Alpha GIGABIT Secure Wireless Router 8400 Table of Contents INTRODUCTION CONTENTS SYSTEM REQUIREMENTS FEATURES HARDWARE GUIDELINES Connections LEDs LOGIN SETUP Quick Start DHCP Wireless ADVANCED Virtual Server Special Applications Gaming Stream Engine Networking Optimization Routing Access Control Web Filter Mac Address Filters Firewall 8.10...
Page 3
Logs 10.6 Statistics 10.7 LAN Port Status 10.8 Active Sessions 10.9 Switch Forwarding 11. GLOSSARY 12. TECHNICAL SPECIFICATIONS 13. SUPPORT 13.1 100% Unhackable or Money Back Guarantee 13.2 Warranty 13.3 Service and Repairs 13.4 RMA Card Version 1.0 Page 3...
Page 4
13.6 Trademark 13.7 Patents 13.8 Restrictions 13.9 Liability Limitations 13.10 Customer Remedies 13.11 Notice of Change of Terms and Conditions 13.12 Replacement Components and Specifications 14. IMPORTANT NOTICES 14.1 FCC Statement 14.2 FCC Caution 14.3 FCC Radiation Exposure Statement 14.4 IC Statement 14.5...
GIGABIT Secure Wireless Router 8400, and thank you for choosing AlphaShield for your networking and security needs. Your new router allows you to share files and printers on your network, and surf the Internet with ® the performance benefits of network optimization using StreamEngine Technology , Gigabit Ethernet and Turbo Wireless-G and the ®...
6. Vertical Stands Note : Please contact your reseller if any of the above items are missing. Important: Using a power supply other than that included with your router will result in the warranty of this product being declared void. Version 1.0...
PC or MAC with following minimum requirements: 1.25 Ghz processor 256MB Memory CD-ROM Drive Ethernet Adapter 10/100/1000 with TCP/IP Protocol Installed ® Windows XP/2000/Vista/ME or Mac® OS X v10.3/v10.2/v10.1or Linux Internet Explorer v6, Netscape® Navigator v7 or Firefox v1.5 Version 1.0 Page 7...
5 x 10/100/1000 Auto-Sensing Gigabit Ethernet LAN Ports with MDI /MDI-X 1 x 10/100 Auto-Sensing Fast Ethernet WAN Port with MDI/MDI-X 4 Universal Serial Bus (USB) connections Atheros Chipset & 802.11 b/g transceiver with Super G 108 Mbps wireless throughput Router Features: WAN and LAN USB Network Storage...
Page 9
WAN Mode: Static, DHCP, PPPoE, PPTP, L2TP and Bigpond Other Protocols Support: RIP, IGMP, and DNS Relay Application Level Gateway Configuration for: MSN, FTP, NetMeeting, IPSec VPN, MMS, SIP, Wake On LAN, PPTP Pre-selectable and Configurable Port Rules for Gaming...
5.1 Connections: All Ethernet Ports (WAN and LAN) are auto MDI/MDIX, meaning you can either use a straight-through or a crossover Ethernet cable. 2. 5 Auto MDI/MDIX LAN ports automatically sense the cable type when connecting to Ethernet-enabled computers for both WAN and LAN.
When there is activity on the wireless network, this LED will flash 1 AlphaGAP LED: A Solid RED light will signify that the Router is in AlphaGAP Mode and Solid Green will signify that the Router is in Connected Mode. Version 1.0...
GIGABIT Secure Wireless Router 8400 6. LOGIN: The Configuration Interface can be accessed from your Web browser. Type http://192.168.0.1 in the address window and press Enter. The Login screen will appear. Select a User Name. By default, there is no password.
Alpha GIGABIT Secure Wireless Router 8400 7. SETUP: 7.1 Quick Start: The Wizard screen contains two wizards: Internet Connection Setup Wireless Setup Version 1.0 Page 13...
Page 14
Router to the Internet. This Setup Wizard will guide you in a step-by-step manner to get your Internet connection up and running. Before launching the Wizard, please make sure you have correctly followed all of the steps outlined in the Quick Installation Guide included in the package.
Page 15
Step 3: Configure Your Internet Connection From the pulldown menu, choose your Internet Service Provider (ISP). If your ISP is not listed in the menu, or you do not know who your ISP is, simply select Not Listed or Don't Know from the menu.
Page 16
Secure Wireless Router 8400 Step 3: Configure Your Internet Connection DHCP CONNECTION (Dynamic IP Address) A MAC Address is a unique hardware address for devices on a Local Area Network. Enter the MAC Address of the computer that was originally connected to your broadband modem.
Page 17
PPTP Server IP Address Your Username Your Password. To verify your Password, Re-enter it below To continue click Next At the Set Username and Password Connection (L2TP) screen enter: L2TP IP Address L2TP Subnet Mask L2TP Gateway IP Address L2TP Server IP Address Your Username Your Password.
Page 18
At the Set Static IP Address Connection Enter: IP address Subnet Mask Gateway Address Primary and Secondary DNS Addresses To continue click Next Setup Complete Click Connect. This will save your settings and reboot the router Version 1.0 Page 18...
Page 19
Secure Wireless Router 8400 b) Launch Wireless Security Setup Wizard: The next step is to set up your wireless network. This Wizard will help you set it up and make it secure. Some changes made using this Setup Alpha GIGABIT...
Page 20
GIGABIT Secure Wireless Router 8400 Step 1: Name Your Wireless Network Choose a Name for your Wireless Network Do not choose the default name for security reasons To continue click Next. Step 2: Secure Your Wireless Network Choose a security option to protect your network from unauthorized users.
Page 21
Select a Security Password between 2 and 20 characters To continue click Next Setup Complete! The setup Page will give you a detailed summary of the settings, based on what you have selected in the previous steps. Click Save to continue...
Page 22
Alpha GIGABIT Secure Wireless Router 8400 This screen will only appear if you selected BETTER security This screen will only appear if you selected GOOD security This screen will only appear if you selected NONE security Version 1.0 Page 22...
7.2 WAN: The WAN section will help you choose one of 6 connection types: Static IP, DHCP, PPPoE, PPTP, L2TP, and BigPond. If you are using the PPPoE option, you will need to remove or disable any PPPoE client software on your computers. If you have any questions about your connection, please contact your Internet Service Provider (ISP).
Page 24
Alpha GIGABIT Secure Wireless Router 8400 DHCP WAN Mode: Enter a Host Name to identify your system to the ISP's server PPPoE WAN Mode: Enter the Username and Password you use to gain access to the Internet. To verify your Password, re-enter it below Enter a Service Name (If your ISP requires it).
Page 25
Enter the PPTP Subnet Mask provided by your ISP. Enter the PPTP Gateway IP Address provided by your ISP. Enter the PPTP Server IP Address you are connecting to, also provided by your ISP. Enter the Username and Password you use to gain access to the Internet.
Page 26
The L2TP Subnet Mask provided by your ISP. The L2TP Gateway IP Address provided by your ISP. The L2TP Server IP Address provided by your ISP. Enter the Username and Password you use to gain access to the Internet. To verify your Password, re-enter it below Select the Maximum Idle Time before the L2TP connection is disconnected.
Page 27
1500 bytes and 1492 bytes for a PPPoE connection. The Router will use the default value assigned in the MTU window. WAN Port Speed is set to Auto by default. You can select the connection type (10 or 100Mbps) if you have trouble connecting the WAN port.
Secure Wireless Router 8400 7.3 LAN Settings: IP Address: Enter the IP Address of the router on the local area network. The local network settings are based on the address assigned here. Subnet Mask: Use the of your router on the local area network.
Note: If you have any devices using static IP addresses, be sure the addresses do not fall within the range defined in the DHCP IP Address Range field. A Static IP address is one that is entered in manually on the device.
Page 30
Copy the PC's MAC Address again because every Ethernet adapter has a unique MAC address. The same goes for any network device. If you replace a network device such as a print server, you will need to input the MAC address of the new print server into the Static DHCP configuration.
Transmission Rate By default the fastest rate will be automatically selected. You can select the speed from the drop-down list. Note: If all of your devices can connect in 802.11g Mode then leave the setting at 802.11g only. If you have some devices that are 802.11b/g then you can change the mode to Mixed.
Page 32
Super G without Turbo: Performance enhancing features such as Packet Bursting, Fast Frames, and Compression. Super G with Static Turbo: Mode is not backwards compatible with non-Turbo (legacy) devices. Static turbo enabled mode is always on and is only enabled when all devices on the wireless network are Super G with Static Turbo enabled.
Page 33
For 128 bit keys you must enter 26 hex digits into each key box. A hex digit is either a number from 0 to 9 or a letter from A to F. For the most secure use of WEP set the authentication type to "Shared Key"...
Page 34
Cipher Type is entered as a pass-phrase and used to generate session keys that are unique for each wireless client. It cannot be less than 8 characters and no more than 63 characters in ASCII format at both ends of the wireless connection.
Page 35
The RADIUS server works with WPA-Enterprise to authenticate wireless clients. The Server may need to be configured in order to do so. The necessary credentials should have been established by wireless clients before attempting to authenticate to the Server through the Gateway Select the pre-shared key Cipher Type.
8.1 Virtual Server: The Virtual Server option allows you to define a single public port on your router for redirection to an internal LAN IP Address and Private LAN port if required. This feature is useful for hosting online services such as FTP or Web Servers.
IPSec VPN: multiple VPN clients can connect to their corporate network. Some VPN clients support traversal of IPSec through NAT . This ALG may interfere with the operation of such VPN clients. If you are having trouble connecting with your corporate network, try turning this ALG off.
Page 38
Select the Input Port Protocol used by the Internet traffic coming back into the router through the opened port range. Select a Schedule for when this rule is in effect. If you do not see the schedule you need in the list of schedules, go to the Tools ->...
Toggling the Enable checkbox enables or disables the Game Rule List. To edit the entries clickon the pencil icon. To delete the entries click on trash can icon. If you have made some changes or deletions click on Save Settings button on top of page. If your configuration settings are over then click the Reboot the Device button otherwise click Continue.
® StreamEngine Technology improves your online gaming experience by ensuring that your game traffic is prioritized over other network traffic, such as FTP or Web. For best performance, use the Automatic Classification option to automatically set the priority for your applications.
Destination network, then the Metric value will be 1. This represents the amount of hops it will take to reach the Destination IP or network. A hop is considered to be traffic passing through a router from one network to another.
Secure Wireless Router 8400 8.6 Access Control: The Access Control option allows you to control access in and out of your network. Use this feature to grant access only to approved sites, limit web access based on time or dates, and/or block Internet access for applications like P2P utilities or games.
Page 43
Step 2: Select Schedule: Select the Schedule of times when you want the policy to apply. If you do not see the schedule you need in the list of schedules, Go to the Tools > Schedules screen and create a new schedule.
Page 44
Step 4: Select Filtering Method: Apply Web Filter: With this option is enabled, the specified system will only have access to the Web sites listed in the Web filter section. Log Internet Access: When this option is enabled, all of the Web sites visited by the specified machine will be logged.
This section lists the currently allowed web sites. By toggling the Enable checkbox Allowed Web Site List can be enabled or disabled. To edit the entries click on the pencil icon. To delete the entries click on the trash can icon. If you have made any changes or deletions, click on Save Settings at the top of the page.
This section lists the current MAC address filters. By toggling the Enable checkbox, the MAC Address List can be enabled or disabled. To edit the entries click on the pencil icon. To delete the entries click on the trash can icon. If you have made any changes or deletions, click on Save Settings at the top of the page.
AlphaGAP’s effective protection technique, please see AlphaGAP in our glossary, or visit our website at www.alphashield.com To set a specified time to deny or allow access on your network, select your appropriate option from the Allow/Deny all Access During down menu.
This section lists the current Inbound Filter rules. By toggling the Enable checkbox, the MAC Address List can be enabled or disabled. To edit the entries click on the Pencil icon. To delete the entries, click on the trash can icon. If you have made some changes or deletions click on Save Settings button on top of page.
AP's via WDS links. Note: WDS is incompatible with WPA. Both features cannot be used at the same time. A WDS link is bidirectional so this AP must know the MAC address (creates the WDS link) of the other AP, and the other AP must have a WDS link back to this AP (the router).
This list displays all of the currently defined schedules. By toggling the Enable checkbox schedules rule List can be enabled or disabled. To edit the entries click on the pencil icon. To delete the entries click on the trash can icon. If you have made any changes or deletions, click on Save Settings at the top of the page.
Internet connection. Remote Management Server Port will be accessed from the Internet. When there is no activity before the administration session is closed that amount of time is Admin Idle Timeout . Version 1.0 Page 51...
Page 52
You need to have the UPnP selected for the Router to be able to communicate with the network. Save and Restore Settings: To load previously saved router configuration settings click on Restore Settings button. To save the router configuration to a file on your computer Click on Save Settings. Version 1.0 Page 52...
9.2 Time: The Time Configuration option allows you to configure, update, and maintain the correct time on the internal system clock. From this section you can set your local time zone and set the Time Server. Daylight Saving Settings can also be configured to automatically adjust the time when needed.
This will enable the Router to find and communicate with the connected printer. Please install the printer in your computer as Local printer on the TCP/IP port. The Port IP address is same as the IP address of your Router e.g. 192.168.0.1 The Port address is 9100. 9.4 Syslog: This section allows you to archive your log files to a Syslog Server.
Selecting On Schedule will send the logs via email according to schedule. Schedule is enabled when On Schedule is selected. You can select a schedule from the list of defined schedules. To create a schedule, go to Tools > Schedules.
Secure Wireless Router 8400 9.6 System: The System Settings section allows you to reboot the device or restore the router to the factory default settings. Restoring the unit to the factory default settings will erase all settings including any rules that you've created.
To make router check online periodically to see if a newer version of the firmware is available enable Automatically Check Online for Latest Firmware Version. When Email Notification of Newer Firmware Version is enabled, an email will be sent to the email address configured in the email section whenever new firmware Is available.
IP address. Most broadband Internet Service Providers assign dynamic (changing) IP addresses. Using a DDNS service provider, your friends can enter in your domain name to connect to your server no matter what your IP address is.
The Status items are mainly informational. 10.1 Device Info: General: Time option displays the time and date that the router is set to. Firmware Version option displays the currently loaded firmware version. WAN: Connection Type shows the Internet connection type that is being used.
Page 60
MAC Address displayed for your local area network. IP Address displays the router on your local area network. Subnet Mask displays the router on your local area network. DHCP Server indicates if the router is acting as a DHCP server on the local area network. Wireless LAN: Wireless Radio dicates whether wireless networking is on or off.
Alpha GIGABIT Secure Wireless Router 8400 10.2 Wireless: Use this option to view the wireless clients that are connected to your wireless router. Number Of Wireless Clients This display includes the number of clients that are connected to the router, the MAC address of each system connecting wirelessly, and the IP address of Each system connecting wirelessly.
10.5 Logs: Events are automatically logged (recorded) on your router’s internal memory. When the memory is full, old event will be deleted and newer ones will be logged. The router also has external Syslog Server support so you can send the log files to a computer on your network that is running a Syslog utility.
Received shows the number of packets received from the Internet. TX Packets Dropped shows the number of transmit packets sent to the WAN port that were dropped. RX Packets Dropped shows the number of receive packets sent to the WAN port that were dropped.
Errors shows the number of errors relating to packets to/ from the Wireless Network. 10.7 LAN Port Status: Traffic Statistics simply displays Receive and Transmit packets passing through your router. 10.8 Active Sessions: The Active Session page displays the full details of active sessions to your router. Version 1.0 Page 64...
Alpha GIGABIT Secure Wireless Router 8400 10.9 Switch Forwarding: This page displays the full details of Ethernet switching in your router. Version 1.0 Page 65...
Attenuation – The loss in strength of digital an analog signals. The loss is greater when the signal is being transmitted over long distances. Authentication – To provide credentials, like a Password, in order to verify that the person or device is really who they are claiming to be Automatic Private IP Addressing - APIPA.
Page 67
Default – A predetermined value or setting that is used by a program when no user input has been entered for this value or setting Demilitarized zone – DMZ. A single computer or group of computers that can be accessed by both users on the Internet as well as users on the Local Network, but that is not protected by the same security as the Local Network.
Page 68
Duplex – Sending and Receiving data transmissions at the sane time Dynamic DNS service – DDNS is provided by companies to allow users with Dynamic IP addresses to obtain a Domain Name that will always by linked to their changing IP address. The IP address is updated by either client software running on a computer or by a router that supports DDNS, whenever the IP address changes Dynamic IP address –...
Page 69
IKE – Internet Key Exchange is used to ensure security for VPN connections Infrastructure – In terms of a wireless network, this is when wireless clients use an Access Point to gain access to the network Internet – A system of worldwide networks which use TCP/IP to allow for resources to be accessed from computers around the world Internet Explorer –...
Page 70
IPsec – Internet Protocol Security IPv6 – Internet Protocol Version 6 uses 128-bit addresses and was developed to solve the problem that we face of running our of IP version 4 addresses IPX – Inter-network Packet Exchange is a networking protocol developed by Novel to enable their Netware clients and servers to communicate ISP –...
Page 71
OSI – Open Systems Interconnection is the reference model for how data should travel between two devices on a network OSPF – Open Shortest Path First is a routing protocol that is used more than RIP in larger scale networks because only changes to the routing table are sent to all the other routers in the network as opposed to sending the entire routing table at a regular interval, which is how RIP functions Password –...
Page 72
SSID – Service Set Identifier is a name for a wireless network Stateful inspection – A feature of a firewall that monitors outgoing and incoming traffic to make sure that only valid responses to outgoing requests for incoming packets are allowed to pass though the firewall Subnet mask –...
Page 73
Unicast – Communication between a single sender and receiver Universal Plug and Play – A standard that allows network devices to discover each other and configure themselves to be a part of the network UPnP – Universal Plug and Play URL –...
11 Channels from 2.400 to 2.4835 GHz ISM Band Wireless Signal Rates 802.11g: 6, 9, 12, 18, 24, 36, 48, 54, 108, Mbps and 108-G Technology with Automatic Fallback 802.11g: 8, 12, 24, 36, 48, 72, 96, 108 Mbps 802.11b: 1, 2, 5.5, and 11 Mbps Wireless Modulation Technology 802.11b DQPSK, DBPSK, DSSS, CCK Modulation...
Page 75
Print Sharing Capability Email Alerts Wireless Distribution Mode (WDS) Device Management Internet Explorer v6 or Later, or other Java-enabled Browers and Telnet Power Requirements DC Wall Adapter 5.8 Volts 2.4 Amps Dimentions and Weight 280 x 120 x 40 mm 250 grams...
If the original purchaser can prove that he or she was hacked while using a properly installed Alpha GIGABIT Router, with AlphaGAP Technology enabled, AlphaShield Inc. will accept the return of the product and provide a full refund (with proof of purchase) or replace the product at AlphaShield's option. 13.2 Warranty:...
13.4 RMA Card: AlphaShield Inc. warrants this product to be free of defects and to be fully functional for a period of 24 months from the date of original purchase. AlphaShield will repair or replace at AlphaShield Inc.'s option any unit, without cost, during this period, if the unit is found to be defective for any reason other than abuse or incorrect usage or installation.
Information in this User Manual and all AlphaShield Inc.'s literature, including URLs and other Internet Website references, is subject to change without notice. The entire risk of the use or the results of the use of this document, with its terms and conditions, remains with the user. Complying with all applicable copyright laws is the responsibility of the user.
Such changes, modifications, additions, or deletions to the terms and conditions of use shall be effective immediately upon notice thereof, which may be given by any means including, but not limited to, posting new terms and conditions on the company's website: www.alphashield.com...
14.1 FCC Statement: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
Industry Canada. The required antenna impedance is 50 Ohms. The installer of this radio equipment must ensure that the antenna is located or pointed such that it does not emit RF field in excess of Health Canada limits for the general population;...
Need help?
Do you have a question about the AlphaGIGABIT 8400 and is the answer not in the manual?
Questions and answers