AlphaShield AlphaGIGABIT 8400 User Manual

Secure wireless router

Advertisement

Quick Links

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the AlphaGIGABIT 8400 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for AlphaShield AlphaGIGABIT 8400

  • Page 2: Table Of Contents

    Alpha GIGABIT Secure Wireless Router 8400 Table of Contents INTRODUCTION CONTENTS SYSTEM REQUIREMENTS FEATURES HARDWARE GUIDELINES Connections LEDs LOGIN SETUP Quick Start DHCP Wireless ADVANCED Virtual Server Special Applications Gaming Stream Engine Networking Optimization Routing Access Control Web Filter Mac Address Filters Firewall 8.10...
  • Page 3 Logs 10.6 Statistics 10.7 LAN Port Status 10.8 Active Sessions 10.9 Switch Forwarding 11. GLOSSARY 12. TECHNICAL SPECIFICATIONS 13. SUPPORT 13.1 100% Unhackable or Money Back Guarantee 13.2 Warranty 13.3 Service and Repairs 13.4 RMA Card Version 1.0 Page 3...
  • Page 4 13.6 Trademark 13.7 Patents 13.8 Restrictions 13.9 Liability Limitations 13.10 Customer Remedies 13.11 Notice of Change of Terms and Conditions 13.12 Replacement Components and Specifications 14. IMPORTANT NOTICES 14.1 FCC Statement 14.2 FCC Caution 14.3 FCC Radiation Exposure Statement 14.4 IC Statement 14.5...
  • Page 5: Introduction

    GIGABIT Secure Wireless Router 8400, and thank you for choosing AlphaShield for your networking and security needs. Your new router allows you to share files and printers on your network, and surf the Internet with ® the performance benefits of network optimization using StreamEngine Technology , Gigabit Ethernet and Turbo Wireless-G and the ®...
  • Page 6: Alpha Gigabit Secure Wireless Router

    6. Vertical Stands Note : Please contact your reseller if any of the above items are missing. Important: Using a power supply other than that included with your router will result in the warranty of this product being declared void. Version 1.0...
  • Page 7: System Requirements

    PC or MAC with following minimum requirements: 1.25 Ghz processor 256MB Memory CD-ROM Drive Ethernet Adapter 10/100/1000 with TCP/IP Protocol Installed ® Windows XP/2000/Vista/ME or Mac® OS X v10.3/v10.2/v10.1or Linux Internet Explorer v6, Netscape® Navigator v7 or Firefox v1.5 Version 1.0 Page 7...
  • Page 8: Features

    5 x 10/100/1000 Auto-Sensing Gigabit Ethernet LAN Ports with MDI /MDI-X 1 x 10/100 Auto-Sensing Fast Ethernet WAN Port with MDI/MDI-X 4 Universal Serial Bus (USB) connections Atheros Chipset & 802.11 b/g transceiver with Super G 108 Mbps wireless throughput Router Features: WAN and LAN USB Network Storage...
  • Page 9 WAN Mode: Static, DHCP, PPPoE, PPTP, L2TP and Bigpond Other Protocols Support: RIP, IGMP, and DNS Relay Application Level Gateway Configuration for: MSN, FTP, NetMeeting, IPSec VPN, MMS, SIP, Wake On LAN, PPTP Pre-selectable and Configurable Port Rules for Gaming...
  • Page 10: Hardware Guidelines

    5.1 Connections: All Ethernet Ports (WAN and LAN) are auto MDI/MDIX, meaning you can either use a straight-through or a crossover Ethernet cable. 2. 5 Auto MDI/MDIX LAN ports automatically sense the cable type when connecting to Ethernet-enabled computers for both WAN and LAN.
  • Page 11: Leds

    When there is activity on the wireless network, this LED will flash 1 AlphaGAP LED: A Solid RED light will signify that the Router is in AlphaGAP Mode and Solid Green will signify that the Router is in Connected Mode. Version 1.0...
  • Page 12: Login

    GIGABIT Secure Wireless Router 8400 6. LOGIN: The Configuration Interface can be accessed from your Web browser. Type http://192.168.0.1 in the address window and press Enter. The Login screen will appear. Select a User Name. By default, there is no password.
  • Page 13: Setup

    Alpha GIGABIT Secure Wireless Router 8400 7. SETUP: 7.1 Quick Start: The Wizard screen contains two wizards: Internet Connection Setup Wireless Setup Version 1.0 Page 13...
  • Page 14 Router to the Internet. This Setup Wizard will guide you in a step-by-step manner to get your Internet connection up and running. Before launching the Wizard, please make sure you have correctly followed all of the steps outlined in the Quick Installation Guide included in the package.
  • Page 15 Step 3: Configure Your Internet Connection From the pulldown menu, choose your Internet Service Provider (ISP). If your ISP is not listed in the menu, or you do not know who your ISP is, simply select Not Listed or Don't Know from the menu.
  • Page 16 Secure Wireless Router 8400 Step 3: Configure Your Internet Connection DHCP CONNECTION (Dynamic IP Address) A MAC Address is a unique hardware address for devices on a Local Area Network. Enter the MAC Address of the computer that was originally connected to your broadband modem.
  • Page 17 PPTP Server IP Address Your Username Your Password. To verify your Password, Re-enter it below To continue click Next At the Set Username and Password Connection (L2TP) screen enter: L2TP IP Address L2TP Subnet Mask L2TP Gateway IP Address L2TP Server IP Address Your Username Your Password.
  • Page 18 At the Set Static IP Address Connection Enter: IP address Subnet Mask Gateway Address Primary and Secondary DNS Addresses To continue click Next Setup Complete Click Connect. This will save your settings and reboot the router Version 1.0 Page 18...
  • Page 19 Secure Wireless Router 8400 b) Launch Wireless Security Setup Wizard: The next step is to set up your wireless network. This Wizard will help you set it up and make it secure. Some changes made using this Setup Alpha GIGABIT...
  • Page 20 GIGABIT Secure Wireless Router 8400 Step 1: Name Your Wireless Network Choose a Name for your Wireless Network Do not choose the default name for security reasons To continue click Next. Step 2: Secure Your Wireless Network Choose a security option to protect your network from unauthorized users.
  • Page 21 Select a Security Password between 2 and 20 characters To continue click Next Setup Complete! The setup Page will give you a detailed summary of the settings, based on what you have selected in the previous steps. Click Save to continue...
  • Page 22 Alpha GIGABIT Secure Wireless Router 8400 This screen will only appear if you selected BETTER security This screen will only appear if you selected GOOD security This screen will only appear if you selected NONE security Version 1.0 Page 22...
  • Page 23: Wan

    7.2 WAN: The WAN section will help you choose one of 6 connection types: Static IP, DHCP, PPPoE, PPTP, L2TP, and BigPond. If you are using the PPPoE option, you will need to remove or disable any PPPoE client software on your computers. If you have any questions about your connection, please contact your Internet Service Provider (ISP).
  • Page 24 Alpha GIGABIT Secure Wireless Router 8400 DHCP WAN Mode: Enter a Host Name to identify your system to the ISP's server PPPoE WAN Mode: Enter the Username and Password you use to gain access to the Internet. To verify your Password, re-enter it below Enter a Service Name (If your ISP requires it).
  • Page 25 Enter the PPTP Subnet Mask provided by your ISP. Enter the PPTP Gateway IP Address provided by your ISP. Enter the PPTP Server IP Address you are connecting to, also provided by your ISP. Enter the Username and Password you use to gain access to the Internet.
  • Page 26 The L2TP Subnet Mask provided by your ISP. The L2TP Gateway IP Address provided by your ISP. The L2TP Server IP Address provided by your ISP. Enter the Username and Password you use to gain access to the Internet. To verify your Password, re-enter it below Select the Maximum Idle Time before the L2TP connection is disconnected.
  • Page 27 1500 bytes and 1492 bytes for a PPPoE connection. The Router will use the default value assigned in the MTU window. WAN Port Speed is set to Auto by default. You can select the connection type (10 or 100Mbps) if you have trouble connecting the WAN port.
  • Page 28: Lan Settings

    Secure Wireless Router 8400 7.3 LAN Settings: IP Address: Enter the IP Address of the router on the local area network. The local network settings are based on the address assigned here. Subnet Mask: Use the of your router on the local area network.
  • Page 29: Dhcp

    Note: If you have any devices using static IP addresses, be sure the addresses do not fall within the range defined in the DHCP IP Address Range field. A Static IP address is one that is entered in manually on the device.
  • Page 30 Copy the PC's MAC Address again because every Ethernet adapter has a unique MAC address. The same goes for any network device. If you replace a network device such as a print server, you will need to input the MAC address of the new print server into the Static DHCP configuration.
  • Page 31: Wireless

    Transmission Rate By default the fastest rate will be automatically selected. You can select the speed from the drop-down list. Note: If all of your devices can connect in 802.11g Mode then leave the setting at 802.11g only. If you have some devices that are 802.11b/g then you can change the mode to Mixed.
  • Page 32 Super G without Turbo: Performance enhancing features such as Packet Bursting, Fast Frames, and Compression. Super G with Static Turbo: Mode is not backwards compatible with non-Turbo (legacy) devices. Static turbo enabled mode is always on and is only enabled when all devices on the wireless network are Super G with Static Turbo enabled.
  • Page 33 For 128 bit keys you must enter 26 hex digits into each key box. A hex digit is either a number from 0 to 9 or a letter from A to F. For the most secure use of WEP set the authentication type to "Shared Key"...
  • Page 34 Cipher Type is entered as a pass-phrase and used to generate session keys that are unique for each wireless client. It cannot be less than 8 characters and no more than 63 characters in ASCII format at both ends of the wireless connection.
  • Page 35 The RADIUS server works with WPA-Enterprise to authenticate wireless clients. The Server may need to be configured in order to do so. The necessary credentials should have been established by wireless clients before attempting to authenticate to the Server through the Gateway Select the pre-shared key Cipher Type.
  • Page 36: Advanced

    8.1 Virtual Server: The Virtual Server option allows you to define a single public port on your router for redirection to an internal LAN IP Address and Private LAN port if required. This feature is useful for hosting online services such as FTP or Web Servers.
  • Page 37: Special Applications

    IPSec VPN: multiple VPN clients can connect to their corporate network. Some VPN clients support traversal of IPSec through NAT . This ALG may interfere with the operation of such VPN clients. If you are having trouble connecting with your corporate network, try turning this ALG off.
  • Page 38 Select the Input Port Protocol used by the Internet traffic coming back into the router through the opened port range. Select a Schedule for when this rule is in effect. If you do not see the schedule you need in the list of schedules, go to the Tools ->...
  • Page 39: Gaming

    Toggling the Enable checkbox enables or disables the Game Rule List. To edit the entries clickon the pencil icon. To delete the entries click on trash can icon. If you have made some changes or deletions click on Save Settings button on top of page. If your configuration settings are over then click the Reboot the Device button otherwise click Continue.
  • Page 40: Stream Engine Networking Optimization

    ® StreamEngine Technology improves your online gaming experience by ensuring that your game traffic is prioritized over other network traffic, such as FTP or Web. For best performance, use the Automatic Classification option to automatically set the priority for your applications.
  • Page 41: Routing

    Destination network, then the Metric value will be 1. This represents the amount of hops it will take to reach the Destination IP or network. A hop is considered to be traffic passing through a router from one network to another.
  • Page 42: Access Control

    Secure Wireless Router 8400 8.6 Access Control: The Access Control option allows you to control access in and out of your network. Use this feature to grant access only to approved sites, limit web access based on time or dates, and/or block Internet access for applications like P2P utilities or games.
  • Page 43 Step 2: Select Schedule: Select the Schedule of times when you want the policy to apply. If you do not see the schedule you need in the list of schedules, Go to the Tools > Schedules screen and create a new schedule.
  • Page 44 Step 4: Select Filtering Method: Apply Web Filter: With this option is enabled, the specified system will only have access to the Web sites listed in the Web filter section. Log Internet Access: When this option is enabled, all of the Web sites visited by the specified machine will be logged.
  • Page 45: Web Filter

    This section lists the currently allowed web sites. By toggling the Enable checkbox Allowed Web Site List can be enabled or disabled. To edit the entries click on the pencil icon. To delete the entries click on the trash can icon. If you have made any changes or deletions, click on Save Settings at the top of the page.
  • Page 46: Mac Address Filters

    This section lists the current MAC address filters. By toggling the Enable checkbox, the MAC Address List can be enabled or disabled. To edit the entries click on the pencil icon. To delete the entries click on the trash can icon. If you have made any changes or deletions, click on Save Settings at the top of the page.
  • Page 47: Firewall

    AlphaGAP’s effective protection technique, please see AlphaGAP in our glossary, or visit our website at www.alphashield.com To set a specified time to deny or allow access on your network, select your appropriate option from the Allow/Deny all Access During down menu.
  • Page 48: Inbound Filters

    This section lists the current Inbound Filter rules. By toggling the Enable checkbox, the MAC Address List can be enabled or disabled. To edit the entries click on the Pencil icon. To delete the entries, click on the trash can icon. If you have made some changes or deletions click on Save Settings button on top of page.
  • Page 49: Advanced Wireless

    AP's via WDS links. Note: WDS is incompatible with WPA. Both features cannot be used at the same time. A WDS link is bidirectional so this AP must know the MAC address (creates the WDS link) of the other AP, and the other AP must have a WDS link back to this AP (the router).
  • Page 50: Schedules

    This list displays all of the currently defined schedules. By toggling the Enable checkbox schedules rule List can be enabled or disabled. To edit the entries click on the pencil icon. To delete the entries click on the trash can icon. If you have made any changes or deletions, click on Save Settings at the top of the page.
  • Page 51: Tools

    Internet connection. Remote Management Server Port will be accessed from the Internet. When there is no activity before the administration session is closed that amount of time is Admin Idle Timeout . Version 1.0 Page 51...
  • Page 52 You need to have the UPnP selected for the Router to be able to communicate with the network. Save and Restore Settings: To load previously saved router configuration settings click on Restore Settings button. To save the router configuration to a file on your computer Click on Save Settings. Version 1.0 Page 52...
  • Page 53: Time

    9.2 Time: The Time Configuration option allows you to configure, update, and maintain the correct time on the internal system clock. From this section you can set your local time zone and set the Time Server. Daylight Saving Settings can also be configured to automatically adjust the time when needed.
  • Page 54: Print Server Setup

    This will enable the Router to find and communicate with the connected printer. Please install the printer in your computer as Local printer on the TCP/IP port. The Port IP address is same as the IP address of your Router e.g. 192.168.0.1 The Port address is 9100. 9.4 Syslog: This section allows you to archive your log files to a Syslog Server.
  • Page 55: Email

    Selecting On Schedule will send the logs via email according to schedule. Schedule is enabled when On Schedule is selected. You can select a schedule from the list of defined schedules. To create a schedule, go to Tools > Schedules.
  • Page 56: System

    Secure Wireless Router 8400 9.6 System: The System Settings section allows you to reboot the device or restore the router to the factory default settings. Restoring the unit to the factory default settings will erase all settings including any rules that you've created.
  • Page 57: Firmware

    To make router check online periodically to see if a newer version of the firmware is available enable Automatically Check Online for Latest Firmware Version. When Email Notification of Newer Firmware Version is enabled, an email will be sent to the email address configured in the email section whenever new firmware Is available.
  • Page 58: Dynamic Dns

    IP address. Most broadband Internet Service Providers assign dynamic (changing) IP addresses. Using a DDNS service provider, your friends can enter in your domain name to connect to your server no matter what your IP address is.
  • Page 59: Status

    The Status items are mainly informational. 10.1 Device Info: General: Time option displays the time and date that the router is set to. Firmware Version option displays the currently loaded firmware version. WAN: Connection Type shows the Internet connection type that is being used.
  • Page 60 MAC Address displayed for your local area network. IP Address displays the router on your local area network. Subnet Mask displays the router on your local area network. DHCP Server indicates if the router is acting as a DHCP server on the local area network. Wireless LAN: Wireless Radio dicates whether wireless networking is on or off.
  • Page 61: Wireless

    Alpha GIGABIT Secure Wireless Router 8400 10.2 Wireless: Use this option to view the wireless clients that are connected to your wireless router. Number Of Wireless Clients This display includes the number of clients that are connected to the router, the MAC address of each system connecting wirelessly, and the IP address of Each system connecting wirelessly.
  • Page 62: Print Serve Status

    10.5 Logs: Events are automatically logged (recorded) on your router’s internal memory. When the memory is full, old event will be deleted and newer ones will be logged. The router also has external Syslog Server support so you can send the log files to a computer on your network that is running a Syslog utility.
  • Page 63: Statistics

    Received shows the number of packets received from the Internet. TX Packets Dropped shows the number of transmit packets sent to the WAN port that were dropped. RX Packets Dropped shows the number of receive packets sent to the WAN port that were dropped.
  • Page 64: Lan Port Status

    Errors shows the number of errors relating to packets to/ from the Wireless Network. 10.7 LAN Port Status: Traffic Statistics simply displays Receive and Transmit packets passing through your router. 10.8 Active Sessions: The Active Session page displays the full details of active sessions to your router. Version 1.0 Page 64...
  • Page 65: Switch Forwarding

    Alpha GIGABIT Secure Wireless Router 8400 10.9 Switch Forwarding: This page displays the full details of Ethernet switching in your router. Version 1.0 Page 65...
  • Page 66: Glossary

    Attenuation – The loss in strength of digital an analog signals. The loss is greater when the signal is being transmitted over long distances. Authentication – To provide credentials, like a Password, in order to verify that the person or device is really who they are claiming to be Automatic Private IP Addressing - APIPA.
  • Page 67 Default – A predetermined value or setting that is used by a program when no user input has been entered for this value or setting Demilitarized zone – DMZ. A single computer or group of computers that can be accessed by both users on the Internet as well as users on the Local Network, but that is not protected by the same security as the Local Network.
  • Page 68 Duplex – Sending and Receiving data transmissions at the sane time Dynamic DNS service – DDNS is provided by companies to allow users with Dynamic IP addresses to obtain a Domain Name that will always by linked to their changing IP address. The IP address is updated by either client software running on a computer or by a router that supports DDNS, whenever the IP address changes Dynamic IP address –...
  • Page 69 IKE – Internet Key Exchange is used to ensure security for VPN connections Infrastructure – In terms of a wireless network, this is when wireless clients use an Access Point to gain access to the network Internet – A system of worldwide networks which use TCP/IP to allow for resources to be accessed from computers around the world Internet Explorer –...
  • Page 70 IPsec – Internet Protocol Security IPv6 – Internet Protocol Version 6 uses 128-bit addresses and was developed to solve the problem that we face of running our of IP version 4 addresses IPX – Inter-network Packet Exchange is a networking protocol developed by Novel to enable their Netware clients and servers to communicate ISP –...
  • Page 71 OSI – Open Systems Interconnection is the reference model for how data should travel between two devices on a network OSPF – Open Shortest Path First is a routing protocol that is used more than RIP in larger scale networks because only changes to the routing table are sent to all the other routers in the network as opposed to sending the entire routing table at a regular interval, which is how RIP functions Password –...
  • Page 72 SSID – Service Set Identifier is a name for a wireless network Stateful inspection – A feature of a firewall that monitors outgoing and incoming traffic to make sure that only valid responses to outgoing requests for incoming packets are allowed to pass though the firewall Subnet mask –...
  • Page 73 Unicast – Communication between a single sender and receiver Universal Plug and Play – A standard that allows network devices to discover each other and configure themselves to be a part of the network UPnP – Universal Plug and Play URL –...
  • Page 74: Technical Specifications

    11 Channels from 2.400 to 2.4835 GHz ISM Band Wireless Signal Rates 802.11g: 6, 9, 12, 18, 24, 36, 48, 54, 108, Mbps and 108-G Technology with Automatic Fallback 802.11g: 8, 12, 24, 36, 48, 72, 96, 108 Mbps 802.11b: 1, 2, 5.5, and 11 Mbps Wireless Modulation Technology 802.11b DQPSK, DBPSK, DSSS, CCK Modulation...
  • Page 75 Print Sharing Capability Email Alerts Wireless Distribution Mode (WDS) Device Management Internet Explorer v6 or Later, or other Java-enabled Browers and Telnet Power Requirements DC Wall Adapter 5.8 Volts 2.4 Amps Dimentions and Weight 280 x 120 x 40 mm 250 grams...
  • Page 76: Support

    If the original purchaser can prove that he or she was hacked while using a properly installed Alpha GIGABIT Router, with AlphaGAP Technology enabled, AlphaShield Inc. will accept the return of the product and provide a full refund (with proof of purchase) or replace the product at AlphaShield's option. 13.2 Warranty:...
  • Page 77: Service And Repairs

    13.4 RMA Card: AlphaShield Inc. warrants this product to be free of defects and to be fully functional for a period of 24 months from the date of original purchase. AlphaShield will repair or replace at AlphaShield Inc.'s option any unit, without cost, during this period, if the unit is found to be defective for any reason other than abuse or incorrect usage or installation.
  • Page 78: Copyright

    Information in this User Manual and all AlphaShield Inc.'s literature, including URLs and other Internet Website references, is subject to change without notice. The entire risk of the use or the results of the use of this document, with its terms and conditions, remains with the user. Complying with all applicable copyright laws is the responsibility of the user.
  • Page 79: Customer Remedies

    Such changes, modifications, additions, or deletions to the terms and conditions of use shall be effective immediately upon notice thereof, which may be given by any means including, but not limited to, posting new terms and conditions on the company's website: www.alphashield.com...
  • Page 80: Important Notices

    14.1 FCC Statement: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
  • Page 81: Ic Statement

    Industry Canada. The required antenna impedance is 50 Ohms. The installer of this radio equipment must ensure that the antenna is located or pointed such that it does not emit RF field in excess of Health Canada limits for the general population;...

Table of Contents