CNET CWR-901 User Manual

54mbps wireless-g router

Advertisement

CWR-901
54Mbps Wireless-G
Router
User's Guide

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the CWR-901 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for CNET CWR-901

  • Page 1 CWR-901 54Mbps Wireless-G Router User’s Guide...
  • Page 2: Table Of Contents

    1 INTRODUCTION ... 4 NSTALLING IRELESS OUTER ... 4 YSTEM EQUIREMENTS ... 4 NSTALLATION NSTRUCTIONS 2 PREPARING THE NETWORK... 6 ... 6 REPARING THE ETWORK ISP I OLLECTING NFORMATION IP N ONFIGURING INDOWS FOR 3 CONFIGURING THE WIRELESS-G ROUTER... 12 3.1 S ...
  • Page 3 3.9.2 DHCP Settings... 48 3.9.3 Password... 49 3.9.4 Time Zone Settings... 49 3.9.5 Upgrade Firmware... 50 3.9.6 Remote Management ... 50 3.9.7 Reload Settings ... 51 3.9.8 System Restart ... 51 3.10 E ... 51 VENT 3.10.1 System Log... 52 3.10.2 ACL Log...
  • Page 4: Introduction

    2. Connect the WAN port on the wireless router to the cable/DSL modem, Ethernet Server, or hub. 3. Connect one or more client PCs to LAN port(s) on the router. 4. Connect the power adapter to the power jack on the wireless router. Then, plug the power cable into a wall outlet.
  • Page 5 5. Turn on your PC(s).
  • Page 6: Preparing The Network

    Collecting ISP Information The following information needs to be gathered from the ISP before configuring the wireless router: ․Is IP assignment static or dynamic? If static, what are the IP address, Subnet Mask, Default Gateway and DNS addresses used for this connection? ․Is the connection type PPPoE? If so, what are the PPPoE username and password?
  • Page 7 3. Click the IP Address tab. Select Obtain an IP address automatically 4. Now click the Gateway tab, and verify that the Installed Gateway field is Blank. Click the OK button. 5. Click the OK button again. Windows may ask you for the original Windows installation disk or additional files.
  • Page 8 2. Select the Local Area Connection icon for the applicable Ethernet adapter (usually it is the first Local Area Connection listed). Double-click the Local Area Connection. Click the Properties button 3. Make sure the box next to Internet Protocol (TCP/IP) is checked. Highlight Internet Protocol (TCP/IP), and click the Properties button.
  • Page 9 5. Restart your computer. The following instructions assume you are running Windows XP with the default interface. If you are using the Classic interface (where the icons and menus look like previous Windows versions), please follow the instructions for Windows 2000. 1.
  • Page 10 3. Make sure the box next to Internet Protocol (TCP/IP) is checked. Highlight Internet Protocol (TCP/IP), and click the Properties button.
  • Page 11 4. Select Obtain an IP address automatically. Once the new window appears, click the OK button. Click the OK button again to complete the PC configuration.
  • Page 12: Configuring The Wireless-G Router

    3.1 Setup Wizard After a successful connection to the configuration web page, the setup page will be shown as in the figure below. To make the installation easy, the wireless router offers a Setup Wizard that will go through the...
  • Page 13: Time Zone Settings

    The first step in Setup Wizard is Time Zone Settings. Users can synchronize the local clock to an available NTP server. Enable NTP client update and select the correct Time Zone. Time Zone Select: Select the time zone of the country where this wireless router is located.
  • Page 14: Wan Interface Setup

    Subnet Mask: Enter the subnet mask for this wireless router. DHCP Server Status: Select to enable the DHCP Server feature. DHCP Server IP Pool Start IP: Enter the Start IP address assigned by the DHCP server. DHCP Server IP Pool End IP: Enter the End IP address assigned by the DHCP server.
  • Page 15: Wireless Basic Settings

    In the Wireless Basic Settings page, users can configure: “Alias Name”, “SSID”, “Regulation Domain B/G”, “RF Band”, “Channel Number”, and “Operation Mode”. Alias Name: Users can assign a unique name to this wireless router. The alias name is especially important for identification when there are more than one wireless router used in a network.
  • Page 16: Wan Settings

    Enable UPnP: Users can enable or disable uPNP feature here. If enabled, all client systems that support uPNP, like Windows XP, can automatically discover the wireless router and access the Internet through it without any configuration. Save and Restart: Save the parameters and reboot the wireless router.
  • Page 17: Dhcp Client

    MAC address of the router’s WAN port. Check the Use box and enter the NIC MAC address provided by ISP. Save and Restart: Save the parameters and reboot the wireless router. Reset: Click on “Reset” button to undo your changes.
  • Page 18: Wan Type: Unnumbered Pppoe

    MTU for your Internet connection. Sometimes ISP sets different MTU size than 1492. Dial-On-Demand: If checked, the wireless router will only dial this session when a LAN -> WAN packet is received. If unchecked, it immediately dials the session when powered up.
  • Page 19 NAPT for LAN hosts: If checked, the wireless router enables NAPT function for LAN PCs using configured LAN IP address (ex: 192.168.1.x). If unchecked, NAPT is disabled and the wireless router will route packets to and from LAN PCs using unnumbered IP addresses.
  • Page 20: Pptp

    “disconnect”. Dial: Click on this button to manually connect to ISP. Hang Up: Click on this button to disconnect the wireless router from ISP. Save and Restart: Save the parameters and reboot the wireless router. Reset: Click on “Reset” button to undo your changes.
  • Page 21: L2Tp

    Silent timeout value is defined as the time for the WAN port to disconnect if the connection is idle. (not used). Dial-on-Demand: If checked, the wireless router will only dial this session when a LAN -> WAN packet is received. If unchecked, the wireless router immediately dials the session when powered up.
  • Page 22: Dhcp + L2Tp

    Silent timeout value is defined as the time for the WAN port to disconnect if the connection is idle. (not used). Dial-on-demand: If checked, the wireless router will only dial this session when a LAN -> WAN packet is received. If unchecked, the wireless router immediately dials the session when powered up.
  • Page 23: Advanced Settings

    Enable Wireless: Check or uncheck (Enable or Disable this wireless interface). Alias Name: You can assign a unique name to the wireless router. The alias name is especially important for identification when there are more than one wireless router applied in a network.
  • Page 24 Before a station enters power save mode, the station needs the beacon interval to know when to wake up to receive the beacon (and learn whether there are buffered frames at the wireless router). Max Data Rate: By default, it selects the highest rate for transmission.
  • Page 25: Security

    WMM capable: Check the Enable box to enable the WMM (Wireless Multi Media) capability. Apply: Save the parameters. Reset: Click on “Reset” button to undo your changes. Help: To request help information. 3.4.3 Security In this page the security level and type for the wireless network can be defined. Please note that using any encryption may be a significant degradation of the data throughput on the wireless link.
  • Page 26 Data encryption: “WEP – 64bits”: Wired Equivalent Privacy encryption method with 64 bits encryption key length. “WEP – 128bits”: Wired Equivalent Privacy encryption method with 128 bits encryption key length. The longer encryption length, the more security but the lower performance. Authentication: There are four authentication types –...
  • Page 27 Data encryption: “TKIP” means Temporal Key Integrity Protocol. Authentication: There are four authentication types – “WPA Pre-shared key”: Using Pre-shared key to perform the WPA authentication “WPA2 Pre-shared key”: Using Pre-shared key to perform the WPA2 authentication “WPA By RADIUS server”: Using RADIUS server to perform the WPA authentication “WPA2 By RADIUS server”: Using RADIUS server to perform the WPA2 authentication...
  • Page 28: Access Control

    Data Encryption: “AES” means Advanced Encryption Standard. Authentication: There are four authentication type – “WPA Pre-shared key”: Using Pre-shared key to perform the WPA authentication “WPA2 Pre-shared key”: Using Pre-shared key to perform the WPA2 authentication “WPA By RADIUS server”: Using RADIUS server to perform the WPA authentication “WPA2 By RADIUS server”: Using RADIUS server to perform the WPA2 authentication...
  • Page 29: Wds

    When the router’s operational mode is set to AP+WDS, the Wireless Distribution System (WDS) feature will set the wireless router in “Bridge Mode”. Two or more wireless routers in bridge mode can communicate with each other through their wireless interfaces. To do this, all routers must be set to operate in the same channel and have their MAC addresses entered in the WDS table.
  • Page 30: Firewall

    3.5.1 Access Control list ACLs are used to block IP packets from being forwarded by the wireless router. The ACL web page lets users specify a “Black list” ACL rules. There is one Policy - to log packets matching a configured ACL, the packet would be sent to software for logging.
  • Page 31: Url Filter

    Ingress, Dest IP/Port: select the packet with an incoming destination IP. Egress, Src IP/Port: select the packet with an outgoing source IP. Ingress, Src IP/Port: select the packet with an incoming source IP. Type: Define the packet type – TCP, UDP or IP Port: Enter the port number.
  • Page 32: Anti-Dos

    Enable: Check the Enable Box, to enable ALG of an application and then the wireless router will let that application correctly pass though the NAT gateway. Apply: Save the parameters. Help: To request help information. 3.5.4 Anti-DoS DoS (Denial of Service) defense function protect network servers, hosts, routers and other devices...
  • Page 33 DoS Prevention Enable: check – enable this DoS feature.
  • Page 34: Udp Blocking

    SYN, FIN, UDP or ICMP exceeds the settings (packets/second). Per-Source IP Flood: The wireless router will ignore all packets from this source IP, when the number of received packets for SYN, FIN, UDP or ICMP exceeds the settings (packets/second).
  • Page 35: Protocol-Based Nat

    Help: To request help information. 3.5.6 Protocol-based NAT This wireless router supports NAT by IP protocol. Users can specify an IP protocol number and internal host’s IP address to let the gateway masquerade IP header then forward to that internal host.
  • Page 36: Vpn Settings

    Default don’t masquerade source port number for new UDP flows: The wireless router will try to keep LAN to WAN source UDP port number when doing NAPT if possible. Doing so helps some NAT unfriendly application without ALG module pass NAT gateway.
  • Page 37 Tunnel Name: The wireless router can create three simultaneous tunnels, Tunnel A, Tunnel B and Tunnel C. This tunnel: Enable or disable this selected tunnel. Local security group: Private network on this VPN router. Remote security group: Private network on the remote peer VPN router.
  • Page 38: Qos Settings

    Disconnect: Start to disconnect this VPN. Help: To request help information. Status: It will display your connection status when you have established the IPSec tunnel. 3.7 QoS Settings 3.7.1 Port/L4 App Based QoS This web page supports two types of QoS: Port based QoS and L4 application based QoS. For Application based QoS, users can specify a destination port number and associate it with an egress priority (high or low).
  • Page 39: Rate Policing Qos

    Users can specify a L3/L4 criterion and associate it with a maximum token (packet rate or data rate based). If a packet arrives and it matches to a rate policing entry, the wireless router decreases entry’s allocated token by one (if pps based) or by packet length in bytes (if bps based).
  • Page 40: Advanced

    IP Address: Enter the IP address. IP Mask: Enter the IP Subnet Mask. Protocol: Select the IP protocol – TCP, UDP or IP. Start port: Enter the Starting port number. End port: Enter the Ending port number. Rate: Enter the average rate value. Unit: Select the unit for this average rate.
  • Page 41: Rip

    Help: To request help information. 3.8.3 RIP You can configure this wireless router to receive and send RIP Version 1 or RIP Version 2 packets. RIP Version 1 does not support authentication. If you are sending and receiving RIP Version 2 packets, RIP authentication can be enabled on an interface.
  • Page 42: Dynamic Dns

    send version: Select the RIP version for send packet – version 1, 2 or 1&2. receive version: Select the RIP version for receive packet – version 1, 2 or 1&2. enable passwd authentication: Enter the password and check it to enable this authentication.
  • Page 43: Dmz Host

    Name: Enter the application name. Incoming Type: Select the incoming packet to be TCP, UDP or Both. Incoming Port Range: Enter the port range of incoming packets for this type of application. Trigger Type: Select the outbound port protocol to be to be TCP, UDP or Both. Trigger Start Port: Enter the trigger start port number.
  • Page 44: Ping Toolkit

    Help: To request help information. 3.8.8 Pseudo-VLAN This wireless router can support a VLAN mapping with fixed VLAN ID 8 for WAN port and VLAN ID 9 for all LAN ports. Users can define the VLAN group for each port.
  • Page 45: Pppoe/Ipv6 Passthru

    Help: To request help information. 3.8.11 Samba Server The SAMBA server is basically a file server running on embedded Linux. This wireless router supports a simple file server through its USB port. User can plug in any USB pendrive or USB hard disk if they are of the FAT16 format.
  • Page 46: Management

    range. Note 2: Since some pendrives are not well protected by its hardware. We recommend the pendrive to be plugged in or out when the router is power off. Samba Server: Check the box and enable this feature. Apply: Save the parameters. Help: To request help information.
  • Page 47 System Product Model: Shows the model name of this product. Firmware Version: Shows the current firmware version. Firmware Date: Shows the current firmware building date. Loader Version: Shows the current boot loader driver version. Wireless AP Version: Shows the current wireless driver version. Rome Driver Version: Shows the current Rome Driver version.
  • Page 48: Dhcp Settings

    MAC Address: Shows the MAC address on your LAN port. DHCP Server: Shows the DHCP server status. Port 1: Shows the LAN’s port 1 status. Port 2: Shows the LAN’s port 2 status. Port 3: Shows the LAN’s port 3 status. Port 4: Shows the LAN’s port 4 status.
  • Page 49: Password

    Help: To request help information. 3.9.4 Time Zone Settings This wireless router provides a NTP (Network Time Protocol) client that can synchronize time with configured NTP servers. Pressing the Refresh Time button refreshes system timestamp and the Save/Time Sync button forces NTP client sync time with NTP server.
  • Page 50: Upgrade Firmware

    Help: To request help information. 3.9.6 Remote Management Users can connect to this wireless router from WAN side using the wireless router’s WAN IP. The wireless router’s current WAN IP is shown in the WAN status page. To avoid conflicting with virtual server at port 80, users can specify a different port number for “Remote Management Port”...
  • Page 51: Reload Settings

    Help: To request help information. 3.9.7 Reload Settings You can reset the wireless router back to its default settings by clicking on the Factory Default button. Note: you can also hold down the reset button on the wireless router’s back panel for more than 5 seconds to reset it back to its default settings.
  • Page 52: System Log

    Note: enabling all logs will generate a large amount of data and adversely affect performance. 3.10.1 System Log Log the internal system information System Log: Check the box and enable this feature. Apply: Save the settings. Help: To request help information. 3.10.2 ACL Log Log the Access Control List information ACL Log: Check the box and enable this feature.
  • Page 53: New Connection Log

    DoS Log: Check the box and enable this feature. Apply: Save the settings. Help: To request help information. 3.10.5 New Connection Log Log the WAN connection information New NAPT Log: Check the box and enable this feature. Apply: Save the settings. Help: To request help information.
  • Page 54: Appendix A: Troubleshooting

    Appendix A: Troubleshooting Symptom Possible Causes Inability to access the router • Incorrect or incompatible wireless network configuration. For example, shared key authentication is configured on the wireless AP/Router and the wireless client is attempting open system authentication • Inadvertent media access control (MAC) address filtering •...
  • Page 55 Disable the authentication feature on the wireless client. • Obtain and install the most recent version of the wireless network adapter driver. Contact CNet Technical Support • Obtain and install the most recent version of the wireless network adapter driver.
  • Page 56 • On a laptop computer, the wireless radio button might be in the off position Client can't connect to the • Wrong IP address AP/Router's configuration utility. Configuration services are configured to start automatically. • A wireless network adapter driver failing in early stages of service startup may result in the Wireless Zero Configuration or Wireless...
  • Page 57: Appendix B: Frequently Asked Questions

    Appendix B: Frequently Asked Questions Q1: What is wireless networking? Ans: The term wireless networking refers to the technology that enables two or more computers to communicate using standard network protocols, but without network cabling. Strictly speaking, any technology that does this could be called wireless networking. The current buzzword however generally refers to wireless LANs.
  • Page 58 Figure A2: Hardware Access Point. Wireless connected computers using a Hardware Access Point. Figure A3: Software Access Point. Wireless connected computers using a Software Access Point. Q3: Can I mix wireless equipment from different vendors? Ans: Because most wireless networking hardware vendors support the 802.11 standard they can inter operate.
  • Page 59 also allow considerable flexibility in providing access to different network types, such as different types of Ethernet, Wireless and Token Ring networks. Such connections are only limited by the number of slots or interfaces in the computer used for this task. Further to this the software access point may include significant additional features such as shared Internet access, web caching or content filtering, providing significant benefits to users and administrators.
  • Page 60 is analogous to Ethernet cabling, the answer to this question becomes clear. To share an Internet connection across a LAN you need two things: (1) an Internet sharing hardware device or software program   (2) connection to a LAN    If your LAN is wireless, the same criteria apply.
  • Page 61 produces secure scrambled text. Decryption is the opposite of encryption; it is the mathematical operation that transforms cipher text to standard text. Q11: Why do I need a router? Ans: The increased reliance on computers to store valuable information and the development of applications that share information over the internet through networked personal computers, in combination with the advent of computer hacking, has made information and network security an important issue.
  • Page 62 Q21: What is the maximum number of users the Access Point facilitates? Ans: It depends on the volume of data and may be less if many users create a large amount of network traffic. Q22: What is the maximum number of IP addresses that the Router will support? Ans: The Router will support up to 253 IP addresses.

Table of Contents