CNET CWR-854 User Manual

CNET CWR-854 User Manual

54mbps wireless-g router
Hide thumbs Also See for CWR-854:

Advertisement

Quick Links

54Mbps Wireless-G Router
CWR-854
User's Guide
1

Advertisement

Table of Contents
loading

Summary of Contents for CNET CWR-854

  • Page 1 54Mbps Wireless-G Router CWR-854 User’s Guide...
  • Page 2: Table Of Contents

    ............................3 ....................... 3 ....................3 CHAPTER-1 INTRODUCTION......................... 4 ........................4 ACKAGE ONTENT 1.2 S ............................ 5 PECIFICATION 1.3 F ............................6 EATURES 1.4 LED I ........................... 7 NDICATOR 1.5 R ......................... 8 ANEL ESCRIPTION CHAPTER-2 INSTALLATION........................9 2.1 H ........................
  • Page 3 Following is the explanation of the picture.
  • Page 4: Chapter-1 Introduction

    Chapter-1 Introduction Thank you for choosing the CNet Wireless series product. CWR-854 is an ideal Wireless-G Router for the small office or home networking environments. Setting SOHO and enterprise standard for high performance, secure, manageable and reliable WLAN. CWR-854 is not only a Wireless Router but also supports AP Client / Bridge and WDS (Wireless Distributed System) mode to satisfy all kinds of the application from different networking environment.
  • Page 5: Specification

    1.2 Specification Standard IEEE 802.11G/B Frequency Band 2.400GHz ~ 2.484GHz IEEE 802.11g: OFDM (64-QAM, 16-QAM, QPSK, BPSK) Radio Type IEEE 802.11b: DSSS (CCK/DQPSK/DBPSK) 802.11g: 54 / 48 / 36 / 24 / 18 / 12 / 9 & 6Mbps Data Rate (Wireless) 802.11b: 11 / 5.5 / 2 &...
  • Page 6: Features

    1.3 Features 802.11b/g compliant with 54Mbps high-speed data rate Operation modes: AP, AP client, Client, Bridge, WDS DHCP Server/Client Four Ethernet ports for broadband sharing Virtual DMZ, Port Forwarding Dynamic DNS TCP/UDP/ICMP/ARP protocol stack Firewall, URL/IP/Port/MAC filtering Wireless users access control Wireless security –...
  • Page 7: Led Indicator

    1.4 LED Indicator LED Indicator State Description POWER The WLAN Broadband Router is powered on The WLAN Broadband Router is powered off WLAN Flashing Data is transmitting or receiving on the antenna No data is transmitting or receiving on the antenna Flashing Data is transmitting or receiving on the LAN interface Port linked...
  • Page 8: Real Panel Description

    1.5 Real Panel Description Interfaces Description Antenna (Fixed / SMA) The Wireless LAN Antenna. Reset Push continually the reset button 5 ~ 10 seconds to reset the configuration parameters to factory defaults. Push continually the WPS button 5 ~ 10 seconds to enable the WPS feature. The RJ-45 sockets allow LAN connection through Category 5 cables.
  • Page 9: Chapter-2 Installation

    Chapter-2 Installation 2.1 Hardware Installation Place the Wireless LAN Broadband Router to the best optimum transmission location. The best transmission location for your WLAN Broadband Router is usually at the geographic center of your wireless network, with line of sign to all of your mobile stations. Connect the WAN port on the router to a Cable/DSL modem, Ethernet Server, or hub.
  • Page 10: Preparing The Networking

    2.2 Preparing the Networking This chapter covers the things that need to be done before configuring the router. The first thing is to set all computers on the network for TCP/IP networking and also gather necessary information from the Internet Service Provider (ISP). 2.3 Collecting ISP Information The following information needs to be gathered from the ISP before configuring the router: IP Assignment from ISP: Are IPs assigned dynamically or you have a fixed IP address? If fixed,...
  • Page 11 Click the IP Address tab. Select Obtain an IP address automatically. Now click the Gateway tab, and verify that the Installed Gateways field is Blank. Click the OK button. Click the OK button again. Windows may ask for original Windows installation CD or additional files.
  • Page 12 Configuring Windows 2000 PCs Click the Start button go to Settings and click on Control Panel. In Control Panel, double-click the Network and Dial-up Connections icon. Select the Local Area Connection icon for the applicable Ethernet adapter (usually it is the first Local Area Connection listed).
  • Page 13 Select Obtain an IP address automatically and click the OK button. Click the OK button again to complete the PC configuration. Restart your computer.
  • Page 14 Configuring Windows XP PCs The following instructions assume you are running Windows XP with the default interface (Control Panel looks different then previous versions of Windows). If you are using the Classic View (where icons and menus look similar to previous Windows versions), please follow the instructions for Windows 2000.
  • Page 15 Select Obtain an IP address automatically and click OK. Click the OK button again to complete the PC configuration. Configuring Windows XP PCs...
  • Page 16: Chapter-3 Web Configuration

    Chapter-3 Web Configuration This chapter describes how to access the router through the web browser. Please be noted that in order to access the router’s admin page, a computer must be connected to one of the LAN ports on the router. The WLAN Broadband Router is delivered with the following factory default parameters on the Ethernet LAN interfaces.
  • Page 17: Operation Mode

    3.1.1.Operation Mode This page followed by Setup Wizard page to define the operation mode. CWR-854 supports three kinds of operation mode for the different application and environment. CWR-854 can be presented a NAT Router, Bridge or Wireless ISP Client.
  • Page 18: Time Zone Settings

    3.1.2 Time Zone Settings Users can synchronize the local clock on the router to an available NTP server (optional). To complete this setting, enable NTP client update and select the correct Time Zone. Enable NTP client update: Enable time zone update function Time Zone Select: Select the time zone this router is used in.
  • Page 19: Lan Interface Setup

    3.1.3 LAN Interface Setup In the LAN interface Setup page, users can change the LAN IP address and Subnet Mask of the router. Most Users will not need to change these values. IP Address: Current IP address of the Wireless-G Router, not WAN IP address. Subnet Mask: Current subnet mask for the Wireless-G Router, not WAN subnet mask address Cancel: To skip the current settings and jump to the Setup Wizard page.
  • Page 20: Wan Interface Setup

    3.1.4 WAN Interface Setup In this screen users must identify and configure the connection type used for connecting to their Internet Service Provider (ISP). WAN Access Type: CWR supports 4 kinds of access type to connect the ISP – Static IP, DHCP Client, PPPoE, PPTP. Cancel: To skip the current settings and jump to the Setup Wizard page.
  • Page 21: Wireless Basic Settings

    3.1.5 Wireless Basic Settings In the Wireless Basic Settings page, users can configure the operating “Band” and “Mode” as well as “Network Type”, ” SSID”, “Channel Number” and if required MAC address cloning. Operating Band: 802.11B/G, 802.11G or 802.11B Operating Mode: AP, Client, WDS and AP+WDS. Network type: when operating mode is “Client”...
  • Page 22: Wireless Security Setup

    3.1.6 Wireless Security Setup This page is used to configure wireless security. CWR-854 could support WEP, WPA and WPA2 Encryption key. Those encryption methods could prevent any unauthorized access to your wireless network. After all items are set, click on “Finished” button to save all the parameters you have set, and the...
  • Page 23: Operation Mode

    3.2 Operation Mode This page is used to configure which mode wireless broadband router acts. Gateway: Traditional gateway configuration. It always connects to the Internet via ADSL/Cable Modem. LAN interface, WAN interface, Wireless interface, NAT and Firewall modules are applied to this mode Bridge: Each interface (LAN, WAN and Wireless) regards as bridge.
  • Page 24: Wireless

    3.3 Wireless 3.3.1 Basic Settings The Wireless Basic Settings include Band, Mode, SSID, Channel Number and other wireless settings. Disable Wireless LAN Interface: The wireless interface will be disabled when checked. Band: This Wireless-G Router can support three RF band: 802.11B/G, 802.11G and 802.11B.
  • Page 25 user when the router connect to a Root AP (When Universal Repeater Mode be enabled) Apply Changes: Click on “Apply Changes” to save changes and logout. Reset: Click on “Reset” to undo your changes.
  • Page 26: Wireless Advanced Settings

    3.3.2 Wireless Advanced Settings In Advanced Settings page, more 802.11 related parameters are tunable. Authentication Type: The router supports three kinds of the authentication types- Open System, Shared Key, and Auto. Fragment Threshold: Fragmentation mechanism is used for improving the efficiency when traffic is high in the wireless network.
  • Page 27 maximum performance is desired. Broadcast SSID: When enabled allows all wireless stations to detect the SSID of this wireless router. IAPP: The Inter-Access Point Protocol (IAPP) can extend multi-vendor interoperability to the roaming function. 802.11g Protection: Is used to prevent packet collision and increase performance in wireless networks with both 802.11b (using CCK modulation) and 802.11g (using OFDM modulation) devices.
  • Page 28: Security

    3.3.3 Security Here users define the security type and level of the wireless network. Selecting different methods provides different levels of security. Please note that using any encryption may cause a significant degradation of data throughput on the wireless link. There are five Encryption types supported: “None”, “WEP”, “WPA (TKIP)”, ”WPA2(AES)”, and “WPA2 Mixed”.
  • Page 29 WEP Encryption Encryption: “WEP” (Wired Equivalent Privacy) encryption type. Set WEP Key: Only active when “Use 802.1x Authentication” is not selected. Use 802.1x Authentication: When this feature is enabled, users need to enter parameters of the “RADIUS Server” and select the encryption key length to be “WEP 64bits”...
  • Page 30 Key Length: Choose either 64-bit or 128-bit. Key Format: Select Hexadecimal or ASCII . Default Tx Key: Select the default encryption Key (Key1 to Key4) being transmitted. Encryption Key 1: enter any key code for Encryption Key 1. Encryption Key 2: enter any key code for Encryption Key 2. Encryption Key 3: enter any key code for Encryption Key 3.
  • Page 31 Encryption: “WPA” stands for Wi-Fi Protected Access. There are three encryption modes – TKIP, AES and Mixed. TKIP: Temporal Key Integrity Protocol. AES: Advanced Encryption Standard. Mixed: WPA2 Mixed mode operation permits the coexistence of WPA and WPA2 clients on a common SSID. WPA2 Mixed Mode is a Wi-Fi Certified feature.
  • Page 32 WPA Authentication Mode: There are two modes of WPA authentication - Enterprise (RADIUS) and Personal (Pre-Shared Key). WPA Cipher Suite: There are two modes could be chose – TKIP and AES ( WPA2 Cipher Suite: There are two method could be chose – TKIP and AES RADIUS Server: When user chooses RADIUS authentication, there are three parameters for the RADIUS server to be set –...
  • Page 33: Access Control

    3.3.4 Access Control Access Control allows user to block or allow wireless clients to access this router. Users can select the access control mode, then add a new MAC address with a simple comment and click on “Apply Changes” to save the new addition. To delete a MAC address, select its corresponding checkbox under the Select column and click on “Delete Selected”...
  • Page 34: Wds Settings

    3.3.5 WDS Settings When selected in the Basic Settings page and enabled here, Wireless Distribution System (WDS) enables the router to be used as a wireless bridge. Two Wireless-G Routers in bridge mode can communicate with each other through their wireless interfaces. To accomplish this, all wireless routers should be set to the same channel and the MAC address of other AP / Routers should be entered in the table.
  • Page 35: Site Survey

    3.3.6 Site Survey The Wireless Site Survey tool will scan and display all available wireless networks. Click on “Refresh” to search/re-scan for available Wireless-G Router(s) or IBSS(s). If any Wireless-G Router or IBSS is found, select and click on connect to start a connection. Refresh: Click on “Refresh”...
  • Page 36: Wps

    Access Point in a minute without any hassle. CWR-854 could support both Self-PIN or PBC modes, or use the WPS button (at real panel) to easy enable the WPS function.
  • Page 37: Tcp / Ip Settings

    3.4 TCP / IP Settings Please follow the following instruction to build the network connection between the wireless router and your computers or network devices. 3.4.1 LAN Interface This page is used to configure the parameters for local area network that connects to the LAN ports of your WLAN Broadband Router.
  • Page 38 configuration setting. Reset: Click the Reset button to abort change and recover the previous configuration setting.
  • Page 39: Wan Interface

    3.4.2 WAN Interface “WAN Interface Setup” allows users to select the WAN connection type and configure the parameters pertaining to the WAN interface. The four different access types supported on this router are: Static IP, DHCP Client, PPPoE and PPTP. Static IP This is the connection type used when users have a fixed IP address from their ISP.
  • Page 40 response. Enable Web Server Access on WAN: Click the checkbox to enable web configuration from WAN side Enable IPSec pass through on VPN connection: Click the checkbox to enable IPSec packet pass through. Enable PPTP pass through on VPN connection: Click the checkbox to enable PPTP packet pass through.
  • Page 41 DHCP Client The DHCP client also called "Dynamic IP address" is the mostly used connection type by cable broadband service providers. In this case the user will automatically receive all IP information from the service provider. WAN Access Type: DHCP Client connection type. Host Name: Fill in the host name of Host Name.
  • Page 42 configuration. Enable Ping Access on WAN: Click the checkbox to enable WAN ICMP response. Enable Web Server Access on WAN: Click the checkbox to enable web configuration from WAN side Enable IPSec pass through on VPN connection: Click the checkbox to enable IPSec packet pass through.
  • Page 43 PPPoE PPPoE stands for “Point-to-Point Protocol over Ethernet”. PPP is the technology used for dialup Internet access. PPPoE works similarly except it works over a network connection. In this connection type, users are required to enter their PPPoE username and password. Some ISPs also require a service name to be entered.
  • Page 44 application is active to connect the Internet. Manual: the connection to the ISP is set manually. Idle Time: Only active only when Connect On Demand is selected. This is the time it takes for the router to disconnect from the ISP if no access request is received.
  • Page 45 PPTP PPTP stands for “Point-to-Point Tunneling Protocol”. PPTP is used to join 2 networks using the Internet as an intermediary network. It allows you to connect your home and work network over the Internet. The key is to enter the PPPTP userID, password, and PPTP Gateway IP address. The IP addresses, subnet mask, and default gateway may or may not be required.
  • Page 46 User Name: User Name provided by ISP. Password: Password provided by ISP MTU Size: MTU is the Maximum Transmission Unit. It specifies the largest packet size permitted for Internet transmission. Keep the default setting, 1452, to have the router select the best MTU for your Internet connection. Request MPPE Encryption: Click the checkbox to enable request MPPE encryption.
  • Page 47: Firewall

    3.5 Firewall 3.5.1 Port Filtering When enabled packets are denied access to Internet/filtered based on their port address. Enable Port Filtering: Enable the Port Filtering function. Port Range: Enter the Port range (1 to 65535) that are to be blocked.. Protocol: Protocols to be blocked UDP, TCP or both.
  • Page 48: Ip Filtering

    3.5.2 IP Filtering When enabled, LAN clients are blocked / filtered from accessing the Internet based on their IP addresses. Enable IP Filtering: Enable the IP Filtering function. Local IP Address: IP address that is to be blocked from accessing the Internet. Protocol: Select the protocol to be blocked UDP, TCP or both .
  • Page 49: Mac Filtering

    3.5.3 MAC Filtering When enabled, filtering will be based on the MAC address of LAN computers. Any computer with its MAC address on this list will be blocked from accessing the Internet. Enable MAC Filtering: Enable the MAC Filtering function. MAC Address: MAC Address that is to be blocked.
  • Page 50: Port Forwarding

    3.5.4 Port Forwarding The Port Forwarding feature allows users to create Virtual Servers by re-directing a particular range of service port numbers (from the WAN port) to a particular LAN IP address. Enable Port Forwarding: Enable port forwarding function. IP Address: This is the private IP of the server behind the NAT firewall. (Note: You need to give your LAN PC clients a fixed/static IP address for Port Forwarding to work properly.) Protocol: This is the protocol type to be forwarded.
  • Page 51: Url Filtering

    3.5.5 URL Filtering URL Filtering is used to restrict users to access specific websites in internet. Enable URL Filtering: Enable URL Filtering function. URL Address: Add one URL address. Apply Changes: Click on “Apply Changes” to save the settings. Reset: Click on “Reset” to undo your changes. Delete Selected: Select and delete any of the listed rules in the Current Port Forwarding Table.
  • Page 52: Dmz

    3.5.6 DMZ The DMZ feature allows one local user to be exposed to the Internet for special-purpose applications like Internet gaming or videoconferencing. When enabled, this feature opens all ports to a single station and hence renders that system exposed to intrusion from outside. The port forwarding feature is more secure because it only opens the ports required by that application..
  • Page 53: Management

    3.6 Management 3.6.1 Status The status page provides a brief read-only report for system, LAN and WAN configuration information. The data displayed may be changed depending on your current configuration. System Uptime: The date/time shows how long the router has been powered on. Firmware Version: Show the current firmware version.
  • Page 54: Statistics

    3.6.2 Statistics This page shows the packet counters for transmission and reception regarding to wireless, Ethernet LAN and Ethernet WAN networks. Wireless LAN Sent Packet: It shows the statistic count of sent packets on the wireless LAN interface. Received Packet: It shows the statistic count of received packets on the wireless LAN interface.
  • Page 55: Ddns

    3.6.3 DDNS You can assign a fixed host and domain name to a dynamic Internet IP address. Each time the router boots up, it will re-register its domain-name-to-IP-address mapping with the DDNS service provider. This is the way Internet users can access the router through a domain name instead of its IP address.
  • Page 56: Time Zone Settings

    3.6.4 Time Zone Settings This wireless router provides a NTP (Network Time Protocol) client that can synchronize time with a configured NTP server. Pressing the Refresh Time button refreshes system timestamp and the Save/Time Sync buttons forces NTP client sync time with NTP server. Current Time: Show the current time and date of the router.
  • Page 57: Denial Of Service (Dos Prevention)

    3.6.5 Denial of Service (DoS Prevention) This page is used to enable and setup protection to prevent attack by hacker’s program. It provides more security for users. Enable DoS Prevention: Click the checkbox to enable DoS prevention. Whole System Flood / Per-Source IP Flood…: Enable and setup prevention in details.
  • Page 58: Event Log

    3.6.6 Event Log This wireless router supports System Log information. This data is useful for monitoring and troubleshooting the network. Enable Log: Enable the Log function. System All: Show all log of wireless broadband router. Wireless: Only show wireless log. DoS: Only show denied of Service log Enable Remote Log: Enable the Remote Log function.
  • Page 59: Upgrade Firmware

    3.6.7 Upgrade Firmware The firmware on this wireless router can be easily upgraded. Firmware Upgrade: Click on the Browse button to select the firmware and then click on the Upload button. After the firmware upgrade is completed, the router will restart automatically. (Note: Do not power off the device while the firmware is being upgraded.) Select File: Enter the location and name of the file containing the new firmware.
  • Page 60: Save / Reload Settings

    3.6.8 Save / Reload Settings Users can create a backup file that contains current router settings. This backup file can be used to restore router settings. This is specially useful in the event you need to reset the router to its default settings.
  • Page 61: Password

    3.6.9 Password This page is used to set the account to access the web server of Access Point. Empty user name and password will disable the protection. User Name: Enter the new login user name. The user name can contain 1 to 30 characters and/or digits, and are case sensitive.
  • Page 62: Appendix A: Troubleshooting

    Appendix A: Troubleshooting Symptom Possible Causes Things to Do Inability to access the router • Incorrect or incompatible • Verify that the wireless wireless network configuration. network configurations For example, shared key between the wireless client authentication is configured on and wireless AP/Router are the wireless AP/Router and the compatible.
  • Page 63 • AP/Router is not power on • Check the “Power” LED. Make sure that you've plugged in the power cord. Intermittent connectivity • IEEE 802.1X authentication • The symptom of this issue is is enabled on the wireless when the wireless client loses client and is not enabled on connectivity every 3 minutes or the wireless AP/Router...
  • Page 64 wireless radio button might be configured to start in the off position automatically. • A wireless network adapter driver failing in early stages of service startup may result in the Wireless Zero Configuration or Wireless Configuration service not initializing over that interface. Client can't connect to the •...
  • Page 65: Appendix B: Frequently Asked Questions

    Appendix B: Frequently Asked Questions Q1: What is wireless networking? Ans: The term wireless networking refers to the technology that enables two or more computers to communicate using standard network protocols, but without network cabling. Strictly speaking, any technology that does this could be called wireless networking. The current buzzword however generally refers to wireless LANs.
  • Page 66 Figure A2: Hardware Access Point. Wireless connected computers using a Hardware Access Point. Figure A3: Software Access Point. Wireless connected computers using a Software Access Point. Q3: Can I mix wireless equipment from different vendors? Ans: Because most wireless networking hardware vendors support the 802.11 standard they can inter operate.
  • Page 67 also allow considerable flexibility in providing access to different network types, such as different types of Ethernet, Wireless and Token Ring networks. Such connections are only limited by the number of slots or interfaces in the computer used for this task. Further to this the software access point may include significant additional features such as shared Internet access, web caching or content filtering, providing significant benefits to users and administrators.
  • Page 68 is analogous to Ethernet cabling, the answer to this question becomes clear. To share an Internet connection across a LAN you need two things: If your LAN is wireless, the same criteria apply. You need a hardware or software access point and a wireless LAN.
  • Page 69 produces secure scrambled text. Decryption is the opposite of encryption; it is the mathematical operation that transforms cipher text to standard text. Q11: Why do I need a router? Ans: The increased reliance on computers to store valuable information and the development of applications that share information over the internet through networked personal computers, in combination with the advent of computer hacking, has made information and network security an important issue.
  • Page 70 Q21: What is the maximum number of users the Access Point facilitates? Ans: It depends on the volume of data and may be less if many users create a large amount of network traffic. Q22: What is the maximum number of IP addresses that the Router will support? Ans: The Router will support up to 253 IP addresses.

Table of Contents