LevelOne WGR-8031 User Manual

LevelOne WGR-8031 User Manual

802.11ac/n dual band wireless router
Hide thumbs Also See for WGR-8031:
Table of Contents

Advertisement

LevelOne

User Manual

WGR-8031
Version : v1.0_20160321
1

Advertisement

Table of Contents
loading

Summary of Contents for LevelOne WGR-8031

  • Page 1: User Manual

    LevelOne User Manual WGR-8031 Version : v1.0_20160321...
  • Page 2: Table Of Contents

    Table of Contents Introduction ............9 Features ................. 9 Device Requirements ............9 Using this Document ............10 Notational conventions ..........10 Typographical conventions .......... 10 Special messages ............10 Getting Support ..............10 Getting to know the device ........ 11 Computer / System requirements ........
  • Page 3 Accessing the Web pages ..........55 Testing your Setup............... 58 Default device settings ............58 Quick Setup ............60 Operation Mode Setup ............61 Gateway ................ 61 Bridge ................62 Wireless ISP..............63 WAN Interface Setup ............64 Static IP ................. 64 DHCP Client ..............
  • Page 4 Configuring WEP 64bit Hex (10 characters) security ............... 85 Configuring WEP 128bit ASCII (13 characters) security ........... 86 Configuring WEP 128bit Hex (26 characters) security ........... 87 Configuring WPA2 (AES) HEX (64 characters) security ........... 89 Operation Mode ..........90 Setting Operation Mode ............
  • Page 5 AP mode..............138 Push Button method ........... 142 Wireless Schedule ............. 146 Wireless Network – wlan2(2.4GHz) ....147 Basic Settings ..............147 Advanced Settings ............. 150 Security ................151 WEP + Encryption Key ..........153 WEP + Use 802.1x Authentication ......154 WPA2/WPA Mixed + Personal (Pre- Shared Key).............
  • Page 6 Changing the LAN IP address and subnet mask ................208 Show Client ................ 211 WAN Interface ..........212 Configuring Static IP connection ........216 Configuring DHCP Client connection ....... 218 Configuring PPPoE connection ........220 Configuring PPTP connection .......... 222 Configuring L2TP connection ...........
  • Page 7 Configure TZO ..............273 Time Zone Setting ..........275 SNTP Server and SNTP Client Configuration settings ................275 Denial-of-Service ..........276 Denial-of-Service ............... 276 TR-069 CONFIG ..........279 Log ..............280 System Log ................ 280 Firmware Update ..........283 About firmware versions ............ 283 Manually updating firmware ..........
  • Page 8 Troubleshooting ..........306 Troubleshooting Suggestions ........... 306 Diagnosing Problem using IP Utilities ......308 ping ................308 nslookup ..............308 LICENSE STATEMENT / GPL CODE STATEMENT ..........310...
  • Page 9: Introduction

    Internet using your high-speed xDSL/Cable modem connection. This User Guide will show you how to connect your WGR-8031, and how to customize its configuration to get the most out of your new product.
  • Page 10: Using This Document

    Acronyms are defined the first time they appear in the text and also in the glossary.  For brevity, the WGR-8031 is referred to as “the device”.  The term LAN refers to a group of Ethernet-connected computers at one site.
  • Page 11: Getting To Know The Device

    Getting to know the device Computer / System requirements  Windows 98SE, Windows Me, Windows 2000, Windows XP, Windows Vista, Windows 7, Windows 8, Windows 8.1 and Windows 10 Package Contents 1. WGR-8031 2. Quick Installation Guide 4. Ethernet Cable (RJ-45) 5. Power Adapter...
  • Page 12: Led Meanings & Activations

    LED meanings & activations Front Panel The front panel contains lights called Light Emitting Diodes (LEDs) that indicate the status of the unit. * Actual Front Panel and ANTENNA may vary depending on model. Figure 1: Front Panel and LEDs Label Color Function...
  • Page 13 * Actual button may vary depending on model. Figure 3: Right Panel Connections Label Function ANTENNA Option 1: 4 fixed ANTENNA (Optional) Option 2: 4 detachable ANTENNA ON/OFF SWITCH Power on/off the device POWER Connects to the supplied power adaptor LAN 4/3/2/1 Connects the device via LAN Ethernet to up to 4 PCs Connects the device via WAN Ethernet to xDSL / Cable...
  • Page 14: Computer Configurations Under Different Os, To Obtain Ip Address Automatically

    Computer configurations under different OS, to obtain IP address automatically Before starting the WGR-8031 configuration, please kindly configure the PC computer as below, to have automatic IP address / DNS Server. For Windows 98SE / ME / 2000 / XP 1.
  • Page 15 2. Single RIGHT click on "Local Area connection", then click "Properties".
  • Page 16 3. Double click on "Internet Protocol (TCP/IP)".
  • Page 17 4. Check "Obtain an IP address automatically" and "Obtain DNS server address automatically" then click on "OK" to continue. 5. Click "Show icon in notification area when connected" (see screen image in 3. above) then Click on "OK" to complete the setup procedures.
  • Page 18: For Windows Vista-32/64

    For Windows Vista-32/64 1. Click on “Start” -> “Control Panel” -> “View network status and tasks”.
  • Page 19 2. In the Manage network connections, click on “Manage network connections” to continue.
  • Page 20 3. Single RIGHT click on "Local Area connection", then click "Properties".
  • Page 21 4. The screen will display the information "User Account Control" and click "Continue" to continue. 5. Double click on "Internet Protocol Version 4 (TCP/IPv4)".
  • Page 22 6. Check "Obtain an IP address automatically" and "Obtain DNS server address automatically" then click on "OK" to continue.
  • Page 23: For Windows 7-32/64

    For Windows 7-32/64 1. Click on “Start” -> “Control Panel” (in Category View) -> “View network status and tasks”.
  • Page 24 2. In the Control Panel Home, click on “Change adapter settings” to continue.
  • Page 25 3. Single RIGHT click on “Local Area Connection”, then click “Properties”.
  • Page 26 4. Double click on "Internet Protocol Version 4 (TCP/IPv4)".
  • Page 27 5. Check "Obtain an IP address automatically" and "Obtain DNS server address automatically" then click on "OK" to continue.
  • Page 28: For Windows 8/8.1-32/64

    For Windows 8/8.1-32/64 1. Move the mouse or tap to the upper right corner and click on “Settings”.
  • Page 29 2. Click on “Control Panel”.
  • Page 30 3. Click on “View network status and tasks”. 4. In the Control Panel Home, click on “Change adapter settings” to continue.
  • Page 31 5. Single RIGHT click on “Ethernet", then click "Properties".
  • Page 32 6. Double click on "Internet Protocol Version 4 (TCP/IPv4)".
  • Page 33 7. Check "Obtain an IP address automatically" and “Obtain DNS server address automatically” then click on "OK" to continue.
  • Page 34: For Windows 10-32/64

    For Windows 10-32/64 1. Right click on Network icon , then click "Open Network and Sharing Center". 2. In the Control Panel Home, click on “Change adapter settings” to continue.
  • Page 35 3. Single RIGHT click on “Ethernet", then click "Properties".
  • Page 36 4. Double click on "Internet Protocol Version 4 (TCP/IPv4)".
  • Page 37 5. Check "Obtain an IP address automatically" and “Obtain DNS server address automatically” then click on "OK" to continue.
  • Page 38: Connecting Your Device

    Connecting your device This chapter provides basic instructions for connecting the WGR-8031 to a computer or LAN and to the Internet. In addition to configuring the device, you need to configure the Internet properties of your computer(s). For more details, see the following sections: ...
  • Page 39 Figure 4: Overview of Hardware Connections Step 1. Connect the Ethernet cable to WAN Port Connect the RJ45 Ethernet cable from your xDSL/Cable Modem's Ethernet port to Router's WAN Port. Step 2. Connect the Ethernet cable to LAN Port Connect the supplied RJ45 Ethernet cable from your PC's Ethernet port to any of the 4 Router's LAN Ports.
  • Page 40: Utility Cd Execution

    Utility CD execution Connecting the Hardware 1. From any of the LAN computers, launch your web browser, type the following URL in the web address (or location) box, and press [Enter] on your keyboard: http://192.168.1.1 2. Please enter the User Name: admin and Password: admin and then click on OK button.
  • Page 41: Wan Interface Setup

    WAN Interface Setup Examples 8-1. DHCP client From the WAN Access Type drop-down list, select DHCP Client If you are happy with your settings, click on Next 8-2. Static IP...
  • Page 42 From the WAN Access Type drop-down list, select Static IP setting. Enter IP Address, Subnet Mask, Default Gateway and DNS which was given by Telecom or by your Internet Service Provider (ISP). If you are happy with your settings, click on Next 8-3.
  • Page 43 From the WAN Access Type drop-down list, select PPTP setting provided by your Network Administrator or ISP. Click on the ratio of Dynamic IP (DHCP) or Static IP. Enter IP Address for example 172.1.1.1 provided by your Network Administrator or ISP. (for Static IP only) Enter Subnet Mask for example 255.255.0.0 provided by your Network Administrator or ISP.
  • Page 44 From the WAN Access Type drop-down list, select L2TP setting provided by your Network Administrator or ISP. Click on the ratio of Dynamic IP (DHCP) or Static IP. Enter IP Address for example 172.1.1.1 provided by your Network Administrator or ISP. (for Static IP only) Enter Subnet Mask for example 255.255.0.0 provided by your Network Administrator or ISP.
  • Page 45: Wireless Configuration - 5Ghz

    Wireless Configuration - 5GHz 6. Enter SSID. 7. Click on Next.
  • Page 46: Wireless Configuration - 2.4Ghz

    8. From the Encryption list, choose the Encryption type and enter related parameters if necessary, as None / WEP / WPA2(AES) and WPA Mixed Mode (the default settings Security Mode = None). For example, the Encryption you choose is None. 9.
  • Page 47: Wireless Connection

    14. Change setting successfully! Do not turn off or reboot the Device during this time. Please wait 20 seconds ... 15. Now, the WGR-8031 has been configured completely, and suitable for Wireless and Internet Connections. Wireless Connection For easy installation it is saved to keep the settings. You can later change the wireless settings via the wireless configuration menu.
  • Page 48 19. If the wireless network is encrypted, enter the network key that belongs to your authentication type and key. (the default settings Security Mode = WPA Mixed mode which could be found on the bottom side of the device). You can later change this network key via the wireless configuration menu.
  • Page 49: What The Internet/Wan Access Of Your Own Network Now Is

    21. Now you are ready to use the Wireless Network to Internet or intranet. What the Internet/WAN access of your own Network now is Now you could check what the Internet/WAN access of your network is to know how to configure the WAN port of Wireless Gateway.
  • Page 50 2. Double click Network Connections...
  • Page 51: Internet/Wan Access Is The Dhcp Client

    Internet/WAN access is the DHCP client If you cannot see any Broadband Adapter in the Network Connections, your Internet/WAN access is DHCP Client or Static IP. 3. Click Local Area Connection in LAN or High-Speed Internet and you could see string Assigned by DHCP Details.
  • Page 52: Internet/Wan Access Is The Static Ip

    Internet/WAN access is the Static IP If you cannot see any Broadband Adapter in the Network Connections, your Internet/WAN access is DHCP Client or Static IP. 4. Click Local Area Connection in LAN or High-Speed Internet and you could see string Manually Configured Details.
  • Page 53 5. Right click Local Area Connection and click Properties and then you could get the IP settings in detail and write down the IP settings as follow: IP Address: 192.168.10.110 Subnet mask: 255.255.255.0 Default gateway: 192.168.10.100 Preferred DNS server: 192.168.10.100 Alternate DNS Server: If you have it, please also write it down.
  • Page 54: Internet/Wan Access Is The Pppoe Client

    Internet/WAN access is the PPPoE client If you can see any Broadband Adapter in the Network Connections, your Internet/WAN access is PPPoE Client. 6. Click Broadband Adapter in Broadband and you could see string Assigned by Service Provider in Details. For PPPoE configuration on Wireless Gateway, you’ll need following information that you could get from your Telecom, or by your Internet Service Provider.
  • Page 55: Getting Started With The Web Pages

    Getting Started with the Web pages The WGR-8031 includes a series of Web pages that provide an interface to the software installed on the device. It enables you to configure the device settings to meet the needs of your network. You can access it through your web browser from any PC connected to the device via the LAN ports.
  • Page 57 Figure 5: Homepage The first time that you click on an entry from the left- hand menu, a login box is displayed. You must enter your username and password to access the pages. A login screen is displayed: Figure 6: Login screen 1.
  • Page 58: Testing Your Setup

    Testing your Setup Once you have connected your hardware and configured your PCs, any computer on your LAN should be able to use the DSL /Cable connection to access the Internet. To test the connection, turn on the device, wait for 30 seconds and then verify that the LEDs are illuminated as follows: Table 1.
  • Page 59 Option Default Setting Explanation/Instructions WAN Port IP DHCP Client This is the temporary public IP address of the WAN Address port on the device. It is an unnumbered interface that is replaced as soon as your ISP assigns a ‘real’ IP address.
  • Page 60: Quick Setup

    Quick Setup The Quick Setup page displays useful information about the setup of your device, including:  details of the device’s Internet access settings  details of the device’s VoIP settings  details of the device’s Wireless settings To display this page: 1.
  • Page 61: Operation Mode Setup

    Operation Mode Setup You can setup different modes to LAN and WLAN interface for NAT function. Gateway In this mode, the device is supposed to connect to internet via ADSL/Cable Modem. The NAT is enabled and PCs in four LAN ports share the same IP to ISP through WAN port.
  • Page 62: Bridge

    Bridge In this mode, all ethernet ports and wireless interface are bridged together and NAT function is disabled. All the WAN related function and firewall are not supported. To change the Operation Mode: 1. From the left-hand menu, click on Wizard. The following page is displayed: 2.
  • Page 63: Wireless Isp

    Wireless ISP In this mode, all ethernet ports are bridged together and the wireless client will connect to ISP access point. The NAT is enabled and PCs in ethernet ports share the same IP to ISP through wireless LAN. You must set the wireless to client mode first and connect to the ISP AP in Site-Survey page.
  • Page 64: Wan Interface Setup

    WAN Interface Setup This page is used to configure the parameters for Internet network which connects to the WAN port of your Access Point. Here you may change the access method to static IP, DHCP, PPPoE, PPTP or L2TP by click the item value of WAN Access type.
  • Page 65: Dhcp Client

    DHCP Client In this mode, the device is supposed to connect to internet via ADSL/Cable Modem. The NAT is enabled and PCs in four LAN ports share the same IP to ISP through WAN port. The connection type can be setup in WAN page by using DHCP Client.
  • Page 66: Pptp

    PPTP In this mode, the device is supposed to connect to internet via ADSL/Cable Modem. The NAT is enabled and PCs in four LAN ports share the same IP to ISP through WAN port. The connection type can be setup in WAN page by using PPTP. 1.
  • Page 67: L2Tp

    L2TP In this mode, the device is supposed to connect to internet via ADSL/Cable Modem. The NAT is enabled and PCs in four LAN ports share the same IP to ISP through WAN port. The connection type can be setup in WAN page by using L2TP. 1.
  • Page 68: Wireless 5Ghz Basic Settings

    LAN clients who may connect to your Access Point. 1. From the Band drop-down list, select a Band. 2. From the Mode drop-down list, select AP setting. 3. Enter SSID for example LevelOne 5G 4. From the Channel Width drop-down list, select a Channel Width.
  • Page 69: Client

    Access Point. 1. From the Band drop-down list, select a Band. 2. From the Mode drop-down list, select Client setting. 3. From the Network Type drop-down list, select a Type. 4. Enter SSID for example LevelOne 5G. 5. Click Next>>.
  • Page 70: Wds (Wireless Distribution System)

    WDS (Wireless Distribution System) WDS stands for Wireless Distribution System. It enables the access points (APs) to be connected wirelessly. WGR-8031 can also provide you services of WDS. WGR-8031 that supports WDS does not support security Note systems like WEP, WPA or WPA-Enterprise on a WDS network.
  • Page 71 Main WDS station: One of your WDS stations is the main base station for the WDS network. This AP is connected directly to your Internet connection, or connected to your router via a wired connection. The main station is the bridge to your Internet connection that all wireless traffic eventually flows through.
  • Page 72: Wds (Wireless Distribution System) Only

    Access Point is used to configure the parameters for wireless LAN clients which may connect to your Access Point. 1. From the Band drop-down list, select a Band. 2. From the Mode drop-down list, select AP+WDS setting. 3. Enter SSID for example LevelOne 5G.
  • Page 73: Wireless 5Ghz Security Setup

    4. From the Channel Width drop-down list, select a Channel Width. 5. From the ControlSideband drop-down list, select a ControlSideband. 6. From the Channel Number drop-down list, select a Channel Number. 7. Click Next>>. Wireless 5GHz Security Setup This page allows you setup the wireless security. Turn on WEP or WPA by using Encryption Keys could prevent any unauthorized access to your wireless network.
  • Page 74 encrypted data can only be sent and received by users with access to a private network key. Each PC on your wireless network must be manually configured with the same key as your device in order to allow wireless encrypted data transmissions.
  • Page 75: Configuring Wep 64Bit Ascii (5 Characters) Security

    Configuring WEP 64bit ASCII (5 characters) security The example set in this section is for 64bit encryption. 1. From the Encryption drop-down list, select WEP setting. 2. From the Key Length drop-down list, select 64-bit setting. 3. From the Key Format drop-down list, select ASCII (5 characters) setting.
  • Page 76: Configuring Wep 128Bit Ascii (13 Characters) Security

    Configuring WEP 128bit ASCII (13 characters) security The example set in this section is for 128bit encryption. 1. From the Encryption drop-down list, select WEP setting. 2. From the Key Length drop-down list, select 128-bit setting. 3. From the Key Format drop-down list, select ASCII (13 characters) setting.
  • Page 77: Configuring Wpa2 (Aes) Hex (64 Characters) Security

    Configuring WPA2 (AES) Passphrase security The example set in this section is for WPA2 (AES) Passphrase encryption. 1. From the Encryption drop-down list, select WPA2 (AES) setting. 2. From the Pre-Shared Key Format drop-down list, select Passphrase setting. 3. Type the Pre-Shared Key. 4.
  • Page 78: Wireless 2.4Ghz Basic Settings

    LAN clients who may connect to your Access Point. 1. From the Band drop-down list, select a Band. 2. From the Mode drop-down list, select AP setting. 3. Enter SSID for example LevelOne 2.4G. 4. From the Channel Width drop-down list, select a Channel Width.
  • Page 79: Client

    Client This page is used to configure the parameters for wireless LAN clients which may connect to your Access Point. 1. From the Band drop-down list, select a Band. 2. From the Mode drop-down list, select Client setting. 3. From the Network Type drop-down list, select a Type. 4.
  • Page 80: Wds (Wireless Distribution System)

    WDS (Wireless Distribution System) WDS stands for Wireless Distribution System. It enables the access points (APs) to be connected wirelessly. 802.11ac WLAN AP Router can also provide you services of WDS. 802.11ac WLAN AP Router that supports WDS does not support security systems like WEP, WPA or WPA-Enterprise on a WDS Note network.
  • Page 81 Main WDS station: One of your WDS stations is the main base station for the WDS network. This AP is connected directly to your Internet connection, or connected to your router via a wired connection. The main station is the bridge to your Internet connection that all wireless traffic eventually flows through.
  • Page 82: Wds (Wireless Distribution System) Only

     You set the SSID of the remote location(s) using either a unique name or by using the same SSID as you use for your main base station. (Whoa, our heads just exploded!) Using the same SSID (a “roaming” network) is pretty cool. You associate with one AP one time and then your PC or Mac can associate with any AP on your WDS network without you having to do anything —...
  • Page 83: Wireless 2.4Ghz Security Setup

    2. From the Mode drop-down list, select AP+WDS setting. 3. Enter SSID for example AP_2.4G. 4. From the Channel Width drop-down list, select a Channel Width. 5. From the ControlSideband drop-down list, select a ControlSideband. 6. From the Channel Number drop-down list, select a Channel Number.
  • Page 84 There are two methods of wireless security to choose from:  Wired Equivalent Privacy (WEP); data is encrypted into blocks of either 64 bits length or 128 bits length. The encrypted data can only be sent and received by users with access to a private network key.
  • Page 85: Configuring Wep 64Bit Ascii (5 Characters) Security

     If you want to use WPA (AES) - Wi-Fi Protected Access 2 (AES) HEX (64 characters) encryption, follow the instructions in Configuring WPA2 (AES) HEX (64 characters) security. Configuring WEP 64bit ASCII (5 characters) security The example set in this section is for 64bit encryption. 1.
  • Page 86: Configuring Wep 128Bit Ascii (13 Characters) Security

    6. Change setting successfully! Do not turn off or reboot the Device during this time. Please wait 20 seconds ... Configuring WEP 128bit ASCII (13 characters) security The example set in this section is for 128bit encryption. 1. From the Encryption drop-down list, select WEP setting. 2.
  • Page 87: Configuring Wep 128Bit Hex (26 Characters) Security

    6. Change setting successfully! Do not turn off or reboot the Device during this time. Please wait 20 seconds ... Configuring WEP 128bit Hex (26 characters) security The example set in this section is for 128bit encryption. 1. From the Encryption drop-down list, select WEP setting. 2.
  • Page 88 Configuring WPA2 (AES) Passphrase security The example set in this section is for WPA2 (AES) Passphrase encryption. 1. From the Encryption drop-down list, select WPA2 (AES) setting. 2. From the Pre-Shared Key Format drop-down list, select Passphrase setting. 3. Type the Pre-Shared Key. 4.
  • Page 89: Configuring Wpa2 (Aes) Hex (64 Characters) Security

    Configuring WPA2 (AES) HEX (64 characters) security The example set in this section is for WPA2 (AES) HEX (64 characters) encryption. 1. From the Encryption drop-down list, select WPA2 (AES) setting. 2. From the Pre-Shared Key Format drop-down list, select HEX (64 characters) setting.
  • Page 90: Operation Mode

    Operation Mode This chapter describes how to configure the way that your device connects to the Internet. There are Three options of Operation Mode: Gateway, Bridge and Wireless ISP. Setting Operation Mode To change the Operation Mode: 1. From the head menu, click on SETUP. 2.
  • Page 91: Wireless Network - Wlan1(5Ghz)

    Wireless Network - wlan1(5GHz) This chapter assumes that you have already set up your Wireless PCs and installed a compatible Wireless card on your device. See Configuring Wireless PCs. Basic Settings The Wireless Network page allows you to configure the Wireless features of your device.
  • Page 92 Figure 8: Wireless Network page Field Description Disable Enable/Disable the Wireless LAN Interface. Wireless LAN Default: Disable Interface Band Specify the WLAN Mode Mode Configure the Wireless LAN Interface to AP, Client, WDS or AP + WDS mode Network Type Configure the Network Type to Infrastructure or Ad hoc.
  • Page 93: Advanced Settings

    Advanced Settings These settings are only for more technically advanced users who have a sufficient knowledge about wireless LAN. These settings should not be changed unless you know what effect the changes will have on your Access Point. To access the Wireless Network Advanced Settings page: 1.
  • Page 94: Security

    Aggregation Disable or Enable Aggregation Short GI Disable or Enable Short GI WLAN Partition Disable or Enable WLAN Partition STBC Disable or Enable STBC LDPC Disable or Enable LDPC Disable or Enable TX Beamforming Beamforming RF Output TX Power measurement. Power Security This page allows you setup the wireless security.
  • Page 95 Field Description Select SSID Select the SSID Encryption Configure the Encryption to Disable, WEP, WPA , WPA2 or WPA-Mixed Use 802.1x Use 802.1x Authentication by WEP 64bits or WEP 128bits Authentication Authentication Configure the Authentication Mode to Open System, Shared Key or Auto Key Length Select the Key Length 64-bit or 128-bit...
  • Page 96: Wep + Encryption Key

    WEP + Encryption Key WEP aims to provide security by encrypting data over radio waves so that it is protected as it is transmitted from one end point to another. However, it has been found that WEP is not as secure as once believed.
  • Page 97: Wep + Use 802.1X Authentication

    9. Change setting successfully! Do not turn off or reboot the Device during this time. Please wait 20 seconds ... WEP + Use 802.1x Authentication WEP aims to provide security by encrypting data over radio waves so that it is protected as it is transmitted from one end point to another.
  • Page 98: Wpa2/Wpa Mixed + Personal (Pre-Shared Key)

    WPA2/WPA Mixed + Personal (Pre-Shared Key) Wi-Fi Protected Access (WPA and WPA2) is a class of systems to secure wireless (Wi-Fi) computer networks. WPA is designed to work with all wireless network interface cards, but not necessarily with first generation wireless access points.
  • Page 99: Wpa2/Wpa Mixed + Enterprise (Radius)

    7. Click on Save & Apply button to confirm and return. 8. Change setting successfully! Do not turn off or reboot the Device during this time. Please wait 20 seconds ... WPA2/WPA Mixed + Enterprise (RADIUS) Wi-Fi Protected Access (WPA and WPA2) is a class of systems to secure wireless (Wi-Fi) computer networks.
  • Page 100 5. Enter the Port, IP Address and Password of RADIUS Server: 6. Change setting successfully! Do not turn off or reboot the Device during this time. Please wait 20 seconds ...
  • Page 101: Access Control

    Access Control For security reason, using MAC ACL's (MAC Address Access List) creates another level of difficulty to hacking a network. A MAC ACL is created and distributed to AP so that only authorized NIC's can connect to the network. While MAC address spoofing is a proven means to hacking a network this can be used in conjunction with additional security measures to increase the level of complexity of the network security...
  • Page 102: Allow Listed

    Allow Listed If you choose 'Allowed Listed', only those clients whose wireless MAC addresses are in the access control list will be able to connect to your Access Point. 1. From the Wireless Access Control Mode drop-down list, select Allowed Listed setting. 2.
  • Page 103: Deny Listed

    Deny Listed When 'Deny Listed' is selected, these wireless clients on the list will not be able to connect the Access Point. 1. From the Wireless Access Control Mode drop-down list, select Deny Listed setting. 2. Enter the MAC Address. 3.
  • Page 104: Wds Settings

    WDS settings Wireless Distribution System uses wireless media to communicate with other APs, like the Ethernet does. To do this, you must set these APs in the same channel and set MAC address of other APs which you want to communicate with in the table and then enable the WDS.
  • Page 105: Configure Wds (Wireless Distribution System) Only

    Configure WDS (Wireless Distribution System) only 1. From the head menu, click on Wlan1. 2. From the left-hand menu, click on Basic Settings. 3. From the Mode drop-down list, select WDS. 4. From the Channel Number drop-down list, select a Channel. 5.
  • Page 106 8. From the left-hand menu, click on WDS settings. 9. Check on the option Enable WDS. 10. Click the Set Security. 11. This page allows you setup the wireless security for WDS. When enabled, you must make sure each WDS device has adopted the same encryption algorithm and Key.
  • Page 107 14. Change setting successfully! Do not turn off or reboot the Device during this time. Please wait 20 seconds ...
  • Page 108 15. From the head menu, click on Wlan1. 16. From the left-hand menu, click on WDS settings. 17. Check on the option Enable WDS. 18. Enter the MAC Address. 19. Enter the Comment. 20. Click the Save & Apply. 21. Change setting successfully! Do not turn off or reboot the Device during this time.
  • Page 109: Configure Ap (Access Point) + Wds (Wireless Distribution System)

    23. From the left-hand menu, click on WDS settings. 24. The MAC Address that you created has been added in the Current Access Control List. Configure AP (Access Point) + WDS (Wireless Distribution System) 1. From the head menu, click on Wlan1. 2.
  • Page 110 7. Change setting successfully! Click on Reboot Now button to confirm. 8. From the head menu, click on Wlan1. 9. From the left-hand menu, click on WDS settings. 10. Check on the option Enable WDS. 11. Click the Set Security.
  • Page 111 12. This page allows you setup the wireless security for WDS. When enabled, you must make sure each WDS device has adopted the same encryption algorithm and Key. 13. Configure each field with the Encryption that you selected. 14. Click Save & Apply button. 15.
  • Page 112 16. From the head menu, click on Wlan1. 17. From the left-hand menu, click on WDS settings. 18. Check on the option Enable WDS. 19. Enter the MAC Address. 20. Enter the Comment. 21. Click the Save & Apply. 22. Change setting successfully! Do not turn off or reboot the Device during this time.
  • Page 113 23. From the head menu, click on Wlan1. 24. From the left-hand menu, click on WDS settings. 25. The MAC Address that you created has been added in the Current Access Control List.
  • Page 114: Site Survey

    Site Survey This page provides tool to scan the wireless network. If any Access Point or IBSS is found, you could choose to connect it manually when client mode is enabled. To access the Wireless Network WDS settings page: 1. From the head menu, click on Wlan1. From the left-hand menu, click on Site Survey.
  • Page 115: Configure Wireless Isp + Wireless Client + Site Survey

    Configure Wireless ISP + Wireless client + Site Survey 2. From the head menu, click on SETUP. 3. From the left-hand Operation Mode menu, click on Wireless ISP Settings. 4. Config WAN Interface. 5. Click Save & Apply button. 6. Change setting successfully! Do not turn off or reboot the Device during this time.
  • Page 116 8. From the left-hand menu, click on Basic Settings. 9. From the Mode drop-down list, select Client. 10. Enter SSID of the AP that you want to connect to for example AP_5G_A81261. If you don’t know what the SSID of the AP that you want to connect to, please skip this step. 11.
  • Page 117 12. Please wait 20 seconds ... 13. From the head menu, click on WAN1. 14. From the left-hand menu, click on Site Survey. 15. Click Site Survey button.
  • Page 118 16. Now you could see the APs that scanned by the Wireless Gateway were listed below. 17. Click on the ratio of AP’s SSID under the item Select that you want the Wireless Gateway to connect to. 18. Click Next button. 19.
  • Page 119 23. Change setting successfully! Please wait 20 seconds….
  • Page 120: Wps

    This page allows you to change the setting for WPS (Wi-Fi Protected Setup). Using this feature could let your wireless client automatically synchronize its setting and connect to the Access Point in a minute without any hassle. To access the Wireless Network WPS page: 1.
  • Page 121: Introduction Of Wps

    Field Description Push Button Clicking this button will invoke the PBC method of WPS. It is only Configuration used when AP acts as a registrar. Whenever users want to enable/disable WPS or change AP’s PIN, Save & Apply they need to apply this button to commit changes. It restores the original values of “Self-PIN Number”...
  • Page 122: Ap Mode

    Other modes such as WDS mode, Infrastructure-Adhoc mode, and the wireless virtual interface of Universal Repeater mode are not implemented with WPS features. If those unsupported modes are enforced by users, WPS will be disabled. Under the configuration of every WPS- supported mode, Wireless Gateway has Push Button method and PIN method.
  • Page 123: Infrastructure-Client Mode

    Infrastructure-Client mode In Infrastructure-Client mode, Wireless Gateway only supports enrollee’s role. If users click “Start PIN”, click “Start PBC”, or press the physical button on Wireless Gateway, it will start to seek WPS AP. Once users apply the same method on registrar side, Wireless Gateway will receive the wireless profile upon successfully doing the registration protocol.
  • Page 124: Wireless Basic Settings - Wlan1 Page

    Wireless Basic Settings - wlan1 page Users need to make sure the “Broadcast SSID” file is set to “Enabled”. Otherwise, it might prevent WPS from working properly.
  • Page 125: Operations Of Ap - Ap Being An Enrollee

    Operations of AP - AP being an enrollee In this case, AP will be configured by any registrar either through in-band EAP or UPnP. Here, users do not need to do any action on AP side. They just need AP’s device PIN and enter it into registrar.
  • Page 126 4. Plug the Ethernet cable into AP’s LAN port and make sure the IP connection is valid with Vista. 5. Make sure WCN is enabled. Users may need to enable it at the first time. They could open the “Control Panel”, click “Classic View“, open “Administrative Tools”, double click “Services”, ”, a User Account Control pop up and click “Continue“, edit properties of “Windows Connect Now”,...
  • Page 127 6. If the previous steps are done, open Windows Explorer. Go to the Network section. 7. Click on “Network discovery and file sharing are turned off. Network computers and devices are not visible. Click to Change…“...
  • Page 128 8. Click on “Turn on network discovery and file sharing“...
  • Page 129 9. Click on “No, make the network that I am connected to a private network“...
  • Page 130 10. AP’s icon will show up. Double click on it.
  • Page 131 11. Users could also Click “Add a wireless device” if the icon is not there. Click “next”.
  • Page 132 12. Enter AP’s Self-PIN Number and click “next”.
  • Page 133 13. Choose a name that people who connect to your network will recognize.
  • Page 134 14. Enter the Passphrase and then click Next.
  • Page 135 15. A User Account Control screen pops up, click Continue. 16. AP is successfully configured by WCN.
  • Page 136 17. Finally, AP will become configured (see WPS Status). The authentication algorithm, encryption algorithm, and key assigned by WCN will be displayed below “Current Key Info”.
  • Page 137 18. The SSID field of Wireless Basic Settings page will also be modified with the value assigned by WCN.
  • Page 138: Operations Of Ap - Ap Being A Registrar

    19. The security settings on the Wireless Security Page will be modified by WCN, too. The warning message will show up if users try to modify the security settings. The reason is the same as we explained in the previous section. Operations of AP - AP being a registrar AP mode Whenever users enter station’s PIN into AP’s Wi-Fi Protected...
  • Page 139 6. Users must start the PIN method on the station side within two minutes. 7. Users must start the PIN method on the station side within two minutes.
  • Page 140 8. If the device PIN is correct and the WPS handshake is successfully done on the station side, User’s Wi-Fi Protected status will be shown as below.
  • Page 141 9. If the device PIN is correct and the WPS handshake is successfully done, AP’s Wi-Fi Protected Setup page will be shown as below. Other pages such as Wireless Basic Settings page and Wireless Security Setup page will also be updated appropriately as described in previous sections.
  • Page 142: Push Button Method

    Push Button method Wireless Gateway supports a virtual button “Start PBC” on the Wi-Fi Protected Setup page for Push Button method. If users push a virtual button “Start PBC”, AP will initiate a WPS session and wait for any station to join. At this moment, AP will detect whether there is more than one station that starts the PBC method.
  • Page 143 5. Users must start the PBC method on the station side within two minutes. 6. Users must start the PBC method on the station side within two minutes.
  • Page 144 7. If the device PCB and the WPS handshake is successfully done on the station side, User’s Wi-Fi Protected status will be shown as below.
  • Page 145 8. If the device PIN is correct and the WPS handshake is successfully done, AP’s Wi-Fi Protected Setup page will be shown as below. Other pages such as Wireless Basic Settings page and Wireless Security Setup page will also be updated appropriately as described in previous sections.
  • Page 146: Wireless Schedule

    Wireless Schedule This page allows you setup the wireless schedule rule. Please do not forget to configure system time before enable this feature. To access the Wireless Schedule page: 1. From the head menu, click on WAN1. 2. From the left-hand menu, click on Wireless Schedule. The following page is displayed:...
  • Page 147: Wireless Network - Wlan2(2.4Ghz)

    Wireless Network – wlan2(2.4GHz) This chapter assumes that you have already set up your Wireless PCs and installed a compatible Wireless card on your device. See Configuring Wireless PCs. Basic Settings The Wireless Network page allows you to configure the Wireless features of your device.
  • Page 148 Figure 9: Wireless Network page...
  • Page 149 Field Description Disable Enable/Disable the Wireless LAN Interface. Wireless LAN Default: Disable Interface Band Specify the WLAN Mode Mode Configure the Wireless LAN Interface to AP, Client, WDS or AP + WDS mode Network Type Configure the Network Type to Infrastructure or Ad hoc. SSID Specify the network name.
  • Page 150: Advanced Settings

    Advanced Settings These settings are only for more technically advanced users who have a sufficient knowledge about wireless LAN. These settings should not be changed unless you know what effect the changes will have on your Access Point. To access the Wireless Network Advanced Settings page: 1.
  • Page 151: Security

    The Fragmentation Threshold defines the number of bytes used for the fragmentation boundary for directed messages. RTS stands for “Request to Send”. This parameter controls what size RTS Threshold data packet the low level RF protocol issues to an RTS packet. The default is 2347.
  • Page 152 2. From the left-hand menu, click on Security. The following page is displayed: Field Description Select SSID Select the SSID Encryption Configure the Encryption to Disable, WEP, WPA , WPA2 or WPA-Mixed Use 802.1x Use 802.1x Authentication by WEP 64bits or WEP 128bits Authentication Authentication Configure the Authentication Mode to Open System, Shared Key or...
  • Page 153: Wep + Encryption Key

    Enable Pre- According to some of the preferred embodiments, a method for Authentication proactively establishing a security association between a mobile node in a visiting network and an authentication agent in another network to which the mobile node can move includes: negotiating pre- authentication using a flag in a message header that indicates whether the communication is for establishing a pre-authentication security association;...
  • Page 154: Wep + Use 802.1X Authentication

    7. Change setting successfully! Please wait 20 seconds…. WEP + Use 802.1x Authentication WEP aims to provide security by encrypting data over radio waves so that it is protected as it is transmitted from one end point to another. However, it has been found that WEP is not as secure as once believed.
  • Page 155: Wpa2/Wpa Mixed + Personal (Pre-Shared Key)

    7. Change setting successfully! Please wait 20 seconds…. WPA2/WPA Mixed + Personal (Pre-Shared Key) Wi-Fi Protected Access (WPA and WPA2) is a class of systems to secure wireless (Wi-Fi) computer networks. WPA is designed to work with all wireless network interface cards, but not necessarily with first generation wireless access points.
  • Page 156: Wpa2/Wpa Mixed + Enterprise (Radius)

    5. From the Pre-Shared Key Format drop-down list, select Passphrase or Hex (64 characters) setting. 6. Enter the Pre-Shared Key depending on selected Passphrase or Hex (64 characters). 7. Click on Save & Apply button to confirm and return. 8. Change setting successfully! Please wait 20 seconds…. WPA2/WPA Mixed + Enterprise (RADIUS) Wi-Fi Protected Access (WPA and WPA2) is a class of systems to secure wireless (Wi-Fi) computer networks.
  • Page 157: Access Control

    4. Check the option of TKIP and/or AES in WPA/WPA2 Cipher Suite if your Encryption is WPA Mixed: 5. Enter the Port, IP Address and Password of RADIUS Server: 6. Change setting successfully! Please wait 20 seconds…. Access Control For security reason, using MAC ACL's (MAC Address Access List) creates another level of difficulty to hacking a network.
  • Page 158: Allow Listed

    8. From the left-hand menu, click on Access Control. The following page is displayed: Allow Listed If you choose 'Allowed Listed', only those clients whose wireless MAC addresses are in the access control list will be able to connect to your Access Point. 1.
  • Page 159: Deny Listed

    6. Change setting successfully! Please wait 20 seconds…. 7. The MAC Address that you created has been added in the Current Access Control List. Deny Listed When 'Deny Listed' is selected, these wireless clients on the list will not be able to connect the Access Point. 1.
  • Page 160: Wds Settings

    6. The MAC Address that you created has been added in the Current Access Control List. WDS settings Wireless Distribution System uses wireless media to communicate with other APs, like the Ethernet does. To do this, you must set these APs in the same channel and set MAC address of other APs which you want to communicate with in the table and then enable the WDS.
  • Page 161: Configure Wds (Wireless Distribution System) Only

    Configure WDS (Wireless Distribution System) only 1. From the head menu, click on Wlan2. 2. From the left-hand menu, click on Basic Settings. 3. From the Mode drop-down list, select WDS. 4. From the Channel Number drop-down list, select a Channel. 5.
  • Page 162 6. Change setting successfully! Please wait 20 seconds….
  • Page 163 7. From the head menu, click on Wlan2. 8. From the left-hand menu, click on WDS settings. 9. Check on the option Enable WDS. 10. Click the Set Security.
  • Page 164 11. This page allows you setup the wireless security for WDS. When enabled, you must make sure each WDS device has adopted the same encryption algorithm and Key. 12. Configure each field with the Encryption that you selected. 13. Click Save & Apply button. 14.
  • Page 165 15. From the head menu, click on Wlan2. 16. From the left-hand menu, click on WDS settings. 17. Check on the option Enable WDS. 18. Enter the MAC Address. 19. Enter the Comment. 20. Click the Save & Apply. 21. Change setting successfully! Please wait 20 seconds….
  • Page 166 22. From the head menu, click on Wlan2. 23. From the left-hand menu, click on WDS settings. 24. The MAC Address that you created has been added in the Current Access Control List.
  • Page 167: Configure Ap (Access Point) + Wds (Wireless Distribution System)

    Configure AP (Access Point) + WDS (Wireless Distribution System) 1. From the head menu, click on Wlan2. 2. From the left-hand menu, click on Basic Settings. 3. From the Mode drop-down list, select AP+WDS. 4. Enter SSID for example AP_2.4G. 5.
  • Page 168 7. Change setting successfully! Please wait 20 seconds…. 8. From the head menu, click on Wlan2. 9. From the left-hand menu, click on WDS settings. 10. Check on the option Enable WDS. 11. Click the Set Security.
  • Page 169 12. This page allows you setup the wireless security for WDS. When enabled, you must make sure each WDS device has adopted the same encryption algorithm and Key. 13. Configure each field with the Encryption that you selected. 14. Click Save & Apply button. 15.
  • Page 170 16. From the head menu, click on Wlan2. 17. From the left-hand menu, click on WDS settings. 18. Check on the option Enable WDS. 19. Enter the MAC Address. 20. Enter the Comment. 21. Click the Save & Apply. 22. Change setting successfully! Please wait 20 seconds….
  • Page 171 23. From the head menu, click on Wlan2. 24. From the left-hand menu, click on WDS settings. 25. The MAC Address that you created has been added in the Current Access Control List.
  • Page 172: Site Survey

    Site Survey This page provides tool to scan the wireless network. If any Access Point or IBSS is found, you could choose to connect it manually when client mode is enabled. To access the Wireless Network WDS settings page: 1. From the head menu, click on Wlan2. 2.
  • Page 173: Configure Wireless Isp + Wireless Client + Site Survey

    Configure Wireless ISP + Wireless client + Site Survey 1. From the head menu, click on SETUP. 2. From the left-hand Operation Mode menu, click on Wireless ISP Settings. 3. Config WAN Interface. 4. Click Save & Apply button. 5. Change setting successfully! Please wait 20 seconds…. 6.
  • Page 174 8. From the Mode drop-down list, select Client. 9. Enter SSID of the AP that you want to connect to for example AP_2.4G. If you don’t know what the SSID of the AP that you want to connect to, please skip this step. 10.
  • Page 175 11. Please wait 20 seconds ... 12. From the head menu, click on WAN2. 13. From the left-hand menu, click on Site Survey. 14. Click Site Survey button.
  • Page 176 15. Now you could see the APs that scanned by the Wireless Gateway were listed below. 16. Click on the ratio of AP’s SSID under the item Select that you want the Wireless Gateway to connect to. 17. Click Next button. 18.
  • Page 177 22. Change setting successfully! Please wait 20 seconds….
  • Page 178: Wps

    This page allows you to change the setting for WPS (Wi-Fi Protected Setup). Using this feature could let your wireless client automatically synchronize its setting and connect to the Access Point in a minute without any hassle. To access the Wireless Network WPS page: 1.
  • Page 179: Introduction Of Wps

    Field Description Push Button Clicking this button will invoke the PBC method of WPS. It is only Configuration used when AP acts as a registrar. Whenever users want to enable/disable WPS or change AP’s PIN, Save & Apply they need to apply this button to commit changes. It restores the original values of “Self-PIN Number”...
  • Page 180: Ap Mode

    Other modes such as WDS mode, Infrastructure-Adhoc mode, and the wireless virtual interface of Universal Repeater mode are not implemented with WPS features. If those unsupported modes are enforced by users, WPS will be disabled. Under the configuration of every WPS- supported mode, Wireless Gateway has Push Button method and PIN method.
  • Page 181: Infrastructure-Client Mode

    Infrastructure-Client mode In Infrastructure-Client mode, Wireless Gateway only supports enrollee’s role. If users click “Start PIN”, click “Start PBC”, or press the physical button on Wireless Gateway, it will start to seek WPS AP. Once users apply the same method on registrar side, Wireless Gateway will receive the wireless profile upon successfully doing the registration protocol.
  • Page 182: Wireless Basic Settings - Wlan1 Page

    Wireless Basic Settings - wlan1 page Users need to make sure the “Broadcast SSID” file is set to “Enabled”. Otherwise, it might prevent WPS from working properly.
  • Page 183: Operations Of Ap - Ap Being An Enrollee

    Operations of AP - AP being an enrollee In this case, AP will be configured by any registrar either through in-band EAP or UPnP. Here, users do not need to do any action on AP side. They just need AP’s device PIN and enter it into registrar.
  • Page 184 4. Plug the Ethernet cable into AP’s LAN port and make sure the IP connection is valid with Vista. 5. Make sure WCN is enabled. Users may need to enable it at the first time. They could open the “Control Panel”, click “Classic View“, open “Administrative Tools”, double click “Services”, ”, a User Account Control pop up and click “Continue“, edit properties of “Windows Connect Now”,...
  • Page 185 6. If the previous steps are done, open Windows Explorer. Go to the Network section. 7. Click on “Network discovery and file sharing are turned off. Network computers and devices are not visible. Click to Change…“...
  • Page 186 8. Click on “Turn on network discovery and file sharing“...
  • Page 187 9. Click on “No, make the network that I am connected to a private network“...
  • Page 188 10. AP’s icon will show up. Double click on it.
  • Page 189 11. Users could also Click “Add a wireless device” if the icon is not there. Click “next”.
  • Page 190 12. Enter AP’s Self-PIN Number and click “next”.
  • Page 191 13. Choose a name that people who connect to your network will recognize.
  • Page 192 14. Enter the Passphrase and then click Next.
  • Page 193 15. A User Account Control screen pops up, click Continue. 16. AP is successfully configured by WCN.
  • Page 194 17. Finally, AP will become configured (see WPS Status). The authentication algorithm, encryption algorithm, and key assigned by WCN will be displayed below “Current Key Info”.
  • Page 195 18. The SSID field of Wireless Basic Settings page will also be modified with the value assigned by WCN.
  • Page 196: Operations Of Ap - Ap Being A Registrar

    19. The security settings on the Wireless Security Page will be modified by WCN, too. The warning message will show up if users try to modify the security settings. The reason is the same as we explained in the previous section. Operations of AP - AP being a registrar AP mode Whenever users enter station’s PIN into AP’s Wi-Fi Protected...
  • Page 197 1. From the head menu, click on WAN2. 2. From the left-hand menu, click on WPS. The following page is displayed: 3. Make sure AP is in un-configured state. 4. Enter the Client PIN Number. 5. Click Start PIN.
  • Page 198 6. Users must start the PIN method on the station side within two minutes. 7. Users must start the PIN method on the station side within two minutes.
  • Page 199 8. If the device PIN is correct and the WPS handshake is successfully done on the station side, User’s Wi-Fi Protected status will be shown as below.
  • Page 200 9. If the device PIN is correct and the WPS handshake is successfully done, AP’s Wi-Fi Protected Setup page will be shown as below. Other pages such as Wireless Basic Settings page and Wireless Security Setup page will also be updated appropriately as described in previous sections.
  • Page 201: Push Button Method

    Push Button method Wireless Gateway supports a virtual button “Start PBC” on the Wi-Fi Protected Setup page for Push Button method. If users push a virtual button “Start PBC”, AP will initiate a WPS session and wait for any station to join. At this moment, AP will detect whether there is more than one station that starts the PBC method.
  • Page 202 5. Users must start the PBC method on the station side within two minutes. 6. Users must start the PBC method on the station side within two minutes.
  • Page 203 7. If the device PCB and the WPS handshake is successfully done on the station side, User’s Wi-Fi Protected status will be shown as below.
  • Page 204 8. If the device PIN is correct and the WPS handshake is successfully done, AP’s Wi-Fi Protected Setup page will be shown as below. Other pages such as Wireless Basic Settings page and Wireless Security Setup page will also be updated appropriately as described in previous sections.
  • Page 205: Wireless Schedule

    Wireless Schedule This page allows you setup the wireless schedule rule. Please do not forget to configure system time before enable this feature. To access the Wireless Schedule page: 1. From the head menu, click on WAN2. 2. From the left-hand menu, click on Wireless Schedule. The following page is displayed:...
  • Page 206: Lan Interface

    LAN Interface This chapter is to configure the parameters for local area network which connects to the LAN port of your Access Point. Here you may change the setting for IP address, subnet mask, DHCP, etc... You should only change the addressing details if your ISP asks you to, or if you are familiar with network configuration.
  • Page 207 Field Description IP Address The LAN IP address Default: 192.168.1.1 Subnet Mask The LAN netmask Default: 255.255.255.0 Default Gateway The LAN Gateway Default: 0.0.0.0 DHCP DHCP Type: Disable, DHCP Client or Server Default: DHCP Server DHCP Client Range Specify the starting/ending IP address of the IP address pool. Default Start IP: 192.168.100 Default Ending IP: 192.168.200 DHCP Lease Time...
  • Page 208: Changing The Lan Ip Address And Subnet Mask

    Changing the LAN IP address and subnet mask To check the configuration of LAN Interface: 1. From the head menu, click on TCP/IP. 2. From the left-hand menu, click on LAN Setting. The following page is displayed:...
  • Page 209 3. Type IP Address and Change default LAN port IP address. 4. Click in the IP Address and Subnet Mask box and type a new IP Address and Subnet Mask. 5. Change the default DHCP Client Range. 6. Click Save & Apply. 7.
  • Page 210 You may also need to renew your DHCP lease: Windows 95/98 a. Select Run... from the Start menu. b. Enter winipcfg and click OK. c. Select your ethernet adaptor from the pull-down menu d. Click Release All and then Renew All. e.
  • Page 211: Show Client

    Show Client To the IP Address, MAC Address, and Expired Time of the DHCP lease for each client computer/device: 1. From the head menu, click on TCP/IP. 2. From the left-hand menu, click on LAN Setting. The following page is displayed: 3.
  • Page 212: Wan Interface

    WAN Interface This chapter describes how to configure the way that your device connects to the Internet. Your ISP determines what type of Internet access you should use and provides you with any information that you need in order to configure the Internet access to your device.
  • Page 213 1. From the head menu, click on TCP/IP. 2. From the left-hand menu, click on WAN Setting. The following page is displayed:...
  • Page 214 Option Description Static IP Choose this option if you are a leased line user with a fixed IP address. Access DHCP Client Choose this option if you are connected to the Internet Type through a Cable modem line. PPPoE Choose this option if you are connected to the Internet through a DSL line PPTP Choose this option if you are connected to the PPTP...
  • Page 215 Clone MAC Address Clone MAC lets the device identify itself as another computer or device Enable uPNP Enable or Disable uPNP Enable IGMP Proxy Enable or Disable IGMP Proxy Enable Ping Access on WAN Enable or Disable Ping Access on WAN Enable Web Server Access on Enable or Disable Web Server Access on WAN Enable IPsec pass through on...
  • Page 216: Configuring Static Ip Connection

    Configuring Static IP connection If you are a leased line user with a fixed IP address, enter in the IP address, subnet mask, gateway address, and DNS (domain name server) address(es) provided to you by your ISP. If your ISP wants you to connect to the Internet using Static IP, follow the instructions below.
  • Page 217 3. From the WAN Access Type drop-down list, select Static IP setting. 4. Enter WAN IP Address, WAN Subnet Mask, Default Gateway and DNS which was given by Telecom or by your Internet Service Provider (ISP). 5. Click Save & Apply. 6.
  • Page 218: Configuring Dhcp Client Connection

    Configuring DHCP Client connection Dynamic Host Configuration Protocol (DHCP), Dynamic IP (Get WAN IP Address automatically). If you are connected to the Internet through a Cable modem line, then a dynamic IP will be assigned. If your ISP wants you to connect to the Internet using DHCP Client, follow the instructions below.
  • Page 219 3. From the WAN Access Type drop-down list, select DHCP Client setting. 4. Click Save & Apply. 5. Change setting successfully! Please wait 20 seconds….
  • Page 220: Configuring Pppoe Connection

    Configuring PPPoE connection If your ISP’s Internet service uses PPPoE you need to set up a PPP login account. The first time that you login to the Internet, your ISP will ask you to enter a username and password so they can check that you are a legitimate, registered Internet service user.
  • Page 221 3. From the WAN Access Type drop-down list, select PPPoE setting. 4. Enter User Name/Password provided by your ISP. Type them in the relevant boxes. 5. Click Save & Apply. 6. Change setting successfully! Please wait 20 seconds….
  • Page 222: Configuring Pptp Connection

    Configuring PPTP connection If your ISP/Network Administrator wants you to connect to the Internet using PPTP, follow the instructions below. 1. From the head menu, click on TCP/IP. 2. From the left-hand menu, click on WAN Setting. The following page is displayed:...
  • Page 223 3. From the WAN Access Type drop-down list, select PPTP setting. 4. Enter IP Address/Subnet Mask/Default Gateway provided by your ISP. Type them in the relevant boxes. (for Static IP only) 5. Select PPTP Server Mode. 6. Enter Server Domain Address/User Name/Password provided by your ISP.
  • Page 225 8. Change setting successfully! Please wait 20 seconds….
  • Page 226: Configuring L2Tp Connection

    Configuring L2TP connection If your ISP/Network Administrator wants you to connect to the Internet using L2TP, follow the instructions below. 1. From the head menu, click on TCP/IP. 2. From the left-hand menu, click on WAN Setting. The following page is displayed:...
  • Page 227 3. From the WAN Access Type drop-down list, select L2TP setting. 4. Enter IP Address/Subnet Mask/Default Gateway provided by your ISP. Type them in the relevant boxes. (for Static IP only) 5. Select L2TP Server Mode. 6. Enter Server Domain Address/User Name/Password provided by your ISP.
  • Page 229: Clone Mac Address

    8. Change setting successfully! Please wait 20 seconds…. Clone MAC Address Some particularly ISPs do not want you to have a home network and have a DSL/Cable modem that allows only 1 MAC to talk on the internet. If you change network cards, you have to call them up to change the MAC.
  • Page 230 2. From the left-hand menu, click on WAN Setting. The following page is displayed:...
  • Page 231 3. Enter the MAC for example 0123456789ab that you want to be instead of in the Clone MAC Address field. 4. If you enter 12 digits of 0 in the Clone MAC Address field, it’ll disable Clone MAC Address function. 5.
  • Page 232: Ipv6

    IPV6 IPV6 WAN SETTING This page is used to configure the parameters for Internet network which connects to the WAN port of your Access Point. Here you may change the access method to static IP, DHCP, PPPoE, Bridge by click the item value of WAN Access type. 1.
  • Page 233: Ipv6 Lan Setting

    IPV6 LAN SETTING 1. From the head menu, click on IPV6. 2. From the left-hand menu, click on IPV6 LAN SETTING. The following page is displayed:...
  • Page 234: Radvd

    RADVD 1. From the head menu, click on IPV6. 2. From the left-hand menu, click on RADVD. The following page is displayed:...
  • Page 236: Tunnel (6 Over 4)

    TUNNEL (6 OVER 4) 1. From the head menu, click on IPV6. 2. From the left-hand menu, click on TUNNEL (6 OVER 4). The following page is displayed:...
  • Page 237: Port Filtering

    Port Filtering Entries in Current Filter Table are used to restrict certain ports and types of data packets from your local network to Internet through the Gateway. Use of such filters can be helpful in securing or restricting your local network. 1.
  • Page 238: Port Filtering For Tcp Port 80

    You must ensure that the single port or range specified does not overlap with a port or range for an existing common or custom Note application. Check the common port ranges listed in. Port filtering for TCP port 80 Please follow example below to deny the TCP port 80 for both Outbound and Inbound packet.
  • Page 239 3. Check the option Enable Port Filtering to enable the port filtering. 4. Enter 80 and 80 in Port Range field. 5. From the Protocol drop-down list, select TCP setting. 6. Enter HTTP in Comment field. 7. Click Save & Apply. 8.
  • Page 240: Port Filtering For Udp Port 53

    Port filtering for UDP port 53 Please follow example below to deny the UDP port 53 for both Outbound and Inbound packet. 1. From the head menu, click on Firewall. 2. From the left-hand menu, click on Port Filtering. The following page is displayed:...
  • Page 241 3. Check the option Enable Port Filtering to enable the port filtering. 4. Enter 53 and 53 in Port Range field. 5. From the Protocol drop-down list, select UDP setting. 6. Enter DNS Resolve in Comment field. 7. Click Save & Apply. 8.
  • Page 242: Ip Filtering

    IP Filtering Entries in this table are used to restrict certain types of data packets from your local network to Internet through the Gateway. Use of such filters can be helpful in securing or restricting your local network. The IP filter feature enables you to create rules that control the forwarding of incoming and outgoing data between the LAN and WAN side.
  • Page 243: Ip Filtering For Tcp With Specified Ip

    1. From the head menu, click on Firewall. 2. From the left-hand menu, click on IP Filtering. The following page is displayed: IP filtering for TCP with specified IP Please follow example below to deny the TCP protocol for specified IP. 1.
  • Page 244 2. From the left-hand menu, click on IP Filtering. The following page is displayed: 3. Check the option Enable IP Filtering to enable the IP Filtering. 4. Enter the IP Address that you want to be denied in Loal IP Address field.
  • Page 245: Ip Filtering For Udp With Specified Ip

    Now The Local IP Address for example 10.0.0.102 that listed in the Current Filter Table cannot visit any application that use TCP protocol for example web site due to the Protocol TCP has been blocked by the IP Filtering rule that created. IP filtering for UDP with specified IP Please follow example below to deny the UDP protocol for specified IP.
  • Page 246: Ip Filtering For Both Tcp And Udp With Specified Ip

    3. Check the option Enable IP Filtering to enable the IP Filtering. 4. Enter the IP Address that you want to be denied in Local IP Address field. 5. From the Protocol drop-down list, select UDP setting. 6. Enter any comment in Comment field. 7.
  • Page 248 3. Check the option Enable IP Filtering to enable the IP Filtering. 4. Enter the IP Address that you want to be denied in Local IP Address field. 5. From the Protocol drop-down list, select Both setting. 6. Enter any comment in Comment field. 7.
  • Page 249: Mac Filtering

    MAC Filtering Entries in this table are used to restrict certain types of data packets from your local network to Internet through the Wireless Gateway. Use of such filters can be helpful in securing or restricting your local network. 1. From the head menu, click on Firewall. 2.
  • Page 250: Mac Filtering For Specified Mac Address

    MAC filtering for specified MAC Address Please follow example below to deny the specified MAC Address has the Internet Access. 1. From the head menu, click on Firewall. 2. From the left-hand menu, click on MAC Filtering. The following page is displayed:...
  • Page 251 3. Check the option Enable MAC Filtering to enable the MAC Filtering. 4. Enter the MAC Address that you want to be denied in MAC Address field. 5. Enter any comment in Comment field. 6. Click Save & Apply. 7. Now the MAC Filter that you created has been added and listed in the Current Filter Table.
  • Page 252: Port Forwarding

    Port Forwarding Entries in this table allow you to automatically redirect common network services to a specific machine behind the NAT firewall. These settings are only necessary if you wish to host some sort of server like a web server or mail server on the private local network behind your Gateway's NAT firewall.
  • Page 253 2. From the left-hand menu, click on Port Forwarding. The following page is displayed:...
  • Page 254: Port Forwarding For Tcp With Specified Ip

    Port Forwarding for TCP with specified IP Please follow example below to configure the Port Forwarding to Specified IP with TCP. 1. From the head menu, click on Firewall. 2. From the left-hand menu, click on Port Forwarding. The following page is displayed:...
  • Page 255: Port Forwarding For Udp With Specified Ip

    3. Check the option Enable Port Forwarding to enable the Enable Port Forwarding. 4. Enter the IP Address that the port you want to be forwarded in IP Address field. 5. From the Protocol drop-down list, select TCP setting. 6. Enter any comment in Comment field. 7.
  • Page 256 2. From the left-hand menu, click on Port Forwarding. The following page is displayed: 3. Check the option Enable Port Forwarding to enable the Enable Port Forwarding. 4. Enter the IP Address that the port you want to be forwarded in IP Address field.
  • Page 257: Url Filtering

    URL Filtering URL filter is used to deny LAN users from accessing the internet. Block those URLs which contain keywords listed below. 1. From the head menu, click on Firewall. 2. From the left-hand menu, click on URL Forwarding. The following page is displayed:...
  • Page 258: Url Filtering For Specified Url Address

    URL filtering for specified URL Address Please follow example below to deny LAN users from accessing the Internet. 1. From the head menu, click on Firewall. 2. From the left-hand menu, click on URL Forwarding. The following page is displayed: 3.
  • Page 259 7. Now the URL Filter that you created has been added and listed in the Current Filter Table. 8. Now the URL Address in the Current Filter Table cannot be visited.
  • Page 260: Dmz

    A Demilitarized Zone is used to provide Internet services without sacrificing unauthorized access to its local private network. Typically, the DMZ host contains devices accessible to Internet traffic, such as Web (HTTP ) servers, FTP servers, SMTP (e- mail) servers and DNS servers. 1.
  • Page 261 3. Check the option Enable DMZ to enable the Enable DMZ. 4. Enter the IP Address that to be the DMZ Host in DMZ Host IP Address field. 5. Click Save & Apply.
  • Page 262: 802.1Q Vlan

    802.1Q VLAN Entries in below table are used to config vlan settings. VLANs are created to provide the segmentation services traditionally provided by routers. VLANs address issues such as scalability, security, and network management. 1. From the head menu, click on Firewall. 2.
  • Page 264: Route Setup

    ROUTE SETUP This page is used to setup dynamic routing protocol or edit static route entry. 1. From the head menu, click on Firewall. 2. From the left-hand menu, click on ROUTE SETUP. The following page is displayed:...
  • Page 265: Qos

    Entries in this table improve your online gaming experience by ensuring that your game traffic is prioritized over other network traffic, such as FTP or Web. 1. From the head menu, click on Firewall. 2. From the left-hand menu, click on QOS. The following page is displayed:...
  • Page 266: Status

    Status This page displays the current information for the device. It will display the LAN, WAN, and system firmware information. This page will display different information, according to WAN setting (Static IP, DHCP, or PPPoE). 1. From the head menu, click on Management. 2.
  • Page 268: Statistics

    Statistics This page shows the packet counters for transmission and reception regarding to wireless and Ethernet networks. 1. From the head menu, click on Management. 2. From the left-hand menu, click on Statistics. The following page is displayed:...
  • Page 269: Dynamic Dns

    Dynamic DNS When you want your internal server to be accessed by using DNS name rather than using the dynamic IP address, you can use the DDNS service. The DDNS server allows to alias a dynamic IP address to a static hostname. This chapter provides you an overview of the Dynamic DNS feature of the modem and configuration details related to it.
  • Page 270 If the dynamic DNS service provider is notified of the same IP address again and again, then it considers it an abuse and might block the host name. To avoid this scenario, the IP address that was successfully updated to the ISP is stored on the unit.
  • Page 271: Configure Dyndns

    1. From the head menu, click on Management. 2. From the left-hand menu, click on DDNS. The following page is displayed: Configure DynDNS 1. From the head menu, click on Management.
  • Page 272 2. From the left-hand menu, click on DDNS. The following page is displayed: 3. Click on Enable DDNS 4. Select the DynDNS from the Service Provider drop-down list. 5. Type your own unique User Name, Password and Domain Name which you applied from www.dyndns.com in the relevant boxes.
  • Page 273: Configure Tzo

    Configure TZO 1. From the head menu, click on Management. 2. From the left-hand menu, click on DDNS. The following page is displayed:...
  • Page 274 3. Click on Enable DDNS 4. Select the TZO from the Service Provider drop-down list. 5. Type your own unique Email, Key and Domain Name which you applied from http://www.tzo.com/MainPageWebClient/clientsignup.html in the relevant boxes. They can be any combination of letters or numbers with a maximum of 20 characters.
  • Page 275: Time Zone Setting

    Time Zone Setting Certain systems may not have a date or time mechanism or may be using inaccurate time/day information. the Simple Network Time Protocol feature provides a way to synchronize the device’s own time of day setting with a remote time server as described in RFC 2030 (SNTP) and RFC 1305 (NTP).
  • Page 276: Denial-Of-Service

    7. Change setting successfully! Please wait 20 seconds…. Denial-of-Service A "denial-of-service" (DoS) attack is characterized by an explicit attempt by hackers to prevent legitimate users of a service from using that service. Denial-of-Service 1. From the head menu, click on Management.
  • Page 277 2. From the left-hand menu, click on Deny Of Service. The following page is displayed:...
  • Page 278 3. Check the option Enable DoS Prevention. 4. Check the option of each Service. 5. Check the option Enable Source IP Blocking. 6. Click Save & Apply. 7. Change setting successfully! Please wait 20 seconds….
  • Page 279: Tr-069 Config

    TR-069 CONFIG This page is used to configure the TR-069 CPE. Here you may change the setting for the ACS's parameters. 1. From the head menu, click on Management. 2. From the left-hand menu, click on TR-069 CONFIG. The following page is displayed:...
  • Page 280: Log

    This page can be used to set remote log server and show the system log. System Log 1. From the head menu, click on Management. 2. From the left-hand menu, click on Log. The following page is displayed:...
  • Page 281 Option Description Enable Log Enable/Disable the feature. Default: Disable system all All system logs will be recorded in the system log wireless The wireless logs will be recorded in the system log The DoS logs will be recorded in the system log Enable Enable: Send the system log to remote log server.
  • Page 282 8. Change setting successfully! Please wait 20 seconds….
  • Page 283: Firmware Update

    Firmware Update About firmware versions Firmware is a software program. It is stored as read-only memory on your device. Your device can check whether there are later firmware versions available. If there is a later version, you can download it via the Internet and install it on your device. If there is a firmware update available you are strongly advised to install it on your device to ensure that you take full advantage of Note...
  • Page 284 6. Firmware update has been update complete. The following page is displayed:...
  • Page 285: Save/Reload Settings

    Save/Reload Settings This page allows you save current settings to a file or reload the settings from the file which was saved previously. Besides, you could reset the current configuration to factory default. If you do make changes to the default configuration but then wish to revert back to the original factory configuration, you can do so by resetting the device to factory defaults.
  • Page 286 2. Click on Save…. 3. If you are happy with this, click Save and then browse to where the file to be saved. Or click Cancel to cancel it.
  • Page 287: Load Settings From File

    Load Settings from File It allows you to reload the settings from the file which was saved previously. 1. From the left-hand Management menu, click on Reset factory default. The following page is displayed: Figure 12: Reset to Defaults page 2.
  • Page 288 3. If you are happy with this, click Upload to start to load settings from file. 4. Once it finished loading settings form file, it’ll show the message below.
  • Page 289: Resetting To Defaults

    Resetting to Defaults If you do make changes to the default configuration but then wish to revert back to the original factory configuration, you can do so by resetting the device to factory defaults. If you reset your device to factory defaults, all previous configuration changes that you have made are overwritten by the Note factory default configuration.
  • Page 290 2. Click on Reset Settings to Default. 3. This page reminds you that resetting to factory defaults cannot be undone – any changes that you have made to the basic settings will be replaced. If you are happy with this, click OK.
  • Page 291: Password

    Password You can restrict access to your device’s web pages using password protection. With password protection enabled, users must enter a username and password before gaining access to the web pages. By default, password protection is enabled on your device, and the username and password set are as follows: Username: admin Password: admin...
  • Page 292 2. This page displays the current username and password settings. Change your own unique password in the relevant boxes. They can be any combination of letters or numbers with a maximum of 30 characters. The default setting uses admin for the username and admin for password. 3.
  • Page 293: Configuring Your Computers

    Configuring your Computers This appendix provides instructions for configuring the Internet settings on your computers to work with the Wireless Gateway. Configuring Ethernet PCs Before you begin By default, the Wireless Gateway automatically assigns the required Internet settings to your PCs. You need to configure the PCs to accept this information when it is assigned.
  • Page 294 3. In the Network and Dial-up Connections window, right-click the Local Area Connection icon, and then select Properties. The Local Area Connection Properties dialog box is displayed with a list of currently installed network components. If the list includes Internet Protocol (TCP/IP), then the protocol has already been enabled.
  • Page 295: Windows Me Pcs

    Windows Me PCs 1. In the Windows task bar, click the Start button, point to Settings, and then click Control Panel. 2. Double-click the Network and Dial-up Connections icon. 3. In the Network and Dial-up Connections window, right-click the Network icon, and then select Properties. The Network Properties dialog box displays with a list of currently installed network components.
  • Page 296: Windows Nt 4.0 Workstations

    5. Click on Microsoft in the Manufacturers list box, and then click TCP/IP in the Network Protocols list box. 6. Click OK to return to the Network dialog box, and then click OK again. You may be prompted to install files from your Windows 95/98 installation CD.
  • Page 297: Assigning Static Internet Information To Your Pcs

    7. Open the Control Panel window, and then double-click the Network icon. 8. In the Network dialog box, click the Protocols tab. 9. In the Protocols tab, select TCP/IP, and then click Properties. 10. In the Microsoft TCP/IP Properties dialog box, click the radio button labeled Obtain an IP address from a DHCP server.
  • Page 299: Ip Addresses, Network Masks, And Subnets

    IP Addresses, Network Masks, and Subnets IP Addresses This section refers only to IP addresses for IPv4 (version 4 of the Internet Protocol). IPv6 addresses are not covered. This section assumes basic knowledge of binary numbers, bits, Note and bytes. IP addresses, the Internet's version of telephone numbers, are used to identify individual nodes (computers or devices) on the Internet.
  • Page 300: Subnet Masks

    scope of this discussion.) These classes have different uses and characteristics. Class A networks are the Internet's largest networks, each with room for over 16 million hosts. Up to 126 of these huge networks can exist, for a total of over 2 billion hosts. Because of their huge size, these networks are used for WANs and by organizations at the infrastructure level of the Internet, such as your ISP.
  • Page 301 255.255.255.192 or 11111111. 11111111. 11111111.11000000 The two extra bits in field4 can have four values (00, 01, 10, 11), so there are four subnets. Each subnet uses the remaining six bits in field4 for its host IDs, ranging from 1 to 62. Sometimes a subnet mask does not specify any additional network ID bits, and thus no subnets.
  • Page 302: Upnp Control Point Software On Windows Me/Xp

    UPnP Control Point Software on Windows ME/XP This appendix provides instructions for configuring the UPnP on your computers to work with the Wireless Gateway. UPnP is an architecture for pervasive peer-to-peer network connectivity of intelligent appliances, Wireless devices, and PCs of all form factors.
  • Page 303: Upnp Control Point Software On Windows Xp With Firewall

    UPnP Control Point Software on Windows XP with Firewall On Windows XP versions earlier than SP2, Firewall support is provided by the Windows XP Internet Connection Firewall. You cannot use the Windows XP Internet Connection Firewall support on a system that you intend to use as a UPnP control point.
  • Page 304 4. The “Networking Services” window is displayed. The subcomponents shown in the Networking Services window will be different depending on if you are using Windows XP, Windows XP (SP1), or Windows XP (SP2). If you are using Windows XP SP2, the Networking Services window will display the following list of sub-components: 5.
  • Page 305 For example, from the Network Connections window you should see the Internet Gateway Device:...
  • Page 306: Troubleshooting

    Troubleshooting This appendix suggests solutions for problems you may encounter in installing or using the Wireless Gateway, and provides instructions for using several IP utilities to diagnose problems. Contact Customer Support if these suggestions do not resolve the problem. Troubleshooting Suggestions Problem Troubleshooting Suggestion LEDs...
  • Page 307 Problem Troubleshooting Suggestion I forgot/lost my user If you have not changed the password from the default, try using “admin” the user ID ID or password. and “admin“ as password. Otherwise, you can reset the device to the default configuration by pressing the Reset Default button on the Rare panel of the device (see Rare Panel).
  • Page 308: Diagnosing Problem Using Ip Utilities

    Diagnosing Problem using IP Utilities ping Ping is a command you can use to check whether your PC can recognize other computers on your network and the Internet. A ping command sends a message to the computer you specify. If the computer receives the message, it sends messages in reply.
  • Page 309 common name, and the nslookup command looks up the name in on your DNS server (usually located with your ISP). If that name is not an entry in your ISP’s DNS table, the request is then referred to another higher-level server, and so on, until the entry is found.
  • Page 310: License Statement / Gpl Code Statement

    LICENSE STATEMENT / GPL CODE STATEMENT This product resp. the here (http://global.level1.com/downloads.php?action=init) for downloading offered software includes software code developed by third parties, including software code subject to the GNU General Public License Version 2 (“GPLv2”) and GNU Lesser General Public License 2.1 („LGPLv2.1“). WRITTEN OFFER FOR GPL/LGPL SOURCE CODE We will provide everyone upon request the applicable...
  • Page 311 Digital Data Communications GmbH Zeche-Norm-Str. 25 44319 Dortmund Deutschland Phone: +49 231 9075 - 0 Fax: +49 231 9075 - 184 Email: support@level1.com Web: www.level1.com NO WARRANTY This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
  • Page 312 WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A...
  • Page 313 51 Franklin Street, Fifth Floor, Boston, MA 02110- 1301, USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it.
  • Page 314 service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things. To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights.
  • Page 315 Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations.
  • Page 316 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", below, refers to any such program or work, and a "work based on the Program"...
  • Page 317 1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty;...
  • Page 318 a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change. b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License.
  • Page 319 does not normally print such an announcement, your work based on the Program is not required to print an announcement.) These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you...
  • Page 320 In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.
  • Page 321 your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, c) Accompany it with the information you received as to the offer to distribute corresponding source code.
  • Page 322 anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code,...
  • Page 323 5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying,...
  • Page 324 to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all.
  • Page 325 sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system;...
  • Page 326 9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.
  • Page 327 guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally. NO WARRANTY 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW.
  • Page 328 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS...
  • Page 329 If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms. To do so, attach the following notices to the program.
  • Page 330 You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. Also add information on how to contact you by electronic and paper mail.
  • Page 331 disclaimer" for the program, if necessary. Here is a sample; alter the names: Yoyodyne, Inc., hereby disclaims all copyright interest in the program `Gnomovision' (which makes passes at compilers) written by James Hacker. signature of Ty Coon, 1 April 1989 Ty Coon, President of Vice This General Public License does not permit incorporating your program into proprietary programs.

Table of Contents