TRENDnet WRT-390L User Manual
TRENDnet WRT-390L User Manual

TRENDnet WRT-390L User Manual

2.4ghz wireless 802.11n(draft) giga router

Advertisement

Quick Links

2.4GHz Wireless 802.11n(DRAFT) Giga Router
WRT-390L
Rev 0.7
User Manual

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the WRT-390L and is the answer not in the manual?

Questions and answers

Summary of Contents for TRENDnet WRT-390L

  • Page 1 2.4GHz Wireless 802.11n(DRAFT) Giga Router WRT-390L Rev 0.7 User Manual...
  • Page 2 Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
  • Page 3 Trademark recognition All product names used in this manual are the properties of their respective owners and are acknowledged.
  • Page 4: Table Of Contents

    Table of Contents Getting Started with the WRT-390L ------------------------------------- 3 Package Contents Minimum System Requirements Wireless LAN Networking ------------------------------------------- 5 Introduction Features Hardware Overview --------------------------------------------- 10 LED Indications Rear Panel Installation Considerations Getting Started Using the Configuration Menu ----------------------------------- 12...
  • Page 5: Getting Started With The Wrt-390L

    1. Getting Started with the WRT-390L Congratulations on purchasing the WRT-390L! This manual provides information for setting up and configuring the WRT-390L. This manual is intended for both home users and professionals. The following conventions are used in this manual: THE NOTE SYMBOL INDICATES ADDITIONAL INFORMATION ON THE TOPIC AT HAND.
  • Page 6: Package Contents

    1.1 Package Contents WRT-390L 2.4GHz Wireless 802.11n(DRAFT) Giga Router CAT-5 Ethernet Cable Power Adapter (12V, 1A) CD-ROM with Manual Quick Installation Guide Using a power supply with a different voltage than the one included with your product will cause damage and void the warranty for this product.
  • Page 7: Wireless Lan Networking

    BE DONE BY AN AUTHORIZED ADMINISTRATOR. Transmission Rate (Transfer Rate) The WRT-390L provides various transmission (data) rate options for you to select. In most networking scenarios, the factory default Best (automatic) setting proves the most efficient. This setting allows your WRT-390L to operate at the maximum transmission (data) rate. When the communication quality drops below a certain level, the WRT-390L automatically switches to a lower transmission (data) rate.
  • Page 9 When a number of wireless stations are connected using a single access point, you have a Basic Service Set (BSS). In the ESS diagram below, communication is done through the access points, which relay data packets to other wireless stations or devices connected to the wired network. Wireless stations can then access resources, such as a printer, on the wired network.
  • Page 10 In an ESS environment, users are able to move from one access point to another without losing the connection. In the diagram below, when the user moves from BSS (1) to BSS (2) the WLAN client devices automatically switches to the channel used in BSS (2). Roaming in an ESS network diagram...
  • Page 11: Introduction

    Unlike most routers, the WRT-390L provides data transfers at up to 300Mbps when using 11n (Draft) connection. This router is also back compatible with 802.11g or 11b devices. This means that you do not need to change your entire network to maintain connectivity.
  • Page 12: Hardware Overview

    3. Hardware Overview 3.1 LED Indications: (from bottom to top) LAN1 LAN2 LAN3 LAN4 Wireless Reserve Reserve 3.2 Rear panel: (from bottom to top) DC-IN RESET LAN1 LAN2 LAN3 LAN4...
  • Page 13: Installation Considerations

    (radio frequency) noise in your home or business. The key to maximizing wireless range is to follow these basic guidelines: Keep the number of walls and ceilings between the WRT-390L and other network devices to a minimum - each wall or ceiling can reduce your wireless product’s range from 3-90 feet (1-30...
  • Page 14: Using The Configuration Menu

    4. Using the Configuration Menu Whenever you want to configure your WRT-390L, you can access the Configuration Menu through your PC by opening the Web-browser and typing in the IP Address of the WRT-390L. The WRT-390L’s default IP Address is http://10.10.10.254 Open the Web browser.
  • Page 15: Network

    4.1 Network Network: Wan Setting...
  • Page 16 Network: Lan Setting...
  • Page 17 LAN Interface Setting IP Address The IP address of the this device on the local area network. Assign any unused IP address in the range of IP addresses available for the LAN. For example, 192.168.0.101. Subnet Mask The subnet mask of the local area network. DHCP Server Settings DHCP stands for Dynamic Host Configuration Protocol.
  • Page 18 same as when a device has a static IP address except that the device must still request an IP address from the router. The router will provide the device the same IP address every time. DHCP Reservations are helpful for server computers on the local network that are hosting applications such as Web and FTP.
  • Page 19 Network: DHCP Client List DHCP Client List In this section you can see what LAN devices are currently leasing IP addresses.
  • Page 20 4.2 Wireless Wireless: Basic...
  • Page 21 Radio On/Off This indicates the wireless operating status. The wireless can be turned on or off by the slide switch. When the radio is on, the following parameters are in effect. Wireless Mode If all of the wireless devices you want to connect with this router can connect in the same transmission mode, you can improve performance slightly by choosing the appropriate "Only"...
  • Page 22 Wireless: Advanced Beacon Interval Beacons are packets sent by a wireless router to synchronize wireless devices. Specify a Beacon Period value between 20 and 1000. The default value is set to 100 milliseconds. DTIM A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages.
  • Page 23 of 2346 bytes. Short Preamble and Slot Using a short (400ns) guard interval can increase throughput. However, it can also increase error rate in some installations, due to increased sensitivity to radio-frequency reflections. Select the option that works best for your installation.
  • Page 24 Wireless: Security Security Mode Unless one of these encryption modes is selected, wireless transmissions to and from your wireless network can be easily intercepted and interpreted by unauthorized users. A method of encrypting data for wireless communication intended to provide the same level of privacy as a wired network.
  • Page 25 Cipher Type: The encryption algorithm used to secure the data communication. TKIP (Temporal Key Integrity Protocol) provides per-packet key generation and is based on WEP. AES (Advanced Encryption Standard) is a very secure block based encryption. With the "TKIP and AES" option, the router negotiates the cipher type with the client, and uses AES when available.
  • Page 26 Wireless: WPS Enable Enable the WPS feature. Lock Wireless Security Settings Locking the wireless security settings prevents the settings from being changed by any new external registrar using its PIN. Devices can still be added to the wireless network using WPS.
  • Page 27 PIN Settings A PIN is a unique number that can be used to add the router to an existing network or to create a new network. The default PIN may be printed on the bottom of the router. For extra security, a new PIN can be generated.
  • Page 28 Wireless: Station List...
  • Page 29: Advanced

    4.3 Advanced Advanced: DMZ DMZ Setting DMZ means "Demilitarized Zone." If an application has trouble working from behind the router, you can expose one computer to the Internet and run the application on that computer. When a LAN host is configured as a DMZ host, it becomes the destination for all incoming packets that do not match some other incoming session or rule.
  • Page 30 only forwarded while the trigger is active. Few applications truly require the use of the DMZ host. Following are examples of when a DMZ host might be required: • A host needs to support several applications that might use overlapping ingress ports such that two port forwarding rules cannot be used because they would potentially be in conflict.
  • Page 31 Advanced: Virtual Server Add/Edit Virtual Server Enable Specifies whether the entry will be active or inactive. Name Assign a meaningful name to the virtual server, for example Web Server. Several well-known types of virtual server are available from the "Application Name" drop-down list. Selecting one of these entries fills some of the remaining parameters with standard values for that type of server.
  • Page 32 Select the protocol used by the service. The common choices -- UDP, TCP, and both UDP and TCP -- can be selected from the drop-down menu. To specify any other protocol, select "Other" from the list, then enter the corresponding protocol number (as assigned by the IANA) in the Protocol box.
  • Page 33 Advanced: Routing Add/Edit Route Adds a new route to the IP routing table or edits an existing route. Destination IP The IP address of packets that will take this route. Gateway Specifies the next hop to be taken if this route is used. A gateway of 0.0.0.0 implies there is no next hop, and the IP address matched is directly connected to the router on the interface specified: LAN or WAN.
  • Page 34 Metric The route metric is a value from 1 to 16 that indicates the cost of using this route. A value of 1 is the lowest cost, and 15 is the highest cost. A value of 16 indicates that the route is not reachable from this router.
  • Page 35 Advanced: Access Control Enable By default, the Access Control feature is disabled. If you need Access Control, check this option. Note: When Access Control is disabled, every device on the LAN has unrestricted access to the Internet. However, if you enable Access Control, Internet access is restricted for those devices that have an Access Control Policy configured for them.
  • Page 36 Advanced: Special Applications Add/Edit Port Trigger Rule Enable Specifies whether the entry will be active or inactive. Name Enter a name for the Special Application Rule, for example Game App, which will help you identify the rule in the future. Alternatively, you can select from the Application list of common applications.
  • Page 37 Select the protocol used by the service. The common choices -- UDP, TCP, and both UDP and TCP -- can be selected from the drop-down menu. Trigger Port Enter the outgoing port range used by your application (for example 6500-6700). Schedule Select a schedule for when this rule is in effect.
  • Page 38 Advanced: Gaming Add/Edit Port Range Rule Use this section to add a Port Range Rule to the following list or to edit a rule already in the list. Rule Enable Specifies whether the entry will be active or inactive. Rule Name Give the rule a name that is meaningful to you, for example Game Server.
  • Page 39 Enter the TCP ports to open (for example 6159-6180, 99). UDP Ports to Open Enter the UDP ports to open (for example 6159-6180, 99). Inbound Filter Select a filter that controls access as needed for this rule. Schedule Select a schedule for the times when this rule is in effect. Clear Re-initialize this area of the screen, discarding any changes you have made.
  • Page 40 Advanced: Inbound Filter Add/Edit Inbound Filter Rule Here you can add entries to the Inbound Filter Rules List below, or edit existing entries. Name Enter a name for the rule that is meaningful to you. Action The rule can either Allow or Deny messages. Remote IP Range Define the ranges of Internet addresses this rule applies to.
  • Page 41 Permit any WAN user to access the related capability. Deny All Prevent all WAN users from accessing the related capability. (LAN users are not affected by Inbound Filter Rules.)
  • Page 42 Advanced: Schedule Add/Edit Schedule Rule In this section you can add entries to the Schedule Rules List below or edit existing entries. Name Give the schedule a name that is meaningful to you, such as "Weekday rule". Day(s) Place a checkmark in the boxes for the desired days or select the All Week radio button to select all seven days of the week.
  • Page 43 The end time is entered in the same format as the start time. The hour in the first box and the minutes in the second box. The end time is used for most other rules, but is not normally used for email events.
  • Page 44: Administrator

    4.4 Administrator Administrator: Management Admin Password Enter a password for the user "admin", who will have full access to the Web-based...
  • Page 45 management interface. Device Name The name of the router can be changed here. Enable Dynamic DNS Enable this option only if you have purchased your own domain name and registered with a dynamic DNS service provider. The following paramters are displayed when the option is enabled.
  • Page 46 Administrator: Setting Management...
  • Page 47 Administrator: Time Time Configuration Current Router Time Displays the time currently maintained by the router. If this is not correct, use the following options to configure the time correctly. Time Zone Select your local time zone from pull down menu. Automatic Time Configuration Enable NTP Server Select this option if you want to synchronize the router's clock to a Network Time Server over...
  • Page 48 Administrator: Status...

Table of Contents