 4-7
4.5.1 WAN
Choose “Network SettingsÆWAN”, and you will see the page of Wide Area Network (WAN)
Setup as shown Figure 4-8.
Figure 4-8
There are four PVC links in the WAN setup page. Click the Add button or choose the appropriate
PVC according to your need. Then you will enter the page of ATM PVC Configuration as shown in
Figure 4-9.
22
Figure 4-9
Enter VPI/VCI value and service category provided by your ISP. Click Next to enter the next step.
You will see the Figure 4-10.
Figure 4-10
After choosing the proper protocol, enter the correct parameters supported by your ISP. Enable
the configurations, and then you will go to the Internet.
) Note:
The type of network protocol selected may be different in different areas. There are five types, so
you should ask your ISP to acquire the Connection Type and Encapsulation Mode.
¾ PPP over ATM (PPPoA)
23
If you select the protocol of PPP over ATM (PPPoA), you will see the Figure 4-11.
Figure 4-11
PPP Username: Enter your username for your PPPoA connection to identify and verify your
account to the ISP.
PPP Password: Enter your password for your PPPoA connection.
Authentication Method: Choose a method of authentication, AUTO, PAP, CHAP, or
MSCHAP.
MTU: The default MTU value is 1480 Bytes. It is not recommended that you change the
default value unless required by your ISP. The value should be between 512 and 1492.
Enable Fullcone NAT: Check this box to enable the Fullcone NAT function. The default value
is disabled.
Dial on demand: If you check this box, the Internet connection can be terminated
automatically after a specified inactivity period (Inactivity Timeout) and be re-established
when you attempt to access the Internet again. The default value of Inactivity Timeout is 15.
The value should be between 1 and 4320.
PPP IP extension: If this box is checked, the IP address obtained by the Router will be
assigned to the computer, and the NAT and Firewall will be disabled.
24
Use Static IP Address: Check this box to use the static IP address to dial. The default value
is disabled.
Enable PPP Debug Mode: Check this box to enable the debug mode. The default value is
disabled.
Click Next button in Figure 4-11, and then you will see Figure 4-12. Check or uncheck the Enable
WAN Service box according to your needs.
Figure 4-12
Click the Next button to enter the next step as shown in Figure 4-13. Click Save to complete the
configuration.
Figure 4-13
25
Figure 4-14
PPP Username: Enter your username for your PPPoE connection to identify and verify your
account to the ISP.
PPP Password: Enter your password for your PPPoE connection.
PPPoE Service Name: Enter a name for the PPPoE connection for recognition.
Authentication Method: Choose a method of authentication, AUTO, PAP, CHAP, or
MSCHAP.
MTU: The default MTU value is 1480 Bytes. It is not recommended that you change the
default value unless required by your ISP. The value should be between 512 and 1492.
Enable Fullcone NAT: Check this box to enable the Fullcone NAT function. The default value
is disabled.
26
Dial on demand: If you check this box, the Internet connection can be terminated
automatically after a specified inactivity period (Inactivity Timeout) and be re-established
when you attempt to access the Internet again. The default value of Inactivity Timeout is 30.
The value should be between 1 and 4320.
PPP IP extension: If this box is checked, the IP address obtained by the Router will be
assigned to the computer, and the NAT and Firewall will be disabled.
Use Static IP Address: Check this box to use the static IP address to dial. The default value
is disabled.
Enable PPP Debug Mode: Check this box to enable the debug mode. The default value is
disabled.
Bridge PPPoE Frames Between WAN and Local Ports: If you check this box, you can
establish dial-up connection in this Router or on the PC. By default, the checkbox is selected.
Click Next button in Figure 4-14, and then you will Figure 4-15. Check or uncheck the Enable
WAN Service box according to your needs.
Figure 4-15
Click the Next button to enter the next step as shown in Figure 4-16. Click Save to complete the
configuration.
27
Figure 4-16
Figure 4-17
Obtain an IP address automatically: This radio button is checked by default. You can obtain
the IP address automatically.
Use the following IP address and gateway: Check this radio button to enter the information
provided by your ISP to configure the WAN IP settings.
Obtain DNS server addresses automatically: This radio button is checked by default. It’s
recommended that you keep the default settings to allow the Router to obtain the default DNS
server addresses automatically.
28
Use the following DNS server addresses: Check this radio button then you can enter the
primary DNS server and secondary DNS server. This is not recommended by default.
) Note:
1) DHCP can be enabled for PVC in MER mode as WAN interface if "Obtain an IP address
automatically" is chosen.
2) Changing the default gateway or the DNS will affect the whole system. Configuring them with
static values will disable the automatic assignment from DHCP or other WAN connection.
3) If you configure static default gateway over this PVC in MER mode, you must enter the IP
address of the remote gateway in the "Use IP address". The "Use WAN interface" is optional.
Click Next button in Figure 4-17, and then you will see the Figure 4-18. Check or uncheck the
Enable WAN Service box according to your needs.
Figure 4-18
Click the Next button to enter the next step as shown in Figure 4-19. Click Save to complete the
configuration.
29
Figure 4-19
Figure 4-20
30
primary DNS server and secondary DNS server. If you have any problems, please ask your
ISP for the information.
) Note:
1) DHCP is not supported in IPoA mode.
2) Changing the default gateway or the DNS will affect the whole system. Configuring them with
static values will disable the automatic assignment from other WAN connection.
Click Next in Figure 4-20, and then you will see the Figure 4-21.
Figure 4-21
Check or uncheck the Enable WAN Service box according to your needs. Click the Next button to
enter the next step as shown in Figure 4-22, and click Save to complete the configuration.
31
Figure 4-22
¾ Bridging
If you select the Bridging protocol, you will see the Figure 4-23. Click the Next button.
Figure 4-23
Then you will see the Figure 4-24. Click Save to complete the configuration.
32
Figure 4-24
) Note:
After completing any setup, the new setup must be saved and the Router must be restarted for the
configuration to go into effect. Please click the Save/Reboot button to restart as shown in Figure
4-25.
Figure 4-25
) Note:
All of the above setup is under windows XP OS.
33
4.5.2 LAN
Choose “Advanced Setup→LAN” menu, and you can see and configure the Local Area Network
(LAN) parameters in the screen as shown in Figure 4-26.
Figure 4-26
¾ IP Address: Enter an IP address for the Router. Then you can access the Web-based Utility
via this IP address. The default setting is 192.168.1.1.
¾ Subnet Mask: An address code that determines the size of the network. Normally use
255.255.255.0 as the subnet mask.
) Note:
1) If you change the IP Address of LAN, you must use the new IP Address to log in the
Router.
2) If the new LAN IP Address you set is not in the same subnet, the IP Address pool of the
DHCP server will change accordingly at the same time,while the Virtual Server and DMZ
Host will not take effect until they are re-configured.
¾ Enable SPI Firewall: Check this box to enable the SPI Firewall function. The default value is
disabled.
34
¾ Disable/Enable DHCP Server: Disable or Enable the DHCP server. DHCP stands for
Dynamic Host Configuration Protocol. The DHCP Server will automatically assign dynamic IP
addresses to the computers on the network. If you disable the Server, you must have another
DHCP server within your network or else you must configure the computer manually. The
following options are available only when DHCP Server is enabled.
z Start IP Address: Specify an IP address for the DHCP Server to start with when
assigning IP addresses. 192.168.1.100 is the default start address.
z End IP Address: Specify an IP address for the DHCP Server to end with when assigning
IP addresses. 192.168.1.200 is the default end address.
z Subnet Mask: An address code that determines the size of the network. Normally use
255.255.255.0 as the subnet mask.
z Leased Time (hour): The Lease Time is the amount of time a network user will be
allowed connection to the Router with their current dynamic IP address. Enter the amount
of time, in hours, and the user will be "leased" this dynamic IP address. After the time is
up, the user will be automatically assigned a new dynamic IP address. The default value
is 24 hours.
¾ Set Address Reservation: Click this button, you can view and add a reserved address for
clients via the Address Reservation page as shown in Figure 4-26. When you specify a
reserved IP address for a PC on the LAN, that PC will always receive the same IP address
each time when it accesses the DHCP server. Reserved IP addresses should be assigned to
servers that require permanent IP settings.
¾ Configure the second IP Address and Subnet Mask for LAN interface: Check this box,
and you can configure a second IP address and subnet mask for the LAN interface.
¾ Save: Clicking this button only saves the LAN configuration data.
¾ Save/Reboot: Clicking this button not only saves the LAN configuration data but also reboots
the Router to make the new configuration take effect.
To Reserve an IP address:
1. Click the Set Address Reservation button shown in Figure 4-26 to enter the screen as
shown in Figure 4-27.
Figure 4-27
2. Click the New Entry button in Figure 4-27. Then Figure 4-28 will pop up.
35
Figure 4-28
3. Enter the MAC address in XX:XX:XX:XX:XX:XX format and reserved IP address in
dotted-decimal notation of the computer for which you want to reserve an IP address.
) Note:
The MAC Address and IP Address added in Figure 4-28 are used for illustrating. They
may be different to your circs.
4. Select Enable from the State drop-down list.
5. Click the Save button, then you will go back to the Address Reservation screen and see
the new entry as shown in Figure 4-27.
6. Click Save/Reboot button to save the settings and reboot the Router.
) Note:
The function won't take effect until the router reboots.
Figure 4-29
Some ISPs require that you register the MAC Address of your adapter. Changes are rarely
needed here.
¾ WAN MAC Address - This field displays the current MAC address of the WAN port. If your
ISP requires you to register the MAC address, please enter the correct MAC address into this
field in XX:XX:XX:XX:XX:XX format (X is any hexadecimal digit).
36
¾ Your PC's MAC Address - This field displays the MAC address of the PC that is managing
the Router. If the MAC address is required, you can click the Clone MAC Address button and
this MAC address will be filled in the WAN MAC Address field.
Click Restore Factory MAC to restore the MAC address of WAN port to the factory default value.
Click the Save/Reboot button to save your settings.
) Note:
1) Only the PC on your LAN can use the MAC Address Clone function.
2) Your configuration won't take effect unless the ADSL Router is rebooted.
3) MAC Clone can't be used with port mirror. If they are set both, the Router will be down.
4.6 Wireless
Choose “Wireless”, there are five submenus to configure Wireless LAN settings. Click any of them,
and you will be able to configure the corresponding function. The detailed explanations for each
submenu are provided below.
4.6.1 Basic
Choose “Wireless→Basic”, you will see the screen of Wireless--Basic settings shown as below.
The basic settings for wireless networking are set on this screen.
37
Figure 4-30
¾ SSID: Enter a value of up to 32 characters. The same name of SSID (Service Set
Identification) must be assigned to all wireless devices in your network. Considering
your wireless network security, the default SSID is set to be (XXXXXX indicates the
last unique six numbers of each Router’s MAC address). This value is case-sensitive.
For example, TEST is NOT the same as test.
¾ Channel: This field determines which operating frequency will be used. The default
channel is set to Auto, so the AP will choose the best channel automatically. It is not
necessary to change the wireless channel unless you notice interference problems with
another nearby access point.
¾ Region: Select your region from the pull-down list. This field specifies the region where
the wireless function of the Router can be used. It may be illegal to use the wireless
function of the Router in a region other than one of those specified in this field. If your
country or region is not listed, please contact your local government agency for
assistance.
When you select your local region from the pull-down list, click the Save button, then the Note
Dialog appears. Click OK.
Note Dialog
38
) Note:
Limited by local law regulations, version for North America does not have region selection option.
¾ Mode: Select the desired mode. The default setting is 11bgn mixed.
)Note:
If 11Mbps (802.11b), 54Mbps (802.11g), or Mixed Mode (802.11b/g) is selected in the Mode
field, the Channel Width selecting field will turn grey and the value will become 20M, which is
unable to be changed.
¾ Enable Wireless Router Radio: The wireless radio of this Router can be enabled or disabled
to allow wireless stations access.
¾ Enable SSID Broadcast: When wireless clients survey the local area for wireless networks to
associate with, they will detect the SSID broadcast by the Router. If you select the Enable
SSID Broadcast checkbox, the Wireless Router will broadcast its name (SSID) on the air.
¾ Enable WDS: Check this box to enable WDS. With this function, the Router can bridge two or
more WLANs. If this checkbox is selected, you will have to set the following parameters as
shown below. Make sure the following settings are correct.
39
¾ SSID(to be bridged): The SSID of the AP your Router is going to connect to as a client.
You can also use the search function to select the SSID to join.
¾ BSSID(to be bridged): The BSSID of the AP your Router is going to connect to as a
client. You can also use the search function to select the BSSID to join.
¾ Survey: Click this button, you can search the AP which runs in the current channel.
¾ Key type: This option should be chosen according to the AP's security configuration. It is
recommended that the security type is the same as your AP's security type.
¾ WEP Index: This option should be chosen if the key type is WEP(ASCII) or WEP(HEX).It
indicates the index of the WEP key.
¾ Auth Type: This option should be chosen if the key type is WEP(ASCII) or WEP(HEX).It
indicates the authorization type of the Root AP.
¾ Password: If the AP your Router is going to connect needs password, you need to fill the
password in this blank.
Click Apply/Save to save your settings.
40
Figure 4-31
¾ Disable Security: If you do not want to use wireless security, select this check box, but it’s
strongly recommended to choose one of the following modes to enable security.
¾ WEP: It is based on the IEEE 802.11 standard. If you select this check box, you will find a
notice in red as show in Figure 4-32.
Figure 4-32
41
• Type: you can choose the type for the WEP security on the pull-down list. The default
setting is Automatic, which can select Open System or Shared Key authentication type
automatically based on the wireless station's capability and request.
• WEP Key Format: Hexadecimal and ASCII formats are provided. Hexadecimal format
stands for any combination of hexadecimal digits (0-9, a-f, A-F) in the specified length.
ASCII format stands for any combination of keyboard characters in the specified length.
• WEP Key: Select which of the four keys will be used and enter the matching WEP key that
you create. Make sure these values are identical on all wireless stations in your network.
• Key Type: You can select the WEP key length (64-bit, or 128-bit, or 152-bit.) for encryption.
"Disabled" means this WEP key entry is invalid.
64-bit: You can enter 10 hexadecimal digits (any combination of 0-9, a-f, A-F, zero key is not
promoted) or 5 ASCII characters.
128-bit: You can enter 26 hexadecimal digits (any combination of 0-9, a-f, A-F, zero key is
not promoted) or 13 ASCII characters.
152-bit: You can enter 32 hexadecimal digits (any combination of 0-9, a-f, A-F, zero key is
not promoted) or 16 ASCII characters.
) Note:
If you do not set the key, the wireless security function is still disabled even if you have
selected Shared Key as Authentication Type.
¾ WPA /WPA2: It’s based on Radius Server.
• Version: you can choose the version of the WPA security on the pull-down list. The default
setting is Automatic, which can select WPA (Wi-Fi Protected Access) or WPA2 (WPA
version 2) automatically based on the wireless station's capability and request.
• Encryption: You can select either Automatic, or TKIP or AES.
) Note:
If you check the WPA/WPA2 radio button and choose TKIP encryption, you will find a notice
in red as shown in Figure 4-33.
Figure 4-33
• Radius Server IP: Enter the IP address of the Radius Server.
• Radius Port: Enter the port that radius service used.
• Radius Password: Enter the password for the Radius Server.
• Group Key Update Period: Specify the group key update interval in seconds. The value
should be 30 or above. Enter 0 to disable the update.
42
) Note:
If you check the WPA-PSK/WPA2-PSK radio button and choose TKIP encryption, you will
find a notice in red as shown in Figure 4-19.
Figure 4-34
• PSK Password: You can enter ASCII characters between 8 and 63 characters or 8 to 64
Hexadecimal characters.
• Group Key Update Period: Specify the group key update interval in seconds. The value
should be 30 or above. Enter 0 to disable the update.
Be sure to click the Save button to save your settings on this page.
43
Figure 4-35
To filter wireless users by MAC Address, click Enable. The default setting is Disable.
¾ MAC Address: The wireless station's MAC address that you want to filter.
¾ Status: The status of this entry either Enabled or Disabled.
¾ Description: A simple description of the wireless station.
To Add a Wireless MAC Address filtering entry, click the Add New… button. The "Add or Modify
Wireless MAC Address Filtering entry" page will appear, shown in Figure 4-36.
44
45
4.6.4 Advanced
Choose “Wireless→Advanced”, you will see the screen of Wireless Advanced settings shown as
below.
Figure 4-37
¾ Beacon Interval: Enter a value between 40-3500 milliseconds. The Beacon Interval value
indicates the frequency interval of the beacon. A beacon is a packet broadcast by the Router
to synchronize the wireless network. The default value is 100.
¾ RTS Threshold: Should you encounter inconsistent data flow, only minor reduction of the
default value 2346 is recommended. If a network packet is smaller than the preset RTS
threshold size, the RTS/CTS mechanism will not be enabled. The Router sends Request to
Send (RTS) frames to a particular receiving station and negotiates the sending of a data
frame. After receiving an RTS, the wireless station responds with a Clear to Send (CTS)
frame to acknowledge the right to begin transmission. In most cases, keep its default value of
2346.
¾ Fragmentation Threshold: This value specifies the maximum size for a packet before data is
fragmented into multiple packets. If you experience a high packet error rate, you may slightly
increase the Fragmentation Threshold. Setting the Fragmentation Threshold too low may
result in poor network performance. Only minor reduction of the default value is
recommended. In most cases, it should remain at its default value of 2346.
¾ DTIM Interval: This value, between 1 and 255, indicates the interval of the Delivery Traffic
Indication Message (DTIM). A DTIM field is a countdown field informing clients of the next
window for listening to broadcast and multicast messages. When the Router has buffered
broadcast or multicast messages for associated clients, it sends the next DTIM with a DTIM
Interval value. Its clients hear the beacons and awaken to receive the broadcast and multicast
messages. The default value is 1.
¾ Enable WMM: WMM function can guarantee the packets with high- priority messages being
transmitted preferentially. It is strongly recommended enabled.
¾ Enable Short GI: This function is recommended for it will increase the data capacity by
reducing the guard interval time.
46
4.6.5 Statistics
Choose menu “Wireless→Wireless Statistics”, you can see the MAC Address, Current Status,
Received Packets and Sent Packets for each connected wireless station.
Figure 4-38
¾ MAC Address - The connected wireless station's MAC address
¾ Current Status - The connected wireless station's running status, one of STA-AUTH /
STA-ASSOC / STA-JOINED / WPA / WPA-PSK / WPA2 / WPA2-PSK / AP-UP / AP-DOWN /
Disconnected
¾ Received Packets - Packets received by the station
¾ Sent Packets - Packets sent by the station
You cannot change any of the values on this page. To update this page and to show the current
connected wireless stations, click on the Refresh button.
If the numbers of connected wireless stations go beyond one page, click the Next button to go to
the next page and click the Previous button to return the previous page.
Figure 4-39
) Note:
When you select PPPoA or PPPoE for the WAN Setup, or when you select Enable NAT for the
type of IPoA and IPoE connection, you will see the NAT menu in the Web-based Utility (shown in
Figure 4-40).
47
Choose “Advanced Setup→NAT”, there are three submenus under the main menu: Virtual
Servers, Port Triggering and DMZ Host. Click any of them, and you will be able to configure the
corresponding function.
Figure 4-40
Figure 4-41
¾ Virtual Server Table: The table indicates the information about the Virtual Server entries.
• Server Name: This is the name of the Virtual Server. It is exclusive and must be filled in.
• External Port Start: The base number of External Ports. You can type a service port or
leave it blank.
• External Port End: The end number of External Ports. You can type a service port or
leave it blank.
• Protocol: The protocol used for this application, TCP, UDP, or TCP/UDP.
• Internal Port Start: The base number of Internal Ports. You can type a service port or
leave it blank.
48
• Internal Port End: The end number of Internal Ports. You can type a service port or leave
it blank.
• Server IP Address: The IP Address of the PC providing the service application.
• Remote Host: The PC can enjoy the service application.
¾ Add: Click the Add button to add a new entry.
¾ Remove: Select the check box in the table (shown in Figure 4-41) and then click the Remove
button, then the corresponding entry will be deleted in the table.
To add a virtual server entry:
1. Click the Add button on the preceding screen Figure 4-41, and then you will see the new
Virtual Server in the next screen as shown in Figure 4-42.
Figure 4-42
2. Select the service which you want to use from the drop-down list. If the list does not have the
service you need, type the name of the custom service in the text box.
3. Type the IP Address of the computer in the Server IP Address text box.
4. Enter the External Port Start, External Port End, Internal Port Start and Internal Port End in
the table, and then select the protocol used for this Virtual Server, TCP, UDP or All.
5. Click Save/Apply to enable virtual server and then you will see your setting as shown in
Figure 4-41.
) Note:
If you select the service from the drop-down list, the External Port Start, External Port End,
Internal Port Start, Internal Port End and the Protocol will be added in the table automatically. You
only need to enter the Server IP Address for the Virtual Server.
49
Figure 4-43
¾ Port Triggering Table: The table indicates the information about the Port Triggering entries.
• Application (Name): This is the name of the Port Triggering. It is exclusive and must be
filled.
• Trigger: It includes the Protocol and the Start and End value of the Trigger Ports.
• Open: It includes the Protocol and the Start and End value of the Open Ports.
¾ Add: Click the button to add a new entry.
¾ Remove: Select the check box in the table (shown in Figure 4-43) and then click the Remove
button, then the corresponding entry will be deleted in the table.
50
Figure 4-44
2. Select the application from the drop-down list. If the list does not have the application that
you want, select the Custom application radio button, and type the name of the custom
application in the text box.
3. Enter the Trigger Port Start, Trigger Port End, Open Port Start and Open Port End in the table,
and then select the Trigger protocol and Open protocol, TCP, UDP or All.
4. Click Save/Apply to enable the settings and then you will see you settings as shown in Figure
4-43.
) Note:
If you select the application from the drop-down list, the External Port Start, External Port End,
Internal Port Start, Internal Port End and the Protocol will be added in the table automatically.
Figure 4-45
To add a new DMZ Host:
You can enter the computer's IP address and then click Save/Apply to activate the DMZ host you
set on this page.
) Note:
DMZ host forwards all the ports at the same time. Any PC whose port is being forwarded must
have its DHCP client function disabled and should have a new static IP Address assigned to it
because its IP Address may change while using the DHCP function.
51
Figure 4-46
Select the Enable QoS checkbox to enable all QoS for all interfaces.
Select a Default DSCP Mark from drop-down list to automatically mark incoming traffic without
reference to a particular classifier.
Click Save/Apply to save the current configuration.
) Note:
The default DSCP mark is used to mark all egress packets that do not match any classification
rules.
52
Figure 4-47
Click the Add button in Figure 4-47, and you can configure the QoS queue entry on the next
screen as shown in Figure 4-48.
Figure 4-48
¾ Queue Configuration Status: Enable or disable the queue configuration.
¾ Queue: Select a QoS queue entry from the drop-down list.
¾ Queue Precedence: Specify precedence for this QoS queue entry.
After you specify the condition, click Save/Apply to save the entry and then you will see you
settings as shown in Figure 4-47.
) Note:
1) Lower integer values for precedence imply higher priority for this queue relative to others.
2) The queue entry configured here will be used by the classifier to place ingress packets
appropriately.
53
Figure 4-49
Click the Add button Figure 4-49, and you can configure the QoS on the next screen.
4.7.3 Routing
Choose “Advanced Setup→ Routing” menu, you can see two submenus under the Routing
menu as shown in Figure 4-50.
Figure 4-50
54
Figure 4-51
¾ Enable Automatic Assigned Default Gateway - Select this checkbox, and then the Router
will accept the first received default gateway assignment from one of the PPPoA, PPPoE or
MER/DHCP enabled PVC(s). If this checkbox is not selected, you have to enter the static
default gateway and/or an interface. Click Save/Apply to save your configurations.
) Note:
If changing the Enable Automatic Assigned Default Gateway from unselected to selected, you
must reboot the Router to get the automatic assigned default gateway.
Figure 4-52
To add a new entry, follow the steps below.
1. Click the Add button in Figure 4-52 to go to the Static Route Add page as shown in Figure
4-53.
2. Enter the IP address of the destination network. This parameter specifies the IP network
address of the final destination.
3. Enter the Subnet Mask for the destination.
4. Select the Use Gateway IP Address checkbox and enter the IP address of the gateway. The
gateway is an immediate neighbor of your ADSL Router that will forward the packet to the
destination. On the LAN, the gateway must be a router on the same segment as your Router;
over Internet (WAN), the gateway must be the IP address of one of the remote nodes.
5. Click Save/Apply to save your configurations. Then you will go back to Figure 4-52 and see
your new entry.
55
Figure 4-53
4.7.4 DNS
When you select the connection type PPPoE, PPPoA or IPoA for WAN configuration, you will see
the DNS menu in the Web-based Utility (shown in Figure 4-54). It includes DNS Server and
Dynamic DNS submenus.
Figure 4-54
Figure 4-55
Enter the primary and /or secondary DNS server IP addresses provided by your ISP.
Click the Apply/Save button to save the new configuration.
56
Figure 4-56
To add a DDNS entry:
1. Click the Add button (pop-up Figure 4-56), and then you will set the DDNS in the next screen
(shown in Figure 4-57).
Figure 4-57
2. Select D-DNS provider in the drop-down list.
3. Enter the Hostname of the DNS Server, and select the corresponding Interface for the DDNS,
you can leave it default.
4. Type the User Name and Password for your DDNS account.
Click Save/Apply to save the entry and then you will see your settings as shown in Figure 4-56
4.7.5 DSL
Choose “Advanced Setup→ DSL” menu, you can view and configure the parameters in the
screen as shown in Figure 4-58.
57
Figure 4-58
If you want to make some advanced settings, click Advanced Settings button in Figure 4-58 to go
to the DSL Advanced Settings page as shown in Figure 4-59.
Figure 4-59
If you want to select the tone, click the Tone Selection button to go to the ADSL Tone Settings
page as shown in Figure 4-60.
58
Figure 4-60
Figure 4-61
59
Figure 4-62
2. Enter the Group name and select interfaces from the available interface list and add it to the
grouped interface list using the arrow buttons to create the required mapping of the ports. The
group name must be unique. The max length is 15.
Click Save/Apply button to make the changes effective immediately
) Note:
Group name only can be a number or letter 0("A~Z" or "a~z").
4.7.7 IPSec
Choose “Advanced Setup→IPSec”, you can Add/Remove or Enable/Disable the IPSec tunnel
connections on the screen as shown in Figure 4-63.
Figure 4-63
This section will guide you to configure a VPN tunnel between two s. The topology is as follows.
60
) Note:
You could also use other VPN Routers to set VPN tunnels with iB-WRA150NiB-WRA150N.
supports up to 10 VPN tunnels simultaneously.
Click Add New Connection in Figure 4-63 and then you will enter the screen shown in Figure
4-64.
Figure 4-64
¾ IPSec Connection Name: Enter a name for your VPN.
61
¾ Remote IPSec Gateway Address: Enter the destination gateway IP address in the box
which is the public WAN IP or Domain Name of the remote VPN server endpoint. (For
example: Input 219.134.112.247 in Device1, Input 219.134.112.246 in Device 2)
¾ Tunnel access from local IP addresses: Choose Subnet if you want the Whole LAN to join
the VPN network, or else choose Single Address if you want single IP to join the VPN
network.
¾ IP Address for VPN: Enter the IP address of your LAN. (For example: Input 192.168.1.1 in
Device1, Input 192.168.2.1 in Device2)
¾ IP Subnetmask: Enter the Subnet mask of your LAN. ( For example: Input 255.255.255.0 in
both Device1 and Device2)
¾ Tunnel access from remote IP addresses: Choose Subnet if you want the Remote Whole
LAN to join the VPN network, or else choose Single Address if you want single IP to join the
VPN network.
¾ IP Address for VPN: Enter the IP address of the Remote LAN. ( For example: Input
192.168.2.1 in Device1,Input 192.168.1.1 in Device2)
¾ IP Subnetmask: Enter the subnetmask of the remote LAN. ( For example: Input
255.255.255.0 in both Device1 and Device2)
¾ Key Exchange Method: Select Auto (IKE) or Manual.
¾ Authentication Method: Select Pre-Shared Key (recommended) or Certificate (X.509).
¾ Pre-Shared Key: Input the Pre-Shared key for Authentication. (For example: Input 12345678)
¾ Perfect Forward Secrecy: PFS is an additional security protocol.
) Note:
The VPN Servers Endpoint from both ends must use the same pre-shared keys and Perfect
Forward Secrecy settings.
Click Show Advanced Settings and then you can configure the Advanced Settings.
¾ Main Mode: Select Main Mode to configure the standard negotiation parameters for IKE
phase1.
¾ Aggressive Mode: Select Aggressive Mode to configure IKE phase1 of the VPN Tunnel to
carry out negotiation in a shorter amount of time. (Not Recommended-Less Secure)
) Note:
The difference between the two is that aggressive mode will pass more information in fewer
packets, with the benefit of slightly faster connection establishment, at the cost of transmitting the
identities of the security firewall in the clear. When using aggressive mode, some configuration
parameters such as Diffie-Hellman groups, and PFS can not be negotiated, resulting in a greater
importance of having "compatible" configuration on both ends.
62
¾ Key Life Time: Enter the number of seconds for the IPSec lifetime. It is the period of time to
pass before establishing a new IPSec security association (SA) with the remote endpoint. The
default value is 3600.
) Note:
If you want to change the default settings of Advanced Settings, please make sure that both VPN
server endpoints use the same Encryption Algorithm, Integrity Algorithm, Diffie-Hellman Group
and Key Life time in both phase1 and phase2.
Figure 4-65
4.8.1 IP Filtering
There are two submenus under IP Filtering.
Figure 4-66
The IP address filtering feature makes it possible for administrators to control user's access to the
Internet, which is based on user's IP. The IP address filtering includes LAN and WAN Restriction,
the detailed descriptions are provided below.
63
Figure 4-67
Figure 4-68
2. Enter the Filter name for the rule, it is exclusive and must be filled.
3. Select the protocol: TCP/UDP, TCP, UDP or ICMP in the drop-down list for the connection
between the Source IP address and Destination IP address.
4. Enter a Source IP Address in dotted-decimal notation format and then type the Source
Subnet Mask and Source Port (port or port: port) in the text boxes separately.
5. Enter a Destination IP Address in dotted-decimal notation format and then type the
Destination Subnet Mask and Destination Port (port or port: port) in the text boxes separately.
6. Click Save/Apply to save this entry.
) Note:
When you add a LAN Restriction entry, you must configure at least one condition on the
preceding screen except the Filter name. If you leave the Protocol blank, it means that the rule is
effective to all protocols, if you leave the Source IP Address and/or Destination IP Address blank,
it suggests that all Source IP Addresses and/or Destination IP Addresses are controlled by the
rule, if you leave the Source Port and/or Destination Port blank, it suggests that all Source Ports
and/or Destination Ports are controlled by the rule.
64
Figure 4-69
Figure 4-70
2. Enter the Filter name for the rule, it is exclusive and must be filled in.
3. Select Protocol in the drop-down list, enter Source IP address, Source Subnet Mask, Source
Port, Destination IP address, Destination Subnet Mask, and Destination Port for the rule.
4. Select at least one WAN interfaces displayed below to apply this rule.
5. Click Save/Apply to save this entry.
65
) Note:
When you add a WAN Restriction entry, you must configure at least one condition on the
preceding screen except the Filter name. If you leave Protocol blank, it means that the rule is
effective to all protocols, if you leave the Source IP address and/or Destination IP address blank, it
suggests that all Source IP addresses and/or Destination IP addresses are controlled by the rule,
if you leave the Source Port and/or Destination Port blank, it suggests that all Source Ports and/or
Destination Ports are controlled by the rule.
Figure 4-71
Domain Filtering Global Policy - The default setting is Allow.
• Allow means that all MAC layer frames will be allowed except those matching with any of the
specified rules in the following table.
• Deny means that all MAC layer frames will be deny except those matching with any of the
specified rules in the following table.
You can change the policy by clicking the Change Policy button to go to the Change Domain
Filtering Global Policy page as shown in Figure 4-72.
Figure 4-72
66
Figure 4-73
To remove an existing entry, follow the steps below.
4. Check the Remove box as shown in Figure 4-71 in the entry you want to remove.
Figure 4-74
Select the desired application and click Save/Apply to make the setting effective.
Figure 4-75
67
Figure 4-76
To add a new entry, follow the steps below.
1. Click the Add button in Figure 4-75 to go to the Add MAC Filter page as shown in Figure 4-77.
2. Select the protocol type.
3. Enter the destination MAC address.
4. Enter the source MAC address.
5. Select the frame direction.
6. Select the WAN interfaces.
7. Click Save/Apply to save your settings.
Figure 4-77
To remove an existing entry, follow the steps below.
1. Check the Remove box as shown in Figure 4-75 in the entry you want to remove.
68
Figure 4-78
For example: If you don’t want your child_1 to surf the Internet from 18:00 to 20:00 on weekdays.
You can follow the steps below.
1. Click the Add button in Figure 4-78 to go to the Time of Day Restriction page as shown in
Figure 4-79.
2. Create a User Name for your child, for example child_1.
3. If you want to restrict the Browser’s surfing time, check the Browser’s MAC Address radio
button. If you want to restrict other user’s surfing time, check the Other MAC Address radio
button and enter the MAC address of the user’s computer, for example 00:11:22:33:44:CC.
4. Select the day or days you need.
5. Enter the Start Blocking Time and End Blocking Time both in hh:mm format.
6. Click Save/Apply button. Then you will go back to the Time of Day Restrictions page and see
the list as shown in Figure 4-78.
Figure 4-79
To remove an existing entry, follow the steps below.
1. Check the box in the Remove column of the entry as shown in Figure 4-78.
2. Click the Remove button below.
69
4.9 Diagnostics
Choose “Diagnostics”, and your modem will test your DSL connection. Then you will see the test
results for the connectivity to your local network and your DSL service provider similar to the
following page.
Figure 4-80
70
Figure 4-81
4.10.1 Settings
Choose “System Tools/Maintenance→ Settings” menu, and you will see the submenus as
shown in Figure 4-82.
Figure 4-82
4.10.1.1 Backup
Choose “Settings→ Backup” menu, and you can save the current configuration of the Router as
a backup file in Figure 4-83. Click Backup Settings button to save your current configuration.
Figure 4-83
4.10.1.2 Restore
Choose “Settings→ Restore” menu, and you can update the settings for the Router as shown in
Figure 4-84. Click the Browse… button to find the file you want to update and then click Restore
to begin the updating.
Figure 4-84
71
Figure 4-85
Figure 4-86
Click the View System Log button, and you will go to the System Log page and see the logs
similar to Figure 4-87.
Figure 4-87
Click the Configure System Log button, and you will go to the Configuration page as shown in
Figure 4-88.
72
Figure 4-88
¾ Log - Check the Disable radio button to disable the system log function. The default setting is
enabled.
¾ Log Level - Select the log level, then all the events above or equal to the selected level will be
logged.
¾ Display Level - All logged events above or equal to the selected level will be displayed.
¾ Mode - Select Local, Remote or Both. If the selected mode is Remote or Both, events will be
sent to the specified IP address and UDP port of the remote syslog server. If the selected
mode is Local or Both, events will be recorded in the local memory.
Figure 4-89
73
Figure 4-90
¾ Inform: You can select the checkbox to disable or enable the Inform Interval.
¾ Inform Interval: Type the interval time of your Router contact with the ACS.
¾ ACS URL: Please accept this information from your ISP. And through ACS
(Auto-Configuration Server) you can perform auto-configuration, provision, collection, and
diagnostics to this router.
¾ ACS User Name: Please accept this User Name information from your ISP.
¾ ACS Password: Please accept the Password information from your ISP.
) Note:
If you want to log on the ACS, you must own the ACS User Name and ACS Password.
¾ Connection Request User Name: Type the Connection Request User Name, set it yourself.
¾ Connection Request Password: Type the Connection Request Password, set it yourself.
) Note:
The Connection Request User Name and Connection Request Password used for ACS log on the
Router and manage it.
Select the desired values and click Save/Apply to configure the TR-069 client options.
74
Figure 4-91
Figure 4-92
¾ Automatically synchronize with Internet time servers: Select the checkbox to make your
router synchronize its time with Internet time severs.
¾ First/Second NTP time server: Select a time server for your router.
¾ Time zone offset: Select your time zone.
75
Figure 4-93
4.10.6.1 Services
Choose “Access Control→ Services” menu, and you can enable or disable the services as
shown in Figure 4-94. Click Save/Apply to save your configurations.
Figure 4-94
4.10.6.2 Remote Management
Choose “Access Control → Remote Management” menu, and can view and configure the IP
address access control in the screen as shown in Figure 4-95. If enabled, only PCs with IP
addresses listed are allowed to access the Router from WAN side.
Figure 4-95
4.10.6.3 IP Address
Choose “Access Control→ IP Address” menu, and can view and configure the IP address
access control in the screen as shown in Figure 4-96. If enabled, only PCs with IP addresses listed
are allowed to access the Router.
76
Figure 4-96
Figure 4-97
4.10.6.4 Password
Choose “Access Control→ Password” menu, and you can change the factory default password
of the Router in the screen as shown in Figure 4-98.
77
Figure 4-98
Figure 4-99
¾ Browse: Click the button to locate the latest software for the device.
¾ Firmware Upgrade: After you have selected the latest software, click the button.
78
) Note:
1) There is no need to upgrade the firmware unless the new firmware has a new feature you
want to use. However, when experiencing problems caused by the Router itself, you can try to
upgrade the firmware.
2) Before upgrading the Router’s firmware, you should write down some of your customized
settings to avoid losing important configuration settings of the Router.
3) Do not turn off the Router or press the Reset button while the software is being updated.
4) The Router will reboot after the Upgrading is finished.
4.10.8 Save/Restart
Choose “System Tools/Maintenance→ Save/Restart”, you can see the screen (shown in Figure
4-100) which allows you to restart the Router.
Figure 4-100
) Note:
1) After you clicked the Restart button, please wait for a while before reopening your web
browser.
2) Do not turn off the Router or press the Reset button while the Router is rebooting.
3) If necessary, reconfigure your PC's IP address to match your new configuration.
79
Appendix A: FAQ
1. How do I configure the Router to access Internet by ADSL users?
1) First, configure the ADSL Modem configured in RFC1483 bridge model.
2) Connect the Ethernet cable from your ADSL Modem to the WAN port on the Router. The
telephone cord plugs into the Line port of the ADSL Modem.
3) Log in to the Router, and configure the WAN connection type as PPPoE connection mode.
The detailed steps please refer to section 4.5.1.
4) If your ADSL lease is in “pay-according-time” mode, select “Dial on Demand” for Internet
connection mode.
) Note:
If you are a Cable user, please configure the Router following the above steps.
2. The wireless stations cannot connect to the Router.
1) Make sure the "Enable Wireless Router Radio" is checked.
2) Make sure that the wireless stations' SSID accord with the Router's SSID.
3) Make sure the wireless stations have right KEY for encryption when the Router is encrypted.
4) If the wireless connection is ready, but you can’t access the Router, check the IP Address of
your wireless stations.
80
1) On the Windows taskbar, click the Start button, and then click Control Panel.
2) Click the Network and Internet Connections icon, and then click on the Network
Connections tab in the appearing window.
3) Right click the icon that showed below, select Properties on the prompt page.
Figure 0-1
4) In the prompt page that showed below, double click on the Internet Protocol (TCP/IP).
Figure 0-2
81
5) The following TCP/IP Properties window will display and the IP Address tab is open on
this window by default.
Now you have two ways to configure the TCP/IP protocol below:
Figure 0-3
) Note:
For Windows 98 OS or before, the PC and Router may need to be restarted.
1 Select Use the following IP address radio button. And the following items available.
3 Type the Router’s LAN IP address (the default IP is 192.168.1.1) into the Default gateway
field.
4 Select Use the following DNS server addresses. In the Preferred DNS Server field you can
enter the same value as the Default gateway or type the local DNS server IP address.
82
Figure 0-4
Now:
Click OK to keep your settings.
83
Appendix C: Specifications
General
ANSI T1.413, ITU G.992.1, ITU G.992.2, ITU G.992.3, ITU G.992.5,
Standards
IEEE 802.3, IEEE 802.3u, IEEE 802.11b , IEEE 802.11g , 802.11n
Protocols TCP/IP, IPoA , PPPoA , PPPoE, SNTP, HTTP, DHCP, ICMP, NAT
LAN Ports:
Ports Four 10/100M Auto-Negotiation RJ45 ports(Auto MDI/MDIX)
Line Ports: One RJ11 port
10BASE-T: UTP category 3, 4, 5 cable (maximum 100m)
EIA/TIA-568 100Ω STP (maximum 100m)
Cabling Type
100BASE-TX: UTP category 5, 5e cable (maximum 100m)
EIA/TIA-568 100Ω STP (maximum 100m)
1,2,3,4(LAN), WLAN, ADSL
LED
Power, Internet, WPS
Safety & Emissions FCC, CE
Wireless
Frequency Band 2.4~2.4835GHz
11n: up to 150Mbps(Automatic)
Radio Data Rate 11g: 54/48/36/24/18/12/9/6Mbps(Automatic)
11b: 11/5.5/2/1Mbps(Automatic)
Frequency Expansion DSSS(Direct Sequence Spread Spectrum)
Modulation DBPSK, DQPSK, CCK, OFDM, 16-QAM, 64-QAM
Security WEP/WPA/WPA2/WPA2-PSK/WPA-PSK
130M: -68dBm@10% PER
108M: -68dBm@10% PER;
54M: -68dBm@10% PER
Sensitivity @PER
11M: -85dBm@8% PER;
6M: -88dBm@10% PER
1M: -90dBm@8% PER
84
Appendix D: Glossary
¾ 802.11n - 802.11n builds upon previous 802.11 standards by adding MIMO (multiple-input
multiple-output). MIMO uses multiple transmitter and receiver antennas to allow for increased
data throughput via spatial multiplexing and increased range by exploiting the spatial diversity,
perhaps through coding schemes like Alamouti coding. The Enhanced Wireless Consortium
(EWC) [3] was formed to help accelerate the IEEE 802.11n development process and
promote a technology specification for interoperability of next-generation wireless local area
networking (WLAN) products.
¾ 802.11b - The 802.11b standard specifies a wireless networking at 11 Mbps using
direct-sequence spread-spectrum (DSSS) technology and operating in the unlicensed radio
spectrum at 2.4GHz, and WEP encryption for security. 802.11b networks are also referred to
as Wi-Fi networks.
¾ 802.11g - specification for wireless networking at 54 Mbps using direct-sequence
spread-spectrum (DSSS) technology, using OFDM modulation and operating in the
unlicensed radio spectrum at 2.4GHz, and backward compatibility with IEEE 802.11b devices,
and WEP encryption for security.
¾ Access Point - A device that allows wireless-equipped computers and other devices to
communicate with a wired network. Also used to expand the range of a wireless network.
¾ Ad-hoc Network - An ad-hoc network is a group of computers, each with a wireless adapter,
connected as an independent IEEE 802.11 wireless LAN. Ad-hoc wireless computers operate
on a peer-to-peer basis, communicating directly with each other without the use of an access
point. Ad-hoc mode is also referred to as an Independent Basic Service Set (IBSS) or as
peer-to-peer mode, and is useful at a departmental scale or SOHO operation.
¾ AES (Advanced Encryption Standard) - A security method that uses symmetric 128-bit block
data encryption.
¾ ACS (Auto-Configuration Server) - Through ACS (Auto-Configuration Server) you can
perform auto-configuration, provision, collection, and diagnostics to the device.
¾ ATM (Asynchronous Transfer Mode) - ATM is a cell based transfer mode that requires
variable length user information to be segmented and reassembled to/from short, fixed length
cells. It uses two different methods for carrying connectionless network interconnect traffic,
routed and bridged Protocol Data Units (PDUs), over an ATM network.
¾ Bridging - A device that connects different networks.
¾ Browser - An application program that provides a way to look at and interact with all the
information on the World Wide Web.
¾ DDNS (Dynamic Domain Name System) - Allows the hosting of a website, FTP server, or
e-mail server with a fixed domain name (e.g., www.xyz.com) and a dynamic IP address.
¾ Default Gateway - A device that forwards Internet traffic from your local area network.
¾ DHCP - A networking protocol that allows administrators to assign temporary IP addresses to
network computers by “leasing” an IP address to a user for a limited amount of time, instead
of assigning permanent IP addresses.
¾ DMZ (Demilitarized Zone) - Removes the Router's firewall protection from one PC, allowing it
to be “seen” from the Internet.
85
¾ DNS (Domain Name Server) - The IP address of your ISP's server, which translates the
names of websites into IP addresses.
¾ Domain - A specific name for a network of computers.
¾ DSL (Digital Subscriber Line) - An always-on broadband connection over traditional phone
lines.
¾ Dynamic IP Address - A temporary IP address assigned by a DHCP server.
¾ EAP (Extensible Authentication Protocol) - A general authentication protocol used to control
network access. Many specific authentication methods work within this framework.
¾ Encryption - Encoding data transmitted in a network.
¾ Ethernet - IEEE standard network protocol that specifies how data is placed on and retrieved
from a common transmission medium.
¾ Firewall - A set of related programs located at a network gateway server that protects the
resources of a network from users from other networks.
¾ Gateway - A device that interconnects networks with different, incompatible communications
protocols.
¾ IEEE 802.11b - The IEEE 802.11b standard specifies a wireless networking at 11 Mbps using
direct-sequence spread-spectrum (DSSS) technology and operating in the unlicensed radio
spectrum at 2.4GHz, and WEP encryption for security. IEEE 802.11b networks are also
referred to as Wi-Fi networks.
¾ IEEE 802.11g - Specification for wireless networking at 54 Mbps using direct-sequence
spread-spectrum (DSSS) technology, using OFDM modulation and operating in the
unlicensed radio spectrum at 2.4GHz, and backward compatibility with IEEE 8021b devices,
and WEP encryption for security.
¾ Infrastructure Network - An infrastructure network is a group of computers or other devices,
each with a wireless adapter, connected as an IEEE 802.11 wireless LAN. In infrastructure
mode, the wireless devices communicate with each other and to a wired network by first going
through an access point. An infrastructure wireless network connected to a wired network is
referred to as a Basic Service Set (BSS). A set of two or more BSS in a single network is
referred to as an Extended Service Set (ESS). Infrastructure mode is useful at a corporation
scale, or when it is necessary to connect the wired and wireless networks.
¾ IP Address - The address used to identify a computer or device on a network.
¾ IPoA (IP and ARP over ATM) - A protocol that provides extensions to the IP Group for
handling IP over ATM flows.
¾ ISP (Internet Service Provider) - A company that provides access to the Internet.
¾ LAN - The computers and networking products that make up your local network.
¾ MAC (Media Access Control) Address - The unique address that a manufacturer assigns to
each networking device.
¾ NAT (Network Address Translation) - NAT technology translates IP addresses of a local area
network to a different IP address for the Internet.
¾ MER (MAC Encapsulation Routing) - MER allows IP packet to be carried as bridged frames.
There are many applications, such as IPoA, DSL networks and other frame-based network.
Depending on your equipment, they can be either bridged or routed within the network.
86
¾ Network - A series of computers or devices connected for the purpose of data sharing,
storage, and/or transmission between users.
¾ Ping (Packet Internet Groper) - An Internet utility used to determine whether a particular IP
address is online.
¾ Port - The connection point on a computer or networking device used for plugging in cables or
adapters.
¾ PPPoE (Point to Point Protocol over Ethernet) - PPPoE stands for Point to Point protocol over
Ethernet, this protocol is used as a type of broadband connection that provides authentication
(username and password) in addition to data transport.
¾ PPPoA (Point to Point Protocol over ATM) - PPPoA stands for Point to Point protocol over
ATM, this protocol is also used as a type of broadband connection that provides
authentication (username and password) in addition to data transport.
¾ RADIUS (Remote Authentication Dial-In User Service) - A protocol that uses an
authentication server to control network access.
¾ RJ45 (Registered Jack-45) - An Ethernet connector that holds up to eight wires.
¾ Router - A networking device that connects multiple networks together.
¾ RPC (Remote Procedure Calls) - RPC is a powerful technique for constructing distributed,
client-server based applications. It is based on extending the notion of convention, or local
procedure calling, so that the called procedure need not exist in the same address space as
the calling procedure. The two processes may be on the same system, or they may be on
different systems with a network connecting them. By using RPC, programmers of distributed
applications avoid the details of the interface with the network. The transport independence of
RPC isolates the application from the physical and logical elements of the data
communications mechanism and allows the application to use a variety of transports.
¾ Server - Any computer whose function in a network is to provide user access to files, printing,
communications, and other services.
¾ SOHO (Small Office/Home Office) - Market segment of professionals who work at home or in
small offices.
¾ SSID - A Service Set Identification is a thirty-two character (maximum) alphanumeric key
identifying a wireless local area network. For the wireless devices in a network to
communicate with each other, all devices must be configured with the same SSID. This is
typically the configuration parameter for a wireless PC card. It corresponds to the ESSID in
the wireless Access Point and to the wireless network name.
¾ Static IP Address - A fixed address assigned to a computer or device that is connected to a
network.
¾ Static Routing - Forwarding data in a network via a fixed path.
¾ Subnet Mask - An address code that determines the size of the network.
¾ TCP (Transmission Control Protocol) - A network protocol for transmitting data that requires
acknowledgement from the recipient of data sent.
¾ TCP/IP (Transmission Control Protocol/Internet Protocol) - A set of instructions PCs use to
communicate over a network.
¾ TKIP (Temporal Key Integrity Protocol) - a wireless encryption protocol that provides dynamic
encryption keys for each packet transmitted.
87
¾ UDP (User Datagram Protocol) - A network protocol for transmitting data that does not require
acknowledgement from the recipient of the data that is sent.
¾ VCI (Virtual Channel Identifier) - The identifier of the VC contained in the ATM cell header.
¾ VPI (Virtual Path Identifier) - The identifier of the VP contained in the ATM cell header.
¾ Update - To replace existing software or firmware with a newer version.
¾ VLAN (Virtual Local Air Network) - Logical subgroups that constitute a Local Area Network
(LAN). This is done in software rather than defining a hardware solution.
¾ VLAN ID (0-4095) - Indicates the ID number of the VLAN being configured. Up to 256 VLANs
can be created.
¾ WAN (Wide Area Network) - Networks that cover a large geographical area.
¾ Web-based Utility - The web page that allows you to manage the Router.
¾ WEP (Wired Equivalent Privacy) - A data privacy mechanism based on a 64-bit or 128-bit or
152- bit shared key algorithm, as described in the IEEE 802.11g standard.
¾ Wi-Fi - A trade name for the IEEE 802.11b wireless networking standard, given by the
Wireless Ethernet Compatibility Alliance (WECA, see http://www.wi-fi.net), an industry
standards group promoting interoperability among IEEE 802.11b devices.
¾ WLAN (Wireless Local Area Network) - A group of computers and associated devices
communicate with each other wirelessly, which network serving users are limited in a local
area.
¾ WPA (Wi-Fi Protected Access) - A wireless security protocol use TKIP (Temporal Key
Integrity Protocol) encryption, which can be used in conjunction with a RADIUS server.
88