Verizon MI424WR User Manual

Verizon MI424WR User Manual

Verizon wireless broadband router user's manual
Hide thumbs Also See for MI424WR:
Table of Contents

Advertisement

Wireless
MI424WR
Broadband
Router
User's
Manual

Advertisement

Table of Contents
loading

Summary of Contents for Verizon MI424WR

  • Page 1 Wireless MI424WR Broadband Router User’s Manual...
  • Page 2: Table Of Contents

    Table of Contents 1 Introduction Package Contents Minimum System Requirements Features Getting to Know the Router 2 Connecting the Router Setting Up the Router Computer Network Configuration Configuring the Router Home Page 3 Configuring My Network Settings Accessing My Network Using My Network 4 Creating a Wireless Network Overview...
  • Page 3 Wireless Broadband Router User Manual 8 Using Advanced Settings Firmware Upgrade Firmware Restore Configuration File System Settings Date and Time Scheduler Rules Routing IP Address Distribution Diagnostics Restoring Default Settings Reboot the Router MAC Cloning ARP (Address Resolution Protocol) Table Users Local Administration Remote Administration...
  • Page 4: Introduction

    Introduction Thank you for purchasing the Wireless Broadband Router. The Wireless Broadband Router supports Multimedia over Coax Alliance ( working standard that allows digital entertainment and information to be trans- mitted and distributed to multiple devices over coaxial cables. The Router also sup- ports Ethernet and Wi-Fi networking, making it the most versatile router available.
  • Page 5: Minimum System Requirements

    Wireless Broadband Router User Manual Wall-mount template Vertical stand Warranty Minimum System Requirements Computer with Ethernet capability Microsoft Windows 98 BSD, Unix Internet Explorer network protocol installed on each computer TCP/IP Features Supports multiple networking standards, including: - Ethernet and - 802.11g, 802.11b, Ethernet, and Integrated wired networking with 4-port 10/100 Mbps Ethernet switch MoCA...
  • Page 6 Chapter 1 Introduction Intrusion detection address filtering hosting Access control Advanced wireless protection featuring tion, 802.1x authentication, and certified ICSA Other Features server option DHCP server/ server auto-detection DHCP server address selection LAN IP WAN IP address cloning Port forwarding support QoS support (end to end layer 2/3) featuring Diffserv, 802.1p/q prioriti- zation, configurable upstream/downstream traffic shaping, random early...
  • Page 7: Getting To Know The Router

    Wireless Broadband Router User Manual Getting to Know the Router This section contains a quick description of the Router’s lights ( The Router features several indicator lights on its front panel, and a series of ports and switches on its rear panel. Front Panel The front panel of the Router features ten indicator lights: Power, Coax, Internet,...
  • Page 8 Internet Light When the Internet light glows steadily green, the Router is connected to the (Internet Service Provider). If it glows amber, there is a physical connection to (Optical Network Terminator), but authentication has not taken place (i.e., no address is present). LAN Ethernet Lights (1, 2, 3, 4) Ethernet lights illuminate when the Router is connected to a local network via one or more of its Ethernet ports.
  • Page 9 Wireless Broadband Router User Manual Rear Panel The rear panel of the Router features seven ports (Coax, Ethernet [4], and Power), as well as a Reset button and Power switch. Coax Port The Coax port connects the Router to the coaxial cable.
  • Page 10 Chapter 1 Introduction Power Switch The Power switch powers the Router on and off. Power Port The Power port connects the Router to an electrical wall outlet via the Power cord.
  • Page 11 Wireless Broadband Router User Manual This page left intentionally blank.
  • Page 12: Connecting The Router

    Connecting the Router Connecting a computer or local network to the Wireless Broadband Router is a simple procedure, varying slightly depending on the computer’s operating system but designed to seamlessly integrate the Router with the computer or local net- work. Moreover, addition configuration to access the ing advantage of Universal Plug-and-Play support in Windows The Windows default network settings dictate that in most cases, the setup pro- cedure described in the “Computer Network Configuration”...
  • Page 13 Wireless Broadband Router User Manual 6. Make sure the computer is powered on, then plug the other end of the yellow Ethernet cable into an Ethernet port on the computer. 7. Make sure at least one of the Ethernet glows steadily green. This may take a few moments. 8.
  • Page 14: Computer Network Configuration

    Chapter 2 Connecting the Router Computer Network Configuration Each network interface on the computer should either be configured with a stati- cally defined address and address using the Network active server, and we recommend leaving this setting as is. DHCP Configuring Dynamic IP Addressing To set up a computer to use dynamic Windows XP...
  • Page 15 Wireless Broadband Router User Manual Windows 98/Me 1. Select Network in the Control Panel. 2. Select the settings for the network card, then click Properties. TCP/IP 3. Click the “Obtain an Address” tab. 4. Click Disable DNS in the 5. Click OK in the “ TCP/IP 6.
  • Page 16: Configuring The Router

    Chapter 2 Connecting the Router Configuring the Router 1. Open a web browser on the computer connected to the Router. In the “Address” text box, type: http://192.168.1.1 then press Enter on the keyboard. 2. The “Login” screen appears. Enter the default user name (admin) and pass- word (password) in the appropriate text boxes, then click OK.
  • Page 17 Wireless Broadband Router User Manual Connecting Other Computers/Set Top Boxes The Router can connect to other computers or set top boxes in three ways: via Ethernet, via wireless connection, or via coaxial cable. Ethernet 1. Get an Ethernet cable and plug one end into one of the open yellow Ethernet ports on the back of the Router.
  • Page 18: Home Page

    Chapter 2 Connecting the Router 3. Connect one end of the coaxial cable to the coaxial wall jack, and the other end to the red Coax port on the back of the Router. 4. Power up the set top box. 5.
  • Page 19: Main Menu

    3, “Configuring My Network Settings.” Action Zone This section contains links to various Verizon Web sites, and other informational links. Clicking on the icon above “Go to Internet Now” connects the user to the home page configured on the user’s web browser.
  • Page 20: Configuring My Network Settings

    Configuring My Network Settings Once the Wireless Broadband Router is physically connected and the MegaControl Panel’s Home screen is displayed in a web browser, a list of the devices connected to the Router’s network appears in the “My Network” section of the screen. From here, some basic network settings can be configured.
  • Page 21: Using My Network

    Wireless Broadband Router User Manual Using My Network Various settings can be accessed for a particular device, as follows. Access Device For devices that can be accessed (such as Internet cameras and networked hard drives), locate it in the My Network column, then click Access Devices to use the device over the network.
  • Page 22 Chapter 3 Configuring My Network Settings 1. Click Add in the “Networked computer/Device” column. The “Add Access Control Rule” screen appears. 2. If this access control rule applies to all networked devices, select “Any” from the “Networked Computer/Device” list box. If this rule applies to certain devices only, select “Specify Address”...
  • Page 23 Wireless Broadband Router User Manual The user may disable an access control and the service made available without having to remove the service from the Access Control table. This may be useful to make the service available only temporarily, with the expectation that the restric- tion will be reinstated later.
  • Page 24 Chapter 3 Configuring My Network Settings 1. Click Add. The “Add Port Forwarding Rule” screen appears. 2. Enter the local address or the host name of the computer providing the ser- vice in the “Networked Computer/Device” text box. Note that only one local network computer can be assigned to provide a specific service or application.
  • Page 25 Wireless Broadband Router User Manual View Device Details To view information about a networked device, or to test a device’s connection, locate the device in the My Network column, then click View Device Details. The “Device Information” screen appears. 1. Click Test Connectivity. The “Diagnostics” screen appears. 2.
  • Page 26 Chapter 3 Configuring My Network Settings Rename This Device To rename a networked device, locate the device in the My Network column, then click Rename This Device. The “Rename Device” screen appears. Enter the new name of the device in the “New Name” text box and, if needed, select a new icon for the device from the “New Icon”...
  • Page 27 Wireless Broadband Router User Manual This page left intentionally blank.
  • Page 28: Creating A Wireless Network

    Creating a Wireless Network This chapter explains how to create a wireless network using the Wireless Broadband Router, including accessing and configuring wireless security options. Overview The Wireless Broadband Router provides the user with wireless connectivity over the 802.11b and g standards (the most common wireless standards). 802.11b has a maximum data rate of 11 Mbps, while 802.11g has a maximum data rate of 54 Mbps.
  • Page 29: Wireless Status

    Wireless Broadband Router User Manual Wireless Status Clicking on the “Wireless Settings” icon in the Home screen generates the “Wireless Status” screen, which displays the current status of the wireless connection. Radio Enabled Displays whether the Router’s wireless radio is active. SSID (Service Set Identifier) is the network name shared among all devices SSID...
  • Page 30: Mac Authentication

    Chapter 4 Creating a Wireless Network SSID Broadcast Displays whether the Router is broadcasting its . If activated, the of the SSID SSID Router’s wireless network is broadcast wirelessly. MAC Authentication Displays whether the Router is using (Media Access Control) address authen- tication to allow wireless devices to join the network.
  • Page 31: Basic Security Settings

    Wireless Broadband Router User Manual Basic Security Settings To configure the Router’s wireless network for basic security, select “Basic Security Settings” from the menu on the left side of any Wireless Settings screen. The “Basic Security Settings” screen appears. 1. Click the “On” radio button to activate the Router’s wireless radio. 2.
  • Page 32 Chapter 4 Creating a Wireless Network 5. Select a security level from the “select a (options include “64/40 bit” or “128/104 bit”). 6. Enter the key code in the “Key Code” text box. Each character must be a letter from A-F or a number from 0-9. If 64/40 bit was selected in step 5, enter 10 characters.
  • Page 33: Advanced Security Settings

    Wireless Broadband Router User Manual Advanced Security Settings To configure the Router’s advanced wireless network security settings, select “Advanced Security Settings” from the menu on the left side of any Wireless Settings screen. The “Advanced Security Settings” screen appears. ☞ Note: The advanced settings should only be configured by experi- enced technical users.
  • Page 34 Chapter 4 Creating a Wireless Network was selected in the Advanced Security Settings screen, the “ screen appears. 1. Select the appropriate network authentication level from the drop- down list. Options include Open System Authentication, Shared Key Authentication, or Both. 2.
  • Page 35 Wireless Broadband Router User Manual 802.1X WEP If 802.1X (Wired Equivalent Privacy) was selected, the “ Settings” screen appears. To generate the full screen, click in the “Enabled” check box to activate. 802.1x is a robust security protocol that uses port control with dynamically changing encryption keys automatically updated over the network.
  • Page 36 Chapter 4 Creating a Wireless Network (Wi-Fi Protected Access) was selected, the “WPA Key” screen appears. 1. Verify the authentication method selected is “Pre-Shared Key.” 2. Enter a phrase of at least eight characters in the “Pre-Shared Key” text box. Verify that “...
  • Page 37 Wireless Broadband Router User Manual Level 2 (SSID Broadcast) This section is used to configure the Router’s broadcast capabilities. SSID Selecting “SSID Broadcast” generates the “SSID Broadcast” screen. Click the “Enable” radio button to enable broadcasting. If enabled, the SSID SSID the Router’s wireless network will be broadcast wirelessly.
  • Page 38 Chapter 4 Creating a Wireless Network Level 3 (Limiting Access) This section is used to limit access to the Router’s wireless network. Wireless MAC Authentication Wireless authentication allows the user to allow or deny access to the Router’s wireless network by a particular device’s “Wireless Authentication”...
  • Page 39 Wireless Broadband Router User Manual 3. Enter the address of a device in the “Client 4. Click Add. 5. Repeat steps 3 and 4 to add more devices to the list. 6. When finished listing devices, click Apply. To remove a MAC address, select it from the “List” list box, then click Remove. 802.11b/g Mode This option allows the user to select the wireless communication standard com- patible with the devices to be connected on the wireless network from the drop-...
  • Page 40 Chapter 4 Creating a Wireless Network When should this rule occur? Displays the time during which the rule is active. To configure schedule rules, see chapter 9, “Advanced Settings.” Network Select the type of connection being configured from this drop-down list (options: Network [Home/Office], Broadband Connection, or DMZ).
  • Page 41: Configuring A Wireless Windows Xp Client

    Wireless Broadband Router User Manual DTIM Interval Enter the Delivery Traffic Indication Message) interval value (in mil- DTIM ( liseconds) in this text box. A informing wireless network clients of the next window for listening to broadcast and multicast messages. Fragmentation Threshold Setting the correct fragmentation threshold can increase the reliability of frame transmissions on the wireless network.
  • Page 42 Chapter 4 Creating a Wireless Network 2. Double-click the wireless connection icon. The “Wireless Network Connection” screen appears, displaying all available wireless networks in the vicinity. If the Router is connected and active, the Router’s wireless connection is displayed. Note that the connection’s status is “Not connected” and defined as “Security-enabled wireless network ( 3.
  • Page 43: Connecting A Wireless Windows Xp Client

    Wireless Broadband Router User Manual Connecting a Wireless Windows XP Client This section assumes the Router is set up with 1. Click Network Connections in the Control Panel. The “Network Connections” window appears. 2. Double-click the wireless connection icon. The “Wireless Network Connection”...
  • Page 44 Chapter 4 Creating a Wireless Network 3. Click the connection once to mark it, then click Connect at the bottom of the screen. The following login window appears, asking for a “Network Key,” which is the pre-shared key used when configuring the Router’s (see the “...
  • Page 45 Wireless Broadband Router User Manual 2. The “Wireless Network Connection Properties” window appears. Select Wireless Networks. 3. Click the connection to highlight it, then click Properties. The connection’s “Properties Window” appears. 4. From the “Network Authentication” drop-down list, select WPA-PSK. 5.
  • Page 46 Chapter 4 Creating a Wireless Network 6. Enter the pre-shared key in both the “Network key” and the “Confirm net- work key” text boxes. 7. Click OK, then OK again. 8. When attempting to connect to the wireless network, the login window appears, pre-populated with the pre-shared key.
  • Page 47 Wireless Broadband Router User Manual This page left intentionally blank.
  • Page 48: Using Network Connections

    Using Network Connections The Wireless Broadband Router supports various local area network ( ) and wide area network ( , on Internet) connections via Ethernet or coaxial cables. Network connections is used to configure the various parameters of the Router’s network and Internet connections, and create new connections.
  • Page 49: Network (Home/Office)

    Wireless Broadband Router User Manual To select a connection, click on its name. The rest of this chapter describes the dif- ferent network connections available on the Router, as well as the connection types that can be created. Network (Home/Office) Select Network (Home/Office) in the Network Connections screen to generate the “Network (Home/Office) Properties”...
  • Page 50 Chapter 5 Using Network Connections Configuring the Home/Office Network Click Settings in the “Network (Home/Office) Properties” screen to generate the “Configure Network (Home/Office)” screen. General The top part of the Configure Network (Home/Office) screen displays general communication parameters. We recommend not changing the default values in this section unless familiar with networking concepts.
  • Page 51 Wireless Broadband Router User Manual Internet Protocol This section has three options: No IP Address, Obtain an IP Address Automatically, and Use the Following IP Address. No IP Address Select this option if the connection will have no useful if the connection operates under a bridge. Obtain an IP Address Automatically Select this option if the network connection is required by the to obtain an...
  • Page 52 Chapter 5 Using Network Connections STP Click in the device’s “ the device. This protocol provides path redundancy while preventing undesir- able loops in the network. Action The “Action” column contains an icon that, when clicked, generates the configuration screen of the particular device. DNS Server Domain Name System ( are translated into...
  • Page 53 Wireless Broadband Router User Manual 4. Enter the subnet mask address in the “Subnet Mask” text boxes. The subnet mask determines which portion of a destination work portion, and which portion is the host portion. 5. If Windows Internet Naming Service ( server address in the “...
  • Page 54: Ethernet Connection

    Chapter 5 Using Network Connections Routing Table Clicking New Route generates the “New Route” window, where a new route can be configured. Additional IP Addresses Clicking New IP Address generates the “Additional where additional IP addresses can be created to access the Router via the Network (Home/Office) connection.
  • Page 55 Wireless Broadband Router User Manual Configuring the Ethernet Connection Click Settings at the bottom-right of the Ethernet Properties screen to generate the “Configure Ethernet” screen. General The top part of the Configure Ethernet screen displays general communication parameters. We recommend not changing the default values in this section unless familiar with networking concepts.
  • Page 56 Chapter 5 Using Network Connections Additional IP Addresses Clicking New IP Address generates the “Additional Address Settings” screen, where additional addresses can be created to access the Router via the Ethernet connection. 4 Ports Ethernet Switch This section displays the connection status of the Router’s four Ethernet ports. Clicking on a connection’s “Action”...
  • Page 57: Coax Connection

    Wireless Broadband Router User Manual Coax Connection A Coax connection connects devices (such as set-top boxes) to the Router using a coaxial cable. Click Coax in the Network Connections screen (if needed, click Advanced at the bottom of the screen to reveal the “Coax” link below “Network [Home/Office]”) to generate the “Coax Properties”...
  • Page 58 Chapter 5 Using Network Connections Configure Coax Click Settings at the bottom-right of the Coax Properties screen generates the “Configure Coax” screen. General The top part of the Configure Coax screen displays general communication parameters. We recommend not changing the default values in this section unless familiar with networking concepts.
  • Page 59 Wireless Broadband Router User Manual Coax Link Set up the coax link options in this section of the Configure Coax screen. Options include Channel, Privacy, and Password. Channel Select the Channel from the drop-down list (select from 1-6, or “Automatic”). Privacy Toggle “Privacy”...
  • Page 60: Broadband Ethernet Connection

    Chapter 5 Using Network Connections Broadband Ethernet Connection A Broadband Ethernet connection connects the Router to the Internet using an Ethernet cable. Click Broadband Connection (Ethernet) from the Network Connections screen to generate the “Broadband Connection (Ethernet) Properties” screen. This screen displays a list of the connection’s properties. The only modifica- tions that can be made from this screen are disabling the connection (by clicking Disable) or renaming the connection (by entering a new name in the “Rule Name”...
  • Page 61 Wireless Broadband Router User Manual Configuring the Broadband Ethernet Connection Click Settings at the bottom-right of the Broadband Connection (Ethernet) Properties window to generate the “Configure Broadband Connection (Ethernet)” screen. General The top part of the screen displays general communication parameters. We recom- mend not changing the default values in this section unless you are familiar with networking concepts.
  • Page 62 Chapter 5 Using Network Connections (Maximum Transmission Unit) specifies the largest packet size per- mitted for Internet transmission. “Automatic, sets the es include “Automatic by connection, and “Manual,” which allows the Internet Protocol This section includes three options: No IP Address, Obtain an IP Address Automatically, and Use the Following IP Address.
  • Page 63 Wireless Broadband Router User Manual IP Address Distribution The “ Address Distribution” section of the Configure Broadband Connection Ethernet) screen is used to configure the Router’s Dynamic Host Configuration Protocol ( ) server parameters. DHCP to network devices. If enabled, make sure to configure the network devices as “...
  • Page 64 Chapter 5 Using Network Connections Additionally, to add a new product or product family, click New IP Range in the “Vendor Class ” column below “ 60 (Vendor Class Identifier). ” This generates the “ Set the device name, range, and priority level in the appropriate text boxes, then click Apply.
  • Page 65: Coax Broadband Connection

    Wireless Broadband Router User Manual 3. Click in the “Default Route” check box to define this device as a the default route. 4. Click in the “Multicast - multicasting. Routing Table Clicking New Route generates the “New Route” window, where a new route can be configured.
  • Page 66 Chapter 5 Using Network Connections ☞ Note: If disabling the connection, the Router must be rebooted for the change to take effect. Configuring the Coax Broadband Connection Click Settings at the bottom of the Broadband Connection (Coax) Properties screen to generate the “Configure Broadband Connection (Coax)” screen. General The top part of the screen displays general communication parameters.
  • Page 67 Wireless Broadband Router User Manual Network Displays the type of network to which the link is connected. Since this is a broadband connection (connected to the Internet), “Broadband Connection is displayed. Connection Type Displays the type of connection. Since this is a coaxial connec- tion, “Coax”...
  • Page 68 Chapter 5 Using Network Connections Obtain an IP Address Automatically Select this option if the nection to obtain an address automatically. The server assigning the also assigns a subnet mask address, which can be overridden by clicking in the “Override Subnet Mask” check box and entering another subnet mask address. Additionally, the lease can be renewed and/or released by clicking on the DHCP...
  • Page 69 Wireless Broadband Router User Manual DHCP Server To set up the server: DHCP 1. Select DHCP Server. 2. Enter the address at which the Router starts issuing addresses in the “Start Address” text boxes. Since the Router’s default 192.168.1.1, the Start 3.
  • Page 70 Chapter 5 Using Network Connections Advanced To set up the Router’s Coax broadband connection for advanced rout- ing: 1. Select Advanced from the Routing drop-down list. 2. Enter a device metric in the “Device Metric” text box. The device metric is a value used by the Router to determine whether one route is superior to another, considering parameters such as bandwidth and delay time.
  • Page 71: Wan Pppoe/Wan Pppoe 2

    Wireless Broadband Router User Manual WAN PPPoE/WAN PPPoE 2 Point-to-Point Protocol over Ethernet ( ) relies on two widely accepted PPPoE standards: Point-to-Point Protocol and Ethernet. enables Ethernet net- PPPoE worked computers to exchange information with computers on the Internet. supports the protocol layers and authentication widely used in PPPoE enables a point-to-point connection to be established in the normally multipoint...
  • Page 72 Chapter 5 Using Network Connections Configuring the WAN PPPoE Connection Click Settings in the WAN PPPoE screen. WAN PPPoE” General The top part of the Configure tion parameters. We recommend not changing the default values in this section unless familiar with networking concepts. Status Displays the connection status of the “Disabled,”...
  • Page 73 Wireless Broadband Router User Manual Network Select the type of connection being configured from the drop-down list (Broadband Connection, Network (Home/Office), or DMZ). Connection Type Displays the type of connection. Since this is “ ” is displayed. Maximum Transmission Unit) specifies the largest packet size MTU ( permitted for Internet transmission.
  • Page 74 Chapter 5 Using Network Connections Login User Name Enter the user name (provided by the ) in this text box. Login Password Enter the password (provided by the ) in this text box. Support Unencrypted Password (PAP) Password Authentication Protocol ( is a simple, plain-text authentication scheme.
  • Page 75 Wireless Broadband Router User Manual Internet Protocol Select one of the following Internet Protocol options from the “Internet Protocol” drop-down list: Obtain an IP Address Automatically This option is selected by default. Change only if required by the . The server that assigns the Router with an assigns a subnet mask.
  • Page 76 Chapter 5 Using Network Connections • NAPT - Select this option to activate Translation), which refers to network address translation involving the mapping of port numbers and allows multiple machines to share a single address. Use if the local network contains multiple devices, a topology NAPT that necessitates port translation in addition to address translation.
  • Page 77 Wireless Broadband Router User Manual This page left intentionally blank.
  • Page 78: Configuring The Router's Security

    Configuring the Router’s Security The Wireless Broadband Router’s security suite includes comprehensive and robust security services: Stateful Packet Inspection, a firewall, user authentication proto- cols, and password protection mechanisms. These features allow users to connect their computers to the Internet and be protected from the security threats. The Router’s firewall is the cornerstone of the Router’s security suite.
  • Page 79 Wireless Broadband Router User Manual This chapter covers these Security features: • General - select the security level for the firewall. • Access Control - restrict access from the local network to the Internet. • Port Forwarding - enable access from the Internet to specified services provided by computers on the local network.
  • Page 80: General

    Chapter 6 Configuring the Router’s Security General The “General” screen is used to configure the Router’s basic security settings. The firewall regulates the flow of data between the local network and the Internet. Both incoming and outgoing data are inspected and then either accepted (allowed to pass through the Router) or rejected (barred from passing through the Router) according to a flexible and configurable set of rules.
  • Page 81 Wireless Broadband Router User Manual Note that it is the origin of the request, not subsequent responses to this request, which determines whether a session can be established or not. The Router features three pre-defined security levels: Minimum, Typical, and Maximum.
  • Page 82: Access Control

    Chapter 6 Configuring the Router’s Security 2. Check the “Block mon type of hacker attack that uses fragmented data packets to sabotage the network. Note that mate use of fragments. network to use these services. 3. Click Apply to save changes. Access Control Access control is used to block specific computers within the local network (or even the whole network) from accessing certain services on the Internet.
  • Page 83 Wireless Broadband Router User Manual Allow or Restrict Services To view and allow/restrict these services: 1. Select Access Control from the left side of any Security screen. The “Access Control” screen appears. ☞ Note: The “Allowed” section is only visible when the firewall is set to “Maximum.”...
  • Page 84 Chapter 6 Configuring the Router’s Security 3. If this access control rule applies to all networked devices, select “Any” from the “Networked Computer/Device” list box. If this rule applies to certain devices only, select “Specify Address” and click Add. Then, create and add a network object (for more details about adding network objects, see the “Advanced Settings”...
  • Page 85: Port Forwarding

    Wireless Broadband Router User Manual Port Forwarding In its default state, the Router blocks all external users from connecting to or communicating with the network, making it safe from hackers who may try to intrude on the network and damage it. However, the network can be exposed to the Internet in certain limited and controlled ways to enable some applications to work from the local network (game, voice, and chat applications, for example) and to enable Internet access to servers in the network.
  • Page 86: Dmz (Demilitarized Zone) Host

    Chapter 6 Configuring the Router’s Security 4. Select the Internet protocol to be provided from the “Protocol” drop-down list. To see all options, select All Services. 5. Select a connection type from the “ list. We recommend selecting All Broadband Devices. 6.
  • Page 87: Port Triggering

    Wireless Broadband Router User Manual To designate a local computer as a 1. Select DMZ Host from the left side of any Security screen. The “ screen appears. 2. Click in the “ Host computer to be designated as a puter can be a 3.
  • Page 88 Chapter 6 Configuring the Router’s Security To use port triggering: 1. Select Port Triggering from the left side of any Security screen. The “Port Triggering” screen appears. 2. Select either “Specify Protocol” or “Show All Services” from the drop-down list next to “Add.”...
  • Page 89: Remote Administration

    Wireless Broadband Router User Manual Remote Administration The Router can be accessed and controlled not only from within the local network, but also from the Internet using remote adminstration. To access, select Remote Administration from the left side of any Security screen. The “Remote Administration”...
  • Page 90 Chapter 6 Configuring the Router’s Security MegaControl Panel MegaControl Panel is used to obtain access to the Router’s MegaControl Panel and gain access to all settings and parameters,using a web browser. Both secure ( and non-secure ( ) access is available. Select the port to be used by clicking in HTTP the appropriate text box, then click Apply.
  • Page 91: Static Nat

    Wireless Broadband Router User Manual Static NAT This option allows multiple public addresses to be designated to devices on the network. Static allows devices behind a firewall and configured with private addresses appear to have public nal host, such as a web server, to have an unregistered (private) be reachable over the Internet.
  • Page 92: Advanced Filtering

    Chapter 6 Configuring the Router’s Security Advanced Filtering Advanced filtering is designed to allow comprehensive control over the firewall’s behavior. Specific input and output rules can be defined, the order of logically similar sets of rules controlled, and distinctions made between rules that apply to Internet and local network devices.
  • Page 93 Wireless Broadband Router User Manual Inbound Packets - Input Rule Sets • Initial rules • All rules defined for the network device on which the packet is • Local servers rules from the local server tab in the security screen •...
  • Page 94 Chapter 6 Configuring the Router’s Security To configure advanced filtering rules, click Add next to the rule title. The “Add Advanced Filter” screen appears. To add an advanced filtering rule, define the following rule parameters: Matching To apply a firewall rule, a match must be made between and ports.
  • Page 95: Security Log

    Wireless Broadband Router User Manual • Accept - Allow access to packets that match the source and destination addresses and protocol ports defined in upper section of the screen. The data transfer session will be handled using Stateful Packet Inspection ( •...
  • Page 96: Configuring The Router’s Security

    Chapter 6 Configuring the Router’s Security Time The time (based on the Router’s date and time settings) the event occurred. Event There are five kinds of events listed in the system log: • Inbound Traffic - a result of an incoming packet •...
  • Page 97 Wireless Broadband Router User Manual sage has been blocked. • ICMP redirect protection - an • Packet invalid in connection - an invalid connection packet has been blocked. • ICMP protection - a broadcast • Broadcast/Multicast protection - a packet with a broadcast/multicast source has been blocked.
  • Page 98 Chapter 6 Configuring the Router’s Security receive a connection has been accepted. PPTP • AUTH:113 request - an outbound packet for accepted (for maximum security level). • IPV6 over IPV4 - an • ARP - an packet has been accepted. •...
  • Page 99 Wireless Broadband Router User Manual • Fragmented packet, packet too big - a packet has been blocked because, after defragmentation, the packet was too big. • Fragmented packet, packet exceeds - a packet has been blocked because, after defragmentation, the packet exceeded. •...
  • Page 100 Chapter 6 Configuring the Router’s Security • FTP port request to 3rd party is forbidden (Possible bounce attack) - a packet has been blocked. • Firewall Rules were changed - the firewall rule set has been modified. • User authentication - a message arrived during login time, including both successful and failed authentication.
  • Page 101 Wireless Broadband Router User Manual 3. Select the type of blocked events to be listed in the log: • All Blocked Connection Attempts - activating this check box generates log messages for all blocked events. • Other Blocked Events - if “All Blocked Connection Attempts” is un- checked, select specific blocked events from this list to generate log messages.
  • Page 102: Using Parental Controls

    Using Parental Controls The abundance of harmful information on the Internet poses a serious challenge for employers and parents alike - “How can I regulate what my employee/child does on the Internet?” The Wireless Broadband Router’s Parental Controls allows users to regulate, control, and monitor Internet access. By classifying and categoriz- ing online content, it is possible to create numerous Internet access policies and easily apply them to networked computers.
  • Page 103 Wireless Broadband Router User Manual 3a. Click the circle next to “Block the following Websites” to block access to a list of websites, or click the circle next to “Allow the following Websites” to allow access to a list of websites. 3b.
  • Page 104: Advanced Parental Controls

    5a. Select the computer or device on the network on which the access policy will be enforced from the “Network Computer/Device” drop-down menu. 5a. Select the time period during which the access policy will be enforced from the “Network Computer/Device” drop-down menu. If “Specify Schedule” is selected, see “Scheduler Rules”...
  • Page 105 Wireless Broadband Router User Manual 2. Select the time period during which the access policy will be enforced from the “Network Computer/Device” drop-down menu. If “Specify Schedule” is selected, see “Scheduler Rules” in the “Advanced Settings” chapter for more infomation. 3.
  • Page 106: Using Advanced Settings

    Using Advanced Settings The “Advanced” section of the Wireless Broadband Router’s MegaControl Panel is intended primarily for more advanced users. Some changes to settings within this section could adversely affect the operation of the Router and the local network, and should be made with caution. To access the Router’s Advanced Settings, click Advanced at the top of the Home screen, which generates the “Advanced”...
  • Page 107 Wireless Broadband Router User Manual Restore Defaults - reset the Router to its default settings Reboot Router - restart the Router MAC Cloning - clone MAC addresses ARP Table - display active devices and their addresses, etc. Users - create and manage remote users Local Administration - configure and manage local administration policies Dynamic DNS - configure Dynamic settings...
  • Page 108: Firmware Upgrade

    Chapter 8 Using Advanced Settings Firmware Upgrade The Router offers a built-in mechanism for upgrading its firmware without los- ing custom configurations and settings. There are two methods for upgrading the firmware: • Upgrading from a local computer - use a software image file pre-down- loaded to the computer’s disk drive or located on the accompanying evalua- tion •...
  • Page 109 Wireless Broadband Router User Manual 2. In the “Upgrade From a Computer in the Network” section, click Upgrade Now. The “Upgrade From a Computer in the Network” screen appears. 3. Enter the path of the software image file, or press the “Browse” button to browse for the file, and click Apply.
  • Page 110: Firmware Restore

    Chapter 8 Using Advanced Settings Automatic Check Disabled If “Automatically Check Disabled” is selected, the Router will not automatically check for firmware upgrades. Manual Checking and Upgrading To manually upgrade the Router’s firmware: 1. Click Check Now in the Firmware Upgrade screen. 2.
  • Page 111: Configuration File

    Wireless Broadband Router User Manual Configuration File Use the Router’s Configuration File feature to view, save, and load configuration files, which are used to backup and restore the Router’s current configuration: To do this: 1. Click Configuration File in the Advanced screen. The “Configuration File” screen appears.
  • Page 112: System Settings

    Chapter 8 Using Advanced Settings System Settings Clicking System Settings in the Advanced screen generates the “System Settings” screen, where various system and management parameters can be configured.
  • Page 113 Wireless Broadband Router User Manual System Use the “System” section of this screen to configure the following two options: Wireless Broadband Router’s Hostname Specify the Router’s host name by entering it into the this text box. The host name is also the Router’s 192.168.1.1.
  • Page 114 Chapter 8 Using Advanced Settings Management Application Ports This section allows the following management application ports to have their default port numbers to be changed: • Primary/secondary • Primary/secondary • Primary/secondary Telnet ports • Secure Telnet over System Logging Use this section to configure the following system log options. Enable Logging Click in this check box to activate system logging.
  • Page 115 Wireless Broadband Router User Manual Security Logging Use this section to configure the following security log options. Enable Logging Click in this check box to activate security logging. Low Capacity Notification Enabled Click in this check box to activate low capacity notification (works in tandem with “Allowed Capacity Before Email Notification”...
  • Page 116 Chapter 8 Using Advanced Settings Port Enter the port number of the E-mail server in this text box. Server Requires Authentication If the E-mail server requires authentication, click in this check box, then enter a user name and password in the “User Name” and “Password” text boxes that appear. Auto WAN Detection When activated, Auto connection.
  • Page 117: Date And Time

    Wireless Broadband Router User Manual Date and Time To configure date, time, and daylight savings time settings perform the following: 1. Click Date and Time in the Advanced screen. The “Date and Time” screen appears. 2. Select the local time zone from the drop-down list. The Router can automati- cally detect daylight saving setting for selected time zones.
  • Page 118: Scheduler Rules

    Chapter 8 Using Advanced Settings To perform an automatic time update: 1. Click in the “Enabled” check box in the “Automatic Time Update” section. 2. Select the protocol to be used to perform the time update by selecting either the “Time of Day” or “Network Time Protocol” radio button. 3.
  • Page 119 Wireless Broadband Router User Manual 3. Click Add. The “Set Rule Schedule” screen appears. 4. Enter a name for the rule in the “Rule Name” text box. 5. Specify if the rule will be active or inactive during the designated time period by clicking the appropriate “Rule Settings”...
  • Page 120: Routing

    Chapter 8 Using Advanced Settings 8. If applicable, click New Hours Range Entry to define an active/inactive hourly range. The “Edit Hour Range” screen appears. Enter a start and end time in the appropriate text boxes. 9. Click Apply. ☞ Note: Make sure the Router’s date and time settings are properly configured for the time zone.
  • Page 121 Wireless Broadband Router User Manual When adding a routing rule, the following parameters must be specified: • Rule Name- Select the type of network from the drop-down list. • Destination - The destination is the destination host, subnet address, net- work address, or default route.
  • Page 122: Ip Address Distribution

    Chapter 8 Using Advanced Settings Domain Routing Domain routing is used in multi-router local network configurations. Normally, to accesss a device connected to one router from another router on the network, its address must be used. Activating domain routing (by clicking in the appropriate check box) allows the user to access to the computer by name (as well as IP Address Distribution The Router’s...
  • Page 123 Wireless Broadband Router User Manual To view a summary of the services currently being provided by the server, click IP Address Distribution in the Advanced screen. The “ Distribution” screen appears. Editing DHCP Server Settings To edit the server settings for a device: DHCP 1.
  • Page 124: Dhcp Connections

    Chapter 8 Using Advanced Settings 3. Complete the following fields: • Start IP Address Range, End IP Address Range - determines the number of hosts connected to the network in this subnet. “Start” specifies the first address assigned in this subnet and “End” specifies the last the range.
  • Page 125 Wireless Broadband Router User Manual To define a new connection with a fixed 1. Click New Static Connection in the Connection Settings” screen appears. 2. Enter a host name for this connection. 3. Enter the fixed address to assign to the computer. 4.
  • Page 126: Diagnostics

    Chapter 8 Using Advanced Settings Diagnostics The Diagnostics screen can assist in testing network connectivity. This feature pings ( echo) an ICMP packets transmitted and received, round trip time, and success status. To diagnose network connectivity: 1. Click Diagnostics from the Advanced screen. The “Diagnostics” screen appears.
  • Page 127: Restoring Default Settings

    Wireless Broadband Router User Manual Restoring Default Settings If the Router’s factory default settings need to be restored (to build a new network from the beginning, for example), use the following procedure: 1. If needed click Save Configuration File to save the Router’s current con- figuration to a file.
  • Page 128: Mac Cloning

    Chapter 8 Using Advanced Settings MAC Cloning (Media Access Control) address is a unique hexadecimal code that identifies a device on a network. All networkable devices have a ing another network device with the Router, the installation process can be simpli- fied by copying the 1.
  • Page 129: Users

    Wireless Broadband Router User Manual Users To manage individual users: 1. Click Users in the Advanced screen, which generates the “Users” screen. 2. Click New User, which generates the “User Settings” screen. When adding a user, specify the following parameters: •...
  • Page 130: Qos

    Chapter 8 Using Advanced Settings • E-mail Notification - E-mail notification can be used to receive indications of system events for a predefined severity classification. The available types of events are “System” or “Security” events. The available severity of events are Error, Warning, and Information.
  • Page 131: Remote Administration

    Wireless Broadband Router User Manual Remote Administration The Router’s Remote Administration capabilities are covered in detail in the “Security” chapter of this manual. Dynamic DNS Dynamic (Domain Name Server) a dynamic address to be aliased to a static hostname, allowing a computer on the network to be more easily accessible from the Internet.
  • Page 132 Chapter 8 Using Advanced Settings Setting up Dynamic DNS on the Router, click Dynamic DNS in the Advanced To set up Dynamic screen. The “Dynamic Configure the following parameters: Connection To Update Select the connection with which to couple the Dynamic include Broadband Connection (Ethernet), Broadband Connection (Coax), and WAN PPPoE.
  • Page 133: Dns Server

    Wireless Broadband Router User Manual Host Name Enter the full Dynamic Wildcard Select the “Wildcard” check box to have any (here.yourhost.dyndns.org, for example) to connect. Mail Exchanger Enter the mail exchange server address. This will redirect all E-mails arriving at the Dynamic address to the mail server.
  • Page 134 Chapter 8 Using Advanced Settings server does not require configuration. However, the list of computers known by the can be viewed, the host name or the list can be changed, or a new computer can be added to the list. DNS Table To view the list of computers stored in the Advanced screen.
  • Page 135: Network Objects

    Wireless Broadband Router User Manual 2. If the host was manually added to the address can be modified. Otherwise, only modify its host name. 3. Click Apply to save the changes. To remove a host from the Click the appropriate “Delete” icon in the Action column. The entry will be removed from the table.
  • Page 136: Universal Plug And Play (Upnp)

    Chapter 8 Using Advanced Settings 2. Click Add. The “Edit Network Object” screen appears. 3. Specify a name for the network object in the “Description” text box. 4. Click Add. The “Edit Item” screen appears. 5. Select the type of network object type from the “Network Object Type” list box. Options include address, 6.
  • Page 137 Wireless Broadband Router User Manual 2. Click in the “Allow Other Network Users to Control Wireless Broadband Router’s Network Features” check box to enable to be defined on any of the network hosts. 3. Click in the “Enable Automatic Cleanup of Old Unused box to enable automatic cleanup of invalid rules.
  • Page 138: Protocols

    Chapter 8 Using Advanced Settings Protocols Protocols features a list of preset and user-defined applications and common port settings. Protocols can be used in various security features, such as Access Control and Port Forwarding. New protocols can be added to support new applications or existing ones can be edited when needed.
  • Page 139 Wireless Broadband Router User Manual 3. Name the service in the “Service Name” text box and, if needed, enter a description of the service in the “Service Description” text box, then click Add Service Ports. The “Edit Service Server Ports” screen appears. 4.
  • Page 140: Monitoring The Router

    Monitoring the Router The Wireless Broadband Router’s System Monitoring screens display important system information, including: • Basic Router settings • System log • Key network device parameters • Network traffic statistics Router Status Click System Monitoring at the top of the Home screen to display the “Router Status”...
  • Page 141: Advanced Status

    Wireless Broadband Router User Manual Advanced Status Clicking Advanced Status displays three other monitoring options: System Logging, Full Status/System wide Monitoring of Connections, and Traffic Monitoring. System Logging Click System Logging in the Advanced Status screen to generate the “System Log” screen.
  • Page 142 Chapter 9 Monitoring the Router Full Status/System wide Monitoring of Connections 1. Click Full Status/System wide Monitoring of Connections in the Advanced Status screen to generate the “Full Status/System wide Monitoring of Connections” screen, which features a table summarizing the monitored con- nection data.
  • Page 143: Traffic Monitoring

    Wireless Broadband Router User Manual Traffic Monitoring The Router constantly monitors traffic within the local network and between the local network and the Internet. To view up-to-the-second statistical information about data received from and transmitted to the Internet, and about data received from and transmitted to computers in the local network, click Traffic Monitoring in the Advanced Status screen.
  • Page 144: Troubleshooting

    Troubleshooting This chapter contains a list of problems that may be encountered while using the Wireless Broadband Router, and techniques to try and overcome the problem. Note that these techniques may not solve the problem (or problems). Accessing the Router if Locked Out If the Router’s connection is lost while making configuration changes, a setting that locks access to the MegaControl Panel may have inadvertantly been acti- vated.
  • Page 145 Wireless Broadband Router User Manual LAN Connection Failure • Ensure the Router is properly installed, the and the power is on. • Confirm the computer and Router are on the same network segment. If unsure, let the computer get the IP address automatically by initiating the function, then verify the computer is using an IP address within the DHCP default range (...
  • Page 146 Chapter 10 Troubleshooting Are the Router’s Ethernet ports auto-sensing? Yes. Either a straight-through or crossover Ethernet cable can be used. Can I use an 802.11b wireless card to connect to the Router? Yes, the Router can interface with b cards or g cards.
  • Page 147 Wireless Broadband Router User Manual I cannot access the Router’s Graphical User Interface? What should I do? If you cannot access the Router’s Graphical User Interface, make sure the com- puter connected to the Router is set up to dynamically receive an address.
  • Page 148: A Quality Of Service

    Quality of Service Network-based applications and traffic are growing at a high rate, producing an ever-increasing demand for bandwidth and network capacity. For obvious reasons, bandwidth and capacity cannot be expanded infinitely, requiring that bandwidth- demanding services be delivered over existing infrastructure, without incurring additional expensive investments.
  • Page 149 Wireless Broadband Router User Manual The matching of packets by rules is connection-based, known as Stateful Packet Inspection ( ), using the Router’s firewall mechanism. Once a packet matches a rule, all subsequent packets with the same attributes receive the same eters, both inbound and outbound.
  • Page 150: Setting Priority Rules

    Setting Priority Rules To set priority rules: 1. Click Quality of Service in the Advanced screen. The “Traffic Priority” screen appears. This screen is divided into two identical sections, one for “ rules” and the other for “ inbound and outbound traffic, respectively. Each section lists all the devices on which rules can be set.
  • Page 151 Wireless Broadband Router User Manual 2. After choosing the traffic direction and the device on which to set the rule, click Add in the appropriate row. The “Add Traffic Priority Rule” screen appears. Set the following parameters: Source Address - The source address of the packets sent to or received from the network object.
  • Page 152: Traffic Shaping

    Set Priority - Activate this check box to add a priority to the rule. The screen will refresh, allowing a selection between one of eight priority levels, zero being the lowest and seven the highest (each priority level is mapped to low/medium/high priority).
  • Page 153 Wireless Broadband Router User Manual Device Traffic Shaping This section describes the different Traffic Shaping screens and terms, and presents the feature’s configuration logic. 1. Click Quality of Service in the Advanced screen, then click Traffic Shaping. The following screen appears. 2.
  • Page 154: Shaping Classes

    Configure the following parameters: Tx Bandwidth - Tx bandwidth limits the Router’s bandwidth transmission rate. The purpose is to limit the bandwidth of the est outbound link.. This forces the Router to be the network bottleneck, where sophisticated prioritization can be performed. Rx Bandwidth - In the same manner, this Rx bandwidth limits the Router’s bandwidth reception rate.
  • Page 155 Wireless Broadband Router User Manual To define a shaping class: 1. Click Add in the “Tx Traffic Shaping” section of the Edit Device Traffic Shaping screen. The “Add Shaping Class” screen appears. 2. Name the new class and click Apply. 3.
  • Page 156 Appendix A Quality of Service Policy The class policy determines the policy of routing packets inside the class. Select one of four options: • Priority - Priority queuing utilizes multiple queues, so that traffic is distrib- uted among queues based on priority. This priority is defined according to packet’s priority, which can be defined explicitly, by a DSCP value, or by an 802.1p value.
  • Page 157 Wireless Broadband Router User Manual To add a new outbound/inbound class rule, click Add in the Edit Class screen. The “Add Traffic Priority Rule” screen appears. Source Address - The source address of the packets sent to or received from the network object (computer A in the above example).
  • Page 158 Set Priority - Activate this check box to add a priority to the rule. The screen will refresh, allowing a selection of one of eight priority levels, zero being the lowest and seven the highest (each priority level is mapped to low/medium/high priority).
  • Page 159 Wireless Broadband Router User Manual Furthermore, the Router cannot control the behavior of the , which may not have proper handling. Unfortunately, this is a common situation. Let’s look at a scenar- io of downloading a large file and surfing the Internet at the same time. Downloading the file is distinguished by small requests, followed by very large responses.
  • Page 160 1. Click Quality of Service at the top of the Home screen, then click DSCP Settings. The “ DSCP 2. To edit an existing entry, click the appropriate icon in the “Action” column. To add a new entry, click Add. In either case, the “Edit DSCP Settings” screen appears.
  • Page 161 Wireless Broadband Router User Manual 802.1p Settings 802.1p priority marking method is a standard for prioritizing network IEEE traffic at the data link/Mac sub-layer. 802.1p traffic is simply classified and sent to the destination, with no bandwidth reservations established. The 802.1p header includes a 3-bit prioritization field, which allows packets to be grouped into eight levels of priority.
  • Page 162 2. The eight 802.1p values are pre-populated with the three priority levels: Low, Medium, and High. These levels can be changed for each of the eight values in their respective drop-down lists. 3. Click Apply to save the settings. Class Statistics The Router provides accurate, real-time information on the traffic moving through the defined device classes.
  • Page 163 Wireless Broadband Router User Manual This page left intentionally blank.
  • Page 164: B Specifications

    Specifications General Model Number MI424WR (4-Port Wireless Broadband Router) Standards IEEE 802.3x IEEE 802.3u IEEE 802.11b, g (Wireless) IP version 4 MoCA Two channels ( frequency: 975 WAN M frequency: 1125 LAN M Firewall certified ICSA Speed LAN Ethernet: 10/100 Mbps auto-sensing Wireless: 802.11g 54 Mbps optimal (see “Wireless Operating Range”...
  • Page 165: Wireless Operating Range

    Wireless Broadband Router User Manual Wireless Operating Range Indoors Up to 91 (300 ft.) Outdoors Up to 533 (1750 ft.) Topology Star (Ethernet) LED Indicators Power, Ethernet , Ethernet Environmental Power External, 5 , 3A V DC Certifications Part 15, -60959-1 Operating Temperature 0 º...

Table of Contents