Copyright The contents of this publication may not be reproduced in any part or as a whole, stored, transcribed in an information retrieval system, translated into any language, or transmitted in any form or by any means, mechanical, magnetic, electronic, optical, photocopying, manual, or otherwise, without the prior written permission.
Congratulations on your purchase of this outstanding ADSL Wireless Broadband Router. This product is specifically designed for Small Office and Home Office needs. It provides a complete SOHO solution for Internet surfing, and is easy to configure and operate even for non-technical users. Instructions for installing and configuring this product can be found in this manual.
Page 5
correctly. Statistics of WAN Supported Enables you to monitor inbound and outbound packets Wireless functions High speed for wireless LAN connection Up to 54Mbps data rate by incorporating Orthogonal Frequency Division Multiplexing (OFDM). Roaming provides seamless roaming within the IEEE 802.11b(11M) and IEEE 802.11g(54M) WLAN infrastructure.
SPI Mode Supported When SPI Mode is enabled, the router will check every incoming packet to detect if this packet is valid. DoS Attack Detection Supported When this feature is enabled, the router will detect and log the DoS attack comes from the Internet.
2.1 Panel Layout 2.1.1. Front Panel Figure 2-1 Front Panel LED: Function Color Status Description Power Power is being applied to this POWER Green indication product. This product is functioning System status Green Blinking properly. The ADSL is linked. SYNC ADSL Synchro Green This router is trying to...
2.1.2. Rear Panel Figure 2-2 Rear Panel Ports: Port Description 5VDC Power inlet: DC 5V, 1.5A (minimum) ADSL The port where you will connect your phone jack. Port 1-4 The ports where you will connect networked computers and other devices. USB Ports for USB printer.
Page 9
performance. Figure 2-3 Setup of LAN and WAN connections for this product. 3. Setup ADSL connection Prepare an Ethernet cable for connecting this product to your cable/xDSL modem or Ethernet backbone. Figure 2-3 illustrates the WAN connection. 4. Connecting this product with your printer (optional) Use the printer cable to connect your printer to the printer port of this product.
To use this product correctly, you have to properly configure the network settings of your computers and install the attached setup program into your MS Windows platform (Windows 95/98/NT/2000). 3.1 Make Correct Network Settings of Your Computer The default IP address of this product is 192.168.0.254, and the default subnet mask is 255.255.255.0. These addresses can be changed on your need, but the default values are used in this manual.
3.2 Install the Software into Your Computers Skip this section if you do not want to use the print server function of this product. Notice: If you are using Windows 2000/XP, please refer to Chapter 5 Printer - 5.3 Configuring on Windows 2000 and XP Platforms.
Page 12
Step 3: Select the destination folder and click on the Next button. Then, the setup program will begin to install the programs into the destination folder. Step 4: When the following window is displayed, click on the Finish button. Select the item to restart the computer and then click the OK button to reboot your computer. Step 4: After rebooting your computer, the software installation procedure is finished.
This product provides Web based configuration scheme, that is, configuring by your Web browser, such as Netscape Communicator or Internet Explorer. This approach can be adopted in any MS Windows, Macintosh or UNIX based platforms.
4.1 Start-up and Log in Activate your browser, and disable the proxy or add the IP address of this product into the exceptions. Then, type this product’s IP address in the Location (for Netscape) or Address (for IE) field and press ENTER. For example: http://192.168.0.254. After the connection is established, you will see the web user interface of this product.
4.2 Status This option provides the function for observing this product’s working status: A. WAN Port Status. If the WAN port is assigned a dynamic IP, there may appear a “Renew” or “Release” button on the Side note column. You can click this button to renew or release IP manually. B.
4.3 Wizard Setup Wizard will guide you through a basic configuration procedure step by step. Press ”Next >” Setup Wizard - Select WAN Type: For detail settings, please refer to 4.4.1 primary setup.
4.4 Basic Setting 4.4.1 Primary Setup – WAN Type Press “Change”...
Page 18
This page is primary to enable this product to work properly. The setting items and the web appearance depend on the WAN type. Choose correct WAN type before you start. 1. LAN IP Address: the local IP address of this device. The computers on your network must use the LAN IP address of your product as their Default Gateway.
Page 19
4.4.1.1 Ethernet Over ATM (RFC 1483 Bridged) without NAT his WAN type disable the NAT, this device becomes a pure bridge between your LAN and WAN, all the clients in your LAN must have legal IPs. If you enable the NAT feature, you have to set the following WAN IP settings.
Page 20
4.4.1.2 Ethernet Over ATM (RFC 1483 Bridged) with NAT Dynamic IP Address: Obtain an IP address from ISP automatically. Host Name: optional. Required by some ISPs, for example, @Home. Renew IP Forever: this feature enables this product to renew your IP address automatically when the lease time is expiring-- even when the system is idle.
Page 21
4.4.1.3 IP over ATM (RFC 1483 Routed) In the Router Mode, NAT is always enabled. You have to set the following WAN IP settings: WAN IP Mode: This product supports two WAN IP modes: static and dynamic. If you select dynamic mode, it will try to get a legal IP and WAN settings from ISP’s DHCP server.
Page 22
4.4.1.4 Classical IP over ATM (RFC 1577) In the Classical IP over ATM Mode, NAT is always enabled. You have to set the following WAN IP settings: WAN IP Mode: This product supports two WAN IP modes: static and dynamic. If you select dynamic mode, it will try to get a legal IP and WAN settings from ISP’s DHCP server.
Page 24
PPPoA Account/Password: The account ID & password provided by your ISP. Maximum Idle Time: The time of no activity disconnect to your PPPoA session. You can also set it to zero or enable Auto-reconnect to disable this feature. If Auto-reconnect is enabled, this product will automatically connect to ISP after system is restarted or connection is dropped.
Page 25
Optional. Required by some ISPs. Once you finished the required configuration, you must click on the "Save" button to save the configuration into Flash memory, and the reboot this device. 4.4.1.6 PPP over Ethernet (RFC 2516) PPPoE Account/Password: The account ID & password provided by your ISP. Maximum Idle Time: The time of no activity disconnect to your PPPoE session.
Page 26
Assigned IP Address: Optional. Required by some ISPs. Once you finished the required configuration, you must click on the "Save" button to save the configuration into Flash memory, and the reboot this device. 4.4.2 OAM Server In this page, you can set the OAM feature for virtual channel. First click on the Enable or Disable circle for the settings of OAM Function, Activation/De-activation, Loop back, and Fault Management individually.
Page 27
The settings of a TCP/IP environment include host IP, Subnet Mask, Gateway, and DNS configurations. It is not easy to manually configure all the computers and devices in your network. Fortunately, DHCP Server provides a rather simple approach to handle all these settings. This product supports the function of DHCP server.
Page 28
Wireless settings allow you to set the wireless configuration items. 1. Network ID (SSID): Network ID is used for identifying the Wireless LAN (WLAN). Client stations can roam freely over this product and other Access Points that have the same Network ID. (The factory setting is “default”) 2.
Key value shared by the RADIUS server and this router. This key value is consistent with the key value in the RADIUS server. 4.4.4 Change Password You can change Password here. We strongly recommend you to change the system password for security reason.
4.5.1 Virtual Server This product’s NAT firewall filters out unrecognized packets to protect your Intranet, so all hosts behind this product are invisible to the outside world. If you wish, you can make some of them accessible by enabling the Virtual Server Mapping. A virtual server is defined as a Service Port, and all requests to this port will be redirected to the computer specified by the Server IP.
Page 31
For example, if you have an FTP server (port 21) at 192.168.0.1, a Web server (port 80) at 192.168.0.2, and a VPN server at 192.168.0.6, then you need to specify the following virtual server-mapping table: Service Port Server IP Enable 192.168.0.1 192.168.0.2 1723...
4.5.3 Miscellaneous Items IP Address of DMZ Host DMZ (DeMilitarized Zone) Host is a host without the protection of firewall. It allows a computer to be exposed to unrestricted 2-way communication for Internet games, Video conferencing, Internet telephony and other special applications. NOTE: This feature should be used only when needed.
Page 34
Packet Filter enables you to control what packets are allowed to pass the router. Outbound filter applies on all outbound packets. However, Inbound filter applies on packets that destined to Virtual Servers or DMZ host only. You can select one of the two filtering policies: 1.
Page 35
Example 1: (1.2.3.100-1.2.3.149) They are allow to send mail (port 25), receive mail (port 110), and browse the Internet (port 80) (1.2.3.10-1.2.3.20) They can do everything (block nothing) Others are all blocked. Example 2:...
Page 36
(1.2.3.100-1.2.3.119) They can do everything except read net news (port 119) and transfer files via FTP (port 21) Others are all allowed. After Inbound Packet Filter setting is configured, click the save button. Outbound Filter: To enable Outbound Packet Filter click the check box next to Enable in the Outbound Packet Filter field.
Page 37
(192.168.0.100-192.168.0.149) They are allowed to send mail (port 25), receive mail (port 110), and browse Internet (port 80); port 53 (DNS) is necessary to resolve the domain name. (192.168.0.10-192.168.0.20) They can do everything (block nothing) Others are all blocked. Example 2:...
Page 38
(192.168.0.100-192.168.0.119) They can do everything except read net news (port 119) and transfer files via FTP (port 21) Others are allowed After Outbound Packet Filter setting is configured, click the save button.
4.6.2 Domain Filter Domain Filter Let you prevent users under this device from accessing specific URLs. Domain Filter Enable Check if you want to enable Domain Filter. Log DNS Query Check if you want to log the action when someone accesses the specific URLs. Privilege IP Addresses Range Setting a group of hosts and privilege these hosts to access network without restriction.
Page 40
Example: In this example: 1. URL include “www.msn.com” will be blocked, and the action will be record in log-file. 2. URL include “www.sina.com” will not be blocked, but the action will be record in log-file. 3. URL include “www.google.com” will be blocked, but the action will not be record in log-file. IP address X.X.X.1~ X.X.X.20 can access network without restriction.
4.6.4 MAC Address Control MAC Address Control allows you to assign different access right for different users and to assign a specific IP address to a certain MAC address. MAC Address Control Check “Enable” to enable the “MAC Address Control”. All of the settings in this page will take effect only when “Enable”...
Page 42
"Control table" is the table at the bottom of the "MAC Address Control" page. Each row of this table indicates the MAC address and the expected IP address mapping of a client. There are four columns in this table: MAC Address MAC address indicates a specific client.
4.6.5 VPN setting VPN Settings are settings that are used to create virtual private tunnels to remote VPN gateways. The tunnel technology supports data confidentiality, data origin authentication and data integrity of network information by utilizing encapsulation protocols, encryption algorithms, and hashing algorithms.
Page 44
4.6.5.1 VPN Settings – IPSEC VPN Settings - IKE There are three parts that are necessary to setup the configuration of IKE for the dedicated tunnel: basic setup, IKE proposal setup, and IPSec proposal setup. Basic setup includes the setting of following items: local subnet, local netmask, remote subnet, remote netmask, remote gateway, and pre-shared key.
Page 45
Remote netmask Remote netmask combined with remote subnet to form a subnet domain of remote end. Remote gateway The IP address of remote VPN gateway. Pre-shared key The first key that supports IKE mechanism of both VPN gateways for negotiating further security keys. The pre-shared key must be same for both end gateways.
Page 46
IKE proposal is not available. DH group There are three groups can be selected: group 1 (MODP768), group 2 (MODP1024), group 5 (MODP1536). Encryption algorithm There are two algorithms can be selected: 3DES and DES. Authentication algorithm There are two algorithms that can be selected: SHA1 and MD5. Life time The unit of life time is based on the value of Life Time Unit.
Page 47
IPSec Proposal index A list of selected proposal indexes from the IPSec proposal pool listed below. Selecting a proposal ID and clicking «add to» button in the bottom of the page performs the selecting activity. There are only four indexes can be chosen for the dedicated tunnel. Remove button beside the index list can remove selected proposal index before.
Page 48
represents the maximum allowable amount of transmitted packets through the dedicated VPN tunnel between both end gateways for. Its value ranges from 20,480 KBs to 2,147,483,647 KBs. Life time unit There are two units can be selected: second and KB. Proposal ID The identifier of IPSec proposal can be chosen for adding the proposal to the dedicated tunnel.
Page 49
Remote Administrator Host/Port In general, only Intranet user can browse the built-in web pages to perform administration task. This feature enables you to perform administration task from remote host. If this feature is enabled, only the specified IP address can perform remote administration. If the specified IP address is 0.0.0.0, any host can connect to this product to perform administration task.
Page 51
Get Date and Time by NTP Protocol Selected if you want to Get Date and Time by NTP Protocol. Time Server Select a NTP timeserver to consult UTC time Time Zone Select a time zone where this device locates. Set Date and Time manually Selected if you want to Set Date and Time manually.
4.7.2 System Log This page support two methods to export system logs to specific destination by means of syslog (UDP) and SMTP (TCP). The items you have to setup including: IP Address for Syslog Host IP of destination where logs will be sent. Check Enable to enable this function.
To fill some SMTP server's authentication requirement, you may need to input Username and Password that offered by your ISP. Log type Please select the activities that should be shown on log. 4.7.3 Dynamic DNS To host your server on a changing IP address, you have to use dynamic domain name service (DDNS). So that anyone wishing to reach your host only needs to know the name of it.
Page 54
Username/E-mail Password/Key You will get this information when you register an account on a Dynamic DNS server. Example: After Dynamic DNS setting is configured, click the save button. 4.7.4 SNMP Setting...
Page 55
In brief, SNMP, the Simple Network Management Protocol, is a protocol designed to give a user the capability to remotely manage a computer network by polling and setting terminal values and monitoring network events. Enable SNMP You must check either Local or Remote or both to enable SNMP function. If Local is checked, this device will response request from LAN.
Example: 1. This device will response to SNMP client which’s get community is set as “public” 2. This device will response to SNMP client which’s set community is set as “private” 3. This device will response request from both LAN and WAN 4.
Page 57
Routing Tables allow you to determine which physical interface address to use for outgoing IP data grams. If you have more than one routers and subnets, you will need to enable routing table to allow packets to find proper routing path and allow different subnets to communicate with each other.Routing Table settings are settings used to setup the functions of static and dynamic routing.
So if, for example, the client3 wanted to send an IP data gram to 192.168.0.2, it would use the above table to determine that it had to go via 192.168.0.103 (a gateway), And if it sends Packets to 192.168.1.11 will go via 192.168.0.216 Each rule can be enabled or disabled individually.
Page 59
After configure Rule 1 Schedule Enable Selected if you want to Enable the Scheduler. Edit To edit the schedule rule. Delete To delete the schedule rule, and the rule# of the rules behind the deleted one will decrease one automatically. Schedule Rule can be apply to Virtual server and Packet Filter, for example:...
Page 60
Exanple1: Virtual Server – Apply Rule#1 (ftp time: everyday 14:10 to 16:20) Exanple2: Packet Filter – Apply Rule#1 (ftp time: everyday 14:10 to 16:20).
4.8 Toolbox 4.8.1 System Log You can View system log by clicking the View Log button...
Page 62
4.8.2 Firmware Upgrade You can upgrade firmware by clicking Firmware Upgrade button. 4.8.3 Backup Setting You can backup your settings by clicking the Backup Setting button and save it as a bin file. Once you want to restore these settings, please click Firmware Upgrade button and use the bin file you saved.
Page 63
4.8.4 Reset to default You can also reset this product to factory default by clicking the Reset to default button. 4.8.5 Reboot You can also reboot this product by clicking the Reboot button. 4.8.6 Miscellaneous Items...
Page 64
MAC Address for Wake-on-LAN Wake-on-LAN is a technology that enables you to power up a networked device remotely. In order to enjoy this feature, the target device must be Wake-on-LAN enabled and you have to know the MAC address of this device, say 00-11-22-33-44-55. Clicking "Wake up" button will make the router to send the wake-up frame to the target device immediately.
This product provides the function of network print server for MS Windows 95/98/NT/2000 and Unix based platforms. (If the product you purchased doesn’t have printer port, please skip this chapter.) 5.1 Configuring on Windows 95/98 Platforms After you finished the software installation procedure described in Chapter 3, your computer has possessed the network printing facility provided by this product.
Page 66
2. Click the Details item: 3. Choose the “PRTmate: (All-in-1)” from the list attached at the Print To item. Be sure that the Printer Driver item is configured to the correct driver of your server printer. 4. Click on the button of Port Settings:...
Types in the IP address of this product and then click the OK button. 6. Make sure that all settings mentioned above are correct and then click the OK button. 5.2 Configuring on Windows NT Platforms The configuration procedure for a Windows NT platform is similar to that of Windows 95/98 except the screen of printer Properties: Compared to the procedure in last section, the selection of Details is equivalent to the selection of Ports, and Port Settings is equivalent to Configure Port.
5.3 Configuring on Windows 2000 and XP Platforms Windows 2000 and XP have built-in LPR client, users could utilize this feature to Print. You have to install your Printer Driver on LPT1 or other ports before you enter the following sequence.
Page 69
3. Select “Standard TCP/IP Port”, and then click “New Port…” 4.Click Next and then provide the following information: Type address of server providing LPD that is our NAT device:192.168.0.254...
Page 70
5. Select Custom, and then click “Settings…” 6.Select “LPR”, type ” lp“ lowercase letter in “Queue Name:” And enable “LPR Byte Counting Enabled”.
5.4 Configuring on Unix-like based Platforms Please follow the traditional configuration procedure on Unix platforms to setup the print server of this product. The printer name is “lp.” In X-Windows, for example, In Red hat Platforms, Please follow the below steps to configure your printer on Red Hat 9.0.
Page 73
1. Start from the Red Hat---> System Setting---> Printing. 2. Click Add---> Forward.
Page 74
3. Enter the Pinter Name, Comments then forward. 4. Select LPD protocol and then forward.
Page 75
5. Enter the router LAN IP Address and the queue name "lp". Then forward. 6. Select the Printer Brand and Model Name. Then Forward. 7. Click Apply to finish setup.
Page 76
8. At last you must click Apply on the toolbox to make the change take effective. In Command Mode: Linux has built-in LPR client, you can utilize it for printing. You can manual set it or via the tool "printtool" in X-windows. PS: The spool name is "lp"------all lowercase letter.
5.5 Configuring on Apple PC 1.First, go to Printer center (Printer list) and add printer 2.Choose IP print and setup printer ip address (router Lan ip address). 3.Disable “Default Queue of Server.” And fill in ‘ lp ‘ in Queue name item. 4.Printer type: Choose “General”.
This section introduces you how to install TCP/IP protocol into your personal computer. And suppose you have been successfully installed one network card on your personal computer. If not, please refer to your network card manual. Moreover, the Section B.2 tells you how to set TCP/IP values for working with this NAT Router correctly.
Page 79
6. The TCP/IP protocol shall be listed in the Network window. Click OK to complete the install procedure and restart your PC to enable the TCP/IP protocol. A.2 Set TCP/IP Protocol for Working with NAT Router 1. Click Start button and choose Settings, then click Control Panel. 2.
Page 80
b. Don’t input any value in the Gateway tab. c. Choose Disable DNS in the DNS Configuration tab.
Page 81
B. Configure IP manually a. Select Specify an IP address in the IP Address tab. The default IP address of this product is 192.168.0.254. So please use 192.168.0.xxx (xxx is between 1 and 253) for IP Address field and 255.255.255.0 for Subnet Mask field. b.
Page 82
c. In the DNS Configuration tab, add the DNS values which are provided by the ISP into DNS Server Search Order field and click Add button.
Example: Win XP/2000 VPN Router (Configuration on WIN 2000 is similar to XP) 1. On Win 2000/XP, click [Start] button, select [Run], type secpol.msc in the field, then click [Run] Goto **Local Security Policy Settings** page 2. Or in Win XP, Click [Control Panel] Double-click [Performance and Maintenance]...
Page 85
Local Security Policy Settings Double-click [Local Security Policy]...
Page 86
Right-click [IP Security Policies on Local Computer], and click [Create IP Security Policy]. Click the [Next] button, enter your policy’s name (Here it is to_vpn_router). Then, click [Next]. Introduction Deselect the [Activate the default response rule] check box, and click [Next] button.
Page 87
Build 2 Filter Lists: “xp->router” and “router->xp” Filter List 1: xp-> router In the “new policy’s properties” screen, select [Use Add Wizard] check box, and then click [Add] button to create a new rule.
Page 89
Enter a name, for example: xp->router and deselect [Use Add Wizard] check box. Click [Add] button.
Page 90
In the Source address field, select [A specific IP Address]. and fill in IP Address: 192.168.1.1 In the Destination address field, select [A specific IP Subnet], fill in IP Address: 192.168.0.0 and Subnet mask: 255.255.255.0. If you want to select a protocol for your filter, click [Protocol] page.
Page 91
Click [OK] button. Then click [OK] button on the “IP Filter List” page.
Page 96
select [Use this string to protect the key exchange (pre-shared key)], and enter your pre-shared key string, such as mypresharedkey. Click [OK] button. Click [OK] button on [Authentication Methods] page. Select [Tunnel Setting]...
Page 97
configure [The tunnel endpoint is specified by this IP address]: 192.168.1.254 Select [Connection Type]...
Page 98
select [All network connections] Tunnel 2: router->xp In the “new policy’s properties” page, deselect [Use Add Wizard] check box, and then click [Add] button to create a new rule.
Page 100
Enter a name, such as router->xp and unselect [Use Add Wizard] check box. Click [Add] button.
Page 101
In the Source address field, select [A specific IP Subnet]. fill in IP Address: 192.168.0.0 and Subnet mask: 255.255.255.0. In the Destination address field, select [A specific IP Address], and fill in IP Address: 192.168.1.1 If you want to select a protocol for your filter, click [Protocol] page.
Page 102
Click [OK] button. Then click [OK] button on [IP Filter List] window.
Page 108
select [Use this string to protect the key exchange (pre-shared key)], and enter the pre-shared key string, such as mypresharedkey. Click [OK] button. Click [OK] button on [Authentication Methods] page. Select [Tunnel Setting]...
Page 109
Configure [The tunnel endpoint is specified by this IP address]: 192.168.1.1 Select [Connection Type]...
Page 111
Configure IKE properties Select [General] Click [Advanced…]...
Page 112
enable “Master key perfect forward security (PFS)” configure “Authenticate and generate a new key after every [10000] seconds” click [Methods…] click [Add] button...
Page 113
Configure “Integrity algorithm”: [SHA1] Configure “Encryption algorithm”: [3DES] Configure “Diffie-Helman group”: [Medium (2)] Settings on VPN router VPN Router: Wan IP address:192.168.1.254 Lan IP address:192.168.0.254 192.168.0.123...
Page 114
VPN Settings: VPN: Enable Max. number of tunnels: 2 ID: 1 Tunnel Name: 1 Method: IKE Press “More”...
Page 115
VPN Settings - Tunnel 1 – IKE Tunnel:1 Local Subnet:192.168.0.0 Local Netmask:255.255.255.0 Remote Subnet:192.168.1.1 Remote Netmask:255.255.255.255 Remote Gateway:192.168.1.1 Pre-shared Key: my-preshare-key...
Page 116
VPN Settings - Tunnel 1 - Set IKE Proposal ID: 1 Proposal Name: 1 DH Group: Group2 Encrypt. Algorithm: 3DES Auth. Algorithm: SHA1 Life Time: 10000 Life Time Unit: Sec.
Page 117
VPN Settings - Tunnel 1 - Set IPSec Proposal ID: 1 Proposal Name: proposal1 DH Group: Group2 Encaps. Protocol: ESP Encrypt. Algorithm: DES Auth. Algorithm:MD5 Life Time: 10000 Life Time Unit: Sec.
Page 118
User can view VPN connection process in “System Log” page, and correct their settings. Phase1 is related to IKE settings, Phase2 is related to IPSEC settings.
Page 119
Figure 1: Testing Environment (Use Windows 2000 Radius Server) 1 Equipment Details PC1: Microsoft Windows XP Professional without Service Pack 1. D-Link DWL-650+ wireless LAN adapter Driver version: 3.0.5.0 (Driver date: 03.05.2003) PC2: Microsoft Windows XP Professional with Service Pack 1a. Z-Com XI-725 wireless LAN USB adapter Driver version: 1.7.29.0 (Driver date: 10.20.2001) Authentication...
3.LAN IP address: 192.168.0.254/24. 4.Set RADIUS server IP. 5.Set RADIUS server shared key. 6.Configure WEP key and 802.1X setting. The following test will use the inbuilt 802.1X authentication method such as, EAP_TLS, PEAP_CHAPv2 (Windows XP with SP1 only), and PEAP_TLS (Windows XP with SP1 only) using the Smart Card or other Certificate of the Windows XP Professional.
Page 122
Figure 3: Smart card or certificate properties 4.Windows 2000 RADIUS server Authentication testing: 4.1DUT authenticate PC1 using certificate. (PC2 follows the same test procedures.) 1. Download and install the certificate on PC1. (Fig 4) 2. PC1 choose the SSID of DUT as the Access Point. 3.
Page 123
Figure 4: Certificate information on PC1 Figure 5: Authenticating...
Page 124
6. Terminate the test steps when PC2 get dynamic IP and PING remote host successfully. Support Type: Comet Labs supports the types of 802.1x Authentication: PEAP-CHAPv2 and PEAP-TLS. Note. 1.PC1 is on Windows XP platform without Service Pack 1.
Console mode When you forget the system password or the IP address of this product, you need enter console mode to reset them. Before invoking the console program, be sure to find a null modem cable and use it to connect from this product’s COM port to your computer’s COM port.
TFTP Mode 1. Symptom: SYS or SYNC LED flashing abnormally. 1.SYS LED flashing very fast 2.SYNC LED flashes irregularly 3.SYS and SYNC blinking reciprocally We can check if the router works ok or not according to M1 LED. If Normal, The SYS LED flashes per second. 2.
6.If successfully, please use “Reset Button” reset to default the router. If failed, the program will ask to redo again from Step 2. Contact us Comet Labs Company URL: www.cometlabs.com FAQ support: support@cometlabs.com...
Need help?
Do you have a question about the WRM54 and is the answer not in the manual?
Questions and answers