Edimax BR-6288ACL V2 User Manual
Edimax BR-6288ACL V2 User Manual

Edimax BR-6288ACL V2 User Manual

Table of Contents

Advertisement

Quick Links

BR-6288ACL V2
User Manual
07-2019 / v1.0

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the BR-6288ACL V2 and is the answer not in the manual?

Questions and answers

Summary of Contents for Edimax BR-6288ACL V2

  • Page 1 BR-6288ACL V2 User Manual 07-2019 / v1.0...
  • Page 2: Table Of Contents

    CONTENTS Product Information ......................... 1 I-1. Package Contents ...................... 1 I-2. LED Status ........................2 I-3. Back Panel ......................... 3 I-4. RJ-45 Splitter Cable ....................4 I-5. Wi-Fi Power Switch ....................5 I-6. Safety Information ..................... 6 Installation ............................7 II-1.
  • Page 3 III-3-6. Firewall ........................81 III-3-6-1. URL Blocking ......................81 III-3-6-2. Access Control ......................83 III-3-6-3. DMZ ......................... 87 III-3-6-4. DoS .......................... 88 III-3-7. QoS (Quality of Service) ................... 90 III-3-7-1. QoS .......................... 90 III-3-7-2. iQoS ......................... 93 III-3-8. Advanced ......................... 95 III-3-8-1.
  • Page 4 IV-1-4-1. Windows Vista & 7 ....................139 IV-1-4-2. Windows 8 ......................141 IV-1-4-3. Mac ........................144 IV-2. Connecting to a Wi-Fi network ................146 IV-3. Troubleshooting ....................148 Glossary ............................152...
  • Page 5: Product Information

    I. Product Information I-1. Package Contents Before you start using this product, please check if there is anything missing in the package, and contact your dealer to claim the missing item(s): BR-6288ACL V2 RJ-45 Splitter Cable USB Cable Power Adapter...
  • Page 6: I-2. Led Status

    Resetting to factory default status or Wi-Fi Flashing (Fast) Protected Setup (WPS) is active. Light Green Internet is connected and Wi-Fi is full power. Internet is connected and Wi-Fi is in green Dark Green mode (75% power). BR-6288ACL V2 is off.
  • Page 7: I-3. Back Panel

    I-3. Back Panel Wi-Fi Power Switch WPS/Reset Button Power Port Network Port...
  • Page 8: I-4. Rj-45 Splitter Cable

    I-4. RJ-45 Splitter Cable The BR-6288ACL V2 includes an RJ-45 splitter cable in the package contents. This plugs into the “Network” port of the BR-6288ACL V2 and splits the port into two separate Ethernet ports – providing two ports instead of one, as shown below.
  • Page 9: I-5. Wi-Fi Power Switch

    I-5. Wi-Fi Power Switch After setup you can use the Wi-Fi power switch to adjust the strength of the BR-6288ACL V2’s wireless radio if you wish. Normal mode uses full 100% wireless power while green mode uses 75% wireless power.
  • Page 10: I-6. Safety Information

    2. Do not place the device in or near hot/humid places, such as a kitchen or bathroom. 3. Do not pull any connected cable with force; carefully disconnect it from the BR-6288ACL V2. 4. Handle the device with care. Accidental damage will void the warranty of the device.
  • Page 11: Ii. Installation

    II. Installation Plug in the BR-6288ACL V2 using the included power adapter and/or USB cable. The BR-6288ACL V2 requires 1.2 A of current – please ensure that your USB port can provide sufficient power. If not, use the 5V DC adapter.
  • Page 12 Wi-Fi device is set to use a dynamic IP address. This is a simple procedure and step-by-step instructions to do this on a computer can be found in the user manual. Choose if you want to use your BR-6288ACL V2 in its default range extender mode or in a different mode.
  • Page 13 The BR-6288ACL V2’s five available modes are outlined below: Range Extender The device connects wirelessly to your existing Mode 2.4GHz and/or 5GHz network and repeats the wireless signal(s). Wi-Fi Router Mode The device connects to your modem and provides 2.4GHz and/or 5GHz Internet (wireless and Ethernet) access for your network devices.
  • Page 14: Ii-1. Ranger Extender Mode

    II-1. Ranger Extender Mode Please ensure your BR-6288ACL V2 is within Wi-Fi range of your existing wireless router. Click “Next” to continue. Select whether to use the 5GHz wireless frequency, 2.4GHz wireless frequency or both. If you are not sure, select both and then click “Next”.
  • Page 15 Select the Wi-Fi network name (SSID) which you wish to connect to for the specified frequency and click “Next” to continue. If the Wi-Fi network you wish to connect to does not appear, try clicking “Refresh”. To connect to a hidden SSID, check the “Setup extender manually” box and enter the details manually on the next page, as shown below.
  • Page 16 Enter your existing wireless network’s security key/password in the “Security Key” field and click “Next” to continue. Wait a moment while the BR-6288ACL V2 tests the wireless connection.
  • Page 17 Select “Obtain an IP address automatically” or “Use the following IP address” for your BR-6288ACL V2. If you are using a static IP, enter the IP address, subnet mask and default gateway. Click “Next” to proceed to the next step.
  • Page 18 The device will use the same wireless password/security key as the existing wireless network. If you wish to backup the BR-6288ACL V2’s settings, click “Backup this configuration” to open a new window and save your current configuration to a .txt file.
  • Page 19 SSID(s) which are shown on the screen then close the browser window. The BR-6288ACL V2 is working and ready for use. Refer to IV-2. Connecting to a Wi-Fi network if you require more guidance.
  • Page 20: Ii-2. Access Point Mode

    II-2. Access Point Mode Select “Access Point” from the top menu and click “Next”. Connect the network port of your BR-6288ACL V2 to the LAN port of your existing router using an Ethernet cable, then click “Next”.
  • Page 21 If you are not sure, select both. Select “Obtain an IP address automatically” or “Use the following IP address” for your BR-6288ACL V2. If you are using a static IP, enter the IP address, subnet mask and default gateway. Click “Next” to proceed to the next step.
  • Page 22 Enter a name and password for your 2.4GHz & 5GHz wireless networks, then click “Next” to continue. A summary of your configuration will be displayed, as shown below. Check that all of the details are correct and then click “Next” to proceed. If you wish to backup the device’s settings, click “Backup this configuration”...
  • Page 23 Please wait a moment until the BR-6288ACL V2 is ready.
  • Page 24 A final congratulations screen will indicate that setup is complete. You can now connect to the device’s new SSID(s) which are shown on the screen then close the browser window. The BR-6288ACL V2 is working and ready for use. Refer to IV-2. Connecting to a Wi-Fi network...
  • Page 25: Ii-3. Wi-Fi Router Mode

    Internet connection type, or enter the settings manually. Manual configuration is only recommended for advanced users. Connect the blue Internet port of your BR-6288ACL V2 to the LAN port of your modem using an Ethernet cable, and then click “Next”.
  • Page 26 Please wait a moment while the BR-6288ACL V2 tests the connection. Click “Next” to continue and configure the device’s wireless network.
  • Page 27 Enter a name and password for your 2.4GHz & 5GHz wireless networks, then click “Next” to continue. A summary of your configuration will be displayed, as shown below. Check that all of the details are correct and then click “Next” to proceed. If you wish to backup the device’s settings, click “Backup this configuration”...
  • Page 28 Please wait while the BR-6288ACL V2 applies your settings.
  • Page 29 A final congratulations screen will indicate that setup is complete. You can now connect to the device’s new SSID(s) which are shown on the screen then close the browser window. The BR-6288ACL V2 is working and ready for use. Refer to IV-2. Connecting to a Wi-Fi network...
  • Page 30: Ii-4. Wireless Bridge Mode

    II-4. Wireless Bridge Mode Select “Wireless Bridge” from the top menu and click “Next”. Please ensure your BR-6288ACL V2 is within Wi-Fi range of your existing wireless router. Click “Next” to continue.
  • Page 31 Select the frequency (2.4GHz or 5GHz) of your existing wireless network. In wireless client mode, the BR-6288ACL V2 can only connect to one wireless network/frequency i.e. 2.4GHz or 5GHz. Select the Wi-Fi network name (SSID) which you wish to connect to and click “Next”...
  • Page 32 To connect to a hidden SSID, check the “Setup extender manually” box and enter the details manually on the next page, as shown below. Enter your existing wireless network’s security key/password in the “Security Key” field and click “Next” to continue.
  • Page 33 Wait a moment while the BR-6288ACL V2 tests the wireless connection. Select “Obtain an IP address automatically” or “Use the following IP address” for your BR-6288ACL V2. If you are using a static IP, enter the IP address, subnet mask and default gateway. Click “Next” to proceed to the next step.
  • Page 34 A summary of your configuration will be displayed, as shown below. Check that all of the details are correct and then click “Next” to proceed. If you wish to backup the BR-6288ACL V2’s settings, click “Backup this configuration” to open a new window and save your current...
  • Page 35 A final congratulations screen will indicate that setup is complete. Please close the browser window. The BR-6288ACL V2 is working and ready for use. You can now connect the BR-6288ACL V2 to your network device using an Ethernet cable and connect to your network as usual.
  • Page 36: Ii-5. Wisp Mode

    II-5. WISP Mode Select “WISP” from the top menu and click “Next”. Please ensure your BR-6288ACL V2 is within Wi-Fi range of your WISP network and click “Next” to continue.
  • Page 37 Select whether to use the iQ Setup wizard (recommended) to detect your Internet connection type, or enter the settings manually. Manual configuration is only recommended for advanced users. Select the wireless frequency (2.4GHz or 5GHz) of your WISP network.
  • Page 38 Select the WISP SSID which you wish to connect to and click “Next” to continue. If the Wi-Fi network you wish to connect to does not appear, try clicking “Refresh”. To connect to a hidden SSID, check the “Setup extender manually” box and enter the details manually on the next page, as shown below.
  • Page 39 Enter your existing wireless network’s security key/password in the “Security Key” field and click “Next” to continue. Wait a moment while the BR-6288ACL V2 tests the wireless connection.
  • Page 40 Click “Next” to continue your Internet service type configuration. Wait a moment while the BR-6288ACL V2 connects to the Internet.
  • Page 41 When the Internet is connected, click “Next” to configure your wireless network. Enter a name and password for your 2.4GHz & 5GHz wireless networks, then click “Next” to continue.
  • Page 42 A summary of your configuration will be displayed, as shown below. Check that all of the details are correct and then click “Next” to proceed. If you wish to backup the device’s settings, click “Backup this configuration” to open a new window and save your current configuration to a .txt file.
  • Page 43 A final congratulations screen will indicate that setup is complete. You can now connect to the device’s new SSID(s) which are shown on the screen then close the browser window. The BR-6288ACL V2 is working and ready for use. Refer to IV-2. Connecting to a Wi-Fi network...
  • Page 44: Ii-6. Wps Setup

    II-7. Reset to Factory Default Settings If you experience problems with your BR-6288ACL V2, you can reset the device back to its factory settings. This resets all settings back to default. Press and hold the WPS/Reset button found on the rear base of the product for at least 10 seconds.
  • Page 45: Iii. Browser Based Configuration Interface

    III. Browser Based Configuration Interface After you have setup the BR-6288ACL V2 as detailed in II. Installation or the included Quick Installation Guide, you can use the browser based configuration interface to configure advanced settings. Please ensure that your computer is set to use a dynamic IP address.
  • Page 46 You will arrive at the “Status” screen. Use the menu down the left side to navigate.
  • Page 47: Iii-2. Save Settings

    III-2. Save Settings After you configure any settings, click the “Save Settings” button at the bottom of the screen to save your changes. The device needs to restart in order to bring any changes into effect. Then, click “Click here to restart” in order to restart the device and bring the changes into effect.
  • Page 48: Iii-3. Main Menu

    III-3. Main Menu The main menu displays different options depending on your device’s operating mode. For Range Extender mode: WPS please refer to 2.4GHz Wireless &  5GHz Wireless Range Extender Access Point Wi-Fi Router Wireless Bridge WISP...
  • Page 49: Status

    III-3-1. Status The “Status” page displays basic system information about the device, arranged into categories. Screenshots displayed are examples.The information shown on your screen will vary depending on your configuration.
  • Page 50: Setup Wizard

    III-3-2. Setup Wizard You can run the setup wizard again to reconfigure the basic settings of the device, or you can run a wizard to help you switch the device to a different operating mode. Select “Setup Wizard” or “Switch to Router/Access Point/Range Extender/Wireless Bridge/WISP mode”...
  • Page 51 Follow the on-screen wizard to setup your device in a different mode. Refer to II. Installation Step 3 onwards for help if needed. If you don’t see the “Get Started” screen, try reconnecting to the edimax.setup SSID and go to http://edimax.setup in a web browser.
  • Page 52: Iii-3-3

    Enable or disable your WISP connection. SSID The name of the WISP network which your BR-6288ACL V2 is connected to. Manually enter an SSID if you wish or use “Site Survey” below. Site Survey Select wireless frequency and click “Show List” to open a new window and select your WISP network.
  • Page 53: Iii-3-3-1-1

    III-3-3-1. WAN Setup Select a Wide Area Network (WAN) connection mode and configure the settings. If you are unsure about your connection type, contact your ISP. In WISP mode, only Dynamic IP, Static IP & PPPoE are available for WAN Connection Mode. III-3-3-1-1.
  • Page 54 Host Name Enter the host name of your computer. MAC Address For some applications, you may need to designate a specific MAC address for the router. Please enter the MAC address here. If you are connecting the router to a computer, press “Clone Mac” to automatically enter your computer’s MAC address.
  • Page 55: Iii-3-3-1-2

    III-3-3-1-2. Static IP Select “Static IP” if your ISP provides Internet access via a fixed IP address. Your ISP will provide you with such information as IP address, subnet mask, gateway address, and DNS address. Fixed IP Address Input the IP address assigned by your ISP here. Subnet Mask Input the subnet mask assigned by your ISP here.
  • Page 56 (URL) DNS proxy server. Enable/Disable time to live (TTL) function which limits the lifespan of network data to improve performance.
  • Page 57: Iii-3-3-1-3

    III-3-3-1-3. PPPoE Select “PPPoE” if your ISP is providing you Internet access via PPPoE (Point-to-Point Protocol over Ethernet). User Name Enter the user name assigned by your ISP here. Password Enter the password assigned by your ISP here. MAC Address For some applications, you may need to designate a specific MAC address for the router.
  • Page 58 DNS Address Select “Obtain an IP address automatically” or “Use the following IP address”. Check with your ISP if you are unsure. DNS Address 1, 2 & 3 Enter the DNS address(es) assigned by your ISP here. DNS Proxy Enable or disable a DNS proxy server. DNS Proxy Rules When DNS proxy is enabled, enter the URL of a (URL)
  • Page 59: Iii-3-3-1-4. Pptp

    III-3-3-1-4. PPTP Select “PPTP” if your ISP is providing you Internet access via PPTP (Point-to-Point Tunneling Protocol). Then select “Obtain an IP address automatically” or “Use the following IP address” depending on your ISP.
  • Page 60 Host Name Enter the host name of your computer here If required. MAC Address For some applications, you may need to designate a specific MAC address for the router. Please enter the MAC address here. If you are connecting the router to a computer, press “Clone Mac”...
  • Page 61 Connection Type Specify a connection type: 1. “Continuous”: Connected all the time. 2. “Connect on Demand”: Connect when you initiate an Internet connection. 3. “Manual”: Connect/disconnect manually using the “Connect” and “Disconnect” buttons. Idle Time Out Specify the amount of time the router waits before shutting down an idle connection.
  • Page 62: Iii-3-3-1-5. L2Tp

    III-3-3-1-5. L2TP Select “L2TP” if your ISP is providing you Internet access via L2TP (Layer 2 Tunneling Protocol). Host Name Enter the host name of your computer here If required. MAC Address For some applications, you may need to designate a specific MAC address for the router.
  • Page 63 a computer, press “Clone Mac” to automatically enter your computer’s MAC address. Static IP Address Input the IP address assigned by your ISP here. Subnet Mask Input the subnet mask assigned by your ISP here. Default Gateway Input the default gateway assigned by your ISP here. Address Some ISPs may call this “Default Route”.
  • Page 64: Iii-3-3-2. Ddns

    III-3-3-2. DDNS Dynamic DNS (DDNS) is a service which provides a hostname-to-IP service for dynamic IP users. The changing nature of dynamic IPs means that it can be difficult to access a service provided by a dynamic IP user; a DDNS service though can map such dynamic IP addresses to a fixed hostname, for easier access.
  • Page 65 ZoneEdit http://www.zoneedit.com CyberGate http://cybergate.planex.co.jp/ddns/ NS2GO http://www.ns2go.com/ NO-IP http://www.noip.com/...
  • Page 66: Iii-3-4. Lan

    IP address instead of using the URL http://edimax.setup. IP Address Specify the IP address here. This IP address will be assigned to the BR-6288ACL V2 and will replace the default IP address. Subnet Mask Specify a subnet mask. The default value is 255.255.255.0...
  • Page 67 Your device’s DHCP server automatically assigns IP addresses to computers on its network, between a defined range of numbers. Start IP Enter the start IP address for the DHCP server’s IP address leases. End IP Enter the end IP address for the DHCP server’s IP address leases.
  • Page 68 The LAN IP page will be displayed as below when your device is set to access point mode. You can set theBR-6288ACL V2 to obtain an IP address automatically or you can specify an IP address.
  • Page 69: Iii-3-5

    III-3-5. 2.4GHz Wireless & 5GHz Wireless The “2.4GHz Wireless” & “5GHz Wireless” menu allows you to configure SSID and security settings for your Wi-Fi network along with a guest Wi-Fi network. WPS, access control and scheduling functions can also be managed from here.
  • Page 70 Bridge-WDS” for the device to function in WDS mode (see below). Band Displays the wireless standard used for the BR-6288ACL V2’s “2.4GHz (B+G+N)” means that 802.11b, 802.11g, and 802.11n wireless clients can connect to the BR-6288ACL V2. Wireless Network This is the name of your Wi-Fi network for Name (SSID) identification, also sometimes referred to as “SSID”.
  • Page 71 information about wireless clients. Please disable any pop-up blockers if you have difficulty using this function. AP Bridge-WDS: Wireless Distribution System (WDS) can bridge/repeat access points together in an extended network. WDS settings can be configured as shown below. When using WDS, configure the IP address of each access point to be in the same subnet and ensure there is only one active DHCP server among connected access points, preferably on the WAN side.
  • Page 72 Wireless Security: Select an encryption type from the drop-down menu: “WPA Pre-shared Key” is the recommended and most secure encryption type. In WISP mode, WPA RADIUS is unavailable for the wireless band that is used to connect to WISP’s AP.
  • Page 73: Iii-3-5-1-1

    III-3-5-1-1. Disable Encryption is disabled and no password/key is required to connect to the BR-6288ACL V2. Disabling wireless encryption is not recommended. When disabled, anybody within range can connect to your device’s SSID. Enable 802.1x Check the box to enable the 802.1x authentication.
  • Page 74: Iii-3-5-1-2. Wep

    III-3-5-1-2. WEP (Wired Equivalent Privacy) is a basic encryption type. For a higher level of security consider using WPA encryption. Key Length Select 64-bit or 128-bit. 128-bit is more secure than 64-bit. Key Format Choose from “ASCII” (any alphanumerical character 0-9, a-z and A-Z) or “Hex” (any characters from 0-9, a-f and A-F).
  • Page 75: Iii-3-5-1-3

    III-3-5-1-3. WPA Pre-Shared Key WPA pre-shared key is the recommended and most secure encryption type. WPA Unicast Select from WPA (TKIP), WPA2 (AES) or WPA2 Cipher Suite Mixed. WPA2 (AES) is safer than WPA (TKIP), but not supported by all wireless clients. Please make sure your wireless client supports your selection.
  • Page 76: Iii-3-5-1-4

    III-3-5-1-4. WPA Radius WPA RADIUS is a combination of WPA encryption and RADIUS user authentication. If you have a RADIUS authentication server, you can authenticate the identity of every wireless client against a user database. WPA Unicast Select from WPA (TKIP), WPA2 (AES) or WPA2 Cipher Suite Mixed.
  • Page 77: Guest/ Multiple Ssid

    “Basic” menu. In access point mode, the “Guest” feature in the menu is replaced by “Multiple SSID”. The BR-6288ACL V2 supports up to four additional SSIDs for each wireless band in access point mode. Enable Guest SSID Check/uncheck the box to enable/disable the guest Wi-Fi network.
  • Page 78 MULTIPLE SSID: The BR-6288ACL V2 supports up to four additional SSIDs for each wireless band in access point mode. Once configured, these SSIDs are displayed in the “Multiple SSID Status” table as shown below. Use the “Multiple SSID Basic Settings”...
  • Page 79 Check the box to enable wireless clients isolation. Clients Isolation This prevents wireless clients connected to the BR-6288ACL V2 from communicating with each other and improves security. Typically, this function is useful for corporate environments or public hot spots and can prevent brute force attacks on clients’...
  • Page 80: Iii-3-5-3. Wps

    III-3-5-3. WPS Wi-Fi Protected Setup is a simple way to establish connections between WPS compatible devices. WPS can be activated on compatible devices by pushing a WPS button on the device or from within the device’s firmware/configuration interface. When WPS is activated in the correct manner and at the correct time for two compatible devices, they will automatically connect.
  • Page 81: Access Control

    This function allows you to define a list of network devices permitted to connect to the BR-6288ACL V2. Devices are each identified by their unique MAC address. If a device which is not on the list of permitted MAC addresses attempts to connect to the BR-6288ACL V2, it will be denied.
  • Page 82 MAC address Select a PC name from the drop-down list and click “>>” to add enter it into the blank field to the right. Click “Refresh’ in the drop-down menu to refresh the list of available MAC addresses. If the address you wish to add is not listed, enter it manually.
  • Page 83: Schedule

    Check/uncheck the box “Enable Schedule Settings” to enable/disable the wireless on/off scheduling function. The BR-6288ACL V2 must remain connected to the Internet and use an NTP server for the schedule feature to function correctly. Wireless scheduling can save energy and increase the security of your network.
  • Page 84 Add the schedule to the table of active schedules. Active schedules will be displayed in the table as shown below. Select an entry using the “Select” checkbox. Delete Selected / Delete selected or all entries from the table. Delete All...
  • Page 85: Firewall

    III-3-6. Firewall The “Firewall” menu provides access to URL blocking, access control, DMZ and DoS functions to improve the security of your wireless network. SPI firewall Enable or disable the Stateful Packet Inspection (SPI) firewall. III-3-6-1. URL Blocking This function can block Internet access by either specific URLs or keywords. Check/uncheck the “Enable URL Blocking”...
  • Page 86 URL/Keyword Enter the URL or keyword to be blocked. Add the URL or keyword to the blocked table. Blocked URLs/keywords entries will be listed in the table as shown below. Select an entry using the “Select” checkbox. Delete Selected / Delete selected or all entries from the table.
  • Page 87: Access Control

    This function allows you to define a list of network devices permitted or denied to connect to the BR-6288ACL V2. Devices are each identified by their unique MAC address or IP address. Specific services can also be allowed/denied for IP addresses.
  • Page 88 MAC Filtering: Enable MAC Filtering Check the box to enable MAC filtering and select whether to “Deny” or “Allow” access for specified MAC address. Client PC MAC Enter a MAC address of computer or network Address device manually without dashes or colons e.g. for MAC address ‘aa-bb-cc-dd-ee-ff’...
  • Page 89 IP Filtering: Enable IP Filtering Check the box to enable IP filtering and select whether to “Deny” or “Allow” access for specified IP address. Add PC Opens a new window to add a new IP to the list, to deny or allow access/services according to above.
  • Page 90 Enter a description for reference/identification of Client PC Description up to 16 alphanumeric characters. Client PC IP address Enter a starting IP address in the left field and the end IP address in the right field to define a range of IP addresses;...
  • Page 91: Iii-3-6-3. Dmz

    III-3-6-3. DMZ A Demilitarized Zone (DMZ) is an isolated area in your local network where private IP addresses are mapped to specified Internet IP addresses, allowing unrestricted access to the private IP addresses but not to the wider local network. You can define a virtual DMZ host here.
  • Page 92: Iii-3-6-4. Dos

    to enter its IP address into the “Client PC” field (above). Click “Add” to add the client to the “Current DMZ Table”. DMZ entries will be displayed in the table shown below: Delete Selected / Delete selected or all entries from the table. Delete All III-3-6-4.
  • Page 93 Ping of Death Specify the frequency of ping of death packets which will trigger the router’s DoS protection function. Discard Ping from Check this box and the router will not answer ping requests from the Internet. Port Scan Intruders use “port scanners” to detect open Internet IP address ports.
  • Page 94: Qos (Quality Of Service)

    QoS allows you to ensure that sufficient bandwidth is available. Minimum or maximum bandwidth can be guaranteed for a specified application. BR-6288ACL V2 QoS can improve the ’s performance. QoS is recommended to optimize performance for online gaming.
  • Page 95 Rule Name Enter a name for the QoS rule for reference/identification. Bandwidth Set the bandwidth limits for the QoS rule: 1. Select “Download” or “Upload” for the QoS rule. 2. Enter the bandwidth limit. 3. Select whether the bandwidth is a “Guarantee”...
  • Page 96 Local Port Range Enter the port range to activate the QoS rule. Enter a single port number e.g. 110 or a range of port numbers e.g. 110-120 Remote IP Address Enter the remote IP address range which will activate the QoS rule. Enter a starting IP address in the left field and the end IP address in the right field to define a range of IP addresses;...
  • Page 97: Iii-3-7-2. Iqos

    III-3-7-2. iQoS iQoS is a more intuitive and automated tool to manage internet bandwidth than manually configuring the settings using QoS. For online gamers or users with bandwidth requirements for audio/video, iQoS is a useful function. iQoS cannot be used in conjunction with QoS and vice-versa. When one is enabled, the other is automatically disabled.
  • Page 98 The icons represent the following categories: Internet Browsing P2P/BT Downloads Multimedia Online Gaming The iQoS table is ordered left to right, high to low priority. Click a small icon below the table to insert it into the table, and click a large icon in the table to remove it.
  • Page 99: Advanced

    III-3-8. Advanced Advanced features of the BR-6288ACL V2 can be configured from the “Advanced” menu. III-3-8-1. Static Routing Static routing is a method of configuring path selection of routers, characterized by the absence of communication between routers regarding the current topology of the network. The opposite of static routing is dynamic routing, sometimes also referred to as adaptive routing.
  • Page 100: Port Forwarding

    Default Gateway Enter the default gateway of the destination network. Hop Count Enter the hop count (the distance between destination network and this broadband router) here. Interface Enter the interface which leads to destination network. Add the route to the current static routing table. Static Routing Table entries will be displayed in the table shown below: Delete Selected/ Delete selected or all entries from the table.
  • Page 101 Private IP Enter the IP address of the computer on the local network. Computer Name Windows computers on the local network will be listed here – select a computer from the list and click << to automatically add the IP address to the “Private IP”...
  • Page 102: Virtual Server

    III-3-8-3. Virtual Server This function allows you to set up an internet service on a local computer, without exposing the local computer to the internet. You can also build various sets of port redirection, to provide various internet services on different local computers via a single internet IP address.
  • Page 103: Ghz Wireless

    Delete Selected/ Delete selected or all entries from the table. Delete All III-3-8-4. 2.4GHz Wireless These settings are for experienced users only. Please do not change any of the values on this page unless you are already familiar with these functions. Fragment Threshold Set the Fragment threshold of the wireless radio.
  • Page 104 Channel Width Select wireless channel width (bandwidth used by wireless signals from the device) – the recommended value is Auto 20/40MHz. Preamble Type Set the wireless radio preamble type. The default value is “Short Preamble”. CTS Protect Enabling this setting will reduce the chance of radio signal collisions between 802.11b and 802.11g wireless access points.
  • Page 105: 5Ghz Wireless

    III-3-8-5. 5GHz Wireless These settings are for experienced users only. Please do not change any of the values on this page unless you are already familiar with these functions. Fragment Set the Fragment threshold of the wireless radio. The Threshold default value is 2346.
  • Page 106 Channel Width Select wireless channel width (bandwidth used by wireless signals from the device) – the recommended value is 20/40/80MHz. Preamble Type Set the wireless radio preamble type. The default value is “Short Preamble”. CTS Protect Enabling this setting will reduce the chance of radio signal collisions between 802.11b and 802.11g wireless access points.
  • Page 107: Iii-3-8-6. Igmp

    III-3-8-6. IGMP IGMP is a communications protocol used to establish multicast group memberships. It allows for a more efficient use of resources and better performance for applications such as IPTV video streaming. IGMP Snooping IGMP snooping monitors traffic between hosts and multicast routers to facilitate bandwidth conservation.
  • Page 108: Administration

    III-3-9. Administration Various administrative functions can be accessed from the “Administration” menu. III-3-9-1. Time Zone Set Time Zone Select the time zone of your country or region. Time Server Address The travel router supports NTP (Network Time Protocol) for automatic time and date setup.
  • Page 109: Password

    III-3-9-2. Password You can change the password used to login to the browser-based configuration interface here. It is advised to do so for security purposes. Please make a note of the new password. In the event that you forget the password and are unable to login to the browser based configuration interface, see II-7.
  • Page 110: Remote Access

    III-3-9-3. Remote Access Check “Enabled” to enable the remote access feature and then enter the appropriate values. Host IP Address Specify the IP address which is allowed remote access. Port Specify a port number used for remote ac cess.
  • Page 111: Backup/Restore

    III-3-9-5. Upgrade The upgrade page allows you to upgrade the system firmware to a more recent version. You can download the latest firmware from the Edimax website. After the upgrade, the system will restart. Do not switch off or disconnect the device during a firmware upgrade, as this could damage the device.
  • Page 112: Restart

    III-3-9-6. Restart In the event that the router malfunctions or is not responding, then it is recommended that you restart the device. III-3-9-7. Logs You can view the system log and security log here. Use the drop down menu in the top-right corner to select which log to view.
  • Page 113: Active Dhcp Client

    Save Click “Save” to save the log on your computer as .txt file. Clear Click “Clear” to clear/erase the existing log. Refresh Click “Refresh” to refresh the log and update any activity. III-3-9-8. Active DHCP Client Information about active DHCP clients is shown in the table, which displays the DHCP server assigned IP address, MAC address and time expired for each computer or device on the local network.
  • Page 114: Iv. Appendix

    IV. Appendix IV-1. Configuring your IP address For first time access to the URL http://edimax.setup please ensure your computer is set to use a dynamic IP address. This means your computer can obtain an IP address automatically from a DHCP server. You can check if your computer is set to use a dynamic IP address by following IV-1-1.
  • Page 115: Iv-1-1. How To Check That Your Computer Uses A Dynamic Ip Address

    IV-1-1. How to check that your computer uses a dynamic IP address Please follow the instructions appropriate for your operating system. IV-1-1-1. Windows Vista Click the “Start” button (it should be located in the lower-left corner of your computer), then click “Control Panel”. Click “View Network Status and Tasks”, then click “Manage Network Connections”.
  • Page 117: Iv-1-1-2. Windows 7

    IV-1-1-2. Windows 7 Click the “Start” button (it should be located in the lower-left corner of your computer), then click “Control Panel”. Under “Network and Internet” click “View network status and tasks”.
  • Page 118 Click “Local Area Connection”. Click “Properties”. Select “Internet Protocol Version 4 (TCP/IPv4) and then click “Properties”.
  • Page 119 Select “Obtain an IP address automatically” and “Obtain DNS server address automatically” should be selected.
  • Page 120: Iv-1-1-3. Windows 8

    IV-1-1-3. Windows 8 From the Windows 8 Start screen, you need to switch to desktop mode. Move your curser to the bottom left of the screen and click. In desktop mode, click the File Explorer icon in the bottom left of the screen, as shown below.
  • Page 121 Right click “Network” and then select “Properties”. In the window that opens, select “Change adapter settings” from the left side.
  • Page 122 Choose your connection and right click, then select “Properties”. Select “Internet Protocol Version 4 (TCP/IPv4) and then click “Properties”.
  • Page 123 Select “Obtain an IP address automatically” and “Obtain DNS server address automatically” should be selected.
  • Page 124: Iv-1-1-4. Mac Os

    IV-1-1-4. Mac OS Have your Mac computer operate as usual, and click on “System Preferences”. In System Preferences, click on “Network”. Click on “Wi-Fi” in the left panel and then click “Advanced” in the lower right corner.
  • Page 125 Select “TCP/IP” from the top menu and “Using DHCP” in the drop down menu labeled “Configure IPv4” should be selected.
  • Page 126: Iv-1-2. How To Modify The Ip Address Of Your Computer

    IV-1-2. How to modify the IP address of your computer Please follow the instructions appropriate for your operating system. In the following examples we use the IP address 192.168.2.10 though you can use any IP address in the range 192.168.2.x (x = 3 – 254) in order to access iQ Setup/browser based configuration interface.
  • Page 127 Your existing static IP address will be displayed in the “IP address” field before you replace it. Please make a note of this IP address, subnet mask, default gateway and DNS server addresses. IP address: 192.168.2.10 Subnet Mask: 255.255.255.0 Preferred DNS Server: 192.168.2.1 Click ‘OK’...
  • Page 128: Iv-1-2-2. Windows 7

    IV-1-2-2. Windows 7 Click the “Start” button (it should be located in the lower-left corner of your computer), then click “Control Panel”. Under “Network and Internet” click “View network status and tasks”.
  • Page 129 Click “Local Area Connection”. Click “Properties”.
  • Page 130 Select “Internet Protocol Version 4 (TCP/IPv4) and then click “Properties”. Select “Use the following IP address” and “Use the following DNS server addresses”, then input the following values: Your existing static IP address will be displayed in the “IP address” field before you replace it. Please make a note of this IP address, subnet mask, default gateway and DNS server addresses.
  • Page 131: Iv-1-2-3. Windows 8

    IV-1-2-3. Windows 8 From the Windows 8 Start screen, you need to switch to desktop mode. Move your curser to the bottom left of the screen and click. In desktop mode, click the File Explorer icon in the bottom left of the screen, as shown below.
  • Page 132 Right click “Network” and then select “Properties”. In the window that opens, select “Change adapter settings” from the left side.
  • Page 133 Choose your connection and right click, then select “Properties”. Select “Internet Protocol Version 4 (TCP/IPv4) and then click “Properties”.
  • Page 134 Select “Use the following IP address” and “Use the following DNS server addresses”, then input the following values: Your existing static IP address will be displayed in the “IP address” field before you replace it. Please make a note of this IP address, subnet mask, default gateway and DNS server addresses.
  • Page 135: Iv-1-2-4. Mac

    IV-1-2-4. Mac Have your Mac computer operate as usual, and click on “System Preferences”. In System Preferences, click on “Network”. Click on “Wi-Fi” in the left panel and then click “Advanced” in the lower right corner. Select “TCP/IP” from the top menu and select “Manually” from the drop down menu labeled “Configure IPv4”, then click “OK”.
  • Page 136 Your existing static IP address will be displayed in the “IP address” field before you replace it. Please make a note of this IP address, subnet mask, default gateway and DNS server addresses. In the “IPv4 Address” and “Subnet Mask” field enter IP address 192.168.2.10 and subnet mask 255.255.255.0.
  • Page 137 Click “Apply” to save the changes.
  • Page 138: Iv-1-3. How To Find Your Network Security Key

    IV-1-3. How to Find Your Network Security Key To find your network security key, please follow the instructions appropriate for your operating system. IV-1-3-1. Windows 7 & Vista Open “Control Panel” and click on “Network and Internet” in the top menu.
  • Page 139 You should see the profile of your Wi-Fi network in the list. Right click on your Wi-Fi network and then click on “Properties”. Click on the “Security” tab, and then check the box labeled “Show characters”. This will show your network security key. Click the “Cancel” button to close the window.
  • Page 140: Iv-1-3-2. Mac

    IV-1-3-2. Mac Open a new Finder window, and select “Applications” from the menu on the left side. Open the folder labeled “Utilities” and then open the application “Keychain Access”. Select “Passwords” from the sub-menu labeled “Category” on the left side, as shown below. Then search the list in the main panel for the SSID of your network.
  • Page 141 Double click the SSID of your network and you will see the following window. Check the box labeled “Show password” and you will be asked to enter your administrative password, which you use to log into your Mac. Enter your password and click “Allow”.
  • Page 142 Your network security password will now be displayed in the field next to the box labeled “Show password”. In the example below, the network security password is “edimax1234”. Please make a note of your network security password.
  • Page 143: Iv-1-4. How To Find Your Router's Ip Address

    IV-1-4. How to Find Your Router’s IP Address To find your router’s IP address, please follow the instructions appropriate for your operating system. IV-1-4-1. Windows Vista & 7 Go to “Start”, select “Run” and type “cmd”, then press Enter or click “OK”. A new window will open, type “ipconfig”...
  • Page 144 Your router’s IP address will be displayed next to “Default Gateway”.
  • Page 145: Iv-1-4-2. Windows 8

    IV-1-4-2. Windows 8 From the Windows 8 Start screen, move your curser to the top right corner of the screen to display the Charms bar. Click “Search” and enter “cmd” into the search bar. Click the “Command Prompt” app which be displayed on the left side.
  • Page 146 A new window will open, type “ipconfig” and press Enter.
  • Page 147 Your router’s IP address will be displayed next to “Default Gateway”.
  • Page 148: Iv-1-4-3. Mac

    IV-1-4-3. Mac Launch “System Preferences” and click on “Network”. If you are using an Ethernet cable to connect to your network, your router’s IP address will be displayed next to “Router”. If you are using Wi-Fi, click “Wi-Fi” in the left panel, and then “Advanced” in the bottom right corner.
  • Page 149 Click the “TCP/IP” tab and your router’s IP address will be displayed next to “Router”.
  • Page 150: Iv-2. Connecting To A Wi-Fi Network

    , or ) in the system tray and select “Connect to a network”. Search for the SSID of your BR-6288ACL V2 and then click “Connect”. If you set a password for your network, you will then be prompted to enter it.
  • Page 151 After correctly entering your password, you will be successfully connected to the BR-6288ACL V2’s wireless network.
  • Page 152: Iv-3. Troubleshooting

    2. In range extender mode, if my BR-6288ACL V2 is set up as a dual-band extender, what happens when I connect a wired Ethernet client? a.
  • Page 153 Wi-Fi network name Enter the SSID (network name) of your existing, hidden network. Range extender SSID Enter an SSID for the BR-6288ACL V2 or leave it blank to use a default which consists of your existing router’s SSID (above) +"_2EX". Encryption Select and enter the encryption information for your existing, hidden network.
  • Page 154 BR-6288ACL V2. If you are too far away from your existing router, then it is difficult for the BR-6288ACL V2 to receive a wireless signal.
  • Page 155 Click “Browse” to locate the firmware file on your computer and then click “Upload” to upload the new firmware. It may take several minutes to complete, please wait and follow the instructions on screen.
  • Page 156: Glossary

    V. Glossary Default Gateway (Wireless bridge): Every non-access point IP device needs to configure a default gateway’s IP address. When the device sends out an IP packet, if the destination is not on the same network, the device has to send the packet to its default gateway, which will then send it out towards the destination.
  • Page 157 A network mask is also a 32-bit binary pattern, and consists of consecutive leading 1’s followed by consecutive trailing 0’s, such as 11111111.11111111.11111111.00000000. Therefore sometimes a network mask can also be described simply as “x” number of leading 1’s. When both are represented side by side in their binary forms, all bits in the IP address that correspond to 1’s in the network mask become part of the IP network address, and the remaining bits correspond to the host ID.
  • Page 158 Port: Network Clients (LAN PC) uses port numbers to distinguish one network application/protocol over another. Below is a list of common applications and protocol/port numbers: Application Protocol Port Number Telnet SMTP POP3 H.323 1720 SNMP SNMP Trap HTTP PPTP 1723 PC Anywhere TCP 5631 PC Anywhere UDP...
  • Page 159 Web-based management Graphical User Interface (GUI): Many devices support a graphical user interface that is based on the web browser. This means the user can use the familiar Netscape or Microsoft Internet Explorer to Control/configure or monitor the device being managed.
  • Page 160 COPYRIGHT Copyright  Edimax Technology Co., Ltd. all rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise, without the prior written permission from Edimax Technology Co., Ltd.
  • Page 161 18.35 dBm 5150-5250 18.72 dBm A simplified DoC shall be provided as follows: Article 10(9) Hereby, Edimax Technology Co., Ltd. declares that the radio equipment type AC600 Multi-Function Dual-Band Wi-Fi Extender is in compliance with Directive 2014/53/EU The full text of the EU declaration of conformity is available at the following internet address: http://www.edimax.com/edimax/global/...
  • Page 162 EU Declaration of Conformity English: This equipment is in compliance with the essential requirements and other relevant provisions of Directive 2014/53/EU, 2014/35/EU. Français: Cet équipement est conforme aux exigences essentielles et autres dispositions de la directive 2014/53/EU, 2014/35/EU. Čeština: Toto zařízení je v souladu se základními požadavky a ostatními příslušnými ustanoveními směrnic 2014/53/EU, 2014/35/EU.
  • Page 163: Declaration Of Conformity

    Declaration of Conformity We, Edimax Technology Co., Ltd., declare under our sole responsibility, that the equipment described below complies with the requirements of the European Radio Equipment directives. Equipment: AC600 Multi-Function Dual-Band Wi-Fi Extender Model No.: BR-6288ACL V2 The following European standards for essential requirements have been followed:...
  • Page 164 Notice According to GNU General Public License Version 2 This product includes software that is subject to the GNU General Public License version 2. The program is free software and distributed without any warranty of the author. We offer, valid for at least three years, to give you, for a charge no more than the costs of physically performing source distribution, a complete machine-readable copy of the corresponding source code.
  • Page 165 intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.
  • Page 166 Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it. 6.

Table of Contents