Kyocera KR2 User Manual

Kyocera kr2: user guide
Hide thumbs Also See for KR2:

Advertisement

HELP MENU

Basic
Advanced
Tools
Status
Glossary
BASIC HELP
Wizard
WAN
Network
DHCP
Wireless (Wi-Fi)
ADVANCED HELP
Virtual Server
Special Applications
Gaming
Traffic Shaping
Routing
Access Control
Web Filter
MAC Address Filter
Firewall Settings
Inbound Filter
Advanced Wireless
WISH
Wi-Fi Protected Setup
Advanced Network
Failover
TOOLS HELP
Administrator Settings
Time
Syslog
Email Settings
System
Firmware
Dynamic DNS
System Check
Schedules
1 of 72

Advertisement

Table of Contents
loading

Summary of Contents for Kyocera KR2

  • Page 1: Help Menu

    HELP MENU • Basic • Advanced • Tools • Status • Glossary BASIC HELP • Wizard • • Network • DHCP • Wireless (Wi-Fi) ADVANCED HELP • Virtual Server • Special Applications • Gaming • Traffic Shaping • Routing • Access Control •...
  • Page 2: Status Help

    STATUS HELP • Device Info • Wireless (Wi-Fi) • Routing • Logs • Statistics • Active Sessions • WISH Sessions 2 of 72...
  • Page 3 BASIC HELP • Wizard • • Network • DHCP • Wireless (Wi-Fi) WIZARD Setup Wizard If you are new to networking and have never configured a router before, click on Setup Wizard and the router will guide you through a few simple steps to get your network up and running.
  • Page 4 Use Unicasting: This option is normally turned off, and should remain off as long as the WAN-side DHCP server correctly provides an IP address to the router. However, if the router cannot obtain an IP address from the DHCP server, the DHCP server may be one that works better with unicast responses.
  • Page 5 PPTP Server IP Address: The ISP provides this parameter, if necessary. The value may be the same as the Gateway IP Address. Reconnect Mode: Typically PPTP connections are not always on. The router allows you to set the reconnection mode. The settings are: •...
  • Page 6 MTU: The Maximum Transmission Unit (MTU) is a parameter that determines the largest packet size (in bytes) that the router will send to the WAN. If LAN devices send larger packets, the router will break them into smaller packets. Ideally, you should set this to match the MTU of the connection to your ISP.
  • Page 7 DNS Relay When DNS Relay is enabled, the router plays the role of a DNS server. DNS requests sent to the router are forwarded to the ISP's DNS server. This provides a constant DNS address that LAN computers can use, even when the router obtains a different DNS server address from the ISP upon re-establishing the WAN connection.
  • Page 8 RIP Password RIP Version 2 supports the use of a password to limit access to routers through the RIP protocol. If the ISP or other LAN router requires a RIP password, enter the password here. DHCP DHCP Server Settings DHCP stands for Dynamic Host Configuration Protocol. The DHCP section is where you configure the built-in DHCP Server to assign IP addresses to the computers and other devices on your local area network (LAN).
  • Page 9 Example: Suppose you configure the DHCP Server to manage addresses From 192.168.0.100 To 192.168.0.199. This means that 192.168.0.3 to 192.168.0.99 and 192.168.0.200 to 192.168.0.254 are NOT managed by the DHCP Server. Computers or devices that use addresses from these ranges are to be manually configured. Suppose you have a web server computer that has a manually configured address of 192.168.0.100.
  • Page 10 NetBIOS Scope This is an advanced setting and is normally left blank. This allows the configuration of a NetBIOS 'domain' name under which network hosts operate. This setting has no effect if the 'Learn NetBIOS information from WAN' is activated. NetBIOS Registration mode Indicates how network hosts are to perform NetBIOS name registration and discovery.
  • Page 11 Add/Edit DHCP Reservation This option lets you reserve IP addresses, and assign the same IP address to the network device with the specified MAC address any time it requests an IP address. This is almost the same as when a device has a static IP address except that the device must still request an IP address from the router.
  • Page 12: Wireless (Wi-Fi)

    Save/Update Record the changes you have made into the following list. Clear Re-initialize this area of the screen, discarding any changes you have made. DHCP Reservations List This shows clients that you have specified to have reserved DHCP addresses. Click the Enable checkbox at the left to directly activate or de-activate the entry.
  • Page 13 Require User Login This option turns off and on the user login feature of the router. When you enable this option a wireless user must enter a password to gain access to the the internet. It will also limit internet access to only 32 simultaneous clients. Wireless Network Name When you are browsing for available wireless networks, this is the name that will appear in the list (unless Visibility Status is set to Invisible, see below).
  • Page 14 A method of encrypting data for wireless communication intended to provide the same level of privacy as a wired network. WEP is not as secure as WPA encryption. To gain access to a WEP network, you must know the key. The key is a string of characters that you create.
  • Page 15 WPA-Personal This option uses Wi-Fi Protected Access with a Pre-Shared Key (PSK). Pre-Shared Key: The key is entered as a pass-phrase of up to 63 alphanumeric characters in ASCII (American Standard Code for Information Interchange) format at both ends of the wireless connection. It cannot be shorter than eight characters, although for proper security it needs to be of ample length and should not be a commonly known phrase.
  • Page 16: Advanced Help

    ADVANCED HELP • Virtual Server • Special Applications • Gaming • Traffic Shaping • Routing • Access Control • Web Filter • MAC Address Filter • Firewall Settings • Inbound Filter • Advanced Wireless • WISH • Wi-Fi Protected Setup •...
  • Page 17 IP Address The IP address of the system on your internal network that will provide the virtual service, for example 192.168.0.50. You can select a computer from the list of DHCP clients in the "Computer Name" drop-down menu, or you can manually enter the IP address of the server computer.
  • Page 18 Note: You might have trouble accessing a virtual server using its public identity (WAN-side IP- address of the gateway or its dynamic DNS name) from a machine on the LAN. Your requests may not be looped back or you may be redirected to the "Forbidden" page. The requests from the LAN machine will not be looped back if Internet access is blocked at the time of access.
  • Page 19: Application Rules

    TCP Ports Enter the TCP ports to open (for example 6159-6180, 99). UDP Ports Enter the UDP ports to open (for example 6159-6180, 99). Schedule Select a schedule for the times when this rule is in effect. If you do not see the schedule you need in the list of schedules, go to the schedule.
  • Page 20 Add/Edit Application Rule Example: You need to configure your router to allow a software application running on any computer on your network to connect to a web-based server or another user on the Internet. Enable Specifies whether the entry will be active or inactive. Name Enter a name for the Special Application Rule, for example Game App, which will help you identify the rule in the future.
  • Page 21: Traffic Shaping

    Clear Re-initialize this area of the screen, discarding any changes you have made. With the above example application rule enabled, the router will open up a range of ports from 6000-6200 for incoming traffic from the Internet, whenever any computer on the internal network opens up an application that sends data to the Internet using a port in the range of 6500-6700.
  • Page 22 Manual Uplink Speed If Automatic Uplink Speed is disabled, this options allows you to set the uplink speed manually. Uplink speed is the speed at which data can be transferred from the router to your ISP. This is determined by your ISP. ISPs often specify speed as a downlink/uplink pair;...
  • Page 23 Local IP Range The rule applies to a flow of messages whose LAN-side IP address falls within the range set here. Local Port Range The rule applies to a flow of messages whose LAN-side port number is within the range set here.
  • Page 24: Access Control

    Gateway Specifies the next hop to be taken if this route is used. A gateway of 0.0.0.0 implies there is no next hop, and the IP address matched is directly connected to the router on the interface specified: LAN or WAN. Metric The route metric is a value from 1 to 16 that indicates the cost of using this route.
  • Page 25: Website Filter

    Enter the URL (address) of the Web Site that you want to allow; for example: google.com. Do not enter the http:// preceding the URL. Enter the most inclusive domain; for example, enter kyocera.com and access will be permitted to both www.kyocera.com and support.kyocera.com.
  • Page 26: Firewall Settings

    MAC ADDRESS FILTER (NETWORK FILTER) The MAC address filter section can be used to filter network access by machines based on the unique MAC addresses of their network adapter(s). It is most useful to prevent unauthorized wireless devices from connecting to your network. A MAC address is a unique ID assigned by the manufacturer of the network adapter.
  • Page 27 Firewall Settings Enable SPI SPI ("stateful packet inspection" also known as "dynamic packet filtering") helps to prevent cyberattacks by tracking more state per session. It validates that the traffic passing through that session conforms to the protocol. When the protocol is TCP, SPI checks that packet sequence numbers are within the valid range for the session, discarding those packets that do not have valid sequence numbers.
  • Page 28 TCP Endpoint Filtering Controls endpoint filtering for packets of the TCP protocol. Formerly, the terms "Full Cone", "Restricted Cone", "Port Restricted Cone" and "Symmetric" were used to refer to different variations of NATs. These terms are purposely not used here, because they do not fully describe the behavior of this router's NAT.
  • Page 29 The DMZ capability is just one of several means for allowing incoming requests that might appear unsolicited to the NAT. In general, the DMZ host should be used only if there are no other alternatives, because it is much more exposed to cyberattacks than any other system on the LAN.
  • Page 30 Application Level Gateway (ALG) Configuration Here you can enable or disable ALGs. Some protocols and applications require special handling of the IP payload to make them work with network address translation (NAT). Each ALG provides special handling for a specific protocol or application. A number of ALGs for common applications are enabled by default.
  • Page 31: Inbound Filter

    Allows devices and applications using VoIP (Voice over IP) to communicate across NAT. Some VoIP applications and devices have the ability to discover NAT devices and work around them. This ALG may interfere with the operation of such devices. If you are having trouble making VoIP calls, try turning this ALG off.
  • Page 32: Advanced Wireless

    Beacon Period Beacons are packets sent by a wireless router to synchronize wireless devices. Specify a Beacon Period value between 20 and 1000. The default value is set to 100 milliseconds. RTS Threshold...
  • Page 33 A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages. When the wireless router has buffered broadcast or multicast messages for associated clients, it sends the next DTIM with a DTIM Interval value.
  • Page 34 WISH WISH is short for Wireless Intelligent Stream Handling, a technology developed to enhance your experience of using a wireless network by prioritizing the traffic of different applications. WISH Enable WISH Enable this option if you want to allow WISH to prioritize your traffic. Priority Classifiers HTTP Allows the router to recognize HTTP transfers for many common audio and video...
  • Page 35 Priority The priority of the message flow is entered here. Four priorities are defined: • BK: Background (least urgent). • BE: Best Effort. • VI: Video. • VO: Voice (most urgent). Protocol The protocol used by the messages. Host 1 IP Range The rule applies to a flow of messages for which one computer's IP address falls within the range set here.
  • Page 36: Wi-Fi Protected Setup

    WI-FI PROTECTED SETUP Wi-Fi Protected Setup Enable Enable the Wi-Fi Protected Setup feature. Lock Wireless Security Settings Locking the wireless security settings prevents the settings from being changed by any new external registrar using its PIN. Devices can still be added to the wireless network using Wi-Fi Protected Setup.
  • Page 37: Advanced Network

    Add Wireless Device Wizard Start the wizard. ADVANCED NETWORK UPnP UPnP is short for Universal Plug and Play, which is a networking architecture that provides compatibility among networking equipment, software, and peripherals. This router has optional UPnP capability, and can work with other UPnP devices and software. Enable UPnP If you need to use the UPnP functionality, you can enable it here.
  • Page 38 PPPoE Pass Through This option controls whether LAN computers can act as PPPoE clients and negotiate the PPP sessions through the router over the WAN ethernet link. Enable PPPoE Pass Through Enabling this option allows LAN computers to act as PPPoE clients. Disabling this option prevents LAN computers from establishing PPPoE pass-through connections.
  • Page 39 Slot The slot is the physical port the modem or ethernet cable is plugged into. Device This shows a description of the device. Status This is the link status of a device, which is one of the following. Ready This means the device is plugged in and available but not active. Establishing This means the router is attempting to bring up the link over the device.
  • Page 40: Administrator Settings

    TOOLS HELP • Administrator Settings • Time • Syslog • Email Settings • System • Firmware • Dynamic DNS • System Check • Schedules ADMINISTRATOR SETTINGS The Administrator Settings section is used to set-up secure access to the Web-based management. By default no password is configured. It is highly recommended that you create a password to keep your new router secure.
  • Page 41 Remote Admin Port The port that you will use to address the management interface from the Internet. For example, if you specify port 1080 here, then, to access the router from the Internet, you would use a URL of the form: http://my.domain.com:1080/. Use HTTPS Setting this option requires all remote administration to use the Secure HTTP (HTTPS) protocol.
  • Page 42: Email Settings

    Automatic Time Configuration Enable NTP Server Select this option if you want to synchronize the router's clock to a Network Time Server over the Internet. If you are using schedules or logs, this is the best way to ensure that the schedules and logs are kept accurate.
  • Page 43 Email Settings From Email Address This email address will appear as the sender when you receive a log file or firmware upgrade notification via email. To Email Address Enter the email address where you want the email sent. SMTP Server Address Enter the SMTP server address for sending email.
  • Page 44 SYSTEM This section allows you to manage the router's configuration settings, reboot the router, and restore the router to the factory default settings. Restoring the unit to the factory default settings will erase all settings, including any rules that you've created. Save To Local Hard Drive This option allows you to save the router's configuration to a file on your computer.
  • Page 45: Dynamic Dns

    Upload Once you have a firmware update on your computer, use this option to browse for the file and then upload the information into the router. Firmware Upgrade Notification Options Automatically Check Online for Latest Firmware Version When this option is enabled, your router will check online periodically to see if a newer version of the firmware is available.
  • Page 46: System Check

    Timeout The time between periodic updates to the Dynamic DNS, if your dynamic IP address has not changed. The timeout period is entered in hours. Note: If a dynamic DNS update fails for any reason (for example, when incorrect parameters are entered), the router automatically disables the Dynamic DNS feature and records the failure in the log.
  • Page 47 SCHEDULES Schedules can be created for use with enforcing rules. For example, if you want to restrict web access to Mon-Fri from 3pm to 8pm, you could create a schedule selecting Mon, Tue, Wed, Thu, and Fri and enter a Start Time of 3pm and End Time of 8pm. Add/Edit Schedule Rule In this section you can add entries to the Schedule Rules List below or edit existing entries.
  • Page 48: Device Info

    STATUS HELP • Device Info • Wireless (Wi-Fi) • Routing • Logs • Statistics • Active Sessions • WISH Sessions DEVICE INFO All of your Internet and network connection details are displayed on the Device Info page. The firmware version is also displayed here. Note: Some browsers have limitations that make it impossible to update the WAN status display when the status changes.
  • Page 49 IGMP Multicast memberships If IGMP is enabled, this area of the screen shows all multicast groups of which any LAN devices are members. WIRELESS (WI-FI) The wireless section allows you to view the wireless clients that are connected to your wireless router.
  • Page 50 What to View Select the kinds of events that you want to view. • Firewall and Security • System • Router Status View Levels Select the level of events that you want to view. • Critical • Warning • Informational Apply Log Settings Now Click this button after changing Log Options to make them effective and permanent.
  • Page 51: Active Sessions

    RX Packets Dropped The number of packets that were dropped while being received, due to errors, collisions, or router resource limitations. Collisions The number of packets that were dropped due to Ethernet collisions (two or more devices attempting to use an Ethernet circuit at the same time). Errors The number of transmission failures that cause loss of a packet.
  • Page 52: Wish Sessions

    The direction of initiation of the conversation: Initiated from LAN to WAN. Initiated from WAN to LAN. Priority The preference given to outbound packets of this conversation by the QoS Engine logic. Smaller numbers represent higher priority. Time Out The number of seconds of idle time until the router considers the session terminated. The initial value of Time Out depends on the type and state of the connection.
  • Page 53 State State for sessions that use the TCP protocol. • NO: None -- This entry is used as a placeholder for a future connection that may occur. • SS: SYN Sent -- One of the systems is attempting to start a connection. •...
  • Page 54 HELP GLOSSARY 802.11 A family of specifications for wireless local area networks (WLANs) developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE). Access Control List ACL. This is a database of network devices that are allowed to access resources on the network.
  • Page 55 AppleTalk Address Resolution Protocol AARP. Used to map the MAC addresses of Apple computers to their AppleTalk network addresses, so that conversions can be made in both directions. Application layer 7th Layer of the OSI model. Provides services to applications to ensure that they can communicate properly with other applications on a network.
  • Page 56 Bit rate The amount of bits that pass in given amount of time Bit/sec Bits per second BOOTP Bootstrap Protocol. Allows for computers to be booted up and given an IP address with no user intervention Bottleneck A time during processes when something causes the process to slowdown or stop all together Broadband A wide band of frequencies available for transmitting data...
  • Page 57 Collision When do two devices on the same Ethernet network try and transmit data at the exact same time. Cookie Information that is stored on the hard drive of your computer that holds your preferences to the site that gave your computer the cookie Data Information that has been translated into binary so that it can be processed or moved to another device...
  • Page 58 Default A predetermined value or setting that is used by a program when no user input has been entered for this value or setting Demilitarized zone DMZ: A single computer or group of computers that can be accessed by both users on the Internet as well as users on the Local Network, but that is not protected by the same security as the Local Network.
  • Page 59 Dynamic DNS service Dynamic DNS is provided by companies to allow users with Dynamic IP addresses to obtain a Domain Name that will always by linked to their changing IP address. The IP address is updated by either client software running on a computer or by a router that supports Dynamic DNS, whenever the IP address changes Dynamic IP address IP address that is assigned by a DHCP server and that may change.
  • Page 60 Firmware Programming that is inserted into a hardware device that tells it how to function Fragmentation Breaking up data into smaller pieces to make it easier to store File Transfer Protocol. Easiest way to transfer files between computers on the Internet Full-duplex Sending and Receiving data at the same time Gain...
  • Page 61 Hexadecimal Characters 0-9 and A-F The action of data packets being transmitted from one router to another Host Computer on a network HTTP Hypertext Transfer Protocol is used to transfer files from HTTP servers (web servers) to HTTP clients (web browsers) HTTPS HTTP over SSL is used to encrypt and decrypt HTTP transmissions A networking device that connects multiple devices together...
  • Page 62 Internet A system of worldwide networks which use TCP/IP to allow for resources to be accessed from computers around the world Internet Explorer A World Wide Web browser created and provided by Microsoft Internet Protocol The method of transferring data from one computer to another on the Internet Internet Protocol Security IPsec provides security at the packet processing layer of network communication Internet Service Provider...
  • Page 63 Java A programming language used to create programs and applets for web pages Kbps Kilobits per second Kbyte Kilobyte L2TP Layer 2 Tunneling Protocol Local Area Network Latency The amount of time that it takes a packet to get from the one point to another on a network.
  • Page 64 Mbps Megabits per second Medium Dependent Interface is an Ethernet port for a connection to a straight-through cable MDIX Medium Dependent Interface Crossover, is an Ethernet port for a connection to a crossover cable Management Information Base is a set of objects that can be managed by using SNMP Modem A device that Modulates digital signals from a computer to an analog signal in order to transmit the signal over phone lines.
  • Page 65 Netmask Determines what portion of an IP address designates the Network and which part designates the Host Network Interface Card A card installed in a computer or built onto the motherboard that allows the computer to connect to a network Network Layer The third layer of the OSI model which handles the routing of traffic on a network Network Time Protocol...
  • Page 66 Physical layer The first layer of the OSI model. Provides the hardware means of transmitting electrical signals on a data carrier Ping A utility program that verifies that a given Internet address exists and can receive messages. The utility sends a control packet to the given address and waits for a response.
  • Page 67 RADIUS Remote Authentication Dial-In User Service allows for remote users to dial into a central server and be authenticated in order to access resources on a network Reboot To restart a computer and reload it's operating software or firmware from nonvolatile storage.
  • Page 68 Session layer The fifth layer of the OSI model which coordinates the connection and communication between applications on both ends Simple Mail Transfer Protocol Used for sending and receiving email Simple Network Management Protocol Governs the management and monitoring of network devices Session Initiation Protocol.
  • Page 69 Syslog System Logger -- a distributed logging interface for collecting in one place the logs from different sources. Originally written for UNIX, it is now available for other operating systems, including Windows. Transmission Control Protocol TCP Raw A TCP/IP protocol for transmitting streams of printer data. TCP/IP Transmission Control Protocol/Internet Protocol TFTP...
  • Page 70 UPnP Universal Plug and Play Uniform Resource Locator is a unique address for files accessible on the Internet Universal Serial Bus Unshielded Twisted Pair Virtual Private Network VPN: A secure tunnel over the Internet to connect remote offices or users to their company's network VLAN Virtual LAN...
  • Page 71 Wireless Distribution System. A system that enables the interconnection of access points wirelessly. Web browser A utility that allows you to view content and interact with all of the information on the World Wide Web Wired Equivalent Privacy is security for wireless networks that is supposed to be comparable to that of a wired network Wide Area Network The larger network that your LAN is connected to, which may be the Internet itself, or a...
  • Page 72 xDSL A generic term for the family of digital subscriber line (DSL) technologies, such as ADSL, HDSL, RADSL, and SDSL. Yagi antenna A directional antenna used to concentrate wireless signals on a specific location 72 of 72...

Table of Contents