CyberTAN WR214C User Manual

High-performance wireless router

Advertisement

Quick Links

H
i
g
h
-
P
e
r
f
o
r
m
a
n
c
e
W
i
r
e
l
e
s
s
R
o
u
t
e
r
H
i
g
h
-
P
e
r
f
o
r
m
a
n
c
e
W
i
r
e
l
e
s
s
R
o
u
t
e
r
User's Manual
2003/06/10

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the WR214C and is the answer not in the manual?

Questions and answers

Summary of Contents for CyberTAN WR214C

  • Page 1 User’s Manual 2003/06/10...
  • Page 2 Broadband Security Router User Guide FCC Interference Statement This device complies with Part 15 of FCC rule. Operation is subject to the following two conditions: This device may not cause harmful interference. This device must accept any interference received, including interference that may cause undesired operation.
  • Page 3: Table Of Contents

    Broadband Security Router User Guide Table of Contents Preface ............................1 Chapter 1: Introduction......................3 About The High-Performance Wireless Router ............3 Features ........................4 Package Contents ....................... 5 Chapter 2: Installation......................7 Front Panel ......................... 7 Rear Panel & Connections ..................8 System Requirements....................
  • Page 4 Broadband Security Router User Guide Chapter 7: Trouble Shooting ....................51 Hardware ........................51 Client Side (Computers)................... 52 Appendix A: Technical Specifications.................. 55 Appendix B: Glossary ......................57 - iv -...
  • Page 5: Preface

    Broadband Security Router User Guide Preface Congratulations on your purchase of this High-Performance Wireless Router. This router is the perfect design product combining wireless and Ethernet network technology together. Fully compatible with IEEE 802.11b wireless standard, this device not only allows you to take advantage of mobility, but also to have fast Ethernet connection with built-in four 10/100 auto-sensing switch Ethernet ports.
  • Page 6 Broadband Security Router User Guide applications illustrations of the High-Performance Wireless Router. Chapter 2: Hardware Installation & Setup This chapter describes the steps for the hardware installation of the High-Performance Wireless Router. Chapter 3: Internet Access This chapter describes the steps for the basic configuration and start up of the High-Performance Wireless Router.
  • Page 7: Chapter 1: Introduction

    Broadband Security Router User Guide Chapter 1: Introduction This chapter describes the package contents and provides a list of features and application illustrations of the High-Performance Wireless Router. About The High-Performance Wireless Router High-Performance Wireless Router is a hybrid design product which combines Ethernet technology and wireless access into a single stand-alone unit.
  • Page 8: Features

    Broadband Security Router User Guide solution for mobile workers to access network resource and for setting a temporary LAN when necessary Wireless LANs can be set as “Aad-hoc” network and “Infrastructure” network. Unlike the “Aad-hoc network”, where users on the LAN send data directly to each other, the “Infrastructure”...
  • Page 9: Package Contents

    Broadband Security Router User Guide Package Contents After carefully unpacking the shipping carton, check the contents listed below. Router Power Adapter User’s Manual The High-Performance Wireless Router Power Adapter User’s Manual - 5 -...
  • Page 10 Broadband Security Router User Guide - 6 -...
  • Page 11: Chapter 2: Installation

    Broadband Security Router User Guide Chapter 2: Installation This chapter provides information about your High-Performance Wireless Router’s physical features and gives step-by-step installation instructions for hardware installation and software configuration. Front Panel The following figure shows the front view of the High-Performance Wireless Router. The LEDs on the front panel indicate the status of the unit.
  • Page 12: Rear Panel & Connections

    Broadband Security Router User Guide Rear Panel & Connections The following figure shows the rear view of the High-Performance Wireless Router and illustrates how the cables connect to the interfaces on the rear panel. Plug one end of the UTP cable into the WAN port, the other into the RJ45 Ethernet jack on your ADSL or Cable modem.
  • Page 13: Setting Up The Tcp/Ip Protocol

    Broadband Security Router User Guide Setting Up the TCP/IP Protocol If you are not sure whether the TCP/IP Protocol has been installed, follow these steps to check, and if necessary, install TCP/IP onto your PCs. Click the “Start” button. Choose “Settings”, then “Control Panel”. Double-click the “Network”...
  • Page 14 Broadband Security Router User Guide In the “Local Area Connection Status” window, click the “Properties” button then your Network window will appear. There is only one tab, “General”, in the Network window. Check whether the TCP/IP Protocol has already been installed onto your computer’s Ethernet card.
  • Page 15 Broadband Security Router User Guide Highlight “Microsoft” under the list of manufacturers. Double-click “TCP/IP” from the list on the right or highlight “TCP/IP” then click “OK” to install TCP/IP. After a few seconds, you will be returned to the Network window. The TCP/IP Protocol should now be on the list of installed network components (see 3 above).
  • Page 16 Broadband Security Router User Guide Fixed IP Addresses Configuration Fixed IP addresses may be assigned to network devices for many reasons, such as the server PCs or printers which are consistently accessed by multiple users. To set up computers with fixed IP Addresses, go to the “IP Address” tab of the “TCP/IP Properties”...
  • Page 17 Broadband Security Router User Guide Click on the “DNS Configuration” tab and select “Enable DNS”. Enter the “DNS IP Address” obtained from your ISP in the “Server Search Order” location. Then click the “Add” button. Click on the “Gateway” tab and enter the High-Performance Wireless Router’s default gateway value 192.168.1.1 in the “New gateway”...
  • Page 18 Broadband Security Router User Guide Click “OK”. Restart your PC to complete the TCP/IP installation. - 14 -...
  • Page 19: Chapter 3: Internet Access

    Broadband Security Router User Guide Chapter 3: Internet Access This chapter describes the procedures necessary to configure the basic functions and begin using your High-Performance Wireless Router. If you follow these procedures correctly, there should be no problem in accessing the Internet via your High-Performance Wireless Router.
  • Page 20: Basic Configuration - Setup

    Broadband Security Router User Guide The “Username and Password Required” prompt box will appear. Leave the Username field empty and type “admin” (default password) in the Password field. Click “OK”. The setup screen will then appear. Basic Configuration – Setup The “OnePage Setup”...
  • Page 21 Broadband Security Router User Guide exceed 32 characters. Channel: Select the appropriate channel number from the drop-down. The permissible channels are different from Regulatory Domains. Make sure that all nodes in the same wireless LAN network use the same channel, or the channel usage is automatic when a connection between client and access point are made.
  • Page 22: Wan Connection Type

    Broadband Security Router User Guide administrator. Default TX Key Select one of the four keys to be the encryption key you are going to use in the wireless network. To be sure that all the points in a same wireless network have to have the same encryption key.
  • Page 23 Broadband Security Router User Guide Address: Address. Domain Name Server Your ISP will provide you with at least one DNS IP (DNS): Address. Multiple DNS IP settings are common. The first available DNS entry is used in most cases. PPPoE PPPoE is a dial-up connection type provided by some ISPs.
  • Page 24 Broadband Security Router User Guide RAS(for SingTel) If your ISP uses RAS to establish the connection, you should select this item and follow the steps below. User Name: Enter the user name your ISP provides you. Password: Enter the password your ISP provides you. RAS Plan: Choose the connection method that you want to use.
  • Page 25 Broadband Security Router User Guide PPTP PPTP is the acronym of Point to Point Tunneling Protocol. Usually, it is used to encapsulate other protocols’ packets for transmission over IP network. Some ISPs use this protocol as way to establish the initial connection between the CPE (end-user side) and DSLAM (ISP side).
  • Page 26 Broadband Security Router User Guide this information in the “Redial Period” field. If your ISP uses HBS to establish the connection, you should select this item and follow the steps below. User Name: Enter the user name provided by your ISP. Password: Enter the password provided by your ISP.
  • Page 27: Chapter 4: Advanced Applications

    Broadband Security Router User Guide Chapter 4: Advanced Applications In general, after finishing the steps listed in chapter 3, you can connect to Internet with ease. Yet, you might want to have advanced configuration for some reasons. This chapter provides information on how to set up and use the advanced functions of your High-Performance Wireless Router.
  • Page 28: Access Control

    Broadband Security Router User Guide LAN side) can use the IP Addresses assigned by Router’s DHCP server. Before the time is up, DHCP clients have to request to renew the DHCP information. DNS: The IP Address of the Domain Name Server, which is currently used.
  • Page 29 Broadband Security Router User Guide IP Access Setting This function allows network administrators to restrict up to five groups of specified network users/computers from accessing the certain applications Protocol: Select the protocol type as “TCP” or “UDP” from the drop down list.
  • Page 30 Broadband Security Router User Guide URL Access Limit: Check “Enable” or “Disable” to make this function active or inactive. Website Access: Check “Allow” to allow users on the network to access specific website listed on the location only. In contrast, to restrict users on the network to access the website listed on the location, check “Block”...
  • Page 31: Virtual Server Settings

    Broadband Security Router User Guide Virtual Server Settings The Virtual Server Settings application allows you to set up a maximum of ten public services that can be accessed by external users of the Internet, such as a Web Address, Email, FTP etc.. Each service is provided by a dedicated network computer (server) configured with a fixed IP Address.
  • Page 32 Broadband Security Router User Guide Ports: Enter the desired service port numbers in the “Ports” fields. You can specify the protocol type as “TCP” or “UDP” from the drop-down list. If you are not sure which one to select, choose “Both”. A selection of well-known service port numbers is provided on this screen.
  • Page 33 Broadband Security Router User Guide Quake III 27660 (first player) "C:\Program Files\Quake III Arena\quake3.exe" +set net_port 27660 27661 (second player) Telnet Server Web Server UPnP Forwarding UPnP (Universal Plug and Play) is a standard introduced from Microsoft and UPnP Forum for interoperability. Currently, this function supported by this device allows you to set virtual server from Windows OS that supports UPnP, such as Windows XP.
  • Page 34: Dmz Host

    Broadband Security Router User Guide 192.168.1.1. If a fixed Public IP Address is to be used, select “Specify an IP address” and enter the IP Address and other necessary information provided by your ISP. Application Name: UPnP has ten pre-setting forwarding rules, which are well-known applications.
  • Page 35 Broadband Security Router User Guide in the “DMZ Host”field. The Multi DMZ allows you to map the public IP addresses to your LAN PCs, should you get more than one public IP address from your ISP. This function is useful to set up your servers, such as an FTP server, web server, and so on, with public IP addresses, but still keep them within your LAN group.
  • Page 36: Dynamic Routing

    Broadband Security Router User Guide 2. Click the “Apply” button after making any changes, or click the “Cancel” button to exit the screen without saving any changes. Dynamic Routing The Dynamic Routing feature allows your High-Performance Wireless Router to exchange routing information with other routers in the network. Enabling this feature is likely to enhance performance of your High-Performance Wireless Router.
  • Page 37: Static Routing

    Broadband Security Router User Guide Static Routing The Static Routing feature allows PCs that are connected to the High-Performance Wireless Router, either directly or through a hub/switch (in the immediate LAN), to communicate with other PCs in the respective LAN segment which are connected to the High-Performance Wireless Router through another router (destination LAN).
  • Page 38 Broadband Security Router User Guide Select the route entry number from 1 to 20 that you wish to Select Route entry: configure. Delete the selected route entry information. Delete this entry Destination LAN IP and Enter the IP Address and Subnet Mask of the destination Subnet Mask: LAN that the immediate LAN is to communicate with.
  • Page 39: Special Applications

    Broadband Security Router User Guide Special Applications Some applications use multiple TCP/UDP ports to transmit data. Due to the NAT, these applications cannot work with the High-Performance Wireless Router. Port Triggering allows some of these applications to work properly. Note that only one PC can use each Port Triggering setting at any time.
  • Page 40 Broadband Security Router User Guide 2069, 2085,3010-3030 MSN Gaming Zone 47624 2300-2400, 28800-29000 PC to Phone 12053 12120,12122, 24150-24220 Quick Time4 6970-6999 wowcall 8000 4000-4020 Wireless This setting page allows you to configure advanced wireless functions. To set those items needs more technology background. Unless you really understand those technical terms, it would be better to leave them as default setting.
  • Page 41 Broadband Security Router User Guide Basic Rates: Select either 1~2 Mbps or 1~2~5.5~11Mbps auto fallback. TX Rates: Select either 1~2 Mbps or 1~2~5.5~11Mbps auto fallback. Preamble is used in the frames to provide time for the Preamble Type: receiving station to synchronize to the incoming data stream. Authentication Type: Select either Open System or Share Key as authentication type.
  • Page 42: Ddns

    Broadband Security Router User Guide Wireless MAC Entry There are 32 sets divided into four groups in this function. You can choose each group by selecting from the pop-down list. Enter the MAC addresses of the wireless clients, which you wish to block in the columns and click the Filter field beside the MAC address, and then those wireless clients will be blocked to access Internet.
  • Page 43 Broadband Security Router User Guide side PCs. Internet users may not be able to reach your servers because your WAN side IP address may change each time you initiate the connection to your ISP. The DDNS function will help to map your IP address to your domain name when your ISP assigns a new dynamic IP Address.
  • Page 44 Broadband Security Router User Guide settings. Update: After clicking Apply to invoke the DDNS settings, you have to click this button to refresh the settings.. - 40 -...
  • Page 45: Chapter 5: Management

    Broadband Security Router User Guide Chapter 5: Management This chapter allows administrator to manage the router such as upgrading the firmware, backup & restore settings, setting log information and so on. Device Administration Settings This feature allows the administrator to manage the High-Performance Wireless Router by setting certain parameters.
  • Page 46 Broadband Security Router User Guide Administrator Enter the password you want to use into the “Password Password: Change” field and re-enter it into the “Password Confirm” field for confirmation. Be sure that the password is less than 64 characters long and without any special characters or spaces..
  • Page 47: Status Monitor

    Broadband Security Router User Guide Reset Device: Select “Yes” if you want to clear a connection, reboot, and re-initialize the unit without affecting any of your configuration setting. Factory Defaults: Select “Yes” if you want to return all the router’s current settings to their factory defaults.
  • Page 48: Log

    Broadband Security Router User Guide disconnection by clicking the appropriate buttons. Be aware that, if you make a disconnection here, “Connect-on- demand” will not function until the connection button is clicked. Note that “Login” won’t show any information if you selected “Obtain IP automatically” or “Static IP” on the OnePage Setup page.
  • Page 49 Broadband Security Router User Guide Check the “Enable” option if you want to activate this Access Log: function. Send Log To: Enter the IP address of the PC that you wish to use to view the Log information. View Log: Click this button to view the log on-line.
  • Page 50: Backup & Restore

    Broadband Security Router User Guide which day in a week to send the alert e-mail. Apply: Click this button after making any changes for activating the settings. Undo: Click this button if you are not satisfied with the settings in this page before clicking “Apply”.
  • Page 51: Diagnostic-Ping

    Broadband Security Router User Guide Browse.. Browse.. To select a file to upgrade, you have to enter path of the latest firmware you saved on the PC. You can choose “Browse” to view the folders and select the firmware. Upgrade: After you enter or select the path, click “Upgrade”...
  • Page 52 Broadband Security Router User Guide selecting Router’s private IP Address or from the WAN side by selecting Router’s WAN IP Address. Destination IP: Enter the IP Address of destination device you want to ping. If Router’s LAN IP address is selected as Source IP, you only can ping LAN side device and vice versa.
  • Page 53: Chapter 6: Macintosh Setup

    Broadband Security Router User Guide Chapter 6: Macintosh Setup This chapter provides information on using Macintosh computers in your network. The instructions given here are for system software version 8.0 or above, which comes with the TCP/IP Protocol preloaded and supports DHCP Addressing. Hardware Connections Connect your Macintosh computer to your High-Performance Wireless Router.
  • Page 54: High-Performance Wireless Router Configuration

    Broadband Security Router User Guide Wireless Router’s default IP Address) in the “Router Address” location. 5. Enter the ISP’s IP Address in the “Name Server” location if your ISP has provided the information. And close the window. 6. Click “Save” from the file menu then “Quit” TCP/IP. 7.
  • Page 55: Chapter 7: Trouble Shooting

    Broadband Security Router User Guide Chapter 7: Trouble Shooting This chapter provides solutions to problems you may encounter during installation and operation of your High-Performance Wireless Router. Hardware Q: The Power LED is off. A: Check that the power cable is properly connected to the High-Performance Wireless Router, the power adapter and the socket.
  • Page 56: Client Side (Computers)

    Broadband Security Router User Guide network segment. If you are not sure, initiate the DHCP function and set you PC to obtain an IP address automatically. Ensure that your PC is using an IP Address within the range 192.168.1.2 to 192.168.1.254 and thus compatible with the High-Performance Wireless Router default IP address of 192.168.1.1 Finally, use the Ping command in MS-DOS mode to verify the network connection:...
  • Page 57 Broadband Security Router User Guide Q: I get a time out error when I enter a URL or IP address. A: Check if other computers work. If they do, ensure the computer’s IP settings are correct (IP Address, Subnet Mask, Gateway IP Address and DNS). Then, check if the High-Performance Wireless Router’s settings are correct.
  • Page 58 Broadband Security Router User Guide Router? A: Yes, you can. Some people think having one Internet account mean that they can only have one E-mail account. However, E-mail is set by mailbox accounts and is different to the account you use to connect to your ISP. If you want more E-mail accounts, you should contact your ISP or you can browse the Internet to apply for a free E-mail account.
  • Page 59: Appendix A: Technical Specifications

    Broadband Security Router User Guide Appendix A: Technical Specifications Standards Compliance IEEE 802.3 10BASE-T IEEE 802.3u 100BASE-TX IEEE 802.11b Wireless Interface One 10/100Mbps Ethernet/Fast Ethernet RJ45 port on WAN Four 10/100Mbps auto-sensing Ethernet RJ-45 One Wireless Access Point Management Web-based UI Management LED Display Power DIAG...
  • Page 60 Broadband Security Router User Guide Mounting Desktop Wall-mounting - 56 -...
  • Page 61: Appendix B: Glossary

    Broadband Security Router User Guide Appendix B: Glossary 10Base-T / 100Base-T The adaptation of the Ethernet standard for Local Area Networks (LANs). 10Base-T uses a twisted pair cable with maximum lengths of 100 meters and transmits data at 10Mbps maximum. 100Base-T is similar, but uses two different twisted pair configurations and transmits at 100Mbps maximun.
  • Page 62 Broadband Security Router User Guide Communication Protocols Communication between devices requires they agree on the format in which the data is to be transmitted, sent and received. The communications protocols are a set of rules that define the data format. Cookie A Cookie is a piece of data stored on your PC while a web server can retrieve late to identify your machine.
  • Page 63 Broadband Security Router User Guide into their respective IP Addresses. Addressing systems using Domain name, like www.yahoo.com, is easier to use than an IP address, such as 204.71.177.70. DSSS Also known as Direct Sequence Spread Spectrum, it is a radio transmission method that continuously changes frequencies.
  • Page 64 Broadband Security Router User Guide to access an existing wired network to take advantage of sharing the wired networks resources, such as files, printers, and Internet access. IP Address An identifier for a computer or device on a TCP/IP network. Networks using the TCP/IP Protocol route messages based on the IP Address of the destination.
  • Page 65 Broadband Security Router User Guide Network Protocol Network protocols encapsulate and forward data packets from one interface to another. PAP/CHAP ISP Short for Password Authentication Protocol and Challenge Handshake Authentication Protocol. Most ISPs use either one for user identification. If your ISP doesn’t support these two protocols, contact your ISP for an authentication script.
  • Page 66 Broadband Security Router User Guide SPI is an acronym for Stateful Packet Inspection. The SPI engine examines not just the headers of the packet, but also the packet contents, it can then determine more about the packet than just its source and destination information. Moreover, stateful inspection firewalls also close off ports until a connection to the specific port is requested.
  • Page 67 FCC Caution The device complies with Part 15 of the FCC rules. Operation is subject to the following two conditions: (1)This device may not cause harmful interference. (2)This device must accept any interference received, including interference that may cause undesired operation. FCC RF Radiation Exposure Statement: The equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment.

Table of Contents