Download Print this page

AmbiCom WL250-KIT User Manual

Ambicom wireless-n broadband router user's manual

Advertisement

Quick Links

Copyright ©2008/2009 by AmbiCom, Inc. All rights reserved. No part of this publication may be reproduced, transmitted,
transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means,
electronic, mechanical, magnetic, optical, chemical, manual or otherwise, without the prior written permission of AmbiCom, Inc.
AmbiCom, Inc makes no representations or warranties, either expressed or implied, with respect to the contents hereof and
specifically disclaims any warranties, merchantability or fitness for any particular purpose. Any software described in this
manual is sold or licensed "as is". Should the programs prove defective following their purchase, the buyer (and not this
company, its distributor, or its dealer) assumes the entire cost of all necessary servicing, repair, and any incidental or
consequential damages resulting from any defect in the software. Further, AmbiCom, Inc reserves the right to revise this
publication and to make changes from time to time in the contents thereof without obligation to notify any person of such
revision or changes.
AmbiCom Wireless-N Broadband Router
AmbiCom Wireless-N Broadband Router Kit
Model:
WL250N-AR
WL250-KIT
User's Manual
Version: 1.0
(November, 2008)
COPYRIGHT

Advertisement

loading
Need help?

Need help?

Do you have a question about the WL250-KIT and is the answer not in the manual?

Questions and answers

Summary of Contents for AmbiCom WL250-KIT

  • Page 1 AmbiCom, Inc. AmbiCom, Inc makes no representations or warranties, either expressed or implied, with respect to the contents hereof and specifically disclaims any warranties, merchantability or fitness for any particular purpose. Any software described in this manual is sold or licensed "as is".
  • Page 2 FCC Part 15 This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
  • Page 3 R&TTE Compliance Statement This equipment complies with all the requirements of DIRECTIVE 1999/5/EC OF THE EUROPEAN PARLIAMENT AND THE COUNCIL of March 9, 1999 on radio equipment and telecommunication terminal Equipment and the mutual recognition of their conformity (R&TTE). The R&TTE Directive repeals and replaces in the directive 98/13/EEC (Telecommunications Terminal Equipment and Satellite Earth Station Equipment) As of April 8, 2000.
  • Page 4 1-1 Introduction And Safety Information 1-2 Safety Information 1-3 System Requirements 1-4 Package Contents 1-5 Familiar With Your New Wireless Broadband Router 2-1 Connecting Your Devices 2-2 Connecting To Wireless Broadband Router By Web Browser 2-2-1 Windows 95/98/Me IP Address Setup 2-2-2 Windows 2000 IP Address Setup 2-2-3 Windows XP IP Address Setup 2-2-4 Windows Vista IP Address Setup...
  • Page 5 2-7 Wireless LAN Configurations 2-7-1 Basic Wireless Settings 2-7-1-1 Setup Procedures For ‘AP' 2-7-1-2 Setup Procedures For ‘Station-Infrastructure' 2-7-1-3 Setup Procedures For ‘AP Bridge - Point to Point’ 2-7-1-4 Setup Procedures For ‘AP Bridge - Point to Multi Point’ 2-7-1-5 Setup Procedures For ‘AP Bridge - WDS’ 2-7-1-6 Setup Procedures For ‘Universal Repeater' 2-7-2 Advanced Wireless Settings 2-7-3 Wireless Security...
  • Page 6 3-4-5 Active DHCP Client List 3-4-6 Statistics 3-5 Configuration Backup And Restore 3-6 Firmware Upgrade 3-7 System Reset 4-1 Hardware Specification 4-2 Troubleshooting 4-3 Glossary CHAPTER IV: APPENDIX...
  • Page 7: Chapter I: Product Information

    CHAPTER I: PRODUCT INFORMATION 1-1 Introduction And Safety Information Thank you for purchasing this wireless broadband router! This high cost-efficiency router is the best choice for Small office / Home office users, all computers and network devices can share a single xDSL / cable modem Internet connection at high speed.
  • Page 8 □ CD-Rom for user manual and other wireless product drivers (1 pcs) □ A/C power adapter (1 pcs) □ Broadband router stand (1 pcs) If you have purchase this router as part of the Wireless-N Kit, you will also receive… □ AmbiCom Wireless-N USB Dongle (1 pcs)
  • Page 9 1-5 Familiar With Your New Wireless Broadband Router Front Panel LED Name Light Status Description POWER Router is switched on and correctly powered. Wireless WPS function is enabled. WLAN Wireless network is switched off. Flashing Wireless LAN activity (transferring or receiving data). WAN port is connected.
  • Page 10 CHAPT ER II: SYSTEM AND NETWORK SETUP 2-1 Connecting Your Devices Follow the instructions here to connect your computer and other devices to your new wireless router. 1. Connect your xDSL / cable modem to the WAN port of router by using an Ethernet cable. 2.
  • Page 11 2-2-4 Windows Vista IP address setup: Click the ‘Start’ button (it should be located at lower-left corner of your computer), then click control panel. Click View Network Status and Tasks, and then click Manage Network Connections. Right-click Local Area Network, then select ‘Properties’.
  • Page 12 Connect to the router’s management interface by using a web browser After your computer obtained an IP address from the router, please start your web browser, and input the ’Default Gateway’ IP address in address bar. The following message should be shown: Please input user name and password in the field respectively, default user name is ‘admin’, and default password is ‘1234’, then press the ‘OK’...
  • Page 13 2-3 Using ‘Quick Setup’ This router provides a ‘Quick Setup’ procedure, which will help you to complete all required settings you need to access the Internet in very short time. HERE! And the following message will be displayed: 1. Set Time Zone Set Time Zone (1): Choose your time zone by clicking on the Time Server Address (2):...
  • Page 14 2. Broadband Type Please choose the broadband (Internet connection) type you’re using. There are six types of Internet connection, they are: NOTE: Some service providers use ‘DHCP’ (Dynamic Host Configuration Protocol) to assign IP address to you. In this case, you can choose ‘Cable Modem’ as Internet connection type; even you’re using another connection type, like xDSL.
  • Page 15 2-3-1 Setup Procedures For ‘Cable Modem’: Host Name (1): Please input the host name of your computer, this is optional, and only required if your service provider asks you to do so. MAC address (2): If your service provider only permits computer with certain MAC address to access internet, please input MAC address of your computer here.
  • Page 16 2-3-2 Setup Procedures For ‘Fixed-IP xDSL’: IP address assigned by your Service Provider (1): Subnet Mask (2): DNS address (3): Service Provider Gateway Address (4): Note: You must use the addresses provided by your Internet service provider, wrong setting value will cause connection problem.
  • Page 17 2-3-3 Setup Procedures For ‘PPPoE xDSL’: User Name (1): Please input user name assigned by your Internet service provider here. Password (2): Please input the password assigned by your Internet service provider here. Service Name (3): Please give a name to this Internet service. (Optional) MTU (4): Please input the MTU value of your network connection here.
  • Page 18 2-3-4 Setup Procedures For ‘PPTP xDSL’: PPTP xDSL requires two kinds of setting: WAN interface setting (setup IP address) and PPTP setting (PPTP user name and password). Select the type of how you obtain IP address from your service provider here. You can choose ‘Obtain an IP address automatically’...
  • Page 19 3. Manual: Only connects to Internet when ‘Connect’ button on this page is pressed, and disconnects when ‘Disconnect button is pressed. Idle Time Out (8): Please input idle time out. Specify the time to shutdown Internet connects after no internet activity is detected by minute. This option is only available when connection type is ‘Connect on Demand’.
  • Page 20 2-3-5 Setup Procedures For ‘L2TP xDSL’: L2TP xDSL requires two kinds of setting: WAN interface setting (setup IP address) and L2TP setting (L2TP user name and password). Select the type of how you obtain IP address from your service provider here. You can choose ‘Obtain an IP address automatically’...
  • Page 21 Specify the time to shutdown Internet connects after no internet activity is detected by minute. This option is only available when connection type is ‘Connect on Demand’. When all settings are finished, you’ll see the following message displayed on your web browser: Please click ‘Apply’...
  • Page 22 2-3-6 Setup Procedures For ‘Telstra Big Pond’: This setting only works when you’re using Telstra big pond’s network service in Australia. User Name (1): Password (2): User device login server manually (3): Login Server (4): When all settings are finished, you’ll see the following message displayed on your web browser: Please click ‘Apply’...
  • Page 23 2-4 Basic Setup Click ‘General Setup’ button on the left, or click ‘General Setup’ link at the upper-right corner of web management interface. HERE! 2-4-1 Time Zone And Time Auto-Synchronization Please click ‘System’ menu on the left of web management interface, then click ‘Time Zone’, and the following message will be displayed on your web browser: Please select time zone at ‘Set time zone’...
  • Page 24 2-4-2 Changing The Management Password Default password of this router is 1234, and it’s displayed on the login prompt when accessed from web browser. There’s a security risk if you don’t change the default password, since everyone can see it. This is very important when you have wireless function enabled.
  • Page 25 If the current and new passwords are correctly entered, after you click ‘Apply’, you’ll be prompted to input your new password again to login: Please use new password to enter web management interface again, and you should be able to login with new password. 2-4-3 Remote Management This router does not allow management access from Internet, to prevent possible security risks (especially when you defined a weak password, or didn’t change default password).
  • Page 26 When you finish with all settings, click ‘Apply’, and you’ll see the following message displayed on web browser: Press ‘Continue’ to save the settings made and back to web management interface; press ‘Apply’ to save the settings made and restart the router so the settings will take effect after it reboots. NOTE: When you want to manage this router from another computer on Internet, you have to input the IP address and port number of this router.
  • Page 27 2-5 Setup Internet Connection (WAN Setup) Internet connections setup can be done by using ‘Quick Setup’ menu described in chapter 2-3. However, you can setup WAN connections up by using WAN configuration menu. You can also set advanced functions like DDNS (Dynamic DNS) here. Please click ‘WAN’...
  • Page 28 2-5-1 Setup Procedures For ‘Dynamic IP’: Host Name (1): Please input the host name of your computer, this is optional, and only required if your service provider asks you to do so. MAC address (2): If your service provider only permits computer with certain MAC address to access internet, please input MAC address of your computer here.
  • Page 29 2-5-2 Setup Procedures For ‘Static IP’: IP address assigned by your Service Provider (1): Subnet Mask (2): Service Provider Gateway Address (3): After you finish with all settings, please click ‘Apply’, the following message will be displayed on your web browser: Please click ‘Continue’...
  • Page 30 2-5-3 Setup Procedures For ‘PPPoE’: User Name (1): Please input user name assigned by your Internet service provider here. Password (2): Please input the password assigned by your Internet service provider here. Service Name (3): Please give a name to this Internet service. (Optional) MTU (4): Please input the MTU value of your network connection here.
  • Page 31 2-5-4 Setup Procedures For ‘PPTP’: PPTP requires two kinds of setting: WAN interface setting (setup IP address) and PPTP setting (PPTP user name and password). Select the type of how you obtain IP address from your service provider here. You can choose ‘Obtain an IP address automatically’...
  • Page 32 5. Connect on Demand: Only connects to Internet when there’s a connect attempt 6. Manual: Only connects to Internet when ‘Connect’ button on this page is pressed, and disconnects when ‘Disconnect button is pressed. Idle Time Out (8): Please input idle time out. Specify the time to shutdown Internet connects after no internet activity is detected by minute.
  • Page 33 2-5-5 Setup Procedures For ‘L2TP’: L2TP requires two kinds of setting: WAN interface setting (setup IP address) and L2TP setting (L2TP user name and password). Select the type of how you obtain IP address from your service provider here. You can choose ‘Obtain an IP address automatically’...
  • Page 34 Specify the time to shutdown Internet connects after no internet activity is detected by minute. This option is only available when connection type is ‘Connect on Demand’. When all settings are finished, you’ll see the following message displayed on your web browser: Please click ‘Apply’...
  • Page 35 2-5-6 Setup Procedures For ‘Telstra Big Pond’: This setting only works when you’re using Telstra big pond’s network service in Australia. User Name (1): Password (2): User device login server manually (3): Login Server (4): When all settings are finished, you’ll see the following message displayed on your web browser: Please click ‘Apply’...
  • Page 36 2-5-7 Setup Procedures For ‘DNS’: If you select ‘Dynamic IP’ or ‘PPPoE’ as Internet connection method, at least one DNS server’s IP address should be assigned automatically. However, if you have preferred DNS server, or your service provider didn’t assign the IP address of DNS server because of any reason, you can input the IP address of DNS server here.
  • Page 37 2-5-8 Setup Procedures For ‘DDNS’: DDNS (Dynamic DNS) is an IP-to-Hostname mapping service for those Internet users who don’t have a static (fixed) IP address. It will be a problem when such user wants to provide services to other users on Internet, because their IP address will vary every time when connected to Internet, and other user will not be able to know the IP address they’re using at a certain time.
  • Page 38 Please click ‘Apply’ button to prepare to restart the router, and you’ll see this message: Please wait for about 30 seconds, then click ‘OK!’ button. You’ll be back to router management interface again, and the router is ready with new settings. 2-6 Wired LAN Configurations Before all computers using wired Ethernet connection (i.e.
  • Page 39 2-6-1 LAN IP Section: IP address (1): Please input the IP address of this router. Subnet Mask (2): Please input subnet mask for this network. 802.1d Spanning Tree (3): If you wish to activate 802.1d spanning tree function, select ‘Enabled’ for setup item ‘802.1d Spanning Tree’, or set it to ‘Disabled’...
  • Page 40 NOTE: 1. The number of the last field (mentioned ‘d’ field) of ‘End IP’ must be greater than ‘Start IP’, and cannot the same with router’s IP address. 2. The former three fields of IP address of ‘Start IP’, ‘End IP’, and ‘IP Address of ‘LAN IP’ section (mentioned ‘a’, ‘b’, and ‘c’...
  • Page 41 After you finish all settings, please click ‘Apply’ button on the bottom of this page. After you click ‘Apply’, the following message will be displayed on your web browser: Please wait for about 30 seconds, then click ‘OK!’ button. You’ll be back to router management interface again, and the router is ready with new settings.
  • Page 42: Ap Bridge-Wds

    2-7-1 Basic Wireless Settings Please click ‘Wireless’ menu on the left of web management interface, then click ‘Basic Settings’, and the following message will be displayed on your web browser: This wireless router can be work in 6 modes: A. AP: Standard wireless AP (access point). B.
  • Page 43 2-7-1-1 Setup Procedures For ‘AP’: Please select the radio band you want to use from ‘Band’ dropdown menu, and the following message will be displayed: Band (2): Please select the radio band from one of options ESSID (3): This is the name of wireless router. You can type any alphanumerical characters here, maximum 32 characters.
  • Page 44 access point in the table and it will join wireless LAN through this access point. WLAN MAC (5): For some applications, you may need to designate a specific MAC address for the router. Please enter the MAC address here. If you are connecting the router to a computer, you can simply press ‘Clone Mac address’...
  • Page 45 MAC address 1 to 4 (4 – 7): Input the MAC address of another wireless router. Set Security (8): Click to set security settings for this connection. 2-7-1-5 Setup Procedures For ‘AP Bridge – WDS’ In this mode, you can expand the scope of network by combining up to four other access points together, and every access point can still accept wireless clients.
  • Page 46 2-7-1-6 Setup Procedures For ‘Universal Repeater’ In this mode, the router can act as a wireless repeater; it can be Station and AP at the same time. It can use Station function to connect to a Root AP and use AP function to service all wireless stations within its coverage. NOTE: For Repeater Mode, this router will demodulate the received signal, checking if this signal is noise for the operating network then have the signal modulated and amplified again.
  • Page 47 2-7-2 Advanced Wireless Settings This router provides some advanced control of wireless parameters, if you want to configure these settings, please click ‘Wireless’ menu on the left of web management interface, then click ‘Advanced Settings’, and the following message will be displayed on your web browser: Fragment Threshold (1): Do not modify default value if you don’t know what it is, default value is 2346.
  • Page 48 message will be displayed on your web browser: Please wait for about 30 seconds, then click ‘OK!’ button. You’ll be back to router management interface again, and the router is ready with new settings. 2-7-3 Wireless Security It’s very important to set wireless security settings properly! If you don’t, hackers and malicious users can reach your network and valuable data without your consent and this will cause serious security problem.
  • Page 49 2-7-3-2 WEP - Wired Equivalent Privacy When you select this mode, the wireless router will use WEP encryption, and the following setup menu will be shown on your web browser: Key Length (2): There are two types of WEP key length: 64-bit and 128-bit. Using ‘128-bit’ is safer than ’64-bit’, but will reduce some data transfer performance.
  • Page 50 TIPS: Some examples of WEP key (Don’t use those examples; use the one of your own!): ASCII (5 characters): pilot, phone, 23561, 2Hyux, #@xmL ASCII (13 characters): digitalFAMILY, 82Jh26xHy3m&n Hex (10 characters): 287d2aa732, 1152dabc85 Hex (26 characters): 9284bcda8427c9e036f7abcd84 To improve security level, do not use those words that can be found in a dictionary or too easy to remember! (‘pilot’ and ‘phone’...
  • Page 51: Wpa Radius

    Please wait for about 30 seconds, then click ‘OK!’ button. You’ll be back to router management interface again, and the router is ready with new settings. NOTE: Some wireless clients (especially those manufactured before year 2003) only support WEP or WPA (TKIP) cipher.
  • Page 52 2-7-4 Wireless Access Control This function will help you to prevent unauthorized users from connecting to your wireless router; only those wireless devices who have the MAC address you assigned here can gain access to your wireless router. You can use this function with other security measures described in previous section, to create a safer wireless environment.
  • Page 53 Please wait for about 30 seconds, then click ‘OK!’ button. You’ll be back to router management interface again, and the router is ready with new settings. 2-7-5 Wi-Fi Protected Setup (WPS) Wi-Fi Protected Setup (WPS) is the simplest way to build connection between wireless network clients and this wireless router. You don’t have to select encryption mode and input a long encryption passphrase every time when you need to setup a wireless client, you only have to press a button on wireless client and this wireless router, and the WPS will do the rest for you.
  • Page 54 Enable WPS (1): Wi-Fi Protected Setup Information (2): Config Mode (3): Configure via Push Button (4): Configure via client PinCode (5): 2-7-6 Security Tips For Wireless Network Here are some quick tips to help you improve the security level of your wireless network: 1.
  • Page 55: Chapter Iii: Advanced Functions

    3. You can hide the ESSID of this router by set ‘Broadcast ESSID’ option to ‘Disable’. Your wireless router will not be found by other people in proximity if they’re just using the AP scanning function of their wireless client, and this can reduce the chance of being intruded.
  • Page 56 Delete Selected (7): You can delete selected rules by clicking this button. You can select one or more rules to delete by check the ‘select’ the box of the rule(s) you want to delete a time. If the QoS table is empty, this button will be grayed out and cannot be clicked.
  • Page 57 addresses, or just input the IP address in the left field to define a single IP address. Local Port Range (4): Please input the range of local (source) port number that will be affected by this rule. If you want to apply this rule on port 80 to 90, please input ’80-90’;...
  • Page 58 To enable NAT function, please select ‘Enable’ for ‘Enable NAT module function; to disable, please select ‘Disable’. After you finish all settings, please click ‘Apply’ button on the bottom of this page. After you click ‘Apply’, the following message will be displayed on your web browser: Please wait for about 30 seconds, then click ‘OK!’...
  • Page 59 Port Forwarding Table (9): All existing port forwarding mappings will be displayed here. Delete Selected (10): Please select a port forwarding mapping by clicking the ‘Select’ box of the mapping, then click ‘Delete Selected’ button to remove the mapping. If there’s no existing mapping, this button will be grayed out.
  • Page 60 Type (5): Select the type of connection, TCP or UDP. If you’re not sure, please select ‘Both’. Public Port (6): Please select the port number of Internet IP address which will be redirected to the port number of local IP address defined above. Comment (7): Please input any text to describe this mapping, up to 16 alphanumerical characters.
  • Page 61 TCP Port to Open (4): UDP Port to Open (5): Comment (6): Popula Applications (7): Add (8): Reset (9): Current Trigger-Port Table (10): Delete Selected (11): Delete All (12): Reset (13): Note: Only one LAN client can use a particular special application at a time. After you finish all settings, please click ‘Apply’...
  • Page 62 3-2-5 UPnP Setting This function enables network auto-configuration for peer-to-peer communications, with this function, network devices will be able to communicate with other devices directly, and learn about information about other devices. Many network device and applications rely on UPnP function nowadays. Please click ‘NAT’...
  • Page 63 3-2-6 ALG Settings Application Layer Gateway (ALG) is a special function of this router. It includes many preset routing rules for numerous applications which require special support. With these supports, those applications which required special support will be able to work with NAT architecture. Please click ‘NAT’...
  • Page 64 3-3 Firewall Excepting NAT, this router also provides firewall function to block malicious intruders from accessing your computers on local network. These functions include inbound attack prevention, and block outbound traffics, like block URLs which have pre-defined keywords. Please click ‘Firewall’ menu on the left of web management interface, and the following message will be displayed on your web browser: After you finish all settings, please click ‘Apply’...
  • Page 65 3-3-1 Access Control This function allows or denies computers with specific MAC address from connecting to the network; it can also allow or deny computers with specific IP address, protocol, or port. Please click ‘Firewall’ menu on the left of web management interface, then click ‘Access Control’, and the following message will be displayed on your web browser: Enable MAC Filtering (1): Client PC MAC address (2):...
  • Page 66 Delete All (9): If you want to delete all MAC addresses listed here, please click ‘Delete All’ button. Reset (10): You can also click ‘Reset’ button to unselect all MAC addresses. Enable IP Filtering Table (11): Check this box to enable IP address based filtering, and please select ‘Deny’ or ‘Allow’ to decide the behavior of IP filtering table.
  • Page 67 3-3-1-1 Add PC Client PC Description (1): Please input any text to describe this IP address, up to 16 alphanumerical characters. Client PC IP address (2): Please input the starting IP address in the left field, and input the end IP address in the right field to define a range of IP addresses, or just input the IP address in the left field to define a single IP address.
  • Page 68 3-3-2 URL Blocking If you want to prevent computers in local network from accessing certain website (like pornography, violence, or anything you want to block), you can use this function to stop computers in local network from accessing the site you defined here. This function is useful for parents and company managers.
  • Page 69 3-3-3 DoS Attack Prevention Denial of Service (DoS) is a common attack measure, by transmitting a great amount of data or request to your Internet IP address and server, the Internet connection will become very slow, and server may stop responding because it is not capable to handle too much traffics.
  • Page 70 Please wait for about 30 seconds, then click ‘OK!’ button. You’ll be back to router management interface again, and the router is ready with new settings. 3-3-3-1 DoS - Advanced Settings When you click ‘Advanced’ button in DoS menu, the following message will be displayed on your web browser: Ping of Death (1): Ping of Death is a special packet, and it will cause certain computer to stop responding.
  • Page 71 Please wait for about 30 seconds, then click ‘OK!’ button. You’ll be back to router management interface again, and the router is ready with new settings. 3-3-4 Demilitarized Zone (DMZ) Demilitarized Zone (DMZ) refers to a special area in your local network. This area resides in local network, and all computers in this area uses private IP address, too.
  • Page 72 Reset (10): You can also click ‘Reset’ button to unselect all DMZ entries. After you finish all settings, please click ‘Apply’ button on the bottom of this page. After you click ‘Apply’, the following message will be displayed on your web browser: Please wait for about 30 seconds, then click ‘OK!’...
  • Page 73 3-4-2 Internet Connection Status You can use this function to know the status of current Internet connection. Please click ‘Internet Connection’ menu on the left of web management interface, and the following message will be displayed on your web browser: NOTE: This information will vary depending on the connection status.
  • Page 74 3-4-4 System Log All important system events are logged. You can use this function to check the event log of your router. Please click ‘System Log’ menu on the left of web management interface, and the following message will be displayed on your web browser: Save (1): Save current event log to a text file.
  • Page 75 3-4-5 Active DHCP Client List If you’re using the DHCP server function of this router, you can use this function to check all active DHCP leases issued by this router. Please click ‘Active DHCP client’ menu on the left of web management interface, and the following message will be displayed on your web browser: All information about active DHCP leases issued by this router will be displayed here.
  • Page 76 3-5 Configuration Backup And Restore You can backup all configurations of this router to a file, so you can make several copied of router configuration for security reason. Please click ‘Tool’ located at the upper-right corner of web management interface, then click ‘Configuration Tools’ on the left of web management interface, then the following message will be displayed on your web browser: Backup Settings (1): Press ‘Save...’...
  • Page 77 Click ‘Browse’ button first, you’ll be prompted to provide the filename of firmware upgrade file. Please download the latest firmware file from our website, and use it to upgrade your router. After a firmware upgrade file is selected, click ‘Apply’ button, and the router will start firmware upgrade procedure automatically. The procedure may take several minutes, please be patient.
  • Page 78: Chapter Iv: Appendix

    CHAPTER IV: APPENDIX 4-1 Hardware Specification • SoC: Ralink RT3052 • Flash: 4MB • SDRAM: 16MB • WAN Port: 10/100M UTP Port x 1 • LAN Ports: 10/100M UTP Port x 4 • Antenna: 3dBi Dipole Antenna x 2 (2T2R Spatial Multiplexing MIMO configuration; 2 antennas are for signal transmitting and 2 antennas are for signal receiving) •...
  • Page 79 g. Try to reset the router and try again later. h. Reset the device provided by your Internet service provider too. I can’t locate my router by my a. ‘Broadcast ESSID’ set to off? wireless client b. All two antennas are properly secured. c.
  • Page 80 DSL Modem: DSL stands for Digital Subscriber Line. A DSL modem uses your existing phone lines to transmit data at high speeds. Ethernet: A standard for computer networks. Ethernet networks are connected by special cables and hubs, and move data around at up to 10/100 million bits per second (Mbps).
  • Page 81 data that corresponds to the Manufacturer ID (unique for each manufacturer), plus 3 bytes that are often used as the product’s serial number. NAT: Network Address Translation. This process allows all of the computers on your home network to use one IP address. Using the broadband router’s NAT capability, you can access the Internet from any computer on your home network without having to purchase more IP addresses from your ISP.
  • Page 82 TCP/IP, UDP: Transmission Control Protocol/Internet Protocol (TCP/IP) and Unreliable Datagram Protocol (UDP). TCP/IP is the standard protocol for data transmission over the Internet. Both TCP and UDP are transport layer protocol. TCP performs proper error detection and error recovery, and thus is reliable. UDP on the other hand is not reliable. They both run on top of the IP (Internet Protocol), a network layer protocol.

This manual is also suitable for:

Wl250n-ar