EnGenius ESR-1221EXT User Manual

EnGenius ESR-1221EXT User Manual

11b/g wireless soho router
Hide thumbs Also See for ESR-1221EXT:

Advertisement

11b/g Wireless SOHO Router
User's Manual
Version: 1.2
1

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the ESR-1221EXT and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for EnGenius ESR-1221EXT

  • Page 1 11b/g Wireless SOHO Router User’s Manual Version: 1.2...
  • Page 2: Table Of Contents

    Table of Contents INTRODUCTION...5 & B EATURES ENEFITS ...6 ACKAGE ONTENTS SOHO R IRELESS OUTER YSTEM EQUIREMENTS ...7 PPLICATIONS ETWORK ONFIGURATION Ad-hoc (peer-to-peer) Mode...8 Infrastructure Mode...8 UNDERSTANDING THE HARDWARE...9 ARDWARE NSTALLATION IP A DDRESS ONFIGURATION WEB CONFIGURATION...10 ...10 OGGING ...11 ANAGEMENT 3.2.1 ...12...
  • Page 3 3.5.6 DMZ ...44 APPENDIX A – SPECIFICATIONS...45 APPENDIX B – FCC INTERFERENCE STATEMENT...46...
  • Page 4: Revision History

    Revision History Version Date Jul 10, 2008 Aug 6, 2008 Aug 11, 2008 Notes Initial Version...
  • Page 5: Introduction

    1 Introduction The Wireless SOHO Router operates seamlessly in the 2.4 GHz frequency spectrum supporting the 802.11b (2.4GHz, 11Mbps) and the newer, faster 802.11g (2.4GHz, 54Mbpswireless standard. High output power and high sensitivity can extend range and coverage to reduce the roaming between APs to get more stability wireless connection.
  • Page 6: Package Contents

    Package Contents Open the package carefully, and make sure that none of the items listed below are missing. Do not discard the packing materials, in case of return; the unit must be shipped in its original package. One Wireless SOHO Router One Power Adapter One CAT5 UTP Cable One CD-ROM with User’s Manual and Install Wizard...
  • Page 7: System Requirements

    socket on the wall, and the DC inlet into the DC connector. Connection / Activity This LED will light up once an Ethernet cable is connected to one of the LAN ports or the WAN port. WAN LED This LED will light up once an Ethernet cable is connected to WAN (Internet) port.
  • Page 8: Network Configuration

    Network Configuration To better understand how the wireless LAN products work together to create a wireless network, it might be helpful to depict a few of the possible wireless LAN PC card network configurations. The wireless LAN products can be configured as: a) Ad-hoc (or peer-to-peer) for departmental or SOHO LANs.
  • Page 9: Understanding The Hardware

    2 Understanding the Hardware Hardware Installation 1. Place the unit in an appropriate location after conducting a site survey. 2. Plug one end of the Ethernet cable into the LAN port of the device and another end into your PC/Notebook. 3.
  • Page 10: Web Configuration

    2. Select Internet Protocol (TCP/IP) and then click on the Properties button. This will allow you to configure the TCP/IP settings of your PC/Notebook. 3. Select Use the following IP Address radio button and then enter the IP address and subnet mask. Ensure that the IP address and subnet mask are on the same subnet as the device.
  • Page 11: Management

    After logging in you will graphical user interface (GUI) of the device. The navigation ƒ drop-down menu on left is divided into four main sections: Management: This menu includes the administrator settings, advanced wireless settings such as wireless MAC clone and RTS/fragmentation threshold. Also included are other system related settings such as firmware upgrade, reset to factory defaults, and system date/time configuration.
  • Page 12: Status

    Status Click on the Status link under the Management menu. The device status page is ƒ also displayed once you have logged in. This includes details about the system uptime and firmware, LAN IP address and MAC address and the wireless settings such as the radio status, MAC address, SSID, RF channel, as well as WAN settings.
  • Page 13: Statistics

    Statistics Click on the Statistics link on the navigation drop-down menu. This page displays ƒ the transmitted and received packet statistics of the wired and wireless interface. Click on the Refresh button to refresh the statistics. Dynamic DNS ƒ Click on the DDNS link on the navigation drop-down menu. This feature allows you to maintain your Internet domain name even if you IP address supplied by your ISP is a dynamic one.
  • Page 14: Time Zone Setting

    Time Zone Setting Click on the Time Zone Setting link in the navigation menu. This feature allows you ƒ to configure, update, and maintain the correct time on the device’s internal system clock as well as configure the time zone. The date and time of the device can be configured manually or by synchronizing with a time server.
  • Page 15: Denial Of Service (Dos)

    Denial of Service (DoS) ƒ Click on the Denial of Service link in the navigation menu. This is a security feature that blocks intrusions from the Internet that may disrupt the network service. ƒ Enable DoS protection: Place a check in this box to enable the DoS features. You may also enable the other DoS protection features listed below.
  • Page 16: Log

    ƒ Click on the Log link on the navigation drop-down menu. Logs display a list of events that are triggered on the Ethernet and Wireless interface. This log can be referred when an unknown error occurs on the system or when a report needs to be sent to the technical support department for debugging purposes.
  • Page 17: Upgrade Firmware

    Upgrade Firmware Click on the Upgrade Firmware link on the navigation drop-down menu. This page ƒ allows you to upgrade the firmware of the device in order to improve the functionality and performance. ƒ Ensure that you have downloaded the appropriate firmware from the vendor’s website.
  • Page 18: Restore The Configuration From A File

    Restore the Configuration from a File ƒ Click on the Save / Reload Settings link on the navigation drop-down menu. This option allows you to restore a backup configuration from a file to the device. Click on the Browse button to select the file and then click on Upload button. ƒ...
  • Page 19: Administrator Settings

    Administrator Settings ƒ Click on the Password link on the navigation drop-down menu. This page allows you to configure the password to access this device from the web-browser. Note: The default user name and password of the device is admin ƒ...
  • Page 20: Lan Settings - Static Ip

    LAN Settings – Static IP ƒ Click on the LAN Interface link on the navigation drop-down menu. This feature allows you to configure the LAN interface using a static IP address or as a DHCP server/client. This IP address is also used to access the web-based interface. ƒ...
  • Page 21: Lan Settings - Dhcp Client

    LAN Settings – DHCP Client ƒ Click on the LAN link on the navigation drop-down menu. This feature allows you to configure the LAN interface using a static IP address or as a DHCP server/client. This IP address is also used to access the web-based interface. ƒ...
  • Page 22: Lan Settings - Dhcp Server

    LAN Settings – DHCP Server Click on the LAN link on the navigation drop-down menu. This feature allows you to ƒ configure the LAN interface using a static IP address or as a DHCP server/client. DHCP stands for Dynamic Host Configuration Protocol. The DHCP section is where you configure the built-in DHCP Server to assign IP addresses to the computers and other devices on your local area network (LAN).
  • Page 23: Wan Settings - Static Ip

    WAN Settings – Static IP ƒ Click on the WAN link on the navigation drop-down menu. This feature allows you to configure the WAN interface using a static IP address, DHCP Client, PPoE, or PPTP. ƒ WAN Access Type: Select Static IP from the drop-down list. This type of connection is used when your ISP has provided you a dedicated IP address.
  • Page 24: Wan Settings - Dhcp Client

    Enable IPsec pass through on VPN connection: Place a check in this box to ƒ enable the pass through of PPTP packets on a VPN connection. ƒ Enable IPsec pass through on VPN connection: Place a check in this box to enable the pass through of L2TP packets on a VPN connection.
  • Page 25: Wan Settings - Pppoe

    Enable uPNP: Place a check in this box to enable UPnP. It is recommended to ƒ enable this feature as it’s used by several applications. ƒ Enable PING Access on WAN: Place a check in this box if you would like the device to be pinged from the WAN side (ISP).
  • Page 26: Wan Settings - Pptp

    Connection Type: Select Continuous (always online), Connect on Demand ƒ (connect to the ISP only when you click on a website), or Manual (connect to the ISP only when you click on a ‘Connect’ button) from the drop-down list. ƒ Idle Time: The PPPoE service can automatically disconnect if the connection is idle.
  • Page 27 ƒ WAN Access Type: Select PPTP from the drop-down list. This type of connection is used when your ISP has provided you a dedicated IP address. IP Address: Enter an IP address for this device, which is assigned by your ISP. ƒ...
  • Page 28: Wireless

    Wireless Wireless Basic Settings ƒ Click on the Basic Settings link on the navigation drop-down menu. These options allow you to enable/disable the wireless interface, switch between the 11b/g and 11b radio band and channel frequency ƒ Wireless Interface: Place a check in this box to disable the wireless interface, it is enabled by default.
  • Page 29: Wireless Advanced Settings

    Show Active Clients: Click on this button to view a list of clients that are associated ƒ with this device. ƒ Click on the Apply Changesto save the changes. Wireless Advanced Settings ƒ Click on the Advanced Settings link on the navigation drop-down menu. These options allow you to configure the authentication type, fragment threshold, RTS threshold, beacon interval, and RF output power.
  • Page 30 Beacon Interval: Beacons are packets sent by a wireless Access Point to ƒ synchronize wireless devices. Specify a Beacon Period value between 20 and 1024. The default value is set to 100 milliseconds. ƒ Data Rate: Select a transmission rate from the drop-down list. It is recommended to use the auto option.
  • Page 31: Wireless Security

    Wireless Security ƒ To protect your privacy this mode supports several types of wireless security: WEP WPA, WPA2, and WPA-Mixed. WEP is the original wireless encryption standard. WPA provides a higher level of security. The following section describes the security configuration in detail.
  • Page 32 ƒ Encryption: Select WEP from the drop-down list in order to enable WEP security and then click on the Set WEP key button. ƒ Key Length: Select a 64-bit or 128-bit WEP key length from the drop-down list. ƒ Key Format: Select a key format such as HEX or ASCII from the drop-down list. ƒ...
  • Page 33: Wireless Security - Wpa / Wpa2-Mixed

    Wireless Security – WPA / WPA2-Mixed ƒ Select WPA or WPA2-Mixed from the drop-down list if your wireless network uses WPA encryption. WPA (Wi-Fi Protected Access) was designed to improve upon the security features of WEP (Wired Equivalent Privacy). The technology is designed to work with existing Wi-Fi products that have been enabled with WEP.
  • Page 34: Wireless Access Control

    Click on the Apply Changes to save the changes. ƒ Wireless Access Control ƒ Click on the Access Control link on the navigation drop-down menu. The MAC address filter section can be used to filter network access by machines based on the unique MAC addresses of their network adapter(s).
  • Page 35: Wds (Wireless Distribution System)

    WDS (Wireless Distribution System) Click on the WDS link on the navigation drop-down menu. The Wireless Distribution System feature configures this device as a repeater and therefore extends the range/coverage area of the wireless network. ƒ Enable WDS: When WDS is enabled, this access point functions as a wireless repeater and is able to wirelessly communicate with other APs via WDS links.
  • Page 36: Wds Security

    WDS Security Click on the Set Security button to configure one of the security options for the WDS. ƒ Options available are WEP, WPA and WPA2, and you must configure the same security setting on each Access Point linked with this one. WDS Security - None ƒ...
  • Page 37: Wds Security - Wpa (Tkip), Wpa2 (Aes)

    ƒ Encryption: Select a 64-bit or 128-bit WEP encryption from the drop-down list. ƒ Key Format: Select a key format such as HEX or ASCII from the drop-down list. ƒ WEP Key: Specify the WEP key ƒ Click on the Apply Changes to save the changes and then click on the Close button. WDS Security –...
  • Page 38 Encryption: Select a WPA or WPA2 encryption from the drop-down list. The ƒ encryption algorithm used to secure the data communication. TKIP (Temporal Key Integrity Protocol) provides per-packet key generation and is based on WEP. AES (Advanced Encryption Standard) is a very secure block based encryption. Note that, if the bridge uses the AES option, the bridge can associate with the access point only if the access point is also set to use only AES.
  • Page 39: Firewall

    Firewall Port Filtering Select Port Filtering from the drop-down list This feature is used to restrict certain ƒ types of data packets on certain port numbers from your local network and the Internet. These filters can be used for securing and restricting your network. ƒ...
  • Page 40: Ip Filtering

    You may place a check in the box on under the Select column and then click on ƒ Delete Selected to remove the selected entry. You may also click on Delete All to delete all the filtering entries. IP Filtering ƒ...
  • Page 41: Mac Filtering

    MAC Filtering ƒ Select MAC Filtering from the drop-down list. This feature is used to restrict certain MAC address from accessing the Internet. These filters can be used for securing and restricting your network. ƒ Enable MAC Filtering: Place a check in this box to enable this feature. MAC Address: Enter the MAC address of the device on the local network.
  • Page 42: Port Forwarding

    Port Forwarding ƒ Select Port Forwarding from the drop-down list. This feature is used to automatically redirect common network services to a specific machine behind the NAT firewall. These settings are only necessary if you wish to host some sort of server like a web server or email server on the private local network behind the NAT firewall.
  • Page 43: Url Filtering

    URL Filtering ƒ Select URL Filtering from the drop-down list. This is a type of parental control feature used to restrict certain websites form being accessed through your network. These filters can be used for securing and restricting your network. ƒ...
  • Page 44 ƒ Select DMZ from the drop-down list. A demilitarized zone is used to provide Internet services without sacrificing unauthorized access to its local private network. Typically, the DMZ host contains devices accessible to Internet traffic, such as web, FTP, email and DNS servers. ƒ...
  • Page 45: Appendix A - Specifications

    Appendix A – Specifications Standards IEEE802.11b/g, IEEE802.1x, IEEE802.3, IEEE802.3u Wi-Fi data speed IEEE 802.11b: 11/5.5/2/1Mbps IEEE 802.11g: 54/48/36/24/18/12/9/6Mbps Compatibility IEEE 802.11g/ IEEE 802.11b Power Requirements Power Supply: 90 to 240 VDC 10 (depends on different countries) Device: 12 V/ 1.3A Status LEDs 4*LAN : Link/Activity WLAN : Link/Activity...
  • Page 46: Federal Communication Commission Interference Statement

    Appendix B – FCC Interference Statement Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
  • Page 47 Industry Canada statement: This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. IMPORTANT NOTE: Radiation Exposure Statement: This equipment complies with IC radiation exposure limits set forth for an uncontrolled...

This manual is also suitable for:

Soho

Table of Contents