CONTENTS I. Product Information ................1 I-1. Package Contents ...................... 1 I-2. LED Status ........................2 I-3. Back Panel ......................... 3 I-4. RJ-45 Splitter Cable ....................4 I-5. Wi-Fi Power Switch ....................5 I-6. Safety Information ..................... 6 II. Installation .................... 7 II-1.
Page 4
IV-1-2-4. Windows 8 ......................131 IV-1-2-5. Mac ........................135 IV-1-3. How to Find Your Network Security Key ..............138 IV-1-3-1. Windows 7 & Vista ....................138 IV-1-3-2. Mac ........................140 IV-1-4. How to Find Your Router’s IP Address ..............143 IV-1-4-1.
I. Product Information I-1. Package Contents Before you start using this product, please check if there is anything missing in the package, and contact your dealer to claim the missing item(s): BR-6288ACL CD-ROM RJ-45 Splitter Cable Power Adapter USB Cable...
Resetting to factory default status or Wi-Fi Flashing (Fast) Protected Setup (WPS) is active. Light Green Internet is connected and Wi-Fi is full power. Internet is connected and Wi-Fi is in green Dark Green mode (25% power). BR-6288ACL is off.
I-4. RJ-45 Splitter Cable The BR-6288ACL includes an RJ-45 splitter cable in the package contents. This plugs into the “Network” port of the BR-6288ACL and splits the port into two separate Ethernet ports – providing two ports instead of one, as shown below.
I-5. Wi-Fi Power Switch After setup you can use the Wi-Fi power switch to adjust the strength of the BR-6288ACL’s wireless radio if you wish. Normal mode uses full 100% wireless power while green mode uses 25% wireless power.
2. Do not place the device in or near hot/humid places, such as a kitchen or bathroom. 3. Do not pull any connected cable with force; carefully disconnect it from the BR-6288ACL. 4. Handle the device with care. Accidental damage will void the warranty of the device.
II. Installation Plug in the BR-6288ACL using the included power adapter and/or USB cable. The BR-6288ACL requires 1 A of current – please ensure that your USB port can provide sufficient power. If not, use the 5V DC adapter. Wait until the circular LED at the base of the product is flashing "...
Page 12
Wi-Fi device is set to use a dynamic IP address. This is a simple procedure and step-by-step instructions to do this on a computer can be found in the user manual. Choose if you want to use your BR-6288ACL in its default Wi-Fi router mode or in a different mode.
Page 13
The BR-6288ACL’s five available modes are outlined below: Wi-Fi Router Mode The device connects to your modem and provides 2.4GHz and/or 5GHz Internet (wireless and Ethernet) access for your network devices. Access Point Mode The device connects to an existing router via Ethernet cable and provides 2.4GHz and/or 5GHz...
Select whether to use the iQ Setup wizard (recommended) to detect your Internet connection type, or enter the settings manually. Manual configuration is only recommended for advanced users. Connect the blue Internet port of your BR-6288ACL to the LAN port of your modem using an Ethernet cable, and then click “Next”.
Page 15
Please wait a moment while the BR-6288ACL tests the connection. Click “Next” to continue and configure the device’s wireless network. Enter a name and password for your 2.4GHz & 5GHz wireless networks, then click “Next” to continue.
Page 16
A summary of your configuration will be displayed, as shown below. Check that all of the details are correct and then click “Next” to proceed. If you wish to backup the device’s settings, click “Backup this configuration” to open a new window and save your current configuration to a .txt file.
Page 17
Please wait while the BR-6288ACL applies your settings. A final congratulations screen will indicate that setup is complete. You can now connect to the device’s new SSID(s) which are shown on the screen then close the browser window.
Page 18
The BR-6288ACL is working and ready for use. Refer to IV-2. Connecting to a Wi-Fi network if you require more guidance.
II-2. Access Point Mode Select “Access Point” from the top menu and click “Next”. Connect the network port of your BR-6288ACL to the LAN port of your existing router using an Ethernet cable, then click “Next”. Select whether to use the 5GHz wireless frequency, 2.4GHz wireless...
Page 20
Select “Obtain an IP address automatically” or “Use the following IP address” for your BR-6288ACL. If you are using a static IP, enter the IP address, subnet mask and default gateway. Click “Next” to proceed to the next step. “Obtain an IP address automatically” is the recommended setting for most users.
Page 21
Enter a name and password for your 2.4GHz & 5GHz wireless networks, then click “Next” to continue. A summary of your configuration will be displayed, as shown below. Check that all of the details are correct and then click “Next” to proceed. If you wish to backup the device’s settings, click “Backup this configuration”...
Page 22
Please wait a moment until the BR-6288ACL is ready. A final congratulations screen will indicate that setup is complete. You can now connect to the device’s new SSID(s) which are shown on the screen then close the browser window.
Page 23
The BR-6288ACL is working and ready for use. Refer to IV-2. Connecting to a Wi-Fi network if you require more guidance.
II-3. Range Extender Mode Select “Range Extender” from the top menu and click “Next”. Please ensure your BR-6288ACL is within Wi-Fi range of your existing wireless router. Click “Next” to continue.
Page 25
Select whether to use the 5GHz wireless frequency, 2.4GHz wireless frequency or both. If you are not sure, select both and then click “Next”. Select the Wi-Fi network name (SSID) which you wish to connect to for the specified frequency and click “Next” to continue. If the Wi-Fi network you wish to connect to does not appear, try clicking “Refresh”.
Page 26
Enter your existing wireless network’s security key/password in the “Security Key” field and click “Next” to continue.
Page 27
Wait a moment while the BR-6288ACL tests the wireless connection. Select “Obtain an IP address automatically” or “Use the following IP address” for your BR-6288ACL. If you are using a static IP, enter the IP address, subnet mask and default gateway. Click “Next” to proceed to the next step.
Page 28
The device will use the same wireless password/security key as the existing wireless network. If you wish to backup the BR-6288ACL’s settings, click “Backup this configuration” to open a new window and save your current configuration to a .txt file.
Page 29
Please wait a moment until the BR-6288ACL is ready.
Page 30
A final congratulations screen will indicate that setup is complete. You can now connect to the device’s new SSID(s) which are shown on the screen then close the browser window. The BR-6288ACL is working and ready for use. Refer to IV-2. Connecting to a Wi-Fi network...
II-4. Wireless Bridge Mode Select “Wireless Bridge” from the top menu and click “Next”. Please ensure your BR-6288ACL is within Wi-Fi range of your existing wireless router. Click “Next” to continue. Select the frequency (2.4GHz or 5GHz) of your existing wireless network.
Page 32
Select the Wi-Fi network name (SSID) which you wish to connect to and click “Next” to continue. If the Wi-Fi network you wish to connect to does not appear, try clicking “Refresh”. To connect to a hidden SSID, check the “Setup extender manually” box and enter the details manually on the next page, as shown below.
Page 33
Enter your existing wireless network’s security key/password in the “Security Key” field and click “Next” to continue.
Page 34
Wait a moment while the BR-6288ACL tests the wireless connection. Select “Obtain an IP address automatically” or “Use the following IP address” for your BR-6288ACL. If you are using a static IP, enter the IP address, subnet mask and default gateway. Click “Next” to proceed to the next step.
Page 35
A summary of your configuration will be displayed, as shown below. Check that all of the details are correct and then click “Next” to proceed. If you wish to backup the BR-6288ACL’s settings, click “Backup this configuration” to open a new window and save your current...
Page 36
A final congratulations screen will indicate that setup is complete. Please close the browser window. The BR-6288ACL is working and ready for use. You can now connect the BR-6288ACL to your network device using an Ethernet cable and connect to your network as usual.
II-5. WISP Mode Select “WISP” from the top menu and click “Next”. Please ensure your BR-6288ACL is within Wi-Fi range of your WISP network and click “Next” to continue.
Page 38
Select whether to use the iQ Setup wizard (recommended) to detect your Internet connection type, or enter the settings manually. Manual configuration is only recommended for advanced users. Select the wireless frequency (2.4GHz or 5GHz) of your WISP network.
Page 39
Select the WISP SSID which you wish to connect to and click “Next” to continue. If the Wi-Fi network you wish to connect to does not appear, try clicking “Refresh”. To connect to a hidden SSID, check the “Setup extender manually” box and enter the details manually on the next page, as shown below.
Page 40
Enter your existing wireless network’s security key/password in the “Security Key” field and click “Next” to continue. Wait a moment while the BR-6288ACL tests the wireless connection.
Page 41
Click “Next” to continue your Internet service type configuration. Wait a moment while the BR-6288ACL connects to the Internet.
Page 42
When the Internet is connected, click “Next” to configure your wireless network. Enter a name and password for your 2.4GHz & 5GHz wireless networks, then click “Next” to continue.
Page 43
A summary of your configuration will be displayed, as shown below. Check that all of the details are correct and then click “Next” to proceed. If you wish to backup the device’s settings, click “Backup this configuration” to open a new window and save your current configuration to a .txt file.
Page 44
A final congratulations screen will indicate that setup is complete. You can now connect to the device’s new SSID(s) which are shown on the screen then close the browser window. The BR-6288ACL is working and ready for use. Refer to IV-2. Connecting to a Wi-Fi network...
II-7. Reset to Factory Default Settings If you experience problems with your BR-6288ACL, you can reset the device back to its factory settings. This resets all settings back to default. Press and hold the WPS/Reset button found on the rear base of the product for at least 10 seconds.
III. Browser Based Configuration Interface After you have setup the BR-6288ACL as detailed in II. Installation or the included Quick Installation Guide, you can use the browser based configuration interface to configure advanced settings. Please ensure that your computer is set to use a dynamic IP address.
Page 47
You will arrive at the “Status” screen. Use the menu down the left side to navigate.
III-2. Save Settings After you configure any settings, click the “Save Settings” button at the bottom of the screen to save your changes. The device needs to restart in order to bring any changes into effect. Then, click “Click here to restart” in order to restart the device and bring the changes into effect.
III-3. Main Menu The main menu displays different options depending on your device’s operating mode. For Range Extender mode: WPS please refer to 2.4GHz Wireless & 5GHz Wireless WPS Wi-Fi Router Access Point Range Extender Wireless Bridge WISP...
III-3-1. Status The “Status” page displays basic system information about the device, arranged into categories. Screenshots displayed are examples.The information shown on your screen will vary depending on your configuration.
III-3-2. Setup Wizard You can run the setup wizard again to reconfigure the basic settings of the device, or you can run a wizard to help you switch the device to a different operating mode. Select “Setup Wizard” or “Switch to Router/Access Point/Range Extender/Wireless Bridge/WISP mode”...
Page 52
Follow the on-screen wizard to setup your device in a different mode. Refer to II. Installation Step 3 onwards for help if needed. If you don’t see the “Get Started” screen, try reconnecting to the edimax.setup SSID and go to http://edimax.setup in a web browser.
Enable or disable your WISP connection. SSID The name of the WISP network which your BR-6288ACL is connected to. Manually enter an SSID if you wish or use “Site Survey” below. Site Survey Select wireless frequency and click “Show List” to open a new window and select your WISP network.
III-3-3-1. WAN Setup Select a Wide Area Network (WAN) connection mode and configure the settings. If you are unsure about your connection type, contact your ISP. In WISP mode, only Dynamic IP, Static IP & PPPoE are available for WAN Connection Mode. III-3-3-1-1.
Page 55
Host Name Enter the host name of your computer. MAC Address For some applications, you may need to designate a specific MAC address for the router. Please enter the MAC address here. If you are connecting the router to a computer, press “Clone Mac” to automatically enter your computer’s MAC address.
III-3-3-1-2. Static IP Select “Static IP” if your ISP provides Internet access via a fixed IP address. Your ISP will provide you with such information as IP address, subnet mask, gateway address, and DNS address. Fixed IP Address Input the IP address assigned by your ISP here. Subnet Mask Input the subnet mask assigned by your ISP here.
Page 57
(URL) DNS proxy server. Enable/Disable time to live (TTL) function which limits the lifespan of network data to improve performance.
III-3-3-1-3. PPPoE Select “PPPoE” if your ISP is providing you Internet access via PPPoE (Point-to-Point Protocol over Ethernet). User Name Enter the user name assigned by your ISP here. Password Enter the password assigned by your ISP here. MAC Address For some applications, you may need to designate a specific MAC address for the router.
Page 59
DNS Address Select “Obtain an IP address automatically” or “Use the following IP address”. Check with your ISP if you are unsure. DNS Address 1, 2 & 3 Enter the DNS address(es) assigned by your ISP here. DNS Proxy Enable or disable a DNS proxy server. DNS Proxy Rules When DNS proxy is enabled, enter the URL of a (URL)
III-3-3-1-4. PPTP Select “PPTP” if your ISP is providing you Internet access via PPTP (Point-to-Point Tunneling Protocol). Then select “Obtain an IP address automatically” or “Use the following IP address” depending on your ISP.
Page 61
Host Name Enter the host name of your computer here If required. MAC Address For some applications, you may need to designate a specific MAC address for the router. Please enter the MAC address here. If you are connecting the router to a computer, press “Clone Mac”...
Page 62
Connection Type Specify a connection type: 1. “Continuous”: Connected all the time. 2. “Connect on Demand”: Connect when you initiate an Internet connection. 3. “Manual”: Connect/disconnect manually using the “Connect” and “Disconnect” buttons. Idle Time Out Specify the amount of time the router waits before shutting down an idle connection.
III-3-3-1-5. L2TP Select “L2TP” if your ISP is providing you Internet access via L2TP (Layer 2 Tunneling Protocol). Host Name Enter the host name of your computer here If required. MAC Address For some applications, you may need to designate a specific MAC address for the router.
Page 64
a computer, press “Clone Mac” to automatically enter your computer’s MAC address. Static IP Address Input the IP address assigned by your ISP here. Subnet Mask Input the subnet mask assigned by your ISP here. Default Gateway Input the default gateway assigned by your ISP here. Address Some ISPs may call this “Default Route”.
III-3-3-2. DDNS Dynamic DNS (DDNS) is a service which provides a hostname-to-IP service for dynamic IP users. The changing nature of dynamic IPs means that it can be difficult to access a service provided by a dynamic IP user; a DDNS service though can map such dynamic IP addresses to a fixed hostname, for easier access.
IP address instead of using the URL http://edimax.setup. IP Address Specify the IP address here. This IP address will be assigned to the BR-6288ACL and will replace the default IP address. Subnet Mask Specify a subnet mask. The default value is 255.255.255.0...
Page 68
Your device’s DHCP server automatically assigns IP addresses to computers on its network, between a defined range of numbers. Start IP Enter the start IP address for the DHCP server’s IP address leases. End IP Enter the end IP address for the DHCP server’s IP address leases.
Page 69
The LAN IP page will be displayed as below when your device is set to access point mode. You can set theBR-6288ACL to obtain an IP address automatically or you can specify an IP address.
III-3-5. 2.4GHz Wireless & 5GHz Wireless The “2.4GHz Wireless” & “5GHz Wireless” menu allows you to configure SSID and security settings for your Wi-Fi network along with a guest Wi-Fi network. WPS, access control and scheduling functions can also be managed from here.
Page 71
Check the box to enable wireless clients isolation. Clients Isolation This prevents wireless clients connected to the BR-6288ACL from communicating with each other and improves security. Typically, this function is useful for corporate environments or public hot spots and can prevent brute force attacks on clients’...
Page 72
information about wireless clients. Please disable any pop-up blockers if you have difficulty using this function. AP Bridge-WDS: Wireless Distribution System (WDS) can bridge/repeat access points together in an extended network. WDS settings can be configured as shown below. When using WDS, configure the IP address of each access point to be in the same subnet and ensure there is only one active DHCP server among connected access points, preferably on the WAN side.
Page 73
Wireless Security: Select an encryption type from the drop-down menu: “WPA Pre-shared Key” is the recommended and most secure encryption type. In WISP mode, WPA RADIUS is unavailable for the wireless band that is used to connect to WISP’s AP.
III-3-5-1-1. Disable Encryption is disabled and no password/key is required to connect to the BR-6288ACL. Disabling wireless encryption is not recommended. When disabled, anybody within range can connect to your device’s SSID. Enable 802.1x Check the box to enable the 802.1x authentication.
III-3-5-1-2. WEP (Wired Equivalent Privacy) is a basic encryption type. For a higher level of security consider using WPA encryption. Key Length Select 64-bit or 128-bit. 128-bit is more secure than 64-bit. Key Format Choose from “ASCII” (any alphanumerical character 0-9, a-z and A-Z) or “Hex” (any characters from 0-9, a-f and A-F).
III-3-5-1-3. WPA Pre-Shared Key WPA pre-shared key is the recommended and most secure encryption type. WPA Unicast Select from WPA (TKIP), WPA2 (AES) or WPA2 Cipher Suite Mixed. WPA2 (AES) is safer than WPA (TKIP), but not supported by all wireless clients. Please make sure your wireless client supports your selection.
III-3-5-1-4. WPA Radius WPA RADIUS is a combination of WPA encryption and RADIUS user authentication. If you have a RADIUS authentication server, you can authenticate the identity of every wireless client against a user database. WPA Unicast Select from WPA (TKIP), WPA2 (AES) or WPA2 Cipher Suite Mixed.
“Basic” menu. In access point mode, the “Guest” feature in the menu is replaced by “Multiple SSID”. The BR-6288ACL supports up to four additional SSIDs for each wireless band in access point mode. Enable Guest SSID Check/uncheck the box to enable/disable the guest Wi-Fi network.
Page 79
WPA RADIUS encyrption type is not available for the guest network. MULTIPLE SSID: The BR-6288ACL supports up to four additional SSIDs for each wireless band in access point mode. Once configured, these SSIDs are displayed in the “Multiple SSID Status” table as shown below. Use the “Multiple SSID Basic Settings”...
Page 80
Check the box to enable wireless clients isolation. Clients Isolation This prevents wireless clients connected to the BR-6288ACL from communicating with each other and improves security. Typically, this function is useful for corporate environments or public hot spots and can prevent brute force attacks on clients’...
III-3-5-3. WPS Wi-Fi Protected Setup is a simple way to establish connections between WPS compatible devices. WPS can be activated on compatible devices by pushing a WPS button on the device or from within the device’s firmware/configuration interface. When WPS is activated in the correct manner and at the correct time for two compatible devices, they will automatically connect.
This function allows you to define a list of network devices permitted to connect to the BR-6288ACL. Devices are each identified by their unique MAC address. If a device which is not on the list of permitted MAC addresses attempts to connect to the BR-6288ACL, it will be denied.
Page 83
MAC address Select a PC name from the drop-down list and click “>>” to add enter it into the blank field to the right. Click “Refresh’ in the drop-down menu to refresh the list of available MAC addresses. If the address you wish to add is not listed, enter it manually.
Check/uncheck the box “Enable Schedule Settings” to enable/disable the wireless on/off scheduling function. The BR-6288ACL must remain connected to the Internet and use an NTP server for the schedule feature to function correctly. Wireless scheduling can save energy and increase the security of your network.
Page 85
Add the schedule to the table of active schedules. Active schedules will be displayed in the table as shown below. Select an entry using the “Select” checkbox. Delete Selected / Delete selected or all entries from the table. Delete All...
III-3-6. Firewall The “Firewall” menu provides access to URL blocking, access control, DMZ and DoS functions to improve the security of your wireless network. SPI firewall Enable or disable the Stateful Packet Inspection (SPI) firewall. III-3-6-1. URL Blocking This function can block Internet access by either specific URLs or keywords. Check/uncheck the “Enable URL Blocking”...
Page 87
URL/Keyword Enter the URL or keyword to be blocked. Add the URL or keyword to the blocked table. Blocked URLs/keywords entries will be listed in the table as shown below. Select an entry using the “Select” checkbox. Delete Selected / Delete selected or all entries from the table.
This function allows you to define a list of network devices permitted or denied to connect to the BR-6288ACL. Devices are each identified by their unique MAC address or IP address. Specific services can also be allowed/denied for IP addresses.
Page 89
MAC Filtering: Enable MAC Filtering Check the box to enable MAC filtering and select whether to “Deny” or “Allow” access for specified MAC address. Client PC MAC Enter a MAC address of computer or network Address device manually without dashes or colons e.g. for MAC address ‘aa-bb-cc-dd-ee-ff’...
Page 90
IP Filtering: Enable IP Filtering Check the box to enable IP filtering and select whether to “Deny” or “Allow” access for specified IP address. Add PC Opens a new window to add a new IP to the list, to deny or allow access/services according to above.
Page 91
Enter a description for reference/identification of Client PC Description up to 16 alphanumeric characters. Client PC IP address Enter a starting IP address in the left field and the end IP address in the right field to define a range of IP addresses;...
III-3-6-3. DMZ A Demilitarized Zone (DMZ) is an isolated area in your local network where private IP addresses are mapped to specified Internet IP addresses, allowing unrestricted access to the private IP addresses but not to the wider local network. You can define a virtual DMZ host here.
to enter its IP address into the “Client PC” field (above). Click “Add” to add the client to the “Current DMZ Table”. DMZ entries will be displayed in the table shown below: Delete Selected / Delete selected or all entries from the table. Delete All III-3-6-4.
Page 94
Ping of Death Specify the frequency of ping of death packets which will trigger the router’s DoS protection function. Discard Ping from Check this box and the router will not answer ping requests from the Internet. Port Scan Intruders use “port scanners” to detect open Internet IP address ports.
QoS allows you to ensure that sufficient bandwidth is available. Minimum or maximum bandwidth can be guaranteed for a specified application. BR-6288ACL QoS can improve the ’s performance. QoS is recommended to optimize performance for online gaming.
Page 96
Rule Name Enter a name for the QoS rule for reference/identification. Bandwidth Set the bandwidth limits for the QoS rule: 1. Select “Download” or “Upload” for the QoS rule. 2. Enter the bandwidth limit. 3. Select whether the bandwidth is a “Guarantee”...
Page 97
Local Port Range Enter the port range to activate the QoS rule. Enter a single port number e.g. 110 or a range of port numbers e.g. 110-120 Remote IP Address Enter the remote IP address range which will activate the QoS rule. Enter a starting IP address in the left field and the end IP address in the right field to define a range of IP addresses;...
III-3-7-2. iQoS iQoS is a more intuitive and automated tool to manage internet bandwidth than manually configuring the settings using QoS. For online gamers or users with bandwidth requirements for audio/video, iQoS is a useful function. iQoS cannot be used in conjunction with QoS and vice-versa. When one is enabled, the other is automatically disabled.
Page 99
The icons represent the following categories: Internet Browsing P2P/BT Downloads Multimedia Online Gaming The iQoS table is ordered left to right, high to low priority. Click a small icon below the table to insert it into the table, and click a large icon in the table to remove it.
III-3-8. Advanced Advanced features of the BR-6288ACL can be configured from the “Advanced” menu. III-3-8-1. Static Routing Static routing is a method of configuring path selection of routers, characterized by the absence of communication between routers regarding the current topology of the network. The opposite of static routing is dynamic routing, sometimes also referred to as adaptive routing.
Default Gateway Enter the default gateway of the destination network. Hop Count Enter the hop count (the distance between destination network and this broadband router) here. Interface Enter the interface which leads to destination network. Add the route to the current static routing table. Static Routing Table entries will be displayed in the table shown below: Delete Selected/ Delete selected or all entries from the table.
Page 102
Private IP Enter the IP address of the computer on the local network. Computer Name Windows computers on the local network will be listed here – select a computer from the list and click << to automatically add the IP address to the “Private IP”...
III-3-8-3. Virtual Server This function allows you to set up an internet service on a local computer, without exposing the local computer to the internet. You can also build various sets of port redirection, to provide various internet services on different local computers via a single internet IP address.
Delete Selected/ Delete selected or all entries from the table. Delete All III-3-8-4. 2.4GHz Wireless These settings are for experienced users only. Please do not change any of the values on this page unless you are already familiar with these functions. Fragment Threshold Set the Fragment threshold of the wireless radio.
Page 105
Channel Width Select wireless channel width (bandwidth used by wireless signals from the device) – the recommended value is Auto 20/40MHz. Preamble Type Set the wireless radio preamble type. The default value is “Short Preamble”. CTS Protect Enabling this setting will reduce the chance of radio signal collisions between 802.11b and 802.11g wireless access points.
III-3-8-5. 5GHz Wireless These settings are for experienced users only. Please do not change any of the values on this page unless you are already familiar with these functions. Fragment Set the Fragment threshold of the wireless radio. The Threshold default value is 2346.
Page 107
Channel Width Select wireless channel width (bandwidth used by wireless signals from the device) – the recommended value is 20/40/80MHz. Preamble Type Set the wireless radio preamble type. The default value is “Short Preamble”. CTS Protect Enabling this setting will reduce the chance of radio signal collisions between 802.11b and 802.11g wireless access points.
III-3-8-6. IGMP IGMP is a communications protocol used to establish multicast group memberships. It allows for a more efficient use of resources and better performance for applications such as IPTV video streaming. IGMP Snooping IGMP snooping monitors traffic between hosts and multicast routers to facilitate bandwidth conservation.
III-3-9. Administration Various administrative functions can be accessed from the “Administration” menu. III-3-9-1. Time Zone Set Time Zone Select the time zone of your country or region. Time Server Address The travel router supports NTP (Network Time Protocol) for automatic time and date setup.
III-3-9-2. Password You can change the password used to login to the browser-based configuration interface here. It is advised to do so for security purposes. Please make a note of the new password. In the event that you forget the password and are unable to login to the browser based configuration interface, see II-7.
III-3-9-3. Remote Access Check “Enabled” to enable the remote access feature and then enter the appropriate values. Host IP Address Specify the IP address which is allowed remote access. Port Specify a port number (0–65535) used for remote access.
III-3-9-5. Upgrade The upgrade page allows you to upgrade the system firmware to a more recent version. You can download the latest firmware from the Edimax website. After the upgrade, the system will restart. Do not switch off or disconnect the device during a firmware upgrade, as this could damage the device.
III-3-9-6. Restart In the event that the router malfunctions or is not responding, then it is recommended that you restart the device. III-3-9-7. Logs You can view the system log and security log here. Use the drop down menu in the top-right corner to select which log to view.
Save Click “Save” to save the log on your computer as .txt file. Clear Click “Clear” to clear/erase the existing log. Refresh Click “Refresh” to refresh the log and update any activity. III-3-9-8. Active DHCP Client Information about active DHCP clients is shown in the table, which displays the DHCP server assigned IP address, MAC address and time expired for each computer or device on the local network.
IV. Appendix IV-1. Configuring your IP address For first time access to the URL http://edimax.setup please ensure your computer is set to use a dynamic IP address. This means your computer can obtain an IP address automatically from a DHCP server. You can check if your computer is set to use a dynamic IP address by following IV-1-1.
IV-1-1. How to check that your computer uses a dynamic IP address Please follow the instructions appropriate for your operating system. IV-1-1-1. Windows XP Click the “Start” button (it should be located in the lower-left corner of your computer), then click “Control Panel”. Double-click the “Network and Internet Connections”...
IV-1-1-2. Windows Vista Click the “Start” button (it should be located in the lower-left corner of your computer), then click “Control Panel”. Click “View Network Status and Tasks”, then click “Manage Network Connections”. Right-click “Local Area Network”, then select “Properties”. The “Local Area Connection Properties” window will then appear, select “Internet Protocol Version 4 (TCP / IPv4)”, and then click “Properties”.
IV-1-1-3. Windows 7 Click the “Start” button (it should be located in the lower-left corner of your computer), then click “Control Panel”. Under “Network and Internet” click “View network status and tasks”. Click “Local Area Connection”.
Page 121
Click “Properties”. Select “Internet Protocol Version 4 (TCP/IPv4) and then click “Properties”.
Page 122
Select “Obtain an IP address automatically” and “Obtain DNS server address automatically” should be selected.
IV-1-1-4. Windows 8 From the Windows 8 Start screen, you need to switch to desktop mode. Move your curser to the bottom left of the screen and click. In desktop mode, click the File Explorer icon in the bottom left of the screen, as shown below.
Page 124
In the window that opens, select “Change adapter settings” from the left side. Choose your connection and right click, then select “Properties”.
Page 125
Select “Internet Protocol Version 4 (TCP/IPv4) and then click “Properties”. Select “Obtain an IP address automatically” and “Obtain DNS server address automatically” should be selected.
IV-1-1-5. Mac OS Have your Macintosh computer operate as usual, and click on “System Preferences”. In System Preferences, click on “Network”. Click on “Wi-Fi” in the left panel and then click “Advanced” in the lower right corner. Select “TCP/IP” from the top menu and “Using DHCP” in the drop down menu labeled “Configure IPv4”...
IV-1-2. How to modify the IP address of your computer Please follow the instructions appropriate for your operating system. In the following examples we use the IP address 192.168.2.10 though you can use any IP address in the range 192.168.2.x (x = 3 – 254) in order to access iQ Setup/browser based configuration interface.
Page 130
Your existing static IP address will be displayed in the “IP address” field before you replace it. Please make a note of this IP address, subnet mask, default gateway and DNS server addresses. IP address: 192.168.2.10 Subnet Mask: 255.255.255.0 Preferred DNS Server: 192.168.2.1 Click ‘OK’...
IV-1-2-2. Windows Vista Click the “Start” button (it should be located in the lower-left corner of your computer), then click “Control Panel”. Click “View Network Status and Tasks”, then click “Manage Network Connections”. Right-click “Local Area Network”, then select “Properties”. The “Local Area Connection Properties” window will then appear, select “Internet Protocol Version 4 (TCP / IPv4)”, and then click “Properties”.
IV-1-2-3. Windows 7 Click the “Start” button (it should be located in the lower-left corner of your computer), then click “Control Panel”. Under “Network and Internet” click “View network status and tasks”.
Page 133
Click “Local Area Connection”. Click “Properties”.
Page 134
Select “Internet Protocol Version 4 (TCP/IPv4) and then click “Properties”. Select “Use the following IP address” and “Use the following DNS server addresses”, then input the following values: Your existing static IP address will be displayed in the “IP address” field before you replace it. Please make a note of this IP address, subnet mask, default gateway and DNS server addresses.
IV-1-2-4. Windows 8 From the Windows 8 Start screen, you need to switch to desktop mode. Move your curser to the bottom left of the screen and click. In desktop mode, click the File Explorer icon in the bottom left of the screen, as shown below.
Page 136
Right click “Network” and then select “Properties”. In the window that opens, select “Change adapter settings” from the left side.
Page 137
Choose your connection and right click, then select “Properties”.
Page 138
Select “Internet Protocol Version 4 (TCP/IPv4) and then click “Properties”. Select “Use the following IP address” and “Use the following DNS server addresses”, then input the following values: Your existing static IP address will be displayed in the “IP address” field before you replace it. Please make a note of this IP address, subnet mask, default gateway and DNS server addresses.
IV-1-2-5. Mac Have your Macintosh computer operate as usual, and click on “System Preferences” In System Preferences, click on “Network”. Click on “Wi-Fi” in the left panel and then click “Advanced” in the lower right corner. Select “TCP/IP” from the top menu and select “Manually” from the drop down menu labeled “Configure IPv4”, then click “OK”.
Page 140
Your existing static IP address will be displayed in the “IP address” field before you replace it. Please make a note of this IP address, subnet mask, default gateway and DNS server addresses. In the “IPv4 Address” and “Subnet Mask” field enter IP address 192.168.2.10 and subnet mask 255.255.255.0.
IV-1-3. How to Find Your Network Security Key To find your network security key, please follow the instructions appropriate for your operating system. If you are using Windows XP or earlier, please contact your ISP or router manufacturer to find your network security key. IV-1-3-1.
Page 143
Click on “Manage wireless networks” in the left menu. You should see the profile of your Wi-Fi network in the list. Right click on your Wi-Fi network and then click on “Properties”. Click on the “Security” tab, and then check the box labeled “Show characters”.
IV-1-3-2. Mac Open a new Finder window, and select “Applications” from the menu on the left side. Open the folder labeled “Utilities” and then open the application “Keychain Access”. Select “Passwords” from the sub-menu labeled “Category” on the left side, as shown below.
Page 145
Double click the SSID of your network and you will see the following window. Check the box labeled “Show password” and you will be asked to enter your administrative password, which you use to log into your Mac. Enter your password and click “Allow”.
Page 146
Your network security password will now be displayed in the field next to the box labeled “Show password”. In the example below, the network security password is “edimax1234”. Please make a note of your network security password.
IV-1-4. How to Find Your Router’s IP Address To find your router’s IP address, please follow the instructions appropriate for your operating system. IV-1-4-1. Windows XP, Vista & 7 Go to “Start”, select “Run” and type “cmd”, then press Enter or click “OK”. A new window will open, type “ipconfig”...
Page 148
Your router’s IP address will be displayed next to “Default Gateway”.
IV-1-4-2. Windows 8 From the Windows 8 Start screen, move your curser to the top right corner of the screen to display the Charms bar. Click “Search” and enter “cmd” into the search bar. Click the “Command Prompt” app which be displayed on the left side.
Page 150
A new window will open, type “ipconfig” and press Enter.
Page 151
Your router’s IP address will be displayed next to “Default Gateway”.
IV-1-4-3. Mac Launch “System Preferences” and click on “Network”. If you are using an Ethernet cable to connect to your network, your router’s IP address will be displayed next to “Router”. If you are using Wi-Fi, click “Wi-Fi” in the left panel, and then “Advanced” in the bottom right corner.
Page 153
Click the “TCP/IP” tab and your router’s IP address will be displayed next to “Router”.
, or ) in the system tray and select “Connect to a network”. Search for the SSID of your BR-6288ACL and then click “Connect”. If you set a password for your network, you will then be prompted to enter it.
Page 155
After correctly entering your password, you will be successfully connected to the BR-6288ACL’s wireless network.
IV-3. Troubleshooting 1. In range extender mode, is my BR-6288ACL dual-band? a. Yes. The BR-6288ACL can extend 2.4GHz & 5GHz Wi-Fi signals concurrently, but you must connect your BR-6288ACL to each (2.4GHz & 5GHz) network separately during iQ setup. During iQ Setup, you will be asked to select both a 2.4GHz &...
Page 157
Wi-Fi network name Enter the SSID (network name) of your existing, hidden network. Range extender SSID Enter an SSID for the BR-6288ACL or leave it blank to use a default which consists of your existing router’s SSID (above) +"_2EX". Encryption Select and enter the encryption information for your existing, hidden network.
Page 158
BR-6288ACL. If you are too far away from your existing router, then it is difficult for the BR-6288ACL to receive a wireless signal.
Page 159
Click “Browse” to locate the firmware file on your computer and then click “Upload” to upload the new firmware. It may take several minutes to complete, please wait and follow the instructions on screen.
Page 160
V. Glossary Default Gateway (Wireless bridge): Every non-access point IP device needs to configure a default gateway’s IP address. When the device sends out an IP packet, if the destination is not on the same network, the device has to send the packet to its default gateway, which will then send it out towards the destination.
Page 161
A network mask is also a 32-bit binary pattern, and consists of consecutive leading 1’s followed by consecutive trailing 0’s, such as 11111111.11111111.11111111.00000000. Therefore sometimes a network mask can also be described simply as “x” number of leading 1’s. When both are represented side by side in their binary forms, all bits in the IP address that correspond to 1’s in the network mask become part of the IP network address, and the remaining bits correspond to the host ID.
Page 162
Port: Network Clients (LAN PC) uses port numbers to distinguish one network application/protocol over another. Below is a list of common applications and protocol/port numbers: Application Protocol Port Number Telnet SMTP POP3 H.323 1720 SNMP SNMP Trap HTTP PPTP 1723 PC Anywhere TCP 5631 PC Anywhere UDP...
Page 163
Web-based management Graphical User Interface (GUI): Many devices support a graphical user interface that is based on the web browser. This means the user can use the familiar Netscape or Microsoft Internet Explorer to Control/configure or monitor the device being managed.
Page 164
COPYRIGHT Copyright Edimax Technology Co., Ltd. all rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise, without the prior written permission from Edimax Technology Co., Ltd.
Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Page 166
EU Declaration of Conformity This equipment is in compliance with the essential requirements and other relevant English: provisions of Directive 1999/5/EC, 2009/125/EC. Cet équipement est conforme aux exigences essentielles et autres dispositions de la Français: directive 1999/5/CE, 2009/125/CE. Toto zařízení je v souladu se základními požadavky a ostatními příslušnými ustanoveními Čeština: směrnic 1999/5/ES, 2009/125/ES.
Declaration of Conformity We, Edimax Technology Co., Ltd., declare under our sole responsibility, that the equipment described below complies with the requirements of the European R&TTE directives. Equipment: AC600 Multi-Function Concurrent Dual-Band Wi-Fi Router Model No.: BR-6288ACL The following European standards for essential requirements have been followed:...