Table of Contents Introduction ............9 Features ................. 9 Device Requirements ............9 Using this Document ............10 Notational conventions ..........10 Typographical conventions .......... 10 Special messages ............10 Getting Support ..............10 Getting to know the device ........ 11 Computer / System requirements ........
Page 3
Accessing the Web pages ..........55 Testing your Setup............... 58 Default device settings ............58 Quick Setup ............60 Operation Mode Setup ............61 Gateway ................ 61 Bridge ................62 Wireless ISP..............63 WAN Interface Setup ............64 Static IP ................. 64 DHCP Client ..............
Internet using your high-speed xDSL/Cable modem connection. This User Guide will show you how to connect your WGR-8031, and how to customize its configuration to get the most out of your new product.
Acronyms are defined the first time they appear in the text and also in the glossary. For brevity, the WGR-8031 is referred to as “the device”. The term LAN refers to a group of Ethernet-connected computers at one site.
Getting to know the device Computer / System requirements Windows 98SE, Windows Me, Windows 2000, Windows XP, Windows Vista, Windows 7, Windows 8, Windows 8.1 and Windows 10 Package Contents 1. WGR-8031 2. Quick Installation Guide 4. Ethernet Cable (RJ-45) 5. Power Adapter...
LED meanings & activations Front Panel The front panel contains lights called Light Emitting Diodes (LEDs) that indicate the status of the unit. * Actual Front Panel and ANTENNA may vary depending on model. Figure 1: Front Panel and LEDs Label Color Function...
Page 13
* Actual button may vary depending on model. Figure 3: Right Panel Connections Label Function ANTENNA Option 1: 4 fixed ANTENNA (Optional) Option 2: 4 detachable ANTENNA ON/OFF SWITCH Power on/off the device POWER Connects to the supplied power adaptor LAN 4/3/2/1 Connects the device via LAN Ethernet to up to 4 PCs Connects the device via WAN Ethernet to xDSL / Cable...
Computer configurations under different OS, to obtain IP address automatically Before starting the WGR-8031 configuration, please kindly configure the PC computer as below, to have automatic IP address / DNS Server. For Windows 98SE / ME / 2000 / XP 1.
Page 15
2. Single RIGHT click on "Local Area connection", then click "Properties".
Page 16
3. Double click on "Internet Protocol (TCP/IP)".
Page 17
4. Check "Obtain an IP address automatically" and "Obtain DNS server address automatically" then click on "OK" to continue. 5. Click "Show icon in notification area when connected" (see screen image in 3. above) then Click on "OK" to complete the setup procedures.
For Windows Vista-32/64 1. Click on “Start” -> “Control Panel” -> “View network status and tasks”.
Page 19
2. In the Manage network connections, click on “Manage network connections” to continue.
Page 20
3. Single RIGHT click on "Local Area connection", then click "Properties".
Page 21
4. The screen will display the information "User Account Control" and click "Continue" to continue. 5. Double click on "Internet Protocol Version 4 (TCP/IPv4)".
Page 22
6. Check "Obtain an IP address automatically" and "Obtain DNS server address automatically" then click on "OK" to continue.
For Windows 10-32/64 1. Right click on Network icon , then click "Open Network and Sharing Center". 2. In the Control Panel Home, click on “Change adapter settings” to continue.
Page 35
3. Single RIGHT click on “Ethernet", then click "Properties".
Page 36
4. Double click on "Internet Protocol Version 4 (TCP/IPv4)".
Page 37
5. Check "Obtain an IP address automatically" and “Obtain DNS server address automatically” then click on "OK" to continue.
Connecting your device This chapter provides basic instructions for connecting the WGR-8031 to a computer or LAN and to the Internet. In addition to configuring the device, you need to configure the Internet properties of your computer(s). For more details, see the following sections: ...
Page 39
Figure 4: Overview of Hardware Connections Step 1. Connect the Ethernet cable to WAN Port Connect the RJ45 Ethernet cable from your xDSL/Cable Modem's Ethernet port to Router's WAN Port. Step 2. Connect the Ethernet cable to LAN Port Connect the supplied RJ45 Ethernet cable from your PC's Ethernet port to any of the 4 Router's LAN Ports.
Utility CD execution Connecting the Hardware 1. From any of the LAN computers, launch your web browser, type the following URL in the web address (or location) box, and press [Enter] on your keyboard: http://192.168.1.1 2. Please enter the User Name: admin and Password: admin and then click on OK button.
WAN Interface Setup Examples 8-1. DHCP client From the WAN Access Type drop-down list, select DHCP Client If you are happy with your settings, click on Next 8-2. Static IP...
Page 42
From the WAN Access Type drop-down list, select Static IP setting. Enter IP Address, Subnet Mask, Default Gateway and DNS which was given by Telecom or by your Internet Service Provider (ISP). If you are happy with your settings, click on Next 8-3.
Page 43
From the WAN Access Type drop-down list, select PPTP setting provided by your Network Administrator or ISP. Click on the ratio of Dynamic IP (DHCP) or Static IP. Enter IP Address for example 172.1.1.1 provided by your Network Administrator or ISP. (for Static IP only) Enter Subnet Mask for example 255.255.0.0 provided by your Network Administrator or ISP.
Page 44
From the WAN Access Type drop-down list, select L2TP setting provided by your Network Administrator or ISP. Click on the ratio of Dynamic IP (DHCP) or Static IP. Enter IP Address for example 172.1.1.1 provided by your Network Administrator or ISP. (for Static IP only) Enter Subnet Mask for example 255.255.0.0 provided by your Network Administrator or ISP.
8. From the Encryption list, choose the Encryption type and enter related parameters if necessary, as None / WEP / WPA2(AES) and WPA Mixed Mode (the default settings Security Mode = None). For example, the Encryption you choose is None. 9.
14. Change setting successfully! Do not turn off or reboot the Device during this time. Please wait 20 seconds ... 15. Now, the WGR-8031 has been configured completely, and suitable for Wireless and Internet Connections. Wireless Connection For easy installation it is saved to keep the settings. You can later change the wireless settings via the wireless configuration menu.
Page 48
19. If the wireless network is encrypted, enter the network key that belongs to your authentication type and key. (the default settings Security Mode = WPA Mixed mode which could be found on the bottom side of the device). You can later change this network key via the wireless configuration menu.
21. Now you are ready to use the Wireless Network to Internet or intranet. What the Internet/WAN access of your own Network now is Now you could check what the Internet/WAN access of your network is to know how to configure the WAN port of Wireless Gateway.
Internet/WAN access is the DHCP client If you cannot see any Broadband Adapter in the Network Connections, your Internet/WAN access is DHCP Client or Static IP. 3. Click Local Area Connection in LAN or High-Speed Internet and you could see string Assigned by DHCP Details.
Internet/WAN access is the Static IP If you cannot see any Broadband Adapter in the Network Connections, your Internet/WAN access is DHCP Client or Static IP. 4. Click Local Area Connection in LAN or High-Speed Internet and you could see string Manually Configured Details.
Page 53
5. Right click Local Area Connection and click Properties and then you could get the IP settings in detail and write down the IP settings as follow: IP Address: 192.168.10.110 Subnet mask: 255.255.255.0 Default gateway: 192.168.10.100 Preferred DNS server: 192.168.10.100 Alternate DNS Server: If you have it, please also write it down.
Internet/WAN access is the PPPoE client If you can see any Broadband Adapter in the Network Connections, your Internet/WAN access is PPPoE Client. 6. Click Broadband Adapter in Broadband and you could see string Assigned by Service Provider in Details. For PPPoE configuration on Wireless Gateway, you’ll need following information that you could get from your Telecom, or by your Internet Service Provider.
Getting Started with the Web pages The WGR-8031 includes a series of Web pages that provide an interface to the software installed on the device. It enables you to configure the device settings to meet the needs of your network. You can access it through your web browser from any PC connected to the device via the LAN ports.
Page 57
Figure 5: Homepage The first time that you click on an entry from the left- hand menu, a login box is displayed. You must enter your username and password to access the pages. A login screen is displayed: Figure 6: Login screen 1.
Testing your Setup Once you have connected your hardware and configured your PCs, any computer on your LAN should be able to use the DSL /Cable connection to access the Internet. To test the connection, turn on the device, wait for 30 seconds and then verify that the LEDs are illuminated as follows: Table 1.
Page 59
Option Default Setting Explanation/Instructions WAN Port IP DHCP Client This is the temporary public IP address of the WAN Address port on the device. It is an unnumbered interface that is replaced as soon as your ISP assigns a ‘real’ IP address.
Quick Setup The Quick Setup page displays useful information about the setup of your device, including: details of the device’s Internet access settings details of the device’s VoIP settings details of the device’s Wireless settings To display this page: 1.
Operation Mode Setup You can setup different modes to LAN and WLAN interface for NAT function. Gateway In this mode, the device is supposed to connect to internet via ADSL/Cable Modem. The NAT is enabled and PCs in four LAN ports share the same IP to ISP through WAN port.
Bridge In this mode, all ethernet ports and wireless interface are bridged together and NAT function is disabled. All the WAN related function and firewall are not supported. To change the Operation Mode: 1. From the left-hand menu, click on Wizard. The following page is displayed: 2.
Wireless ISP In this mode, all ethernet ports are bridged together and the wireless client will connect to ISP access point. The NAT is enabled and PCs in ethernet ports share the same IP to ISP through wireless LAN. You must set the wireless to client mode first and connect to the ISP AP in Site-Survey page.
WAN Interface Setup This page is used to configure the parameters for Internet network which connects to the WAN port of your Access Point. Here you may change the access method to static IP, DHCP, PPPoE, PPTP or L2TP by click the item value of WAN Access type.
DHCP Client In this mode, the device is supposed to connect to internet via ADSL/Cable Modem. The NAT is enabled and PCs in four LAN ports share the same IP to ISP through WAN port. The connection type can be setup in WAN page by using DHCP Client.
PPTP In this mode, the device is supposed to connect to internet via ADSL/Cable Modem. The NAT is enabled and PCs in four LAN ports share the same IP to ISP through WAN port. The connection type can be setup in WAN page by using PPTP. 1.
L2TP In this mode, the device is supposed to connect to internet via ADSL/Cable Modem. The NAT is enabled and PCs in four LAN ports share the same IP to ISP through WAN port. The connection type can be setup in WAN page by using L2TP. 1.
LAN clients who may connect to your Access Point. 1. From the Band drop-down list, select a Band. 2. From the Mode drop-down list, select AP setting. 3. Enter SSID for example LevelOne 5G 4. From the Channel Width drop-down list, select a Channel Width.
Access Point. 1. From the Band drop-down list, select a Band. 2. From the Mode drop-down list, select Client setting. 3. From the Network Type drop-down list, select a Type. 4. Enter SSID for example LevelOne 5G. 5. Click Next>>.
WDS (Wireless Distribution System) WDS stands for Wireless Distribution System. It enables the access points (APs) to be connected wirelessly. WGR-8031 can also provide you services of WDS. WGR-8031 that supports WDS does not support security Note systems like WEP, WPA or WPA-Enterprise on a WDS network.
Page 71
Main WDS station: One of your WDS stations is the main base station for the WDS network. This AP is connected directly to your Internet connection, or connected to your router via a wired connection. The main station is the bridge to your Internet connection that all wireless traffic eventually flows through.
Access Point is used to configure the parameters for wireless LAN clients which may connect to your Access Point. 1. From the Band drop-down list, select a Band. 2. From the Mode drop-down list, select AP+WDS setting. 3. Enter SSID for example LevelOne 5G.
4. From the Channel Width drop-down list, select a Channel Width. 5. From the ControlSideband drop-down list, select a ControlSideband. 6. From the Channel Number drop-down list, select a Channel Number. 7. Click Next>>. Wireless 5GHz Security Setup This page allows you setup the wireless security. Turn on WEP or WPA by using Encryption Keys could prevent any unauthorized access to your wireless network.
Page 74
encrypted data can only be sent and received by users with access to a private network key. Each PC on your wireless network must be manually configured with the same key as your device in order to allow wireless encrypted data transmissions.
Configuring WEP 64bit ASCII (5 characters) security The example set in this section is for 64bit encryption. 1. From the Encryption drop-down list, select WEP setting. 2. From the Key Length drop-down list, select 64-bit setting. 3. From the Key Format drop-down list, select ASCII (5 characters) setting.
Configuring WEP 128bit ASCII (13 characters) security The example set in this section is for 128bit encryption. 1. From the Encryption drop-down list, select WEP setting. 2. From the Key Length drop-down list, select 128-bit setting. 3. From the Key Format drop-down list, select ASCII (13 characters) setting.
Configuring WPA2 (AES) Passphrase security The example set in this section is for WPA2 (AES) Passphrase encryption. 1. From the Encryption drop-down list, select WPA2 (AES) setting. 2. From the Pre-Shared Key Format drop-down list, select Passphrase setting. 3. Type the Pre-Shared Key. 4.
LAN clients who may connect to your Access Point. 1. From the Band drop-down list, select a Band. 2. From the Mode drop-down list, select AP setting. 3. Enter SSID for example LevelOne 2.4G. 4. From the Channel Width drop-down list, select a Channel Width.
Client This page is used to configure the parameters for wireless LAN clients which may connect to your Access Point. 1. From the Band drop-down list, select a Band. 2. From the Mode drop-down list, select Client setting. 3. From the Network Type drop-down list, select a Type. 4.
WDS (Wireless Distribution System) WDS stands for Wireless Distribution System. It enables the access points (APs) to be connected wirelessly. 802.11ac WLAN AP Router can also provide you services of WDS. 802.11ac WLAN AP Router that supports WDS does not support security systems like WEP, WPA or WPA-Enterprise on a WDS Note network.
Page 81
Main WDS station: One of your WDS stations is the main base station for the WDS network. This AP is connected directly to your Internet connection, or connected to your router via a wired connection. The main station is the bridge to your Internet connection that all wireless traffic eventually flows through.
You set the SSID of the remote location(s) using either a unique name or by using the same SSID as you use for your main base station. (Whoa, our heads just exploded!) Using the same SSID (a “roaming” network) is pretty cool. You associate with one AP one time and then your PC or Mac can associate with any AP on your WDS network without you having to do anything —...
2. From the Mode drop-down list, select AP+WDS setting. 3. Enter SSID for example AP_2.4G. 4. From the Channel Width drop-down list, select a Channel Width. 5. From the ControlSideband drop-down list, select a ControlSideband. 6. From the Channel Number drop-down list, select a Channel Number.
Page 84
There are two methods of wireless security to choose from: Wired Equivalent Privacy (WEP); data is encrypted into blocks of either 64 bits length or 128 bits length. The encrypted data can only be sent and received by users with access to a private network key.
If you want to use WPA (AES) - Wi-Fi Protected Access 2 (AES) HEX (64 characters) encryption, follow the instructions in Configuring WPA2 (AES) HEX (64 characters) security. Configuring WEP 64bit ASCII (5 characters) security The example set in this section is for 64bit encryption. 1.
6. Change setting successfully! Do not turn off or reboot the Device during this time. Please wait 20 seconds ... Configuring WEP 128bit ASCII (13 characters) security The example set in this section is for 128bit encryption. 1. From the Encryption drop-down list, select WEP setting. 2.
6. Change setting successfully! Do not turn off or reboot the Device during this time. Please wait 20 seconds ... Configuring WEP 128bit Hex (26 characters) security The example set in this section is for 128bit encryption. 1. From the Encryption drop-down list, select WEP setting. 2.
Page 88
Configuring WPA2 (AES) Passphrase security The example set in this section is for WPA2 (AES) Passphrase encryption. 1. From the Encryption drop-down list, select WPA2 (AES) setting. 2. From the Pre-Shared Key Format drop-down list, select Passphrase setting. 3. Type the Pre-Shared Key. 4.
Configuring WPA2 (AES) HEX (64 characters) security The example set in this section is for WPA2 (AES) HEX (64 characters) encryption. 1. From the Encryption drop-down list, select WPA2 (AES) setting. 2. From the Pre-Shared Key Format drop-down list, select HEX (64 characters) setting.
Operation Mode This chapter describes how to configure the way that your device connects to the Internet. There are Three options of Operation Mode: Gateway, Bridge and Wireless ISP. Setting Operation Mode To change the Operation Mode: 1. From the head menu, click on SETUP. 2.
Wireless Network - wlan1(5GHz) This chapter assumes that you have already set up your Wireless PCs and installed a compatible Wireless card on your device. See Configuring Wireless PCs. Basic Settings The Wireless Network page allows you to configure the Wireless features of your device.
Page 92
Figure 8: Wireless Network page Field Description Disable Enable/Disable the Wireless LAN Interface. Wireless LAN Default: Disable Interface Band Specify the WLAN Mode Mode Configure the Wireless LAN Interface to AP, Client, WDS or AP + WDS mode Network Type Configure the Network Type to Infrastructure or Ad hoc.
Advanced Settings These settings are only for more technically advanced users who have a sufficient knowledge about wireless LAN. These settings should not be changed unless you know what effect the changes will have on your Access Point. To access the Wireless Network Advanced Settings page: 1.
Aggregation Disable or Enable Aggregation Short GI Disable or Enable Short GI WLAN Partition Disable or Enable WLAN Partition STBC Disable or Enable STBC LDPC Disable or Enable LDPC Disable or Enable TX Beamforming Beamforming RF Output TX Power measurement. Power Security This page allows you setup the wireless security.
Page 95
Field Description Select SSID Select the SSID Encryption Configure the Encryption to Disable, WEP, WPA , WPA2 or WPA-Mixed Use 802.1x Use 802.1x Authentication by WEP 64bits or WEP 128bits Authentication Authentication Configure the Authentication Mode to Open System, Shared Key or Auto Key Length Select the Key Length 64-bit or 128-bit...
WEP + Encryption Key WEP aims to provide security by encrypting data over radio waves so that it is protected as it is transmitted from one end point to another. However, it has been found that WEP is not as secure as once believed.
9. Change setting successfully! Do not turn off or reboot the Device during this time. Please wait 20 seconds ... WEP + Use 802.1x Authentication WEP aims to provide security by encrypting data over radio waves so that it is protected as it is transmitted from one end point to another.
WPA2/WPA Mixed + Personal (Pre-Shared Key) Wi-Fi Protected Access (WPA and WPA2) is a class of systems to secure wireless (Wi-Fi) computer networks. WPA is designed to work with all wireless network interface cards, but not necessarily with first generation wireless access points.
7. Click on Save & Apply button to confirm and return. 8. Change setting successfully! Do not turn off or reboot the Device during this time. Please wait 20 seconds ... WPA2/WPA Mixed + Enterprise (RADIUS) Wi-Fi Protected Access (WPA and WPA2) is a class of systems to secure wireless (Wi-Fi) computer networks.
Page 100
5. Enter the Port, IP Address and Password of RADIUS Server: 6. Change setting successfully! Do not turn off or reboot the Device during this time. Please wait 20 seconds ...
Access Control For security reason, using MAC ACL's (MAC Address Access List) creates another level of difficulty to hacking a network. A MAC ACL is created and distributed to AP so that only authorized NIC's can connect to the network. While MAC address spoofing is a proven means to hacking a network this can be used in conjunction with additional security measures to increase the level of complexity of the network security...
Allow Listed If you choose 'Allowed Listed', only those clients whose wireless MAC addresses are in the access control list will be able to connect to your Access Point. 1. From the Wireless Access Control Mode drop-down list, select Allowed Listed setting. 2.
Deny Listed When 'Deny Listed' is selected, these wireless clients on the list will not be able to connect the Access Point. 1. From the Wireless Access Control Mode drop-down list, select Deny Listed setting. 2. Enter the MAC Address. 3.
WDS settings Wireless Distribution System uses wireless media to communicate with other APs, like the Ethernet does. To do this, you must set these APs in the same channel and set MAC address of other APs which you want to communicate with in the table and then enable the WDS.
Configure WDS (Wireless Distribution System) only 1. From the head menu, click on Wlan1. 2. From the left-hand menu, click on Basic Settings. 3. From the Mode drop-down list, select WDS. 4. From the Channel Number drop-down list, select a Channel. 5.
Page 106
8. From the left-hand menu, click on WDS settings. 9. Check on the option Enable WDS. 10. Click the Set Security. 11. This page allows you setup the wireless security for WDS. When enabled, you must make sure each WDS device has adopted the same encryption algorithm and Key.
Page 107
14. Change setting successfully! Do not turn off or reboot the Device during this time. Please wait 20 seconds ...
Page 108
15. From the head menu, click on Wlan1. 16. From the left-hand menu, click on WDS settings. 17. Check on the option Enable WDS. 18. Enter the MAC Address. 19. Enter the Comment. 20. Click the Save & Apply. 21. Change setting successfully! Do not turn off or reboot the Device during this time.
23. From the left-hand menu, click on WDS settings. 24. The MAC Address that you created has been added in the Current Access Control List. Configure AP (Access Point) + WDS (Wireless Distribution System) 1. From the head menu, click on Wlan1. 2.
Page 110
7. Change setting successfully! Click on Reboot Now button to confirm. 8. From the head menu, click on Wlan1. 9. From the left-hand menu, click on WDS settings. 10. Check on the option Enable WDS. 11. Click the Set Security.
Page 111
12. This page allows you setup the wireless security for WDS. When enabled, you must make sure each WDS device has adopted the same encryption algorithm and Key. 13. Configure each field with the Encryption that you selected. 14. Click Save & Apply button. 15.
Page 112
16. From the head menu, click on Wlan1. 17. From the left-hand menu, click on WDS settings. 18. Check on the option Enable WDS. 19. Enter the MAC Address. 20. Enter the Comment. 21. Click the Save & Apply. 22. Change setting successfully! Do not turn off or reboot the Device during this time.
Page 113
23. From the head menu, click on Wlan1. 24. From the left-hand menu, click on WDS settings. 25. The MAC Address that you created has been added in the Current Access Control List.
Site Survey This page provides tool to scan the wireless network. If any Access Point or IBSS is found, you could choose to connect it manually when client mode is enabled. To access the Wireless Network WDS settings page: 1. From the head menu, click on Wlan1. From the left-hand menu, click on Site Survey.
Configure Wireless ISP + Wireless client + Site Survey 2. From the head menu, click on SETUP. 3. From the left-hand Operation Mode menu, click on Wireless ISP Settings. 4. Config WAN Interface. 5. Click Save & Apply button. 6. Change setting successfully! Do not turn off or reboot the Device during this time.
Page 116
8. From the left-hand menu, click on Basic Settings. 9. From the Mode drop-down list, select Client. 10. Enter SSID of the AP that you want to connect to for example AP_5G_A81261. If you don’t know what the SSID of the AP that you want to connect to, please skip this step. 11.
Page 117
12. Please wait 20 seconds ... 13. From the head menu, click on WAN1. 14. From the left-hand menu, click on Site Survey. 15. Click Site Survey button.
Page 118
16. Now you could see the APs that scanned by the Wireless Gateway were listed below. 17. Click on the ratio of AP’s SSID under the item Select that you want the Wireless Gateway to connect to. 18. Click Next button. 19.
This page allows you to change the setting for WPS (Wi-Fi Protected Setup). Using this feature could let your wireless client automatically synchronize its setting and connect to the Access Point in a minute without any hassle. To access the Wireless Network WPS page: 1.
Field Description Push Button Clicking this button will invoke the PBC method of WPS. It is only Configuration used when AP acts as a registrar. Whenever users want to enable/disable WPS or change AP’s PIN, Save & Apply they need to apply this button to commit changes. It restores the original values of “Self-PIN Number”...
Other modes such as WDS mode, Infrastructure-Adhoc mode, and the wireless virtual interface of Universal Repeater mode are not implemented with WPS features. If those unsupported modes are enforced by users, WPS will be disabled. Under the configuration of every WPS- supported mode, Wireless Gateway has Push Button method and PIN method.
Infrastructure-Client mode In Infrastructure-Client mode, Wireless Gateway only supports enrollee’s role. If users click “Start PIN”, click “Start PBC”, or press the physical button on Wireless Gateway, it will start to seek WPS AP. Once users apply the same method on registrar side, Wireless Gateway will receive the wireless profile upon successfully doing the registration protocol.
Wireless Basic Settings - wlan1 page Users need to make sure the “Broadcast SSID” file is set to “Enabled”. Otherwise, it might prevent WPS from working properly.
Operations of AP - AP being an enrollee In this case, AP will be configured by any registrar either through in-band EAP or UPnP. Here, users do not need to do any action on AP side. They just need AP’s device PIN and enter it into registrar.
Page 126
4. Plug the Ethernet cable into AP’s LAN port and make sure the IP connection is valid with Vista. 5. Make sure WCN is enabled. Users may need to enable it at the first time. They could open the “Control Panel”, click “Classic View“, open “Administrative Tools”, double click “Services”, ”, a User Account Control pop up and click “Continue“, edit properties of “Windows Connect Now”,...
Page 127
6. If the previous steps are done, open Windows Explorer. Go to the Network section. 7. Click on “Network discovery and file sharing are turned off. Network computers and devices are not visible. Click to Change…“...
Page 128
8. Click on “Turn on network discovery and file sharing“...
Page 129
9. Click on “No, make the network that I am connected to a private network“...
Page 130
10. AP’s icon will show up. Double click on it.
Page 131
11. Users could also Click “Add a wireless device” if the icon is not there. Click “next”.
Page 132
12. Enter AP’s Self-PIN Number and click “next”.
Page 133
13. Choose a name that people who connect to your network will recognize.
Page 134
14. Enter the Passphrase and then click Next.
Page 135
15. A User Account Control screen pops up, click Continue. 16. AP is successfully configured by WCN.
Page 136
17. Finally, AP will become configured (see WPS Status). The authentication algorithm, encryption algorithm, and key assigned by WCN will be displayed below “Current Key Info”.
Page 137
18. The SSID field of Wireless Basic Settings page will also be modified with the value assigned by WCN.
19. The security settings on the Wireless Security Page will be modified by WCN, too. The warning message will show up if users try to modify the security settings. The reason is the same as we explained in the previous section. Operations of AP - AP being a registrar AP mode Whenever users enter station’s PIN into AP’s Wi-Fi Protected...
Page 139
6. Users must start the PIN method on the station side within two minutes. 7. Users must start the PIN method on the station side within two minutes.
Page 140
8. If the device PIN is correct and the WPS handshake is successfully done on the station side, User’s Wi-Fi Protected status will be shown as below.
Page 141
9. If the device PIN is correct and the WPS handshake is successfully done, AP’s Wi-Fi Protected Setup page will be shown as below. Other pages such as Wireless Basic Settings page and Wireless Security Setup page will also be updated appropriately as described in previous sections.
Push Button method Wireless Gateway supports a virtual button “Start PBC” on the Wi-Fi Protected Setup page for Push Button method. If users push a virtual button “Start PBC”, AP will initiate a WPS session and wait for any station to join. At this moment, AP will detect whether there is more than one station that starts the PBC method.
Page 143
5. Users must start the PBC method on the station side within two minutes. 6. Users must start the PBC method on the station side within two minutes.
Page 144
7. If the device PCB and the WPS handshake is successfully done on the station side, User’s Wi-Fi Protected status will be shown as below.
Page 145
8. If the device PIN is correct and the WPS handshake is successfully done, AP’s Wi-Fi Protected Setup page will be shown as below. Other pages such as Wireless Basic Settings page and Wireless Security Setup page will also be updated appropriately as described in previous sections.
Wireless Schedule This page allows you setup the wireless schedule rule. Please do not forget to configure system time before enable this feature. To access the Wireless Schedule page: 1. From the head menu, click on WAN1. 2. From the left-hand menu, click on Wireless Schedule. The following page is displayed:...
Wireless Network – wlan2(2.4GHz) This chapter assumes that you have already set up your Wireless PCs and installed a compatible Wireless card on your device. See Configuring Wireless PCs. Basic Settings The Wireless Network page allows you to configure the Wireless features of your device.
Page 149
Field Description Disable Enable/Disable the Wireless LAN Interface. Wireless LAN Default: Disable Interface Band Specify the WLAN Mode Mode Configure the Wireless LAN Interface to AP, Client, WDS or AP + WDS mode Network Type Configure the Network Type to Infrastructure or Ad hoc. SSID Specify the network name.
Advanced Settings These settings are only for more technically advanced users who have a sufficient knowledge about wireless LAN. These settings should not be changed unless you know what effect the changes will have on your Access Point. To access the Wireless Network Advanced Settings page: 1.
The Fragmentation Threshold defines the number of bytes used for the fragmentation boundary for directed messages. RTS stands for “Request to Send”. This parameter controls what size RTS Threshold data packet the low level RF protocol issues to an RTS packet. The default is 2347.
Page 152
2. From the left-hand menu, click on Security. The following page is displayed: Field Description Select SSID Select the SSID Encryption Configure the Encryption to Disable, WEP, WPA , WPA2 or WPA-Mixed Use 802.1x Use 802.1x Authentication by WEP 64bits or WEP 128bits Authentication Authentication Configure the Authentication Mode to Open System, Shared Key or...
Enable Pre- According to some of the preferred embodiments, a method for Authentication proactively establishing a security association between a mobile node in a visiting network and an authentication agent in another network to which the mobile node can move includes: negotiating pre- authentication using a flag in a message header that indicates whether the communication is for establishing a pre-authentication security association;...
7. Change setting successfully! Please wait 20 seconds…. WEP + Use 802.1x Authentication WEP aims to provide security by encrypting data over radio waves so that it is protected as it is transmitted from one end point to another. However, it has been found that WEP is not as secure as once believed.
7. Change setting successfully! Please wait 20 seconds…. WPA2/WPA Mixed + Personal (Pre-Shared Key) Wi-Fi Protected Access (WPA and WPA2) is a class of systems to secure wireless (Wi-Fi) computer networks. WPA is designed to work with all wireless network interface cards, but not necessarily with first generation wireless access points.
5. From the Pre-Shared Key Format drop-down list, select Passphrase or Hex (64 characters) setting. 6. Enter the Pre-Shared Key depending on selected Passphrase or Hex (64 characters). 7. Click on Save & Apply button to confirm and return. 8. Change setting successfully! Please wait 20 seconds…. WPA2/WPA Mixed + Enterprise (RADIUS) Wi-Fi Protected Access (WPA and WPA2) is a class of systems to secure wireless (Wi-Fi) computer networks.
4. Check the option of TKIP and/or AES in WPA/WPA2 Cipher Suite if your Encryption is WPA Mixed: 5. Enter the Port, IP Address and Password of RADIUS Server: 6. Change setting successfully! Please wait 20 seconds…. Access Control For security reason, using MAC ACL's (MAC Address Access List) creates another level of difficulty to hacking a network.
8. From the left-hand menu, click on Access Control. The following page is displayed: Allow Listed If you choose 'Allowed Listed', only those clients whose wireless MAC addresses are in the access control list will be able to connect to your Access Point. 1.
6. Change setting successfully! Please wait 20 seconds…. 7. The MAC Address that you created has been added in the Current Access Control List. Deny Listed When 'Deny Listed' is selected, these wireless clients on the list will not be able to connect the Access Point. 1.
6. The MAC Address that you created has been added in the Current Access Control List. WDS settings Wireless Distribution System uses wireless media to communicate with other APs, like the Ethernet does. To do this, you must set these APs in the same channel and set MAC address of other APs which you want to communicate with in the table and then enable the WDS.
Configure WDS (Wireless Distribution System) only 1. From the head menu, click on Wlan2. 2. From the left-hand menu, click on Basic Settings. 3. From the Mode drop-down list, select WDS. 4. From the Channel Number drop-down list, select a Channel. 5.
Page 163
7. From the head menu, click on Wlan2. 8. From the left-hand menu, click on WDS settings. 9. Check on the option Enable WDS. 10. Click the Set Security.
Page 164
11. This page allows you setup the wireless security for WDS. When enabled, you must make sure each WDS device has adopted the same encryption algorithm and Key. 12. Configure each field with the Encryption that you selected. 13. Click Save & Apply button. 14.
Page 165
15. From the head menu, click on Wlan2. 16. From the left-hand menu, click on WDS settings. 17. Check on the option Enable WDS. 18. Enter the MAC Address. 19. Enter the Comment. 20. Click the Save & Apply. 21. Change setting successfully! Please wait 20 seconds….
Page 166
22. From the head menu, click on Wlan2. 23. From the left-hand menu, click on WDS settings. 24. The MAC Address that you created has been added in the Current Access Control List.
Configure AP (Access Point) + WDS (Wireless Distribution System) 1. From the head menu, click on Wlan2. 2. From the left-hand menu, click on Basic Settings. 3. From the Mode drop-down list, select AP+WDS. 4. Enter SSID for example AP_2.4G. 5.
Page 168
7. Change setting successfully! Please wait 20 seconds…. 8. From the head menu, click on Wlan2. 9. From the left-hand menu, click on WDS settings. 10. Check on the option Enable WDS. 11. Click the Set Security.
Page 169
12. This page allows you setup the wireless security for WDS. When enabled, you must make sure each WDS device has adopted the same encryption algorithm and Key. 13. Configure each field with the Encryption that you selected. 14. Click Save & Apply button. 15.
Page 170
16. From the head menu, click on Wlan2. 17. From the left-hand menu, click on WDS settings. 18. Check on the option Enable WDS. 19. Enter the MAC Address. 20. Enter the Comment. 21. Click the Save & Apply. 22. Change setting successfully! Please wait 20 seconds….
Page 171
23. From the head menu, click on Wlan2. 24. From the left-hand menu, click on WDS settings. 25. The MAC Address that you created has been added in the Current Access Control List.
Site Survey This page provides tool to scan the wireless network. If any Access Point or IBSS is found, you could choose to connect it manually when client mode is enabled. To access the Wireless Network WDS settings page: 1. From the head menu, click on Wlan2. 2.
Configure Wireless ISP + Wireless client + Site Survey 1. From the head menu, click on SETUP. 2. From the left-hand Operation Mode menu, click on Wireless ISP Settings. 3. Config WAN Interface. 4. Click Save & Apply button. 5. Change setting successfully! Please wait 20 seconds…. 6.
Page 174
8. From the Mode drop-down list, select Client. 9. Enter SSID of the AP that you want to connect to for example AP_2.4G. If you don’t know what the SSID of the AP that you want to connect to, please skip this step. 10.
Page 175
11. Please wait 20 seconds ... 12. From the head menu, click on WAN2. 13. From the left-hand menu, click on Site Survey. 14. Click Site Survey button.
Page 176
15. Now you could see the APs that scanned by the Wireless Gateway were listed below. 16. Click on the ratio of AP’s SSID under the item Select that you want the Wireless Gateway to connect to. 17. Click Next button. 18.
This page allows you to change the setting for WPS (Wi-Fi Protected Setup). Using this feature could let your wireless client automatically synchronize its setting and connect to the Access Point in a minute without any hassle. To access the Wireless Network WPS page: 1.
Field Description Push Button Clicking this button will invoke the PBC method of WPS. It is only Configuration used when AP acts as a registrar. Whenever users want to enable/disable WPS or change AP’s PIN, Save & Apply they need to apply this button to commit changes. It restores the original values of “Self-PIN Number”...
Other modes such as WDS mode, Infrastructure-Adhoc mode, and the wireless virtual interface of Universal Repeater mode are not implemented with WPS features. If those unsupported modes are enforced by users, WPS will be disabled. Under the configuration of every WPS- supported mode, Wireless Gateway has Push Button method and PIN method.
Infrastructure-Client mode In Infrastructure-Client mode, Wireless Gateway only supports enrollee’s role. If users click “Start PIN”, click “Start PBC”, or press the physical button on Wireless Gateway, it will start to seek WPS AP. Once users apply the same method on registrar side, Wireless Gateway will receive the wireless profile upon successfully doing the registration protocol.
Wireless Basic Settings - wlan1 page Users need to make sure the “Broadcast SSID” file is set to “Enabled”. Otherwise, it might prevent WPS from working properly.
Operations of AP - AP being an enrollee In this case, AP will be configured by any registrar either through in-band EAP or UPnP. Here, users do not need to do any action on AP side. They just need AP’s device PIN and enter it into registrar.
Page 184
4. Plug the Ethernet cable into AP’s LAN port and make sure the IP connection is valid with Vista. 5. Make sure WCN is enabled. Users may need to enable it at the first time. They could open the “Control Panel”, click “Classic View“, open “Administrative Tools”, double click “Services”, ”, a User Account Control pop up and click “Continue“, edit properties of “Windows Connect Now”,...
Page 185
6. If the previous steps are done, open Windows Explorer. Go to the Network section. 7. Click on “Network discovery and file sharing are turned off. Network computers and devices are not visible. Click to Change…“...
Page 186
8. Click on “Turn on network discovery and file sharing“...
Page 187
9. Click on “No, make the network that I am connected to a private network“...
Page 188
10. AP’s icon will show up. Double click on it.
Page 189
11. Users could also Click “Add a wireless device” if the icon is not there. Click “next”.
Page 190
12. Enter AP’s Self-PIN Number and click “next”.
Page 191
13. Choose a name that people who connect to your network will recognize.
Page 192
14. Enter the Passphrase and then click Next.
Page 193
15. A User Account Control screen pops up, click Continue. 16. AP is successfully configured by WCN.
Page 194
17. Finally, AP will become configured (see WPS Status). The authentication algorithm, encryption algorithm, and key assigned by WCN will be displayed below “Current Key Info”.
Page 195
18. The SSID field of Wireless Basic Settings page will also be modified with the value assigned by WCN.
19. The security settings on the Wireless Security Page will be modified by WCN, too. The warning message will show up if users try to modify the security settings. The reason is the same as we explained in the previous section. Operations of AP - AP being a registrar AP mode Whenever users enter station’s PIN into AP’s Wi-Fi Protected...
Page 197
1. From the head menu, click on WAN2. 2. From the left-hand menu, click on WPS. The following page is displayed: 3. Make sure AP is in un-configured state. 4. Enter the Client PIN Number. 5. Click Start PIN.
Page 198
6. Users must start the PIN method on the station side within two minutes. 7. Users must start the PIN method on the station side within two minutes.
Page 199
8. If the device PIN is correct and the WPS handshake is successfully done on the station side, User’s Wi-Fi Protected status will be shown as below.
Page 200
9. If the device PIN is correct and the WPS handshake is successfully done, AP’s Wi-Fi Protected Setup page will be shown as below. Other pages such as Wireless Basic Settings page and Wireless Security Setup page will also be updated appropriately as described in previous sections.
Push Button method Wireless Gateway supports a virtual button “Start PBC” on the Wi-Fi Protected Setup page for Push Button method. If users push a virtual button “Start PBC”, AP will initiate a WPS session and wait for any station to join. At this moment, AP will detect whether there is more than one station that starts the PBC method.
Page 202
5. Users must start the PBC method on the station side within two minutes. 6. Users must start the PBC method on the station side within two minutes.
Page 203
7. If the device PCB and the WPS handshake is successfully done on the station side, User’s Wi-Fi Protected status will be shown as below.
Page 204
8. If the device PIN is correct and the WPS handshake is successfully done, AP’s Wi-Fi Protected Setup page will be shown as below. Other pages such as Wireless Basic Settings page and Wireless Security Setup page will also be updated appropriately as described in previous sections.
Wireless Schedule This page allows you setup the wireless schedule rule. Please do not forget to configure system time before enable this feature. To access the Wireless Schedule page: 1. From the head menu, click on WAN2. 2. From the left-hand menu, click on Wireless Schedule. The following page is displayed:...
LAN Interface This chapter is to configure the parameters for local area network which connects to the LAN port of your Access Point. Here you may change the setting for IP address, subnet mask, DHCP, etc... You should only change the addressing details if your ISP asks you to, or if you are familiar with network configuration.
Page 207
Field Description IP Address The LAN IP address Default: 192.168.1.1 Subnet Mask The LAN netmask Default: 255.255.255.0 Default Gateway The LAN Gateway Default: 0.0.0.0 DHCP DHCP Type: Disable, DHCP Client or Server Default: DHCP Server DHCP Client Range Specify the starting/ending IP address of the IP address pool. Default Start IP: 192.168.100 Default Ending IP: 192.168.200 DHCP Lease Time...
Changing the LAN IP address and subnet mask To check the configuration of LAN Interface: 1. From the head menu, click on TCP/IP. 2. From the left-hand menu, click on LAN Setting. The following page is displayed:...
Page 209
3. Type IP Address and Change default LAN port IP address. 4. Click in the IP Address and Subnet Mask box and type a new IP Address and Subnet Mask. 5. Change the default DHCP Client Range. 6. Click Save & Apply. 7.
Page 210
You may also need to renew your DHCP lease: Windows 95/98 a. Select Run... from the Start menu. b. Enter winipcfg and click OK. c. Select your ethernet adaptor from the pull-down menu d. Click Release All and then Renew All. e.
Show Client To the IP Address, MAC Address, and Expired Time of the DHCP lease for each client computer/device: 1. From the head menu, click on TCP/IP. 2. From the left-hand menu, click on LAN Setting. The following page is displayed: 3.
WAN Interface This chapter describes how to configure the way that your device connects to the Internet. Your ISP determines what type of Internet access you should use and provides you with any information that you need in order to configure the Internet access to your device.
Page 213
1. From the head menu, click on TCP/IP. 2. From the left-hand menu, click on WAN Setting. The following page is displayed:...
Page 214
Option Description Static IP Choose this option if you are a leased line user with a fixed IP address. Access DHCP Client Choose this option if you are connected to the Internet Type through a Cable modem line. PPPoE Choose this option if you are connected to the Internet through a DSL line PPTP Choose this option if you are connected to the PPTP...
Page 215
Clone MAC Address Clone MAC lets the device identify itself as another computer or device Enable uPNP Enable or Disable uPNP Enable IGMP Proxy Enable or Disable IGMP Proxy Enable Ping Access on WAN Enable or Disable Ping Access on WAN Enable Web Server Access on Enable or Disable Web Server Access on WAN Enable IPsec pass through on...
Configuring Static IP connection If you are a leased line user with a fixed IP address, enter in the IP address, subnet mask, gateway address, and DNS (domain name server) address(es) provided to you by your ISP. If your ISP wants you to connect to the Internet using Static IP, follow the instructions below.
Page 217
3. From the WAN Access Type drop-down list, select Static IP setting. 4. Enter WAN IP Address, WAN Subnet Mask, Default Gateway and DNS which was given by Telecom or by your Internet Service Provider (ISP). 5. Click Save & Apply. 6.
Configuring DHCP Client connection Dynamic Host Configuration Protocol (DHCP), Dynamic IP (Get WAN IP Address automatically). If you are connected to the Internet through a Cable modem line, then a dynamic IP will be assigned. If your ISP wants you to connect to the Internet using DHCP Client, follow the instructions below.
Page 219
3. From the WAN Access Type drop-down list, select DHCP Client setting. 4. Click Save & Apply. 5. Change setting successfully! Please wait 20 seconds….
Configuring PPPoE connection If your ISP’s Internet service uses PPPoE you need to set up a PPP login account. The first time that you login to the Internet, your ISP will ask you to enter a username and password so they can check that you are a legitimate, registered Internet service user.
Page 221
3. From the WAN Access Type drop-down list, select PPPoE setting. 4. Enter User Name/Password provided by your ISP. Type them in the relevant boxes. 5. Click Save & Apply. 6. Change setting successfully! Please wait 20 seconds….
Configuring PPTP connection If your ISP/Network Administrator wants you to connect to the Internet using PPTP, follow the instructions below. 1. From the head menu, click on TCP/IP. 2. From the left-hand menu, click on WAN Setting. The following page is displayed:...
Page 223
3. From the WAN Access Type drop-down list, select PPTP setting. 4. Enter IP Address/Subnet Mask/Default Gateway provided by your ISP. Type them in the relevant boxes. (for Static IP only) 5. Select PPTP Server Mode. 6. Enter Server Domain Address/User Name/Password provided by your ISP.
Configuring L2TP connection If your ISP/Network Administrator wants you to connect to the Internet using L2TP, follow the instructions below. 1. From the head menu, click on TCP/IP. 2. From the left-hand menu, click on WAN Setting. The following page is displayed:...
Page 227
3. From the WAN Access Type drop-down list, select L2TP setting. 4. Enter IP Address/Subnet Mask/Default Gateway provided by your ISP. Type them in the relevant boxes. (for Static IP only) 5. Select L2TP Server Mode. 6. Enter Server Domain Address/User Name/Password provided by your ISP.
8. Change setting successfully! Please wait 20 seconds…. Clone MAC Address Some particularly ISPs do not want you to have a home network and have a DSL/Cable modem that allows only 1 MAC to talk on the internet. If you change network cards, you have to call them up to change the MAC.
Page 230
2. From the left-hand menu, click on WAN Setting. The following page is displayed:...
Page 231
3. Enter the MAC for example 0123456789ab that you want to be instead of in the Clone MAC Address field. 4. If you enter 12 digits of 0 in the Clone MAC Address field, it’ll disable Clone MAC Address function. 5.
IPV6 IPV6 WAN SETTING This page is used to configure the parameters for Internet network which connects to the WAN port of your Access Point. Here you may change the access method to static IP, DHCP, PPPoE, Bridge by click the item value of WAN Access type. 1.
Port Filtering Entries in Current Filter Table are used to restrict certain ports and types of data packets from your local network to Internet through the Gateway. Use of such filters can be helpful in securing or restricting your local network. 1.
You must ensure that the single port or range specified does not overlap with a port or range for an existing common or custom Note application. Check the common port ranges listed in. Port filtering for TCP port 80 Please follow example below to deny the TCP port 80 for both Outbound and Inbound packet.
Page 239
3. Check the option Enable Port Filtering to enable the port filtering. 4. Enter 80 and 80 in Port Range field. 5. From the Protocol drop-down list, select TCP setting. 6. Enter HTTP in Comment field. 7. Click Save & Apply. 8.
Port filtering for UDP port 53 Please follow example below to deny the UDP port 53 for both Outbound and Inbound packet. 1. From the head menu, click on Firewall. 2. From the left-hand menu, click on Port Filtering. The following page is displayed:...
Page 241
3. Check the option Enable Port Filtering to enable the port filtering. 4. Enter 53 and 53 in Port Range field. 5. From the Protocol drop-down list, select UDP setting. 6. Enter DNS Resolve in Comment field. 7. Click Save & Apply. 8.
IP Filtering Entries in this table are used to restrict certain types of data packets from your local network to Internet through the Gateway. Use of such filters can be helpful in securing or restricting your local network. The IP filter feature enables you to create rules that control the forwarding of incoming and outgoing data between the LAN and WAN side.
1. From the head menu, click on Firewall. 2. From the left-hand menu, click on IP Filtering. The following page is displayed: IP filtering for TCP with specified IP Please follow example below to deny the TCP protocol for specified IP. 1.
Page 244
2. From the left-hand menu, click on IP Filtering. The following page is displayed: 3. Check the option Enable IP Filtering to enable the IP Filtering. 4. Enter the IP Address that you want to be denied in Loal IP Address field.
Now The Local IP Address for example 10.0.0.102 that listed in the Current Filter Table cannot visit any application that use TCP protocol for example web site due to the Protocol TCP has been blocked by the IP Filtering rule that created. IP filtering for UDP with specified IP Please follow example below to deny the UDP protocol for specified IP.
3. Check the option Enable IP Filtering to enable the IP Filtering. 4. Enter the IP Address that you want to be denied in Local IP Address field. 5. From the Protocol drop-down list, select UDP setting. 6. Enter any comment in Comment field. 7.
Page 248
3. Check the option Enable IP Filtering to enable the IP Filtering. 4. Enter the IP Address that you want to be denied in Local IP Address field. 5. From the Protocol drop-down list, select Both setting. 6. Enter any comment in Comment field. 7.
MAC Filtering Entries in this table are used to restrict certain types of data packets from your local network to Internet through the Wireless Gateway. Use of such filters can be helpful in securing or restricting your local network. 1. From the head menu, click on Firewall. 2.
MAC filtering for specified MAC Address Please follow example below to deny the specified MAC Address has the Internet Access. 1. From the head menu, click on Firewall. 2. From the left-hand menu, click on MAC Filtering. The following page is displayed:...
Page 251
3. Check the option Enable MAC Filtering to enable the MAC Filtering. 4. Enter the MAC Address that you want to be denied in MAC Address field. 5. Enter any comment in Comment field. 6. Click Save & Apply. 7. Now the MAC Filter that you created has been added and listed in the Current Filter Table.
Port Forwarding Entries in this table allow you to automatically redirect common network services to a specific machine behind the NAT firewall. These settings are only necessary if you wish to host some sort of server like a web server or mail server on the private local network behind your Gateway's NAT firewall.
Page 253
2. From the left-hand menu, click on Port Forwarding. The following page is displayed:...
Port Forwarding for TCP with specified IP Please follow example below to configure the Port Forwarding to Specified IP with TCP. 1. From the head menu, click on Firewall. 2. From the left-hand menu, click on Port Forwarding. The following page is displayed:...
3. Check the option Enable Port Forwarding to enable the Enable Port Forwarding. 4. Enter the IP Address that the port you want to be forwarded in IP Address field. 5. From the Protocol drop-down list, select TCP setting. 6. Enter any comment in Comment field. 7.
Page 256
2. From the left-hand menu, click on Port Forwarding. The following page is displayed: 3. Check the option Enable Port Forwarding to enable the Enable Port Forwarding. 4. Enter the IP Address that the port you want to be forwarded in IP Address field.
URL Filtering URL filter is used to deny LAN users from accessing the internet. Block those URLs which contain keywords listed below. 1. From the head menu, click on Firewall. 2. From the left-hand menu, click on URL Forwarding. The following page is displayed:...
URL filtering for specified URL Address Please follow example below to deny LAN users from accessing the Internet. 1. From the head menu, click on Firewall. 2. From the left-hand menu, click on URL Forwarding. The following page is displayed: 3.
Page 259
7. Now the URL Filter that you created has been added and listed in the Current Filter Table. 8. Now the URL Address in the Current Filter Table cannot be visited.
A Demilitarized Zone is used to provide Internet services without sacrificing unauthorized access to its local private network. Typically, the DMZ host contains devices accessible to Internet traffic, such as Web (HTTP ) servers, FTP servers, SMTP (e- mail) servers and DNS servers. 1.
Page 261
3. Check the option Enable DMZ to enable the Enable DMZ. 4. Enter the IP Address that to be the DMZ Host in DMZ Host IP Address field. 5. Click Save & Apply.
802.1Q VLAN Entries in below table are used to config vlan settings. VLANs are created to provide the segmentation services traditionally provided by routers. VLANs address issues such as scalability, security, and network management. 1. From the head menu, click on Firewall. 2.
ROUTE SETUP This page is used to setup dynamic routing protocol or edit static route entry. 1. From the head menu, click on Firewall. 2. From the left-hand menu, click on ROUTE SETUP. The following page is displayed:...
Entries in this table improve your online gaming experience by ensuring that your game traffic is prioritized over other network traffic, such as FTP or Web. 1. From the head menu, click on Firewall. 2. From the left-hand menu, click on QOS. The following page is displayed:...
Status This page displays the current information for the device. It will display the LAN, WAN, and system firmware information. This page will display different information, according to WAN setting (Static IP, DHCP, or PPPoE). 1. From the head menu, click on Management. 2.
Statistics This page shows the packet counters for transmission and reception regarding to wireless and Ethernet networks. 1. From the head menu, click on Management. 2. From the left-hand menu, click on Statistics. The following page is displayed:...
Dynamic DNS When you want your internal server to be accessed by using DNS name rather than using the dynamic IP address, you can use the DDNS service. The DDNS server allows to alias a dynamic IP address to a static hostname. This chapter provides you an overview of the Dynamic DNS feature of the modem and configuration details related to it.
Page 270
If the dynamic DNS service provider is notified of the same IP address again and again, then it considers it an abuse and might block the host name. To avoid this scenario, the IP address that was successfully updated to the ISP is stored on the unit.
1. From the head menu, click on Management. 2. From the left-hand menu, click on DDNS. The following page is displayed: Configure DynDNS 1. From the head menu, click on Management.
Page 272
2. From the left-hand menu, click on DDNS. The following page is displayed: 3. Click on Enable DDNS 4. Select the DynDNS from the Service Provider drop-down list. 5. Type your own unique User Name, Password and Domain Name which you applied from www.dyndns.com in the relevant boxes.
Configure TZO 1. From the head menu, click on Management. 2. From the left-hand menu, click on DDNS. The following page is displayed:...
Page 274
3. Click on Enable DDNS 4. Select the TZO from the Service Provider drop-down list. 5. Type your own unique Email, Key and Domain Name which you applied from http://www.tzo.com/MainPageWebClient/clientsignup.html in the relevant boxes. They can be any combination of letters or numbers with a maximum of 20 characters.
Time Zone Setting Certain systems may not have a date or time mechanism or may be using inaccurate time/day information. the Simple Network Time Protocol feature provides a way to synchronize the device’s own time of day setting with a remote time server as described in RFC 2030 (SNTP) and RFC 1305 (NTP).
7. Change setting successfully! Please wait 20 seconds…. Denial-of-Service A "denial-of-service" (DoS) attack is characterized by an explicit attempt by hackers to prevent legitimate users of a service from using that service. Denial-of-Service 1. From the head menu, click on Management.
Page 277
2. From the left-hand menu, click on Deny Of Service. The following page is displayed:...
Page 278
3. Check the option Enable DoS Prevention. 4. Check the option of each Service. 5. Check the option Enable Source IP Blocking. 6. Click Save & Apply. 7. Change setting successfully! Please wait 20 seconds….
TR-069 CONFIG This page is used to configure the TR-069 CPE. Here you may change the setting for the ACS's parameters. 1. From the head menu, click on Management. 2. From the left-hand menu, click on TR-069 CONFIG. The following page is displayed:...
This page can be used to set remote log server and show the system log. System Log 1. From the head menu, click on Management. 2. From the left-hand menu, click on Log. The following page is displayed:...
Page 281
Option Description Enable Log Enable/Disable the feature. Default: Disable system all All system logs will be recorded in the system log wireless The wireless logs will be recorded in the system log The DoS logs will be recorded in the system log Enable Enable: Send the system log to remote log server.
Firmware Update About firmware versions Firmware is a software program. It is stored as read-only memory on your device. Your device can check whether there are later firmware versions available. If there is a later version, you can download it via the Internet and install it on your device. If there is a firmware update available you are strongly advised to install it on your device to ensure that you take full advantage of Note...
Page 284
6. Firmware update has been update complete. The following page is displayed:...
Save/Reload Settings This page allows you save current settings to a file or reload the settings from the file which was saved previously. Besides, you could reset the current configuration to factory default. If you do make changes to the default configuration but then wish to revert back to the original factory configuration, you can do so by resetting the device to factory defaults.
Page 286
2. Click on Save…. 3. If you are happy with this, click Save and then browse to where the file to be saved. Or click Cancel to cancel it.
Load Settings from File It allows you to reload the settings from the file which was saved previously. 1. From the left-hand Management menu, click on Reset factory default. The following page is displayed: Figure 12: Reset to Defaults page 2.
Page 288
3. If you are happy with this, click Upload to start to load settings from file. 4. Once it finished loading settings form file, it’ll show the message below.
Resetting to Defaults If you do make changes to the default configuration but then wish to revert back to the original factory configuration, you can do so by resetting the device to factory defaults. If you reset your device to factory defaults, all previous configuration changes that you have made are overwritten by the Note factory default configuration.
Page 290
2. Click on Reset Settings to Default. 3. This page reminds you that resetting to factory defaults cannot be undone – any changes that you have made to the basic settings will be replaced. If you are happy with this, click OK.
Password You can restrict access to your device’s web pages using password protection. With password protection enabled, users must enter a username and password before gaining access to the web pages. By default, password protection is enabled on your device, and the username and password set are as follows: Username: admin Password: admin...
Page 292
2. This page displays the current username and password settings. Change your own unique password in the relevant boxes. They can be any combination of letters or numbers with a maximum of 30 characters. The default setting uses admin for the username and admin for password. 3.
Configuring your Computers This appendix provides instructions for configuring the Internet settings on your computers to work with the Wireless Gateway. Configuring Ethernet PCs Before you begin By default, the Wireless Gateway automatically assigns the required Internet settings to your PCs. You need to configure the PCs to accept this information when it is assigned.
Page 294
3. In the Network and Dial-up Connections window, right-click the Local Area Connection icon, and then select Properties. The Local Area Connection Properties dialog box is displayed with a list of currently installed network components. If the list includes Internet Protocol (TCP/IP), then the protocol has already been enabled.
Windows Me PCs 1. In the Windows task bar, click the Start button, point to Settings, and then click Control Panel. 2. Double-click the Network and Dial-up Connections icon. 3. In the Network and Dial-up Connections window, right-click the Network icon, and then select Properties. The Network Properties dialog box displays with a list of currently installed network components.
5. Click on Microsoft in the Manufacturers list box, and then click TCP/IP in the Network Protocols list box. 6. Click OK to return to the Network dialog box, and then click OK again. You may be prompted to install files from your Windows 95/98 installation CD.
7. Open the Control Panel window, and then double-click the Network icon. 8. In the Network dialog box, click the Protocols tab. 9. In the Protocols tab, select TCP/IP, and then click Properties. 10. In the Microsoft TCP/IP Properties dialog box, click the radio button labeled Obtain an IP address from a DHCP server.
IP Addresses, Network Masks, and Subnets IP Addresses This section refers only to IP addresses for IPv4 (version 4 of the Internet Protocol). IPv6 addresses are not covered. This section assumes basic knowledge of binary numbers, bits, Note and bytes. IP addresses, the Internet's version of telephone numbers, are used to identify individual nodes (computers or devices) on the Internet.
scope of this discussion.) These classes have different uses and characteristics. Class A networks are the Internet's largest networks, each with room for over 16 million hosts. Up to 126 of these huge networks can exist, for a total of over 2 billion hosts. Because of their huge size, these networks are used for WANs and by organizations at the infrastructure level of the Internet, such as your ISP.
Page 301
255.255.255.192 or 11111111. 11111111. 11111111.11000000 The two extra bits in field4 can have four values (00, 01, 10, 11), so there are four subnets. Each subnet uses the remaining six bits in field4 for its host IDs, ranging from 1 to 62. Sometimes a subnet mask does not specify any additional network ID bits, and thus no subnets.
UPnP Control Point Software on Windows ME/XP This appendix provides instructions for configuring the UPnP on your computers to work with the Wireless Gateway. UPnP is an architecture for pervasive peer-to-peer network connectivity of intelligent appliances, Wireless devices, and PCs of all form factors.
UPnP Control Point Software on Windows XP with Firewall On Windows XP versions earlier than SP2, Firewall support is provided by the Windows XP Internet Connection Firewall. You cannot use the Windows XP Internet Connection Firewall support on a system that you intend to use as a UPnP control point.
Page 304
4. The “Networking Services” window is displayed. The subcomponents shown in the Networking Services window will be different depending on if you are using Windows XP, Windows XP (SP1), or Windows XP (SP2). If you are using Windows XP SP2, the Networking Services window will display the following list of sub-components: 5.
Page 305
For example, from the Network Connections window you should see the Internet Gateway Device:...
Troubleshooting This appendix suggests solutions for problems you may encounter in installing or using the Wireless Gateway, and provides instructions for using several IP utilities to diagnose problems. Contact Customer Support if these suggestions do not resolve the problem. Troubleshooting Suggestions Problem Troubleshooting Suggestion LEDs...
Page 307
Problem Troubleshooting Suggestion I forgot/lost my user If you have not changed the password from the default, try using “admin” the user ID ID or password. and “admin“ as password. Otherwise, you can reset the device to the default configuration by pressing the Reset Default button on the Rare panel of the device (see Rare Panel).
Diagnosing Problem using IP Utilities ping Ping is a command you can use to check whether your PC can recognize other computers on your network and the Internet. A ping command sends a message to the computer you specify. If the computer receives the message, it sends messages in reply.
Page 309
common name, and the nslookup command looks up the name in on your DNS server (usually located with your ISP). If that name is not an entry in your ISP’s DNS table, the request is then referred to another higher-level server, and so on, until the entry is found.
LICENSE STATEMENT / GPL CODE STATEMENT This product resp. the here (http://global.level1.com/downloads.php?action=init) for downloading offered software includes software code developed by third parties, including software code subject to the GNU General Public License Version 2 (“GPLv2”) and GNU Lesser General Public License 2.1 („LGPLv2.1“). WRITTEN OFFER FOR GPL/LGPL SOURCE CODE We will provide everyone upon request the applicable...
Page 311
Digital Data Communications GmbH Zeche-Norm-Str. 25 44319 Dortmund Deutschland Phone: +49 231 9075 - 0 Fax: +49 231 9075 - 184 Email: support@level1.com Web: www.level1.com NO WARRANTY This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Page 312
WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A...
Page 313
51 Franklin Street, Fifth Floor, Boston, MA 02110- 1301, USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it.
Page 314
service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things. To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights.
Page 315
Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations.
Page 316
0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", below, refers to any such program or work, and a "work based on the Program"...
Page 317
1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty;...
Page 318
a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change. b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License.
Page 319
does not normally print such an announcement, your work based on the Program is not required to print an announcement.) These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you...
Page 320
In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.
Page 321
your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, c) Accompany it with the information you received as to the offer to distribute corresponding source code.
Page 322
anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code,...
Page 323
5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying,...
Page 324
to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all.
Page 325
sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system;...
Page 326
9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.
Page 327
guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally. NO WARRANTY 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW.
Page 328
12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS...
Page 329
If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms. To do so, attach the following notices to the program.
Page 330
You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. Also add information on how to contact you by electronic and paper mail.
Page 331
disclaimer" for the program, if necessary. Here is a sample; alter the names: Yoyodyne, Inc., hereby disclaims all copyright interest in the program `Gnomovision' (which makes passes at compilers) written by James Hacker. signature of Ty Coon, 1 April 1989 Ty Coon, President of Vice This General Public License does not permit incorporating your program into proprietary programs.