Table of Contents

Advertisement

Quick Links

Wireless Router User Guide

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Wireless Router and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Sitecom Wireless Router

  • Page 1 Wireless Router User Guide...
  • Page 2: Limitation Of Liability

    Wireless Router User Guide May, 2001 Limitation of Liability Information in this document is subject to change without notice and does not represent a commitment on the part. The material contained herein is supplied without representation or warranty of any kind. Therefore assumes no responsibility and shall have no liability of any kind arising from the supply or use of this document or the material contained herein.
  • Page 3: Table Of Contents

    The LEDs on the Front Chapter 2 Installing the Wireless Router Installing the Wireless Router Setting Up a Windows PC for Configuring the Wireless Router Connecting more Devices through a Hub to the Wireless Router Chapter 3 Configuring the Wireless Router...
  • Page 4: Chapter 4 Advanced Configuration

    To Enable Bridging Learning Chapter 5 Managing the Wireless Router How to View the Connection Log How to Upgrade the Wireless Router Features/Software How to Save or Clear Configuration Changes How to Reset the Wireless Router How to Change the ARM Password...
  • Page 5: About This User Guide

    Chapter Six: Messages, lists messages you may see in the ARM message window, and what they mean. Appendix A: Specifications Appendix B: Glossary Appendix C: Warranty, Copyright, FCC Notice Safety Warnings • The Wireless Router is not intended to be serviced by the user. Do not open the case.
  • Page 6: Wireless Router

    Wireless Router Console/COM port and external ISDN TA/Analog Modem • 1 female to female 9 pin adaptor to connect the Wireless Router Console port to a PC COM port. • 1 CAT5 UTP cross-over LAN cable to connect the Wireless Router EWAN port...
  • Page 7: Accessing The Internet

    Router to proxy the service from its own address. This means that the remote user can address the router as if it were the special server and the Wireless Router will re-direct this connection to the appropriate computer on the network.
  • Page 8: Creating Your Own Private Wide Area Network

    Figure 1-3 Connecting Two Networks with Wireless Router You can set up the Wireless Router to provide Internet access for everyone on your LAN and create your own private wide area network via V.90 Modem or ISDN TA simultaneously.
  • Page 9: Creating A Virtual Private Network (Vpn)

    VPN data session creation is requested, the router will base on the originating IP address to search for a matched profile. Once found, the Wireless Router will use the information in the matched profile to authenticate the incoming "call", after which data transfer can begin.
  • Page 10: A Configuration Example

    IP addresses automatically (i.e., from the built-in DHCP server in the Wireless Router). It is important for the Web Server on LAN #1 to have the same IP address all the time (so that users can use the same IP address to access it), it also means the Wireless Router should also be assigned a static IP address.
  • Page 11: A Security Overview

    A Security Overview More and more people are concerned about security of their data in the Internet The Wireless Router provides many ways to help make your network and your data secure: •...
  • Page 12: The Leds On The Front

    Figure 1-7 Wireless Router Connectors The LEDs on the Front There are 17 LEDs on the front of the Wireless Router that show connection and traffic status of Power, PPPoE, EWAN and LAN ports: Figure 1-8 LEDs Power: Green. The LED illuminates whe the Router is Powered on.
  • Page 13: Chapter 2 Installing The Wireless Router

    2Wireless RouterWireless Router Installing the Wireless Router Now you should be ready to connect your Wireless Router devices on your LAN . Follow these steps to install the Wireless Router: Step 1 Connect ADSL/Cable modem to the Wireless Router EWAN port using crossover CAT5 UTP LAN cable.
  • Page 14: Setting Up A Windows Pc For Configuring The Wireless Router

    Step 1 Connect your PC to one of the Wireless Router Switch ports. If you connect to LAN port 1, you should use a straight LAN cable and set the Uplink switch to the Normal position. or use a crossover LAN cable and set the Uplink switch to Uplink.
  • Page 15 -DNS Configuration Tab: Disable DNS should be selected -IP Address Tab: Obtain IP address automatically should be selected Step 10 When the Wireless Router connected to the LAN (and powered on), reboot the PC. After the PC is re-booted, you should be ready to configure...
  • Page 16: Connecting More Devices Through A Hub To The Wireless Router

    Connecting more Devices through a Hub to the Wireless Router The Wireless Router provides four LAN ports to allow up to four PCs or Workstations to be connected to it directly. If you want to connect more devices, you can connect an external hub or switch to LAN port 1 using a straight LAN cable if the Uplink switch is set to the Uplink position, or using a cross-over LAN cable if the Uplink switch is set to the Normal position.
  • Page 17: Chapter 3 Configuring The Wireless Router

    To configure Internet access time restrictions Internet Access in Five Minutes In this section you will be shown how to configure the Wireless Router for basic Internet access in less than five minutes using the web browser-based Acess Router Manager (ARM).
  • Page 18 password , the default password (“password”) will still be used as the default. You need to change it to the correct password before you will be let in. No matter what password you use, each character will always be displayed in the logon prompt as a “*”.
  • Page 19: Customizing The Arm For Your Specific Needs

    IP address (e.g., when you intend to create your own private WAN among multiple Wireless Router ), or adding a public IP address (e.g., when you want to install servers on the LAN which are accessible from the Internet).
  • Page 20: Overview Of The Arm Browser Screen

    Dial-in Access for Off-Site Users Select this option if you want to allow users on a stand-alone computer to dial in and access resources on your network. Click Next when you have selected the options you want. Share Netware (IPX) Resource Select this option if you use Novell servers on your network and want to allow dial-in users or remote offices to share them.
  • Page 21 Router with cables and peripheral devices that can be connected to it. Message Window Whenever appropriate, the Wireless Router will display system status or error messages in this window. For example, when you try to connect to the Internet, if you had configured your password incorrectly, the message window will display an appropriate message.
  • Page 22: What Is A Connection Profile

    Router. Likewise, a connection profile needs to be created for each dial-in user, each remote office, or each VPN user. Essentially, a connection profile contains all information that the Wireless Router needs to access the Internet, or support a remote dial-in user, or set up a connection with a remote office, or create a VPN.
  • Page 23 TA/Analog Modem Now select Internet Access as the Access Type (if your router is customized to support Internet access only, this selection will be made by the system automatically). Then press Enter, which will cause the following screen to show. There are three ways to obtain an IP Address for your router, including via PPP over Ethernet, via DHCP and No .If you choose “No”, the following screen will appear and please follow step 1.
  • Page 24 Note: After configuring each item, please go to step 4. Step 2 If you choose “via DHCP” the following items will appear. Please enter the following information: Profile Name: the name that you will use to identify this Internet access profile.
  • Page 25: Configuring A Basic Internet Access Profile Via Modem

    Click APPLY or APPLY and Test Note: When you click Apply or Apply and Test , the Wireless Router connects to your Internet Service Provider. Watch the Message Window for any messages. If the test is successful, your users will be ready to access the Internet. If not, the Wireless Router will try to give you enough information to let you know why the connection is not successful.
  • Page 26 The default value of the idle timeout is 300 seconds. It represents the number of seconds of inactivity over the connection: when this value is reached, the Wireless Router will disconnect the call. You can change the idle timeout value to anything between 0 to 3600 seconds. But if you select 0, the connection will never time out.
  • Page 27: Adding Internet Access Profiles

    Internet Service Provider. Watch the Message Window for any messages. If the test is successful, your users will be ready to access the Internet. If not, the Wireless Router will try to give you enough information to let you know why the connection is not successful.
  • Page 28 Step 2 Highlight the entry in the list, and click DELETE to delete the profile, or click NEXT to modify the profile, in which case the same screen as configured previously will appear.s 3-12...
  • Page 29: Setting Up Internet Access With Advanced Features

    When you check the box, Internet Access with Advanced Configuration on the ARM Customization Screen, additional configuration choices become available during your ARM configuration session. For example, some of these choices will allow you to , modify the Wireless Router private IP address, and/or assign a public IP address. Note: After you change the private IP address of a Wireless Router , all devices on your LAN will no longer be able to communicate with it.
  • Page 30 To install publicly addressed servers on your network (e.g., Web or ftp servers), you need to apply for an IP address for each server plus one for the LAN port of the Wireless Router. All these public IP addresses have to belong to the same IP network.
  • Page 31 IP address for a secondary DNS. DHCP: you can enable or disable the DHCP server feature provided by the Wireless Router. If you want the Wireless Router to act as a DHCP server and assign private IP addresses to requesting DHCP clients, you need to nable the DHCP (this is the default).
  • Page 32: Setting Up Your Router For Wireless Lan Connection

    Peer to Peer m: Mix-node h: Hybrid Additionally, some ISPs may require you to register the MAC address of your Wireless Router’s EWAN port, please refer to the CLI manual for configuration details. Setting up Your Router for Wireless LAN Connection Click the “WLAN”...
  • Page 33 5, 128 bit WEP key length must equal 13. Once you enabele WEP funcation, Please take care that the WEP key must be set up exactly the same on the Wireless Router as they are on the wireless client stations.
  • Page 34 Note: The default is “2342“ which disables the RTS treshold and Fragment threshold functions, the RTS and Fragment will be activated if the packet size exceeds the value you set. Since the packet size maximum of Ethernet frame is 1500 bytes, if the packet size you set is bigger than 1500 bytes, the function will be disable.
  • Page 35: Configuring For Remote Office Access

    (the remote router and the local router). Note that the remote site does not have to have a Wireless Router, and may not be configurable by the local administrator. In either case, make sure the configuration of the Wireless Router matches the requirements of the remote site.
  • Page 36 Profile Name: the name that you will use to identify this profile. Call Direction: If the remote site will be dialing in only, select Incoming. If the Wireless Router will only be dialing out to the remote site, select Outgoing. Select Both if either side can initiate the connection. The default setting is Both.
  • Page 37: Advanced Options For Remote Office Profiles

    Note: When you click APPLY and TEST, the Wireless Router attempts to place a call to the remote LAN and log in. Watch the Message Window for any messages. Advanced Options for Remote Office Profiles Note: The IPX options shown in this screen only appear if you also selected Share...
  • Page 38: Deleting Or Modifying Remote Office Access Profiles

    Service Advertising Protocol. Set as IPX Default Route: if this parameter is set to Yes, then the Wireless Router uses this connection if no other route for an IPX packet can be found in the routing table. Remote IPX Network Number: the IPX network number of a network reachable through this connection.
  • Page 39: Configuring Dial-In User Profiles

    Configuring Dial-in User Profiles If you selected Dial-in Access for Off-Site Users from the ARM Customization screen, follow the steps in this section to set up the Wireless Router to allow dial-in access from remote users: Step 1 In the ARM Customization screen, select Dial-in Access for Off-site Users from the list, and click Next.
  • Page 40 Enter the following information: Profile Name: a name that you will use to identify this profile. Call Back: sets the call back option. If selected, the Wireless Router disconnects after authenticating the dial-in user, and dials the remote user’s call back phone number to reconnect.
  • Page 41: Single User Dial-In Advanced Options

    ISP Idle Timeout: the number of seconds of inactivity over the connection. When this value is reached, the Wireless Router will disconnect the call. You can set the idle timeout from 0 to 3600 seconds. The default setting is 300 seconds.
  • Page 42 The Connection Profile Summary screen appears. Step 2 Highlight the entry in the list you want to delete, and click DELETE. 3-26...
  • Page 43: Setting The System Time

    It is also used for determining Internet access restrictions (see the section, “Setting Internet Access Time Restrictions”, below). Since the Wireless Router does not contain a backup battery for the real-time clock, the time will not be maintained across system resets or power cycles. Therefore, after a reset or power cycle, the clock will not be correct.
  • Page 44 Internet access is allowed. The Wireless Router will not connect to the Internet outside of the configured times. In order for this feature to be effective, the Wireless Router must be configured for the current local time. To do this, see the section, “Setting the System Time” , above.
  • Page 45: Advanced Configuration

    PC with which he or she is communicating. In this way a PC application is “mapped” to a port on the Wireless Router. Note: When port 80 (HTTP) and/or port 23 (telnet) is mapped to a private IP...
  • Page 46 map port 23 on the router to another port. Configuring Port Address Translation Each application that is to be mapped requires an entry to be configured in the Address Translation Table. To access this table perform the following steps: Step 1 Select Internet Access with Advanced Configuration in the ARM Configuration screen.
  • Page 47 Step 5 From Add a Static Entry screen configure the following information: Add Address Translation: Select the type of entry being configured. There may be one and only one Default Entry configured in the router. The Default Entry is a device to which Internet requests will be sent if no other match is found in the Address Translation Table.
  • Page 48 Static DHCP Assignments In certain LAN environments, it is desirable for some PCs to be assigned the same address each time it queries a DHCP server. Wireless Router is capable of configuring up to 20 such PCs for static assignments.
  • Page 49 button at the bottom of the table. Step 5 From the Add a Static Entry screen configure the following information: Name: Enter a convenient display name for this resource. IP Address: The IP address to be consistently assigned to this device MAC Address: The hardware address associated with the Ethernet adapter which is permanently assigned to this machine.
  • Page 50 When you set up your VPN, keep in mind that the VPN connection (the “tunnel”) emulates an actual hardware wide area network port. After setting up your VPN tunnel, you can create a connection profile to allow access to and from a remote site. VPN connections are created automatically as a result of a reference by a LAN user to a resource reachable through a VPN connection.
  • Page 51 Tunnel Password, if used). Remote Tunnel Name: the name of the remote network that is dialing in. Remote Tunnel Password: the password that your Wireless Router will expect to see from the remote system. If you do not require tunnel authentication, leave this field blank.
  • Page 52 Call Direction: the direction of the call in the tunnel. If the remote site will be dialing in, select Incoming Only. If the Wireless Router will be dialing out to the remote site, select Outgoing Only. Select Both if either side can initiate the connection.The default setting is Both.
  • Page 53 Account Name and Account Password. Remote Account Name: the name of the remote network that is dialing Remote Account Password: the password that your Wireless Router will expect to see from the remote system. VPN-L2TP Tunnel: the VPN Tunnel you will use for this profile. This is one of the tunnel configurations set up earlier.
  • Page 54: Packet Filtering

    Confirm Encryption key: re-enter the DES encryption key to confirm its correct entry. Note: For security reasons, encryption options only appear if you are connected to the Wireless Router over a local LAN and if encryption is enabled on your system. Step 2 Click OK.
  • Page 55 Otherwise, the exception action is taken, i.e., the packet is discarded or forwarded, the opposite of the default action. The Wireless Router maintains separate filtering tables for IP and IPX traffic. These filters are configured separately. Configuration commands allow you to define: each and every IP or IPX packet to be inspected to determine if it should be allowed to be transmitted over a WAN interface alternatively.
  • Page 56 Condition Configuration Protocol Parameter Formats Protocol TCP/UDP/ ICMP/IGMP/ Address Single/Range/ Network/Any Port Single/Range/ Packet Type Single/Any Network Single/Range/ Number Node Number Single/Any Socket Single/Range/ Therefore packet filtering simply defines sets of rules of what to allow or disallow through a set of parameters highlighted below: For IP, remote devices with IP addresses/port numbers are allowed (or disallowed) to communicate with...
  • Page 57 using any IPX packet type. “I want to disallow people in the manufacturing department to access the Internet“. The corresponding “translated” packet rule is: All access to the Internet is allowed EXCEPT remote devices with the range of IP addresses in the manufacturing department and any port number which are disallowed to communicate with any IP address/port number over my Internet connection using any IP protocol.
  • Page 58 Step 4 In case of adding a new selection rule, the following screen shows: Step 5 Enter the following information: Rule No.: a number used for identification purposes. Rule Name: a name by which you will refer to this rule. Interface: the specific WAN interface to which this new selection rule applies.
  • Page 59 necessary.If you highlighted an existing entry and clicked Delete instead, the corresponding entry in the rule table will be removed. TCP/IP Service Port Range Type BootP/DHCP 67-68 Finger 20-21 HTTP 80/8080 NetBIOS 137-139 NNTP SMTP SNMP 161-162 Sun RPC Telnet TFTP Whois Table 4-1 TCP/IP Port Assignments...
  • Page 60 in the rule table followed by clicking the Edit button. Step 4 In case of adding a new selection rule, the following screen shows: Step 5 Enter the following information: Rule No.: a number used for identification purposes. Rule Name: a name by which you will refer to this rule. Interface: the specific WAN interface this new selection rule will apply IPX Packet Type: The packet type to which the rule applies.
  • Page 61 Network Number, a range of IPX Network Numbers, or any IPX Network Number. The screen may change to show fields you need to fill out accordingly. For example, if you select range, you will also see (From) and (To) fields where you need to fill out the starting IPX Network Number and the ending IPX Network Number.
  • Page 62 To install public servers on your network (e.g., Web or ftp servers), you need to apply for an IP address for each server plus one for the LAN port of the Wireless Router. All these public IP addresses have to belong to the same IP network.
  • Page 63 Wireless Router router. To reconnect, you need to restart your device. This is so that your device will re-acquire the IP address from the Wireless Router router based on the new private IP address, and then your 4-19...
  • Page 64 Routing Table to display or modify the IP Routing Table (The operation for Address Translation and static DHCP are described in previous sections.) The IP Routing Table The IP routing table contains all the information that the Wireless Router needs to 4-20...
  • Page 65 The following screen shows an example of the IP routing table. When an IP packet arrives in the Wireless Router, IP tries to determine if the destination IP address contained in the packet is within the network defined by the “Dest IP”...
  • Page 66 following screen: Step 2 Enter the following information: Add Default Route: select if you want to specify a new default route. Note that the Remote IP Address and Remote IP netmask fields do not appear if you select this option. Note: Mis-configuring the default route may result in abnormal system behavior and/or unnecessary telephone charges.
  • Page 67 SAP Table to display or modify the IPX SAP Table. The IPX Routing Table The IPX routing table contains all the information that the Wireless Router needs to route an IPX data packet. You can view the IPX routing table by clicking on the IPX Routing Table button at the bottom of the System IPX Configuration screen.
  • Page 68 IPX routing table. When an IPX packet arrives in the Wireless Router, IPX tries to determine if the destination IPX Network Number contained in the packet is within the network defined by the “Network Number” in an entry in the routing table. If a match is found, the packet is forwarded to the interface or profile specified in the “Gateway IfName”...
  • Page 69 display the following screen: Step 2 Enter the following information: Add IPX: select the type of entry to be added. If you specify a Default Route, the Destination Network Number and Hop Count fields do not appear. Select Static Route if you want to add a static route. Note: Mis-configuring the IPX default route may result in abnormal system behavior and/or unnecessary telephone charges.
  • Page 70 entries to the table. The following screen shows an example of the IPX SAP table. SAP table entries contain the following pieces of information: Server Name: This is a string of up to 48 characters that identifies the device providing the service Network Number: This is the identification of the network on which the Server resides Node: The node address of the device providing the service.
  • Page 71 The Wireless Router will respond to a workstation request for the names and address information of servers of a specific service types or all service types. The router will search the SAP table for these entries and respond with the necessary information that the workstation can use to communicate with the desired service.
  • Page 72 Note: Enabling the learning protocol does not enable bridging on any connection on the Wireless Router. You must enable bridging in the Connection Profile for a specific WAN connection. Step 3 Click APPLY.
  • Page 73 How to configure general system settings How to View the Connection Log The Wireless Router provides a connection log that you can use to track the connections in establlished both out of or into your Wireless Router. Connect and disconnect messages can be useful in determining connection costs, Trigger messages are useful in determining the particular device and application that triggered the connection.
  • Page 74 The following screen is displayed: Step 2 To update the Wireless Router software, download the software from distributor’s web site and install the software in your local environment first, then from the above screen enter a path or filename (e.g., a:\P17v500.sig), or click Browse to select the path for the firmware.
  • Page 75 How to Save or Clear Configuration Changes Every 30 minutes, the Wireless Router looks for configuration changes that have been made and save them into the router’s permanent memory. You can use the Configuration Data Options features to manually save changes or clear the configuration (i.e., to restore to its factor default configuration).
  • Page 76 The following screen displays: Step 2 Click YES to reset the Wireless Router. If you do not want to reset the system, Click No. Note: Resetting the Wireless Router disconnects any active calls, and therefore may disrupt current data traffic. Unless you manually save the configuration, you may also lose most-recent configuration changes (that have been made within the last 30 minutes after the last auto-configuration save).
  • Page 77 Wireless Router Console port. The default port settings are 19200, 8, None, 1, None. Step 2 Turn off the Wireless Router, then turn it on again. In the console window, you’ll see the message “Loading firmware...”. Step 3 When you see the message "Ready", immediately (within one second) press Control-C.
  • Page 78 Enter the following information: System Uptime: the elapsed time since the Wireless Router was powered on(display only). System Name: a unique name that you assign to this Wireless Router. System Contact: the network administrator responsible for maintaining the network. System Location: where the Wireless Router is physically located.
  • Page 79 6Wireless Messages This chapter lists messages you may see in the 904S ARM message window. System Messages ****** has to be an integer [0123456789] The entered field (******) is not a valid integer. ****** has to be valid IP address The entered field (******) is an invalid IP address format or an invalid IP address value.
  • Page 80 A valid IPX network number may only contain hexadecimal numbers, (0-9, a-f) and may be up to 8 characters in length. "Browser failed to send out user’ s command. Please try again." A temporary error has occurred while trying to communicate with the router. Please repeat the operation.
  • Page 81 "The confirmed encryption key doesn't match" The encryption key entered in the "Confirm Encryption Key" field is not the same as the key in "Encryption key" field. "Invalid DHCP static IP address" An Invalid static DHCP IP address has been detected. This is not permitted. Please select another address or modify the original entry.
  • Page 82 operation may take up to several minutes, depending upon the modem responses. "Download firmware, please wait (2 minutes)..." System is downloading new firmware. It takes about two minutes to complete the operation. "Duplicate public port" The specified public port is already used in a static NAT Table entry "Duplicate static assignment"...
  • Page 83 An invalid IP route has entered. Please check the parameters entered and try again. "Failed to configure system IPX. Please check input and try again" The IPX Network Number entered is not valid. IPX Network Numbers consist of eight hexadecimal digits (0-9, a-f). "Failed to remove DHCP lease entry"...
  • Page 84 Current DHCP entry can’t be accessed. "Invalid Filter IP Address" This message is displayed when an IP address with a syntax error is entered. An IP address should be a set of four three-digit numbers. Each three-digit number should be between 0 and 255, inclusive. For example, a correct IP address is 192.168.100.2. "Invalid Entry: Private Port"...
  • Page 85 The IP address entered in the static DHCP configuration form is invalid. Please check all parameters entered. "Remote Tunnel Name is required" Each tunnel configuration requires a remote system name for authentication. If such a name is not provided or is invalid, this message will be displayed. "IP Address is invalid"...
  • Page 86 "The menu option you clicked on can’ t be found. Please try again." An internal error has occurred. Please try this operation again. "NAT translation failed. Procotol not supported." A Network Address Translation operation failed because the packet protocol type was unknown or is not supported.
  • Page 87 "Passwords are 6 - 15 characters (numbers, letters, dashes, underscores, dashes or colons) starting with a letter or a number" The password entered is invalid. A passwords must be more than 6 characters and less than 15 characters. They can be digits, letters, dashes, underscores, dashes or colons, and must begin with a letter or a digits.
  • Page 88 numbers have been reserved by the system: 9800, 9801, 9802, 17783, and 17784. "Remote call back phone number unspecified" “Call Back” is selected but a “Call Back Phone Number” is not provided. "Remote name unspecified" Please enter a Remote Name. This is a required parameter in a VPN tunnel configuration.
  • Page 89 A tunnel profile defined as "Incoming Only" cannot be used in an outgoing VPN profile. "Static entry not found" An attempt was made to locate an entry which does not exist. "Statistics Cleared" The Broadband Router has completed a clear statistics operation on the link selected in the System Status Monitoring Window.
  • Page 90 message informs the user that ongoing operations may be interrupted and that any configuration changes made within the last 30 minutes (the default time period for automatic configuration saves), may be lost as a result. "This profile no longer exists" The profile being configured no longer exists in the system.
  • Page 91 port (if available), from a LAN-attached device, or through a non-Internet connection. Note: Address Translation only applies to Internet connections 6-13...
  • Page 92: Specifications

    Specifications • Internet Access via Cable or xDSL • Accessing Servers from the Public Network • Supporting Inter-office Communication • Supporting Dial-In Access to your Network • Supporting Multimedia Applications • Creating Virtual Private Network Features Internet Access, Multimedia Applications and Virtual Server •...
  • Page 93 • Configuration data upload and download via TFTP • Internet Access time restriction feature • Support DHCP server/client • SNMP MIB support, easily for MIS staff • Multiple connection profile Monitoring • Runtime traffic monitoring • Connection log • Syslog Security •...
  • Page 94 • LED: 17 LEDs for Power.WLAN; WAN: KN/ACT, COL; LAN: 10/100, LNK/ ACT, FDX/COL for port 1, 2, 3, 4; PPPoE • 1 power jack for AC Adapter 9V/1A • 1 Power Switch...
  • Page 95 BWireless Glossary This section provides some common networking terms you may find in this user guide. ARP, ARP Table To send an IP packet to another device on the same LAN, the source device needs to know the MAC address of the destination device first. If such information is already maintained in the ARP (Address Resolution Protocol) table, the corresponding MAC address will be used to transmit the data packet.
  • Page 96 Broadcast, Unicast A data packet contains data, the sender’s address and the receiver’s address - just like a letter to be mailed. There is a special type of data packet that is delivered to every destination on the network. This is called a broadcast packet. When there is only a single receiving party, it is called a unicast packet.
  • Page 97 DHCP, DHCP Client, DHCP Server DHCP (the Dynamic Host Control Protocol) is the protocol that a DHCP client uses to communicate with a DHCP server to ask for an IP address to be assigned. Other network parameters that can be assigned using the DHCP protocol include network mask, the primary DNS IP address, the secondary DNS IP address, the default gateway IP address, WINS Server addresses, NetBIOS Node Type, etc.
  • Page 98 occurs. If the user uses a dial-up service to access the Internet, the associated telecommunication cost is often directly proportional to the amount of time the user uses the network service to connect to the Internet. Therefore, the Idle Timeout is designed so that after there is no traffic to the Internet for a pre-configured amount of time, the connection will automatically be taken down.
  • Page 99 This feature can be used to block certain types of data, such as for security reasons, or when parents want to make sure that their children do not access certain web sites. IP Multicast A protocol that allows only one copy of data to be sent out for multiple destinations in the network.
  • Page 100 Note that for the Wireless Router, only LAN-to-LAN connections (between two Wireless Router) support Multilink PPP.
  • Page 101 communicate with the Internet, all devices on the LAN will be assigned private IP addresses. Although they are free to communicate with the outside world, they are not reachable from the Internet, making the LAN a private network to the outside world. Protocol A protocol is a set of rules for interaction agreed upon between multiple parties so that when they interface with each other based on such a protocol, the interpretation...
  • Page 102 The routing table normally contains, for each destination network, the network address of the next hop router, the hop count to the destination network, an aging count, among other information. The aging count is for information aging purposes: the routing table is periodically exchanged and kept up-to-date.
  • Page 103 having to pay long distance charges. It consists of two parts: (1) a method to create a tunnel between two communicating devices, and (2) a method to encrypt/decrypt out-going/in-coming data. The standard tunneling protocol is L2TP, which stands for Layer 2 Tunnel Protocol. PPTP, a de facto standard from Microsoft, is being gradually replaced by it.
  • Page 104 Warranty Policy. 1. WARRANTY: Wireless Router (the "Product") carry a one (1) year limited warranty, except for the power supply units, which carry a one (1) year limited warranty (collectively the Warranty).
  • Page 105 without charge to the customer. If, in the company opinion, it is impractical for any reason to repair or replace the Product, company may at its option refund or pay an amount equal to the lesser of (1) the purchase price paid for the product or (2) the then effective company estimated purchase price for the Product.

Table of Contents