Encore EN2HWI-N3 User Manual

Encore EN2HWI-N3 User Manual

Wireless n300 gigabit gaming router
Table of Contents

Advertisement

Quick Links

© 2010 Encore Electronics, Inc. All rights reserved.COVER
© 2010 Encore Electronics, Inc.
Product specifications, size, and shape are subject to change without notice, and actual product appearance may differ from that depicted herein.
All trademarks and brand names are the properties of their respective holders.

Advertisement

Table of Contents
loading

Summary of Contents for Encore EN2HWI-N3

  • Page 1 © 2010 Encore Electronics, Inc. All rights reserved.COVER © 2010 Encore Electronics, Inc. Product specifications, size, and shape are subject to change without notice, and actual product appearance may differ from that depicted herein. All trademarks and brand names are the properties of their respective holders.
  • Page 2: Table Of Contents

    ABLE OF ONTENTS 1. INTRODUCTION ....................4 & B ................5 EATURES ENEFITS ................6 ACKAGE ONTENTS ................6 AFETY UIDELINES SOHO R ..........7 IRELESS OUTER ESCRIPTION ................. 9 YSTEM EQUIREMENTS ..................9 PPLICATIONS ..............11 ETWORK ONFIGURATION a) Ad-hoc (peer-to-peer) Mode ..............11 b) Infrastructure Mode ..................
  • Page 3 MAC Cloning ..................... 26 3.1.3 Wizard Wireless ................27 Automatic Network Setup ................28 Manual Network Setup ................28 3.1.4 Network Settings ................31 Bridge Mode ..................... 31 Router Mode ..................... 32 RIP (Routing Information Protocol) ............34 DHCP Server Settings ................36 Add/Edit DHCP Reservation ..............
  • Page 4 Product specifications, size, and shape are subject to change without notice, and actual product appearance may differ from that depicted herein. All trademarks and brand names are the properties of their respective holders. © 2010 Encore Electronics, Inc. All rights reserved. www.encore-usa.com...
  • Page 5: Introduction

    1. Introduction The EN2HWI-N3 wireless N300 gigabit gaming router is an 802.11n compliant device that delivers up to 6x faster speeds than 802.11g while staying backward compatible with 802.11g and 802.11b devices. It is not only a Wireless Access Point, which lets you connect to the network without wires.
  • Page 6: Features & Benefits

    1.1 Features & Benefits Features Benefits High Speed Data Rate Up to Capable of handling heavy data payloads such as 300Mbps MPEG video streaming IEEE 802.11n Compliant and Fully interoperable with IEEE 802.11b/g/n devices backward compatible with 802.11b/g Four built-in Scalability, able to extend your network 10/100/1000Mbps Gigabit Switch Ports...
  • Page 7: Package Contents

    Do not discard the packing materials, in case of return; the unit must be shipped in its original package.  EN2HWI-N3 wireless N300 gigabit gaming router x 1  DC Power Adapter x 1  3dBi 2.4GHz Dipole Antennas x 2 ...
  • Page 8: Wireless Soho Router Description

    1.4 Wireless SOHO Router Description Rear Panel Power Jack Power Switch LAN Ports WAN / Internet Port www.encore-usa.com...
  • Page 9 Front Panel Antenna Antenna Connector LED panel WPS button www.encore-usa.com...
  • Page 10: System Requirements

    Parts Description LAN Ports (1 – 4) Use an Ethernet cable to connect each port to a computer on your Local Area Network (LAN). WAN Port Use an Ethernet cable to connect this port to your WAN router. Power Switch Turn on or off the device Antenna Interface for the antennas.
  • Page 11 a) Difficult-to-wire environments There are many situations where wires cannot be laid easily. Historic buildings, older buildings, open areas and across busy streets make the installation of LANs either impossible or very expensive. b) Temporary workgroups Consider situations in parks, athletic arenas, exhibition centers, disaster-recovery, temporary offices and construction sites where one wants a temporary WLAN established and removed.
  • Page 12: Network Configuration

    1.7 Network Configuration To better understand how the wireless LAN products work together to create a wireless network, it might be helpful to depict a few of the possible wireless LAN PC card network configurations. The wireless LAN products can be configured as: a) Ad-hoc (peer-to-peer) for departmental or SOHO LANs.
  • Page 13: B) Infrastructure Mode

    b) Infrastructure Mode The infrastructure mode requires the use of an access point (AP). In this mode, all wireless communication between two computers has to be via the AP. It doesn’t matter if the AP is stand-alone or wired to an Ethernet network. If used in stand-alone, the AP can extend the range of independent wireless LANs by acting as a repeater, which effectively doubles the distance between wireless stations.
  • Page 14: Installation

    2. INSTALLATION 2.1 Hardware Connection 1. Place the EN2HWI-N3 router in an appropriate location after conducting a site survey. 2. LAN connection: Connect Ethernet cable between your PC/Notebook LAN port & one of the 4 available LAN ports on EN2HWI-N3.
  • Page 15: Login To The Web-Based Configuration Utility

    2.2 Login to the web-based configuration utility Windows XP 1. Assuming your PC or Laptop is already equipped with a Network Interface Card and properly working. Click on START  select “Control Panel”  From the Control Panel Window select “Network Connections” 2.
  • Page 16 3. Click to Highlight the “Internet Protocol (TCP/IP)” then click “Properties” button 4. Select the “General” tab. The EN2HWI-N3 supports DHCP Client function, select both “Obtain an IP address automatically” and “Obtain DNS server address automatically” www.encore-usa.com...
  • Page 17 5. Insert the Setup CD into the CD-ROM drive; the setup screen will automatically appear. Click the “Setup Wizard” button, and then follow the on-screen instructions. The final Setup Page as below: Click the “OK” button to open your web browser with Login Page. www.encore-usa.com...
  • Page 18 7. Input the Username and Password, and the click [Login] button to navigate into the EN2HWI-N3 configuration home page. The factory default username is admin and password is also admin.
  • Page 19: Web-Based Configuration

    3. Web-based Configuration After login, you will see the configuration home page of the EN2HWI-N3 as follows. The navigation tree menu on left is divided following sections: 1. Basic: This menu includes the wireless wizard, network settings, wireless settings, and WAN settings.
  • Page 20: Basic

    3.1 Basic Click on the Basic link on the navigation drop-down menu. 3.1.1 Internet Settings This chapter describes how to use the wizard to configure the WAN, LAN, and wireless settings. Please refer to Chapter 3.2 in order to configure the more advanced features of the EN2WI-N3.
  • Page 21: Internet Connection Type

    Internet Connection Type  Select your Internet service WAN type  The EN2HWI-N3 supports several types of Internet / WAN connections: o DHCP Connection (Dynamic IP address) – Choose this connection type if your ISP provides you the IP address. Most cable modems use this type of connection.
  • Page 22: Dhcp Connection (Dynamic Ip Address)

    The WAN interface can be configured as a DHCP Client in which the ISP provides the IP address to the EN2HWI-N3. This is also known as Dynamic IP. Host Name: this is optional if you need to specify the host name for this router.
  • Page 23: Pppoe (Point-To-Point Protocol Over Ethernet)

    PPPoE (Point-to-Point Protocol over Ethernet) The WAN interface can be configured as PPPoE. This type of connection is usually used for a DSL service and requires a username and password to connect.  Address Mode: PPPoE can be used with a dynamic or static IP address. If you select the Dynamic IP radio button, then the IIP address in the next field is not required.
  • Page 24: Pptp (Point-To-Point Tunneling Protocol)

     Maximum Idle Time: This is for the Internet connection is maintained during inactivity. If the application is inactive for certain time designated here the internet connection will be automatically dropped. PPTP (Point-to-Point Tunneling Protocol) PPTP uses a virtual private network to connect to your ISP. This method of connection requires you to enter a username and password (provided by your ISP) to gain access to the Internet.
  • Page 25: Static Ip Address Configuration

     Reconnect Mode: o Keep Connection: will stay connected to the Internet. o Automatic Connect: automatically connects to the Internet when an application needs it, and drops the connection after the designated idle time period. o Manual Connect: manually connect and disconnect to the internet by the user. ...
  • Page 26: Other Internet Settings

    3.1.2 Other Internet Settings RIP (Routing Information Protocol) This function allows RIP to accept updates from this connection. Note that private routing information is never sent to this connection. DNS Settings Optional. If your ISP doesn’t provide you with a DNS server address automatically through DHCP, enter a DNS server IP address here.
  • Page 27: Wan Ping

    MAC Cloning The “Clone Your PC’s MAC Address” button clones the MAC address of your PC and use it as the MAC address of your EN2HWI-N3 router instead of the real MAC address of the router. www.encore-usa.com...
  • Page 28: Wizard Wireless

    This wizard will guide you in the configuration of the wireless network settings such as the SSID and security (WEP/WPA). Click the “Wireless Network Setup Wizard” button to configure the basic functionalities of the EN2HWI-N3 Router. Click “Next” button. www.encore-usa.com...
  • Page 29: Automatic Network Setup

    Automatic Network Setup  If you select the Auto option, then the device will automatically configure the SSID and security mode.  Click on the Next button to continue.  The wizard has automatically configured the SSID and security mode for the device. Click on the Save button to complete the setup.
  • Page 30  Click on the Next button to continue.  Enter the Wireless Network Name (SSID) for the EN2HWI-N3. The SSID is a unique named shared amongst all the points of the wireless network. The SSID must be identical on all points of the wireless network and cannot exceed 32 characters. Click on the Next button to continue.
  • Page 31  Enter a security password between 2 and 20 characters then click on the Next button.  The setup is complete. To save configuration changes click the Save button. After the Wireless settings are saved and the EN2HWI-N3 is rebooted www.encore-usa.com...
  • Page 32: Network Settings

    3.1.4 Network Settings The EN2HWI-N3 can be configured at a Router or a Bridge. Select Router mode if the WAN port is connected to the Internet. Select Bridge if the device is connected to a local network downstream from another router.
  • Page 33: Router Mode

     Default Gateway: Enter the IP address of the upstream router.  Primary/Secondary DNS: Enter the IP address of the DNS server.  To save configuration changes click the Apply button. Router Mode In this mode, the device functions as a NAT router and is connected to the Internet. Select the Router Mode radio button.
  • Page 34 DHCP server. For example, if you enter EN2HWI-N3 here, and you have a LAN side laptop with a name of USER1, that laptop will be known as USER1.EN2HWI-N3.
  • Page 35: Rip (Routing Information Protocol)

    RIP messages on your network.  RIP Operating mode: The EN2HWI-N3 supports both version 2 and version 1 of the RIP specification. V1: Click it if none of the routers supports Version 2.
  • Page 36  Act as default router: Check box to make this router preferred destination for packets that are not otherwise destined.  RIP Password: This router supports the use of clear-text passwords in RIP version 2 messages. Only routers with the same RIP password can share routes via RIP. RIP passwords serve more as a mechanism to limit route sharing rather than as a security mechanism.
  • Page 37: Dhcp Server Settings

    DHCP Server Settings DHCP stands for Dynamic Host Configuration Protocol. The DHCP section is where you configure the built-in DHCP Server to assign IP addresses to the computers and other devices on your local area network (LAN).  Enable DHCP Server: Once your router is properly configured and this option is enabled, the DHCP Server will manage the IP addresses and other network configuration information for computers and other devices connected to your Local Area Network.
  • Page 38  DHCP IP Address Range: These two IP values (from and to) define a range of IP addresses that the DHCP Server uses when assigning addresses to computers and devices on your Local Area Network. Any addresses that are outside of this range are not managed by the DHCP Server;...
  • Page 39  Secondary WINS Server IP address: Configure the IP address of the backup WINS server, if any. This setting has no effect if the 'Learn NetBIOS information from WAN' is activated.  NetBIOS Scope: This is an advanced setting and is normally left blank. This allows the configuration of a NetBIOS 'domain' name under which network hosts operate.
  • Page 40: Add/Edit Dhcp Reservation

    Add/Edit DHCP Reservation This option lets you reserve IP addresses, and assign the same IP address to the network device with the specified MAC address any time it requests an IP address. This is almost the same as when a device has a static IP address except that the device must still request an IP address from the router.
  • Page 41 DHCP Reservations List This shows clients that you have specified to have reserved DHCP addresses. Click the Enable checkbox at the left to directly activate or de-activate the entry. An entry can be changed by clicking the Edit icon or can be deleted by clicking the Delete icon. When you click the Edit icon, the item is highlighted, and the "Edit DHCP Reservation"...
  • Page 42: Wireless Settings

    3.1.5 Wireless Settings These options allow you to enable/disable the wireless interface, switch between the 11b, 11g, and 11n. Mixed radio band and channel frequency, setup for multiple SSID as well.  Enable Wireless: Place a check in this box to enable the wireless interface, it is enabled by default.
  • Page 43  Wireless Channel: Select a channel from the drop-down list. The channels available are based on the country’s regulation. A wireless network uses specific channels in the wireless spectrum to handle communication between clients. Some channels in your area may have interference from other electronic devices. Choose the clearest channel to help optimize the performance and coverage of your wireless network.
  • Page 44: Wep (Wired Equivalent Privacy)

    Wireless Security Mode To protect your privacy this mode supports several types of wireless security: WEP WPA, WPA2, and WPA-Mixed. WEP is the original wireless encryption standard. WPA provides a higher level of security. The following section describes the security configuration in detail. WEP (Wired Equivalent Privacy) WEP is an acronym for Wired Equivalent Privacy, and is a security protocol that provides the same level of security for wireless networks as for a wired network.
  • Page 45  WEP Key Length: Select a 64-bit or 128-bit WEP key length from the drop-down list.  WEP Key 1-4: You may enter four different WEP keys.  Authentication: Select Open or Shared Key from the drop-down list. An open system allows any client to authenticate as long as it conforms to any MAC address filter policies that may have been set.
  • Page 46: Wpa Personal (Wi-Fi Protected Access)

    WPA Personal (Wi-Fi Protected Access) Select the WPA-Personal from the Wireless Security Mode drop-down list if your wireless network uses WPA encryption. WPA (Wi-Fi Protected Access) was designed to improve upon the security features of WEP (Wired Equivalent Privacy). The technology is designed to work with existing Wi-Fi products that have been enabled with WEP.
  • Page 47  Cipher Type: Select TKIP and AES as the cipher suite. The encryption algorithm used to secure the data communication. TKIP. Use TKIP only. TKIP (Temporal Key Integrity Protocol) provides per-packet key generation and is based on WEP. AES. Use AES only. AES (Advanced Encryption Standard) is a very secure block based encryption.
  • Page 48: Wpa Enterprise (Wi-Fi Protected Access & 802.1X)

    WPA Enterprise (Wi-Fi Protected Access & 802.1x) Select the WPA-Enterprise from the drop-down list if your wireless network uses WPA encryption. WPA (Wi-Fi Protected Access) was designed to improve upon the security features of WEP (Wired Equivalent Privacy). The technology is designed to work with existing Wi-Fi products that have been enabled with WEP.
  • Page 49  RADIUS Server IP Address: Specify the IP address of the RADIUS server.  RADIUS Server Port: Specify the port number of the RADIUS server, the default port is 1812.  RADIUS Server Shared Secret: Specify the pass-phrase that is matched on the RADIUS Server.
  • Page 50: Advanced

    3.2 Advanced Click on the Advanced link on the navigation tree menu. The configuration steps for each option are described below. 3.2.1 Advanced Wireless If you are not familiar with Advanced Wireless Settings, please read the help section before attempting to modify these settings. www.encore-usa.com...
  • Page 51  Transmit Power: Set the power output of the wireless signal  Beacon Period: Beacons are packets sent by a wireless router to synchronize wireless devices. Specify a Beacon Period value between 20 and 1000. The default value is set to 100 milliseconds.
  • Page 52 Fragmentation Threshold. This setting should remain at its default value of 2346 bytes. Setting the Fragmentation value too low may result in poor performance.  DTIM Interval: A Delivery Traffic Indication Message informs all wireless clients that the access point will be sending Multi-cast data. ...
  • Page 53: Virtual Server

    3.2.2 Virtual Server The Virtual Server option gives Internet users access to services on your LAN. This feature is useful for hosting online services such as FTP, Web, or game servers. For each Virtual Server, you define a public port on your router for redirection to an internal LAN IP Address and LAN port.
  • Page 54: Special Applications

     Private Port: Specify the private port number.  Schedule: Select a schedule to Always or Never from the drop-down list. If a schedule does not exist, you may create it in the Tools > Schedule section.  Inbound Filter: Select an inbound filter from the drop-down list. If an inbound filter does not exist, you may create it from Advanced >...
  • Page 55: Port Forwarding

     Triggering Ports: Specify the outgoing port range that is used by the application.  Firewall Ports: Specify the port range that you would like to open for Internet traffic.  Schedule: Select a schedule to Always or Never from the drop-down list. If a schedule does not exist, you may create it in the Tools >...
  • Page 56: Streamengine

    of these entries fills some of the remaining parameters with standard values for that type of server.  IP Address: Specify the IP address for the virtual server entry.  TCP/UDP Ports: Specify the TCP or UDP port numbers.  Schedule: Select a schedule to Always or Never from the drop-down list.
  • Page 57  Automatic Uplink Speed. Place a check in this box to enable automatic uplink speed. When enabled, this option causes the router to automatically measure the useful uplink bandwidth each time the WAN interface is re-established (after a reboot, for example). ...
  • Page 58  Enable StreamEngine: Place a check in this box to enable this option. Enable this option for better performance and experience with online games and other interactive applications, such as VoIP.  Automatic Classification: Place a check in this box to enable this option. This option is enabled by default so that your router will automatically determine which programs should have network priority.
  • Page 59 Add StreamEngine Rule: A StreamEngine Rule identifies a specific message flow and assigns a priority to that flow. For most applications, automatic classification will be adequate, and specific StreamEngine Rules will not be required. StreamEngine supports overlaps between rules, where more than one rule can match for a specific message flow. If more than one rule is found to match the rule with the highest priority will be used.
  • Page 60: Routing

    3.2.6 Routing This section adds a new entry into the routing table.  Name: Specify a name for the rule.  Destination IP: Specify the destination IP address.  Netmask: Specify the subnet mask for the IP address.  Gateway: Specify the IP address of the gateway. ...
  • Page 61: Access Control

    3.2.7 Access Control The Access Control section allows you to control access in and out of devices on your network. Use this feature as Parental Controls to only grant access to approved sites, limit web access based on time or dates, and/or block access from applications such as peer-to-peer utilities or games.
  • Page 62  Specify a policy name and then click on the Next button.  Select a schedule from the drop-down list: Always or Never, or you may define a new schedule. Click on the Next button.  Select a machine to which the policy applies. ...
  • Page 63  IP Address: If you selected IP address above, then specify the IP address here.  MAC Address: If you need to change the MAC address of the router's WAN-side Ethernet interface, either type in an alternate MAC address (for example, the MAC address of the router initially connected to the ISP) or click on Clone Your PCs MAC Address.
  • Page 64: Web Filter

    3.2.8 Web Filter This is a type of parental control feature used to restrict certain websites form being accessed through your network. These filters can be used for securing and restricting your network. Website URL/Domain: Specify the web address that you would like to filter. Do not use “http://”...
  • Page 65: Mac Address Filter

    3.2.9 MAC Address Filter This feature is used to restrict certain MAC address from accessing the Internet. These filters can be used for securing and restricting your network. MAC Filtering Setup: Select one of the options from the drop-down list. ...
  • Page 66: Firewall

    3.2.10 Firewall The device provides a tight firewall by virtue of the way NAT works. Unless you configure the router to the contrary, the NAT does not respond to unsolicited incoming requests on any port, thereby making your LAN invisible to Internet cyber attacks. However, some network applications cannot run with a tight firewall.
  • Page 67 the router always tracks TCP connection states and ensures that each TCP packet's flags are valid for the current state.  TCP / UDP NAT Endpoint Filtering options control how the Router's NAT manages incoming connection requests to ports that are already being used. Select one of the radio buttons.
  • Page 68  Enable Port Preservation: Place a check in this box to enable Port Preservation. NAT Port preservation (on by default) tries to ensure that, when a LAN host makes an Internet connection, the same LAN port is also used as the Internet visible port. This ensures best compatibility for internet communications.
  • Page 69  DMZ IP Address: Specify the IP address of the DMZ host.  Non-UDP/TCP/ICMP LAN Sessions: Place a check in this box to enable this feature. When a LAN application that uses a protocol other than UDP, TCP, or ICMP initiates a session to the Internet, the router's NAT can track such a session, even though it does not recognize the protocol.
  • Page 70 servers but not to the same server. The advantage of disabling the PPTP ALG is to increase VPN performance. Enabling the PPTP ALG also allows incoming VPN connections to a LAN side VPN server (refer to Advanced → Virtual Server). ...
  • Page 71  MMS: Allows Windows Media Player, using MMS protocol, to receive streaming media from the internet.  To save configuration changes click the Apply button. www.encore-usa.com...
  • Page 72: Inbound Filter

    3.2.11 Inbound Filter When you use the Virtual Server, Port Forwarding, or Remote Administration features to open specific ports to traffic from the Internet, you could be increasing the exposure of your LAN to cyber attacks from the Internet. In these cases, you can use Inbound Filters to limit that exposure by specifying the IP addresses of internet hosts that you trust to access your LAN through the ports that you have opened.
  • Page 73: Wish

    3.2.12 WISH WISH is short for Wireless Intelligent Stream Handling, a technology developed to enhance your experience of using a wireless network by prioritizing the traffic of different applications.  Enable WISH: Place a check in this box to enable the WISH feature. ...
  • Page 74 that the streams exhibit. This acts to de-prioritize streams that exhibit bulk transfer characteristics, such as file transfers, while leaving interactive traffic, such as gaming or VoIP, running at a normal priority.  Enable: Place a check in this box to enable the WISH Rule. A WISH Rule identifies a specific message flow and assigns a priority to that flow.
  • Page 75  Host 1 Port Range: Specify the port range for the rule.  Host 2 IP Range: Specify the IP range for the rule.  Host 2 Port Range: Specify the port range for the rule.  Click on the Save button to insert the entry into the WISH Rules list. www.encore-usa.com...
  • Page 76: Wi-Fi Protected Setup

    3.2.13 Wi-Fi Protected Setup Wi-Fi Protected Setup is a feature that locks the wireless security settings and prevents the settings from being changed by any new external registrar using its PIN. Devices can still be added to the wireless network using Wi-Fi Protected Setup. ...
  • Page 77  Generate NEW PIN: Press this button to generate a new random PIN.  Add Wireless Device Wizard: Please refer to Chapter 3.1.3 in order to configure Wi-Fi Protected Setup using the Wizard.  Click on the Apply button to store these settings. www.encore-usa.com...
  • Page 78: Advanced Network

    3.2.14 Advanced Network In this section you can configure the UPNP, WAN Ping, WAN port speed, multicast streams, and PPPoE pass-through settings.  Enable UPnP: Place a check in this box to enable UPnP. UPnP stands for Universal Plug and Play, which is a networking architecture that provides compatibility among networking equipment, software, and peripherals.
  • Page 79  Allow Users to disable Internet Access: Place a check in this box if you would like to allow to user to terminate the WAN session.  Allow Users to modify Virtual Server Mappings: Place a check in this box if you would like the users to add, modify, or delete server mapping entries.
  • Page 80: Tools

    3.3 Tools Click on the Tools link on the navigation drop-down menu. You will then see seven options: Time, System, Firmware, SysLog, Dynamic DNS, System Check, and Schedules. The configuration steps for each option are described below. 3.3.1 Time Zone Setting Click on the Time link in the navigation menu.
  • Page 81  Current Router Time: Displays the current time on the device.  Time Zone: Select your time zone from the drop-down list.  Enable Daylight Saving: Place a check in this box to enable daylight savings time.  Daylight Saving Offset: Select the offset from the drop-down list. www.encore-usa.com...
  • Page 82: System

     Daylight Saving Date: Select the daylight savings date from the drop-down list. Select the starting and ending times for the change to and from daylight saving time. For example, suppose for DST Start you select Month="Oct", Week="3rd", Day="Sun" and Time="2am". This is the same as saying: "Daylight saving starts on the third Sunday of October at 2:00 AM."...
  • Page 83: Save To Local Hard Drive

    Save To Local Hard Drive This option allows you to save the current configuration of the device into a file. Click on the Save Configuration button to begin. Save the file on your local disk by using the Save or Save to Disk button in the dialog box. www.encore-usa.com...
  • Page 84: Load From Local Hard Drive

    Load From Local Hard Drive This option allows you to restore a backup configuration from a file to the EN2HWI-N3 Router. Click on the Select button to browse for a .gws file and then click on Restore Configuration from File button.
  • Page 85: Restore To Factory Default

    Click on the OK button to continue. You will then see the Rebooting page. Note: The current settings will be lost. Please wait while the system is rebooting. Note: Do not un-plug the EN2HWI-N3 during this process as this may cause permanent damage. www.encore-usa.com...
  • Page 86: Reboot The Device

    Reboot the device Click on the Reboot the Device button to reboot the EN2HWI-N3 Router using its current settings. Click on the OK button to continue. You will then see the Rebooting page. Note: The current settings will be lost.
  • Page 87: Firmware Upgrade

    Ensure that you have downloaded the appropriate firmware from the Encore’s website. Connect the EN2HWI-N3 Router to your computer using an Ethernet cable, as the firmware cannot be upgraded using the wireless interface.
  • Page 88: System Logs

    Please wait while the system is rebooting. Note: Do not un-plug the EN2HWI-N3 during this process as this may cause permanent damage. 3.3.4 System Logs Logs display a list of events that are triggered on the Ethernet and Wireless interface. This...
  • Page 89: Dynamic Dns

    3.3.5 Dynamic DNS The Dynamic DNS feature allows you to host a server (Web, FTP, Game Server, etc.) using a domain name that you have purchased with your dynamically assigned IP address. Most broadband Internet Service Providers assign dynamic (changing) IP addresses. When you use a Dynamic DNS service provider, your friends can enter your host name to connect to your server, no matter what your IP address is.
  • Page 90: System Check

    3.3.6 System Check Click on the System Check link in the navigation menu. This page allows you to ping a host name or IP address. Host Name or IP address: Enter the host name or IP address and then click on the Ping button.
  • Page 91: Schedules

    3.3.7 Schedules Click on the Schedules link in the navigation menu. Schedules can be created for use with enforcing rules. For example, if you want to restrict web access to Mon-Fri from 3pm to 8pm, you could create a schedule selecting Mon, Tue, Wed, Thu, and Fri and enter a Start Time of 3pm and End Time of 8pm.
  • Page 92: Status

    3.4 Status Click on the Status link on the navigation tree menu. You will then see seven options: Wireless, Logs, Statistics, WISH Sessions, Routing, Internet Sessions and Firewall. The configuration steps for each option are described below. 3.4.1 Wireless Status Click on the Wireless link in the navigation menu.
  • Page 93  Mode: The transmission standard being used by the client. Values are 11a, 11b, 11g, or 11n for 802.11a, 802.11b, 802.11g, or 802.11n respectively.  Rate: The actual transmission rate of the client in megabits per second.  Signal: This is a relative measure of signal quality. The value is expressed as a percentage of theoretical best quality.
  • Page 94: Logs Status

    3.4.2 Logs Status Click on the Logs link in the navigation menu. The router automatically logs (records) events of possible interest in its internal memory. If there is not enough internal memory for all events, logs of older events are deleted, but logs of the latest events are retained. The Logs option allows you to view the router logs.
  • Page 95: Statistics

    3.4.3 Statistics Click on the Statistics link in the navigation drop-down menu. This page displays the transmitted and received packet statistics of the wired (LAN & WAN) and wireless interface. Click on the Refresh button to refresh the statistics. 3.4.4 WISH Session Status Click on the WISH Sessions link in the navigation drop-down menu.
  • Page 96 • Protocol: The communications protocol used for the conversation. • State: State for sessions that use the TCP protocol.  NO: None -- This entry is used as a placeholder for a future connection that may occur.  SS: SYN Sent -- One of the systems is attempting to start a connection. ...
  • Page 97: Routing

    3.4.5 Routing This function shows current routing table 3.4.6 Internet Session Status Click on the Internet Sessions link in the navigation drop-down menu. The Internet Sessions page displays full details of active Internet sessions through your router. An Internet session is a conversation between a program or application on a LAN-side computer and a program or application on a WAN-side computer.
  • Page 98  EST: Established -- the connection is passing data.  FW: FIN Wait -- The client system has requested that the connection be stopped.  CW: Close Wait -- the server system has requested that the connection be stopped.  TW: Time Wait -- Waiting for a short time while a connection that was in FIN Wait is fully closed.
  • Page 99: Firewall

    3.4.7 Firewall This page displays the full details about firewall holes in your router -- ports that accept unsolicited messages from the WAN. www.encore-usa.com...
  • Page 100: Appendix A - Glossary

    Appendix A – Glossary 802.11 A family of specifications for wireless local area networks (WLANs) developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE). Access Control List ACL. This is a database of network devices that are allowed to access resources on the network.
  • Page 101 Antenna Used to transmit and receive RF signals. AppleTalk A set of Local Area Network protocols developed by Apple for their computer systems AppleTalk Address Resolution Protocol AARP. Used to map the MAC addresses of Apple computers to their AppleTalk network addresses, so that conversions can be made in both directions.
  • Page 102 The ability for new devices to communicate and interact with older legacy devices to guarantee interoperability Bandwidth The maximum amount of bytes or bits per second that can be transmitted to and from a network device Basic Input/Output System BIOS. A program that the processor of a computer uses to startup the system once it is turned on Baud Data transmission speed...
  • Page 103 Browser A program that allows you to access resources on the web and provides them to you graphically Cable modem A device that allows you to connect a computer up to a coaxial cable and receive Internet access from your Cable provider CardBus A newer version of the PC Card or PCMCIA interface.
  • Page 104 Database Organizes information so that it can be managed updated, as well as easily accessed by users or applications. Data-Link layer The second layer of the OSI model. Controls the movement of data on the physical link of a network DB-25 A 25 ping male connector for attaching External modems or RS-232 serial devices...
  • Page 105 Dynamic Host Configuration Protocol: Used to automatically assign IP addresses from a predefined pool of addresses to computers or devices that request them Digital certificate: An electronic method of providing credentials to a server in order to have access to it or a network Direct Sequence Spread Spectrum DSSS: Modulation technique used by 802.11b wireless devices "Demilitarized Zone".
  • Page 106 changing IP address. The IP address is updated by either client software running on a computer or by a router that supports Dynamic DNS, whenever the IP address changes Dynamic IP address IP address that is assigned by a DHCP server and that may change. Cable Internet providers usually use this method to assign IP addresses to their customers.
  • Page 107 A device that protects resources of the Local Area Network from unauthorized users outside of the local network Firmware Programming that is inserted into a hardware device that tells it how to function Fragmentation Breaking up data into smaller pieces to make it easier to store File Transfer Protocol.
  • Page 108 compatibility for videoconferencing devices Half-duplex Data cannot be transmitted and received at the same time Hashing Transforming a string of characters into a shorter string with a predefined length Hexadecimal Characters 0-9 and A-F The action of data packets being transmitted from one router to another Host Computer on a network HTTP...
  • Page 109 Internet Information Server is a WEB server and FTP server provided by Microsoft Internet Key Exchange is used to ensure security for VPN connections Infrastructure In terms of a wireless network, this is when wireless clients use an Access Point to gain access to the network Internet A system of worldwide networks which use TCP/IP to allow for resources to be accessed from computers around the world...
  • Page 110 Internet Protocol IP address A 32-bit number, when talking about Internet Protocol Version 4, which identifies each computer that transmits data on the Internet or on an Intranet IPsec Internet Protocol Security Internetwork Packet Exchange is a networking protocol developed by Novel to enable their Netware clients and servers to communicate Internet Service Provider Java...
  • Page 111 The amount of time that it takes a packet to get from the one point to another on a network. Also referred to as delay Light Emitting Diode Legacy Older devices or technology Local Area Network A group of computers in a building that usually access files from a server LPR/LPD "Line Printer Requestor"/"Line Printer Daemon".
  • Page 112 A device that Modulates digital signals from a computer to an analog signal in order to transmit the signal over phone lines. It also Demodulates the analog signals coming from the phone lines to digital signals for your computer MPPE Microsoft Point-to-Point Encryption is used to secure data transmissions over PPTP connections Maximum Transmission Unit is the largest packet that can be transmitted on...
  • Page 113 The third layer of the OSI model which handles the routing of traffic on a network Network Time Protocol Used to synchronize the time of all the computers in a network Network Interface Card Network Time Protocol OFDM Orthogonal Frequency-Division Multiplexing is the modulation technique for both 802.11a and 802.11g Open Systems Interconnection is the reference model for how data should travel between two devices on a network...
  • Page 114 transmitting electrical signals on a data carrier Ping A utility program that verifies that a given Internet address exists and can receive messages. The utility sends a control packet to the given address and waits for a response. Power over Ethernet is the means of transmitting electricity over the unused pairs in a category 5 Ethernet cable POP3 Post Office Protocol 3 is used for receiving email...
  • Page 115 RADIUS Remote Authentication Dial-In User Service allows for remote users to dial into a central server and be authenticated in order to access resources on a network Reboot To restart a computer and reload it's operating software or firmware from nonvolatile storage.
  • Page 116 A computer on a network that provides services and resources to other computers on the network Session key An encryption and decryption key that is generated for every communication session between two computers Session layer The fifth layer of the OSI model which coordinates the connection and communication between applications on both ends Simple Mail Transfer Protocol Used for sending and receiving email...
  • Page 117 Service Set Identifier is a name for a wireless network Stateful inspection A feature of a firewall that monitors outgoing and incoming traffic to make sure that only valid responses to outgoing requests are allowed to pass though the firewall Subnet mask Determines what portion of an IP address designates the Network and which part designates the Host...
  • Page 118 User Datagram Protocol Unicast Communication between a single sender and receiver Universal Plug and Play A standard that allows network devices to discover each other and configure themselves to be a part of the network Upgrade To install a more recent version of a software or firmware product Upload To send a request from one computer to another and have a file transmitted from the requesting computer to the other...
  • Page 119 Voice over IP Sending voice information over the Internet as opposed to the PSTN VoIP Voice over IP Wake on LAN Allows you to power up a computer though it's Network Interface Card Wide Area Network Windows Connect Now. A Microsoft method for configuring and bootstrapping wireless networking hardware (access points) and wireless clients, including PCs and other devices.
  • Page 120 Wi-Fi Protected Access An updated version of security for wireless networks that provides authentication as well as encryption Wireless ISP A company that provides a broadband Internet connection over a wireless connection Wireless LAN Connecting to a Local Area Network over one of the 802.11 wireless standards WISP Wireless Internet Service Provider...
  • Page 121 * Local tech-support numbers are provided in selectively countries. Service may change without prior notice. Please visit www.encore-usa.com for more details. Product specifications, size, and shape are subject to change without notice, and actual product appearance may differ from that depicted herein. www.encore-usa.com All trademarks and brand names are the properties of their respective holders.

Table of Contents