2. Connect the WAN port on the wireless router to the cable/DSL modem, Ethernet Server, or hub. 3. Connect one or more client PCs to LAN port(s) on the router. 4. Connect the power adapter to the power jack on the wireless router. Then, plug the power cable into a wall outlet.
Collecting ISP Information The following information needs to be gathered from the ISP before configuring the wireless router: ․Is IP assignment static or dynamic? If static, what are the IP address, Subnet Mask, Default Gateway and DNS addresses used for this connection? ․Is the connection type PPPoE? If so, what are the PPPoE username and password?
Page 7
3. Click the IP Address tab. Select Obtain an IP address automatically 4. Now click the Gateway tab, and verify that the Installed Gateway field is Blank. Click the OK button. 5. Click the OK button again. Windows may ask you for the original Windows installation disk or additional files.
Page 8
2. Select the Local Area Connection icon for the applicable Ethernet adapter (usually it is the first Local Area Connection listed). Double-click the Local Area Connection. Click the Properties button 3. Make sure the box next to Internet Protocol (TCP/IP) is checked. Highlight Internet Protocol (TCP/IP), and click the Properties button.
Page 9
5. Restart your computer. The following instructions assume you are running Windows XP with the default interface. If you are using the Classic interface (where the icons and menus look like previous Windows versions), please follow the instructions for Windows 2000. 1.
Page 10
3. Make sure the box next to Internet Protocol (TCP/IP) is checked. Highlight Internet Protocol (TCP/IP), and click the Properties button.
Page 11
4. Select Obtain an IP address automatically. Once the new window appears, click the OK button. Click the OK button again to complete the PC configuration.
3.1 Setup Wizard After a successful connection to the configuration web page, the setup page will be shown as in the figure below. To make the installation easy, the wireless router offers a Setup Wizard that will go through the...
The first step in Setup Wizard is Time Zone Settings. Users can synchronize the local clock to an available NTP server. Enable NTP client update and select the correct Time Zone. Time Zone Select: Select the time zone of the country where this wireless router is located.
Subnet Mask: Enter the subnet mask for this wireless router. DHCP Server Status: Select to enable the DHCP Server feature. DHCP Server IP Pool Start IP: Enter the Start IP address assigned by the DHCP server. DHCP Server IP Pool End IP: Enter the End IP address assigned by the DHCP server.
In the Wireless Basic Settings page, users can configure: “Alias Name”, “SSID”, “Regulation Domain B/G”, “RF Band”, “Channel Number”, and “Operation Mode”. Alias Name: Users can assign a unique name to this wireless router. The alias name is especially important for identification when there are more than one wireless router used in a network.
Enable UPnP: Users can enable or disable uPNP feature here. If enabled, all client systems that support uPNP, like Windows XP, can automatically discover the wireless router and access the Internet through it without any configuration. Save and Restart: Save the parameters and reboot the wireless router.
MAC address of the router’s WAN port. Check the Use box and enter the NIC MAC address provided by ISP. Save and Restart: Save the parameters and reboot the wireless router. Reset: Click on “Reset” button to undo your changes.
MTU for your Internet connection. Sometimes ISP sets different MTU size than 1492. Dial-On-Demand: If checked, the wireless router will only dial this session when a LAN -> WAN packet is received. If unchecked, it immediately dials the session when powered up.
Page 19
NAPT for LAN hosts: If checked, the wireless router enables NAPT function for LAN PCs using configured LAN IP address (ex: 192.168.1.x). If unchecked, NAPT is disabled and the wireless router will route packets to and from LAN PCs using unnumbered IP addresses.
“disconnect”. Dial: Click on this button to manually connect to ISP. Hang Up: Click on this button to disconnect the wireless router from ISP. Save and Restart: Save the parameters and reboot the wireless router. Reset: Click on “Reset” button to undo your changes.
Silent timeout value is defined as the time for the WAN port to disconnect if the connection is idle. (not used). Dial-on-Demand: If checked, the wireless router will only dial this session when a LAN -> WAN packet is received. If unchecked, the wireless router immediately dials the session when powered up.
Silent timeout value is defined as the time for the WAN port to disconnect if the connection is idle. (not used). Dial-on-demand: If checked, the wireless router will only dial this session when a LAN -> WAN packet is received. If unchecked, the wireless router immediately dials the session when powered up.
Enable Wireless: Check or uncheck (Enable or Disable this wireless interface). Alias Name: You can assign a unique name to the wireless router. The alias name is especially important for identification when there are more than one wireless router applied in a network.
Page 24
Before a station enters power save mode, the station needs the beacon interval to know when to wake up to receive the beacon (and learn whether there are buffered frames at the wireless router). Max Data Rate: By default, it selects the highest rate for transmission.
WMM capable: Check the Enable box to enable the WMM (Wireless Multi Media) capability. Apply: Save the parameters. Reset: Click on “Reset” button to undo your changes. Help: To request help information. 3.4.3 Security In this page the security level and type for the wireless network can be defined. Please note that using any encryption may be a significant degradation of the data throughput on the wireless link.
Page 26
Data encryption: “WEP – 64bits”: Wired Equivalent Privacy encryption method with 64 bits encryption key length. “WEP – 128bits”: Wired Equivalent Privacy encryption method with 128 bits encryption key length. The longer encryption length, the more security but the lower performance. Authentication: There are four authentication types –...
Page 27
Data encryption: “TKIP” means Temporal Key Integrity Protocol. Authentication: There are four authentication types – “WPA Pre-shared key”: Using Pre-shared key to perform the WPA authentication “WPA2 Pre-shared key”: Using Pre-shared key to perform the WPA2 authentication “WPA By RADIUS server”: Using RADIUS server to perform the WPA authentication “WPA2 By RADIUS server”: Using RADIUS server to perform the WPA2 authentication...
Data Encryption: “AES” means Advanced Encryption Standard. Authentication: There are four authentication type – “WPA Pre-shared key”: Using Pre-shared key to perform the WPA authentication “WPA2 Pre-shared key”: Using Pre-shared key to perform the WPA2 authentication “WPA By RADIUS server”: Using RADIUS server to perform the WPA authentication “WPA2 By RADIUS server”: Using RADIUS server to perform the WPA2 authentication...
When the router’s operational mode is set to AP+WDS, the Wireless Distribution System (WDS) feature will set the wireless router in “Bridge Mode”. Two or more wireless routers in bridge mode can communicate with each other through their wireless interfaces. To do this, all routers must be set to operate in the same channel and have their MAC addresses entered in the WDS table.
3.5.1 Access Control list ACLs are used to block IP packets from being forwarded by the wireless router. The ACL web page lets users specify a “Black list” ACL rules. There is one Policy - to log packets matching a configured ACL, the packet would be sent to software for logging.
Ingress, Dest IP/Port: select the packet with an incoming destination IP. Egress, Src IP/Port: select the packet with an outgoing source IP. Ingress, Src IP/Port: select the packet with an incoming source IP. Type: Define the packet type – TCP, UDP or IP Port: Enter the port number.
Enable: Check the Enable Box, to enable ALG of an application and then the wireless router will let that application correctly pass though the NAT gateway. Apply: Save the parameters. Help: To request help information. 3.5.4 Anti-DoS DoS (Denial of Service) defense function protect network servers, hosts, routers and other devices...
Page 33
DoS Prevention Enable: check – enable this DoS feature.
SYN, FIN, UDP or ICMP exceeds the settings (packets/second). Per-Source IP Flood: The wireless router will ignore all packets from this source IP, when the number of received packets for SYN, FIN, UDP or ICMP exceeds the settings (packets/second).
Help: To request help information. 3.5.6 Protocol-based NAT This wireless router supports NAT by IP protocol. Users can specify an IP protocol number and internal host’s IP address to let the gateway masquerade IP header then forward to that internal host.
Default don’t masquerade source port number for new UDP flows: The wireless router will try to keep LAN to WAN source UDP port number when doing NAPT if possible. Doing so helps some NAT unfriendly application without ALG module pass NAT gateway.
Page 37
Tunnel Name: The wireless router can create three simultaneous tunnels, Tunnel A, Tunnel B and Tunnel C. This tunnel: Enable or disable this selected tunnel. Local security group: Private network on this VPN router. Remote security group: Private network on the remote peer VPN router.
Disconnect: Start to disconnect this VPN. Help: To request help information. Status: It will display your connection status when you have established the IPSec tunnel. 3.7 QoS Settings 3.7.1 Port/L4 App Based QoS This web page supports two types of QoS: Port based QoS and L4 application based QoS. For Application based QoS, users can specify a destination port number and associate it with an egress priority (high or low).
Users can specify a L3/L4 criterion and associate it with a maximum token (packet rate or data rate based). If a packet arrives and it matches to a rate policing entry, the wireless router decreases entry’s allocated token by one (if pps based) or by packet length in bytes (if bps based).
IP Address: Enter the IP address. IP Mask: Enter the IP Subnet Mask. Protocol: Select the IP protocol – TCP, UDP or IP. Start port: Enter the Starting port number. End port: Enter the Ending port number. Rate: Enter the average rate value. Unit: Select the unit for this average rate.
Help: To request help information. 3.8.3 RIP You can configure this wireless router to receive and send RIP Version 1 or RIP Version 2 packets. RIP Version 1 does not support authentication. If you are sending and receiving RIP Version 2 packets, RIP authentication can be enabled on an interface.
send version: Select the RIP version for send packet – version 1, 2 or 1&2. receive version: Select the RIP version for receive packet – version 1, 2 or 1&2. enable passwd authentication: Enter the password and check it to enable this authentication.
Name: Enter the application name. Incoming Type: Select the incoming packet to be TCP, UDP or Both. Incoming Port Range: Enter the port range of incoming packets for this type of application. Trigger Type: Select the outbound port protocol to be to be TCP, UDP or Both. Trigger Start Port: Enter the trigger start port number.
Help: To request help information. 3.8.8 Pseudo-VLAN This wireless router can support a VLAN mapping with fixed VLAN ID 8 for WAN port and VLAN ID 9 for all LAN ports. Users can define the VLAN group for each port.
Help: To request help information. 3.8.11 Samba Server The SAMBA server is basically a file server running on embedded Linux. This wireless router supports a simple file server through its USB port. User can plug in any USB pendrive or USB hard disk if they are of the FAT16 format.
range. Note 2: Since some pendrives are not well protected by its hardware. We recommend the pendrive to be plugged in or out when the router is power off. Samba Server: Check the box and enable this feature. Apply: Save the parameters. Help: To request help information.
Page 47
System Product Model: Shows the model name of this product. Firmware Version: Shows the current firmware version. Firmware Date: Shows the current firmware building date. Loader Version: Shows the current boot loader driver version. Wireless AP Version: Shows the current wireless driver version. Rome Driver Version: Shows the current Rome Driver version.
MAC Address: Shows the MAC address on your LAN port. DHCP Server: Shows the DHCP server status. Port 1: Shows the LAN’s port 1 status. Port 2: Shows the LAN’s port 2 status. Port 3: Shows the LAN’s port 3 status. Port 4: Shows the LAN’s port 4 status.
Help: To request help information. 3.9.4 Time Zone Settings This wireless router provides a NTP (Network Time Protocol) client that can synchronize time with configured NTP servers. Pressing the Refresh Time button refreshes system timestamp and the Save/Time Sync button forces NTP client sync time with NTP server.
Help: To request help information. 3.9.6 Remote Management Users can connect to this wireless router from WAN side using the wireless router’s WAN IP. The wireless router’s current WAN IP is shown in the WAN status page. To avoid conflicting with virtual server at port 80, users can specify a different port number for “Remote Management Port”...
Help: To request help information. 3.9.7 Reload Settings You can reset the wireless router back to its default settings by clicking on the Factory Default button. Note: you can also hold down the reset button on the wireless router’s back panel for more than 5 seconds to reset it back to its default settings.
Note: enabling all logs will generate a large amount of data and adversely affect performance. 3.10.1 System Log Log the internal system information System Log: Check the box and enable this feature. Apply: Save the settings. Help: To request help information. 3.10.2 ACL Log Log the Access Control List information ACL Log: Check the box and enable this feature.
DoS Log: Check the box and enable this feature. Apply: Save the settings. Help: To request help information. 3.10.5 New Connection Log Log the WAN connection information New NAPT Log: Check the box and enable this feature. Apply: Save the settings. Help: To request help information.
Appendix A: Troubleshooting Symptom Possible Causes Inability to access the router • Incorrect or incompatible wireless network configuration. For example, shared key authentication is configured on the wireless AP/Router and the wireless client is attempting open system authentication • Inadvertent media access control (MAC) address filtering •...
Page 55
Disable the authentication feature on the wireless client. • Obtain and install the most recent version of the wireless network adapter driver. Contact CNet Technical Support • Obtain and install the most recent version of the wireless network adapter driver.
Page 56
• On a laptop computer, the wireless radio button might be in the off position Client can't connect to the • Wrong IP address AP/Router's configuration utility. Configuration services are configured to start automatically. • A wireless network adapter driver failing in early stages of service startup may result in the Wireless Zero Configuration or Wireless...
Appendix B: Frequently Asked Questions Q1: What is wireless networking? Ans: The term wireless networking refers to the technology that enables two or more computers to communicate using standard network protocols, but without network cabling. Strictly speaking, any technology that does this could be called wireless networking. The current buzzword however generally refers to wireless LANs.
Page 58
Figure A2: Hardware Access Point. Wireless connected computers using a Hardware Access Point. Figure A3: Software Access Point. Wireless connected computers using a Software Access Point. Q3: Can I mix wireless equipment from different vendors? Ans: Because most wireless networking hardware vendors support the 802.11 standard they can inter operate.
Page 59
also allow considerable flexibility in providing access to different network types, such as different types of Ethernet, Wireless and Token Ring networks. Such connections are only limited by the number of slots or interfaces in the computer used for this task. Further to this the software access point may include significant additional features such as shared Internet access, web caching or content filtering, providing significant benefits to users and administrators.
Page 60
is analogous to Ethernet cabling, the answer to this question becomes clear. To share an Internet connection across a LAN you need two things: (1) an Internet sharing hardware device or software program (2) connection to a LAN If your LAN is wireless, the same criteria apply.
Page 61
produces secure scrambled text. Decryption is the opposite of encryption; it is the mathematical operation that transforms cipher text to standard text. Q11: Why do I need a router? Ans: The increased reliance on computers to store valuable information and the development of applications that share information over the internet through networked personal computers, in combination with the advent of computer hacking, has made information and network security an important issue.
Page 62
Q21: What is the maximum number of users the Access Point facilitates? Ans: It depends on the volume of data and may be less if many users create a large amount of network traffic. Q22: What is the maximum number of IP addresses that the Router will support? Ans: The Router will support up to 253 IP addresses.
Need help?
Do you have a question about the CWR-901 and is the answer not in the manual?
Questions and answers