Planet ADN-4100 User Manual

Planet ADN-4100 User Manual

802.11n wireless adsl 2/2+ router
Hide thumbs Also See for ADN-4100:

Advertisement

Quick Links

802.11n Wireless
ADSL 2/2+ Router
ADN-4100

Advertisement

Table of Contents
loading

Summary of Contents for Planet ADN-4100

  • Page 1 802.11n Wireless ADSL 2/2+ Router ADN-4100...
  • Page 2 Copyright Copyright© 2012 by PLANET Technology Corp. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise, without the prior written permission of PLANET.
  • Page 3 1. Reorient or relocate the receiving antenna. 2. Increase the separation between the equipment and receiver. 3. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. 4. Consult the dealer or an experienced radio technician for help. FCC Caution To assure continued compliance (example-use only shielded interface cables when connecting to computer or peripheral devices).
  • Page 4 Revision User’s Manual for 802.11n Wireless ADSL 2/2+ Router Model: ADN-4100 Rev: 1.0 (March. 2012) Part No. EM-ADN4100v3_v1.0...
  • Page 5: National Restrictions

    National restrictions This device is intended for home and office use in all EU countries (and other countries following the EU directive 1999/5/EC) without any limitation except for the countries mentioned below: Country Restriction Reason/remark Generalaauthorization required for outdoor use Bulgaria None and public service.
  • Page 6 General authorization required for network Luxembourg None and service supply (not for spectrum) This subsection does not apply for the geographical Norway Implemented area within a radius of 20 km from the centre of Ny-Ålesund. Only for indoor applications Russian None Federation...
  • Page 8: Table Of Contents

    CONTENT Overview ................... 1 Safety Precautions ..............2 LEDs and Interfaces ..............2 System Requirements .............. 4 Features ..................5 Hardware Installation ..............9 Web Configuration ................ 11 Accessing the Device .............. 11 General Configuration ............12 3.2.1 Wizard ................... 12 3.2.2 Internet Setup ...............
  • Page 9 3.3.1.1 MAC Filtering ............40 3.3.1.2 Security Settings ............41 3.3.1.3 WPS Settings .............. 42 3.3.1.4 WDS Settings .............. 43 3.3.2 Port Forwarding ..............44 3.3.3 ..................47 3.3.4 Parental Control ..............47 3.3.4.1 Block Website ............. 48 3.3.4.2 MAC Filter ..............
  • Page 10 3.3.10.5 ADSL Settings ............67 3.3.10.6 SNMP ................68 3.3.10.7 TR-064 ................ 69 3.3.10.8 TR-069 ................ 69 3.3.10.9 Certificates ..............71 3.3.10.10 PPTP ................72 3.3.10.11 IPSec ................74 3.3.11 Routing ................78 3.3.11.1 Static Route ..............79 3.3.11.2 Policy Route ..............
  • Page 11 3.4.4.2 Ping Diagnostics ............92 3.4.5 Log Configuration ..............93 3.4.6 Logout ................... 94 Status ..................95 3.5.1 Device Information ............... 95 3.5.2 Wireless Clients ..............96 3.5.3 DHCP Clients ................ 96 3.5.4 IPv6 STATUS ................ 97 3.5.5 Logs ..................98 3.5.6 Statistics .................
  • Page 12: Overview

    Overview High-Speed 802.11n Wireless Data Rate The PLANET 802.11n Wireless ADSL 2/2+ Router with 2T2R MIMO antenna technology, ADN-4100A, provides office and residential users the ideal solution for sharing a high-speed ADSL 2/2+ broadband Internet connection and four-10/100Mbps Fast Ethernet backbone. It can support downstream transmission rates of up to 24Mbps and upstream transmission rates of up to 3.5Mbps.
  • Page 13: Safety Precautions

    VPN, DDNS, and UPnP capability. For further IP compatibility it supports IPv6 as well. Safety Precautions Refer to the following instructions to prevent the device from risks and damage caused by fire or electric power: Use volume labels to mark the type of power. Use the power adapter packed within the device package.
  • Page 14 The following table describes the LEDs of the device. Color Status Description The device is powered on and the Green initialization is normal. The power is off. The device is self-testing or self-testing is failed. Slow No signal is detected. Blinks Fast The device is handshaking with the physical...
  • Page 15: System Requirements

    Rear Panel The following table describes the interfaces and buttons of the device. Interface/Button Description RJ-11 interface, for connecting the interface of the LINE telephone set through the telephone cable. LAN1,LAN2, RJ-45 interface, for connecting the Ethernet interface of a LAN3,LAN4 computer or an Ethernet device.
  • Page 16: Features

    Internet Explorer V6.0 or higher, Netscape V4.0 or higher, or Firefox 1.5 or higher Features The device supports the following features: Internet Access Features Shared Internet Access All users on the LAN can access the Internet through ADN-4100A using only a single external IP Address. The local (invalid) IP Addresses are hidden from external sources.
  • Page 17 Firewall Supports simple firewall with NAT technology and provides option for access control from Internet, like Telnet, FTP, TFTP, HTTP, SNMP, and ICMP services. It also supports IP/MAC /Application/URL filtering. Port Forwarding (Virtual Server) This feature allows Internet users to access Internet servers on your LAN.
  • Page 18 RIP Routing ADN-4100A supports RIPv1/2 routing protocol for routing capability. Simple Network Management Protocol (SNMP It is an easy way to remotely manage the router via SNMP. LAN Features 4-Port Switch ADN-4100A incorporates a 4-Port 10/100BaseT switching hub, making it easy to create or extend your LAN. DHCP Server Support Dynamic Host Configuration Protocol provides a dynamic IP address to PCs and other devices upon request.
  • Page 19 and 128 Bit are supported. WPS Push Button Control ADN-4100A supports WPS (Wi-Fi Protected Setup) to easy connect wireless network without configuring the security. WPA-PSK Support WPA-PSK_TKIP and WPA2-PSK_AES encryption are supported. Wireless MAC Access Control The Wireless Access Control feature can check the MAC address (hardware address) of Wireless stations to ensure that only trusted Wireless Stations can access your LAN.
  • Page 20: Hardware Installation

    Hardware Installation Step 1 Connect the LINE interface of the device and the Modem interface of the splitter with a telephone cable. Connect the phone set to the Phone interface of the splitter through a telephone cable. Connect the input cable to the Line interface of the splitter. The splitter has three interfaces: Line: Connect to a wall phone interface (RJ-11 jack).
  • Page 21 Connection 2: Figure 2 shows the connection of the device, PC, splitter, and telephone set, when a telephone set is placed before the splitter. As illustrated in the following figure, the splitter is installed close to the device: Figure 2 Connection diagram (with a telephone set before the splitter) Note: When connection 2 is used, the filter must be installed close to the telephone cable.
  • Page 22: Web Configuration

    Web Configuration This chapter describes how to configure the device by using the Web-based configuration utility. Accessing the Device The following describes how to access the device for the first time in detail. Step 1 Open the Internet Explorer (IE) browser and enter http://192.168.1.1 in the address bar.
  • Page 23: General Configuration

    Click OK to log in again. Note: In the LAN, you can use either of the following two levels of user accounts (displayed in the user name/password format) to access the device: admin/admin and user/user. In the WAN, you can use one of the following three levels of user accounts (displayed in the user name/password format) to access the device: admin/admin, user/user, and support/support.
  • Page 24 Step 1 Choose Setup > Wizard. The page as shown in the following figure appears: Step 2 Click Setup Wizard. The page as shown in the following figure appears: There are four steps to configure the device. Click Next to continue.
  • Page 25 Step 3 Set the time and date. Then, click Next. Step 4 Configure the Internet connection. Select the protocol and the encapsulation mode. Set the VPI and the VCI. If the Protocol is set to PPPoE or PPPoA, the page as shown in the following figure appears:...
  • Page 26 You need to enter the user name and password for PPPoE or PPPoA dialup. If the Protocol is set to Dynamic IP, the page as shown in the following figure appears: If the Protocol is set to Static IP, the page as shown in the following figure appears:...
  • Page 27 You need to enter the information of the IP address, subnet mask, and gateway. If the Protocol is set to Bridge, the page as shown in the following figure appears: After setting, click Next.
  • Page 28 Step 5 Configure the wireless network. Enter the information and click Next.
  • Page 29 Step 6 View the configuration information of the device. To modify the information, click Back. To effect the configuration, click Next. Note: In each step of the Wizard page, you can click Back to review or modify the previous settings or click Cancel to exit the wizard.
  • Page 30: Internet Setup

    3.2.2 Internet Setup Choose Setup > Internet Setup. The page as shown in the following figure appears: In this page, you can configure the WAN interface of the device. Click Add and the page as shown in the following figure appears: The following table describes the parameters in this page.
  • Page 31 Field Description ATM PVC CONFIGURATION Virtual Path Identifier (VPI) is the virtual path between two points in an ATM network. Its value range is from 0 to 255. Virtual Channel Identifier (VCI) is the virtual channel between two points in an ATM network. Its value range is from 32 to 65535 (0 to 31 is reserved for local management of ATM traffic).
  • Page 32: Wireless Setup

    Field Description The name to identify the WAN connection. You need not Service Name modify it. 3.2.3 Wireless Setup This section describes the wireless LAN and some basic configuration. Wireless LANs can be as simple as two computers with wireless LAN cards communicating in a pear-to-pear network or as complex as a number of computers with wireless LAN cards communicating through access points that bridge network traffic to a wired LAN.
  • Page 33: Wireless Basics

    3.2.3.1 Wireless Basics In the WIRELESS SETTINGS page, click Wireless Basic. The page as shown in the following figure appears: In this page, you can configure the parameters of wireless LAN clients that may connect to the device. The following table describes the parameters in this page. Field Description Select or deselect the check box to enable or disable...
  • Page 34: Wireless Security

    Field Description You can select from the drop-down list: FCC(1-11), Channel Standard ETS(1-13), JP(1-14) Control Sideband You can select Upper or Lower from the list Select the wireless channel used by the device from Wireless Channel the drop-down list. You can select Auto Scan or a value from CH1—CH13.
  • Page 35 provides the following encryption modes: None, WEP, Auto (WPA or WPA2), WPA2 Only, and WPA Only. If the Security Mode is set to WEP, the page as shown in the following figure appears:...
  • Page 36 The following table describes the parameters in this page. Field Description You can select 64 bits or 128 bits from the drop-down list. If you select 64 bits, you need to enter 10 WEP Key Length hexadecimal numbers or 5 characters. If you select 128 bits, you need to enter 26 hexadecimal numbers or 13 characters.
  • Page 37 The following table describes the parameters in this page. Field Description You can select Auto (WPA or WPA2)-PSK or Auto (WPA WPA Mode or WPA2)-Enterprise from the drop-down list. WPA Encryption You can select AES or TKIP+AES from the drop-down list. Group Key Set the interval for updating the key.
  • Page 38 You need to enter the IP address, port, shared key of the RADIUS server. Click Apply to save the settings. WPA2 Only If the Security Mode is set to WPA2 only, the page as shown in the following figure appears:...
  • Page 39 Parameters in this page are similar to those in the page for Auto (WPA or WPA2).Click Apply to save the settings. WPA Only If the Security Mode is set to WPA only, the page as shown in the following figure appears:...
  • Page 40 Parameters in this page are similar to those in the page for Auto (WPA or WPA2). Click Apply to save the settings.
  • Page 41: Local Network

    3.2.4 Local Network You can configure the LAN IP address according to the actual application. The preset IP address is 192.168.1.1. You can use the default settings and DHCP service to manage the IP settings of the private network. The IP address of the device is the base address used for DHCP.
  • Page 42 address pool can contain up to 253 IP addresses. You can also make DHCP server just acting on the specific port, by default, those ports are selected. If your DHCP server doesn’t belong to the same segment with your pc, but you need to assign IP address from DHCP server, you must uncheck the Enable DHCP Server and selected the Enable DHCP Relay to set the DHCP Relay IP address.
  • Page 43 In the DHCP CLIENT CLASS LIST page, you can set an IP address range for some specification device. The page as shown in the following figure appears: The following table describes the parameters in this page. Field Description Client Class Name Enter the Client Class name Min IP Address The IP Address for minimum...
  • Page 44 The following table describes the parameters in this page. Field Description Select the check box to reserve the IP address for the Enable designated PC with the configured MAC address. Enter the computer name. It helps you to recognize the Computer Name PC with the MAC address.
  • Page 45: Lan Ipv6

    3.2.5 LAN IPv6 In this page,you can configure the LAN IPv6. Choose Setup > LAN IPv6. The IPv6 LAN setting page as shown in the following figure appears: The following table describes the parameters in this page. Field Description Start Unique Local Check this enable the Prefix Unique Local...
  • Page 46: Time And Date

    3.2.6 Time and Date Choose Setup > Time and Date. The TIME AND DATE page as shown in the following figure appears: In the TIME AND DATE page, you can configure, update, and maintain the time of the internal system clock. You can set the time zone that you are in and the network time protocol (NTP) server.
  • Page 47: Logout

    3.2.7 Logout Choose Setup > Logout. The page as shown in the following figure appears: Click Logout to log out of the configuration page.
  • Page 48: Advanced Configuration

    Advanced Configuration This section contains advanced features used for network management, security and administrative tools to manage the device. You can view the status and other information of the device, to examine the performance and troubleshoot. 3.3.1 Advanced Settings In the ADVANCED WIRELESS page, click Advanced Settings. The page as shown in the following figure appears: The following table describes the parameters in this page.
  • Page 49 Field Description or Higher. Select the power for data transmission from the Transmit Power drop-down list. You can select 100%, 80%, 60%, 40%, or 20%. By default, the wireless beacon frame sends the data Beacon Period once every 100ms. Its value range is 20—1024. The threshold of transmission request.
  • Page 50 Select whether users of the AP can communicate with each other. You can select Off or On from the User Isolation drop-down list. On indicates that computers connected to the device cannot communicate with each other. WMM Advertise Select whether to enable WMM. Set the maximum number of clients that can be Max Clients connected to the AP at the same time.
  • Page 51: Mac Filtering

    Field Description Enable Wireless Select or deselect the check box to enable or disable Guest Network the wireless interface. SSID Similar to the primary SSID, it identifies a wireless AP. These settings are applicable only for more technically advanced users who have sufficient knowledge about wireless LAN.
  • Page 52: Security Settings

    Field Description Enter the MAC address of another device that is MAC Address included in MAC filtering. Click Apply to save the settings. 3.3.1.2 Security Settings In the ADVANCED WIRELESS page, click Security Settings. The page as shown in the following figure appears: Select the desired SSID from the drop-down list.
  • Page 53: Wps Settings

    3.3.1.3 WPS Settings In the ADVANCED WIRELESS page, click WPS Setting. The WIRELESS WPS page as shown in the following figure appears: Note: Ensure that the network card supports the WPS function. Field Description Enabled The WPS service is enabled by default. Select Mode Select Enrollee or Registrar from the drop-down list.
  • Page 54: Wds Settings

    Field Description access point or a wireless router. You can use one of the following there methods to use WPS authentication: Press the WPS button on the side panel for 3 seconds. In the WIRELESS WPS page, click PBC. It has the same function of the WPS button on the side panel.
  • Page 55: Port Forwarding

    3.3.2 Port Forwarding This function is used to open ports in your device and re-direct data through these ports to a single PC in your network (WAN-to-LAN traffic). It allows remote users to access services in your LAN, such as FTP for file transfers or SMTP, and POP3 for e-mail.
  • Page 56 Click Add to add a virtual server. See the following figure: Please refer the description as below: Field Description Select the WAN connection which you want the remote WAN Connection side via this connection to access in. Select a Service Select the default service for the port forwarding.
  • Page 57 Field Description forwarding feature. You also can click” View Available Schedules ”to select the schedule. Enter an IP address in the Server IP Address field, to Server IP Address appoint the corresponding PC to receive forwarded packets. Enter the service (service/Internet application) port External Port number from the Internet that will be re-directed to the Start-End...
  • Page 58: Dmz

    3.3.3 Choose Advanced > DMZ. The page as shown in the following figure appears: In this page, you can enable a DMZ host. In this way, access from Internet to the WAN IP address of the device is forwarded to the DMZ host and network server of the internal LAN is protected.
  • Page 59: Block Website

    This page provides two useful tools for restricting Internet access. Block Website allows you to quickly create a list of websites that you wish to prevent users from accessing. MAC Filter allows you to control Internet access by clients or PCs connected to the device. 3.3.4.1 Block Website In the PARENTAL CONTROL page, click Block Website.
  • Page 60: Mac Filter

    3.3.4.2 MAC Filter In the PARENTAL CONTROL page, click MAC Filter. The page as shown in the following figure appears: Click Add. The page as shown in the following figure appears:...
  • Page 61 The following table describes the parameters in this page. Field Description Enter the name that identifies your configuration. For User Name example, kids. Current PC’s MAC Enter the MAC address of the computer that connects Address to the device. Enter the MAC address of another device that is Other MAC Address included in MAC filtering.
  • Page 62: Filtering Options

    3.3.5 Filtering Options Choose Advanced > Filtering Options. The FILTERING OPTIONS page as shown in the following figure appears:...
  • Page 63: Ip Filtering

    3.3.5.1 IP Filtering In the Filtering Options page, click IP Filtering. The FIREWALL page as shown in the following figure appears: Click Add to add an IP filter. The page as shown in the following figure appears:...
  • Page 64 Field Description Name Enter the name that identifies your configuration. Select LAN or the other connection from the drop-down Interface list. Type Select the In, Out or Both from the drop-down list. Default action Select the Permit or Drop from the drop-down list. Select the Local, Forward or Both from the Default Chain drop-down list.
  • Page 65: Bridge Filtering

    3.3.5.2 Bridge Filtering In the FILTERING OPTIONS page, click Bridge Filtering. The page as shown in the following figure appears: This page is used to configure bridge parameters. In this page, you can modify the settings or view the information of the bridge and its attached ports. Click Add to add a bridge filter.
  • Page 66: Qos Configuration

    Field Description drop-down list. You can select PPPoE, IPv4, IPv6, AppleTalk, IPX, NetBEUI, or IGMP. Destination MAC Enter the destination MAC address to be mapped. Address Source MAC Enter the source MAC address to be mapped. Address Select the frame direction to be mapped from the Frame Direction drop-down list.
  • Page 67: Qos Global Option

    QoS Global Option 3.3.6.1 In the QoS Configuration page, click QoS Global Option. The page as shown in the following figure appears: In this page, you can select or deselect the check box to enable or disable the Queuing Operation. 3.3.6.2 Queue Configuration In the QoS Configuration page, click Qos Queue Configuration.
  • Page 68: Classification Configuration

    The device supports the following four priority levels: 1,2,3,4. Click Submit save the settings. 3.3.6.3 Classification Configuration In the QoS Configuration page, click QoS Classification Configuration. Cl Add and the page as shown in the following figure appears: The following table describes the parameters in this page. Field Description You can select Upstream Flow Classify or...
  • Page 69 Field Description QoS classification. SPECIFY TRAFFIC CLASSIFICATION RULES Select the physical port of the packet from the Input Interface drop-down list. For example, ethernet1, ethernet2 ethernet3, and ethernet4. Source MAC Address Enter the source MAC address of the packet. Use mask 000000ffffff to mask the MAC address. 00 Source MAC Mask indicates not mapped and ff indicates mappe Select the 802.1p priority of the packet from the...
  • Page 70: Firewall Settings

    3.3.7 Firewall Settings A denial-of-service (DoS) attack is one of the most common network attacks and is characterized by an explicit attempt by attackers to prevent legitimate users of a service from using that service. It usually leads to overload of system server or core dump of the system.
  • Page 71 The DNS system is, in fact, its own network. If one DNS server does not know how to translate a particular domain name, it asks another one, and so on, until the correct IP address is returned. Choose Advanced > DNS. The page as shown in the following figure appears: he following table descr ibes the parameters in this page.
  • Page 72: Dynamic Dns

    3.3.9 Dynamic DNS The device supports dynamic domain name service (DDNS). The dynamic DNS service allows a dynamic public IP address to be associated with a static host name in any of the many domains, and allows access to a specified host from various locations on the Internet.
  • Page 73: Network Tools

    Description Select the DDNS provider from the drop-down list. You DDNS provider can select Planet , DynDns.org, TZO, or GnuDIP. Enter the host name that you register with your DDN Hostname provider. Select the interface that is used for DDNS service from Interface the drop-down list.
  • Page 74 This page contains the following function items: Port Mapping, IGMP Proxy, IGMP Snooping, UPnP, ADSL, SNMP , TR-069, Certificates, PPTP.and IPSec...
  • Page 75: Port Mapping

    3.3.10.1 Port Mapping. In the NETWORK TOOLS page, click Port Mapping. The page as shown in the following figure appears: In this page, you can bind the WAN interface and the LAN interface to the same group. Click Add to add port mapping. The page as shown in the following figure appears:...
  • Page 76: Igmp Proxy

    To create a mapping group, do as follows: Step 1 Enter the group name. Step 2 Select interfaces from the Available Interfaces list and click the <- arrow button to add them to the Grouped Interfaces list, in this way, you can create the required mapping of the ports.
  • Page 77: Igmp Snooping

    Select Enable IGMP Proxy and select the desired WAN and click Apply to save the settings. 3.3.10.3 IGMP Snooping When IGMP snooping is enabled, only hosts that belong to the group receive the multicast packets. If a host is deleted from the group, the host cannot receive the multicast packets any more.
  • Page 78: Adsl Settings

    In this page, you can enable universal plug and play (UPnP) and then the system serves as a daemon. UPnP is widely applied in audio and video software. It automatically searches devices in the network. If you are concerned about UPnP security, you can disable it.
  • Page 79: Snmp

    3.3.10.6 SNMP In the NETWORK TOOLS page, click SNMP. The page as shown in the following figure appears: In this page, you can set the SNMP parameters. The following table describes the parameters in this page. Field Description Select or deselect the check box to enable or disable Enable SNMP Agent SNMP agent.
  • Page 80: Tr-064

    Click Apply to save the settings. 3.3.10.7 TR-064 In the NETWORK TOOLS page, click enable item to enable the TR-064 .The page as shown in the following figure appears: 3.3.10.8 TR-069 In the NETWORK TOOLS page, click TR-069. The page as shown in the following figure appears:...
  • Page 81 In this page, you can configure the TR-069 CPE. The following table describes the parameters in this page. Field Description You can select Disabled or Enabled to disable or enable TR069 Configuration TR-069 configuration. You can select Disabled or Enabled to disable or enable notification.
  • Page 82: Certificates

    3.3.10.9 Certificates In the NETWORK TOOLS page, click Certificates. The Certificates page as shown in the following figure appears: Click Trusted CA and the page as shown in the following figure appears: Note: Before importing a certificate, you must synchronize the system t ime with time server.
  • Page 83: Pptp

    3.3.10.10 PPTP The Point-to-Point Tunneling Protocol (PPTP) is a method for implementing virtual private networks . PPTP uses a control channel over TCP and a tunnel operating to encapsulate packets. In the NETWORK TOOLS page, click PPTP, the page as shown in the following figure appears.
  • Page 84 The following table describes the parameters in this page. Field Description Local IP Start The started IP address of the local network. The valid numbers of local IP addresses. It works Local IP Num together with the Local IP Start to determine the range of the local IP addresses.
  • Page 85: Ipsec

    Clicks add, the page as shown in the following figure appears. The following table describes the parameters in this page. Field Description The user name that is used for dialup to connect the Username modem to the PPTP. The password that is used for dialup to connect the Password modem to the PPTP.
  • Page 87 Field Description IPSec Connection The connection name of the marker IPSec. Name Tunnel Mode You can select ESP or AH. Remote IPSec The IP or domain name of the Remote IPSec Gateway Address Gateway. Tunnel access from You can select Subnet or Single Address. local IP address If you select Single Address, it allows only one PC from local to connect remote hosts with IPSEC...
  • Page 88 Field Description You can select from the drop-down list. Integrity Algorithm You can select from the drop-down list. Diffie-Hellman Group Key Exchange Key Life Time Enter the time of key life. Use Interface Select the use interface This is a dynamic page. The displays are different (some options are shown and hidden) when different types or connections are chosen.
  • Page 89: Routing

    3.3.11 Routing Choose Advanced > Routing. The page as shown in the following page appears: This page contains the following function items: Static Route, Policy Router, Default Gateway and RIP setting.
  • Page 90: Static Route

    3.3.11.1 Static Route Choose Advanced > Routing and click Static Route. The page as shown in the following figure appears: This page displays the information of existing static routes. Click Add and the page as shown in the following figure appears: The following table describes the parameters in this page.
  • Page 91: Policy Route

    Note: You can enter the gateway IP address of the device in the Use Gateway IP Address field or set the User Interface, but cannot apply the two settings at the same time. 3.3.11.2 Policy Route Choose Advanced > Routing and click Policy Route. Click Add and the page as shown in the following figure appears: In this page, you can select the interfaces on your device that use RIP of the protocol used.
  • Page 92: Default Gateway

    3.3.11.3 Default Gateway. Choose Advanced > Routing and click Default Gateway. The page as shown in the following figure appears: In this page, you can select Enable Automatic Assigned Default Gateway, or enter the information in the Use Gateway IP Address and Use Interface fields. Click Apply to save the settings.
  • Page 93: Schedules

    In this page, you can view the interfaces on your device that use RIP and the version of the protocol used. If you enable RIP, the device communicates with other devices using the routing information protocol (RIP). Click Apply to save the settings. 3.3.12 Schedules Choose Advanced >...
  • Page 94: Nat

    Field Description If you select the check box, the rule applies throughout All Day – 24 hrs the 24 hours of the day. Start Time Set the start time of the firewall. End Time Set the end time of the firewall. Click Apply to save the settings.
  • Page 95: Logout

    3.3.14 Logout Choose Advanced > Logout. The page as shown in the following figure appears: Click Logout to log out of the configuration page...
  • Page 96: Management

    Management 3.4.1 System Choose Management > System Management. The System page as shown in the following figure appears: In this page, you can restart the device, back up the current settings to a file, update the backup file, and restore the factory default settings. The following table describes the buttons in this page.
  • Page 97: Firmware Update

    Button Description Reboot Restart the device. Specify the path to back up the current configuration in Backup Setting a configuration file on your computer. You can rename the configuration file. Click Browse… to select the configuration file of device Update Settings and click Update Settings to update the configuration of the device.
  • Page 98: Access Controls

    In this page, you can upgrade the firmware of the device. To update the firmware, do as follows: Step 1 Click Browse…to select the file. Step 2 Select Clear Config. Step 3 Click Update Firmware to update the configuration file. The device loads the file and reboots automatically.
  • Page 99: Account Password

    3.4.3.1 Account Password In the ACCESS CONTROLS page, click Account Password. The page as shown in the following figure appears: In this page, you can change the password and set the time for automatic logout. You are recommended to change the default password to ensure the security of your network.
  • Page 100: Services

    The following table describes the parameters in this page. Field Description ACCOUNT PASSWORD Select a user name from the drop-down list to access Username the device. You can select admin, user. New Username Enter the new username. Current Password Enter the password of the user. New Password Enter the new password.
  • Page 101: Ip Address

    In this page, you can enable or disable the services that are used by the remote host. For example, if telnet service is enabled at port 23, the remote host can access the device by telnet through port 23. Select the management services that you want to enable or disable at the LAN or WAN interface and click Apply to apply the settings.
  • Page 102: Diagnostics

    Click Add. The page as shown in the following figure appears: Enter the IP address of the desired device in the IP Address field and click Apply to apply the settings. 3.4.4 Diagnostics Choose Management > Diagnosis. The page as shown in the following figure appears: This page contains WAN Diagnostics and Ping Diagnostics.
  • Page 103: Ping Diagnostics

    3.4.4.2 Ping Diagnostics In the Diagnosis page, click Ping Diagnostics. The page as shown in the following figure appears:...
  • Page 104: Log Configuration

    In this page, you can test the IP address on the same segment connect status of the device. Click Ping to run diagnostics. 3.4.5 Log Configuration Choose Management > Log Configuration. The SYSTEM LOG page as shown in the following figure appears: In this page, you can enable the log function.
  • Page 105: Logout

    3.4.6 Logout Choose Management > Logout. The page as shown in the following figure appears: Click Logout to log out of the configuration page.
  • Page 106: Status

    Status In the Status page, you can view the system information and monitor the performance of the device. 3.5.1 Device Information Choose Status > Device Info. The page as shown in the following figure appears:...
  • Page 107: Wireless Clients

    The page displays the summary of the device status, including the system information, WAN connection information, wireless information, and local network information. 3.5.2 Wireless Clients Choose Status > Wireless Clients. The page as shown in the following page appears: The page displays authenticated wireless stations and their statuses. 3.5.3 DHCP Clients Choose Status >...
  • Page 108: Ipv6 Status

    This page displays all client devices that obtain IP addresses from the device. You can view th e host name, IP address, MAC address, and expiration time of the IP address. 3.5.4 IPv6 STATUS Choose S tatus >IPv6 Status. The page as shown in the following figure appears:...
  • Page 109: Logs

    In this section you can see the info rmation for the IPv6 Connection. Click Refresh to refresh the system IPv6 status shown in the page. 3.5.5 Logs Choose Status > Logs. The page as shown in the following figure appears: This page displays the system log.
  • Page 110 This page displays the statistics information of the network and data transmission. The information helps technicians to identify whether the device is functioning properly. The information does not affect the functions of the device.
  • Page 111: Route Information

    3.5.7 Route information Choose Status > Route Info. The page as shown in the following figure appears: The table displays destination routes commonly accessed by the network. 3.5.8 Logout Choose Status > Logout. The page as shown in the following figure appears: Click Logout to log out of the configuration page.
  • Page 112: Help

    Help If you want to realize some information for each configuration, you can click the hyperlink in the Help page...
  • Page 113: Appendix A : Specification

    Appendix A : Specification Product 802.11n Wireless ADSL 2/2+ 4-Port Router Model ADN-4100A Hardware Compliant with ADSL Standard - Full-rate ANSI T1.413 Issue 2 - G.dmt (ITU G.992.1) - G.lite (ITU G.992.2) - G.hs,Multimode (ITU G.994.1) Standard Capable of ADSL2 Standard - G.dmt.bis (ITU G.992.3) Capable of ADSL2+ Standard - G.dmt.bisplus (ITU G.992.5)
  • Page 114 Max. Concurrent 2048 Sessions Wireless Standard IEEE 802.11b, g and 802.11n Wireless Frequency 2.4 to 2.4835GHz (Industrial Scientific Medical Band ) America/ FCC: 2.414~2.462GHz (11 Channels) Wireless Channels Europe/ ETSI: 2.412~2.472GHz (13 Channels) Japan/ TELEC: 2.412~2.484GHz (14 Channels) Wireless Data 64 bit / 128 bit WEP, WPA-PSK / WPA2-PSK, and WPS Encryption 802.11n (40MHz):...
  • Page 115 PPTP/IPSec VPN pass through 2 PPTP VPN Tunnel 8 IPSec VPN Tunnel Security PPP over PAP (Password Authentication Protocol, RFC1334) PPP over CHAP (Challenge Authentication Protocol, RFC1994) DoS Protection Access Control ACL (Access Control) IP/MAC /Application/URL Filter Stateful Packet Inspection (SPI) Firewall Password protection for system management Management Web-based configuration...

Table of Contents