Conceptronic 150N Wireless LAN Broadband Router User Manual

150n wireless lan broadband router
Table of Contents

Advertisement

Quick Links

Conceptronic
150N Wireless LAN Broadband
Router
User's Manual
Version: 2.0

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the 150N Wireless LAN Broadband Router and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Conceptronic 150N Wireless LAN Broadband Router

  • Page 1 Conceptronic 150N Wireless LAN Broadband Router User’s Manual Version: 2.0...
  • Page 2: Table Of Contents

    Contents CHAPTER I: PRODUCT INFORMATION 1-1. Introduction and safety information 1-2. Safety Information 1-3. Package Contents 1-4. Familiar with your new wireless broadband router CHAPTER II: SYSTEM AND NETWORK SETUP 2-1. Build network connection 2-2. Connecting to wireless broadband router by web browser 2-2-1.
  • Page 3 2-6. Wired LAN Configurations 2-6-1. LAN IP section 2-6-2. DHCP Server 2-6-3. Static DHCP Leases Table 2-7. Wireless LAN Configurations 2-7-1. Basic Wireless Settings 2-7-1-1. Setup procedure for ‘AP' 2-7-1-2. Setup procedure for ‘Station-Infrastructure' 2-7-1-3. Setup procedure for ‘AP Bridge - Point to Point’ 2-7-1-4.
  • Page 4 3-4. System Status 3-4-1. System information and firmware version 3-4-2. Internet Connection Status 3-4-3. Device Status 3-4-4. System Log 3-4-5. Active DHCP client list 3-4-6. Statistics 3-5. Configuration Backup and Restore 3-6. Firmware Upgrade 3-7. System Reset CHAPTER IV: APPENDIX 4-1.
  • Page 5: Introduction And Safety Information

    Chapter I: Product information 1-1. Introduction and safety information Thank you for purchasing this wireless broadband router! This high cost-efficiency router is the best choice for Small office / Home office users, all computers and network devices can share a single xDSL / cable modem internet connection at high speed.
  • Page 6: Safety Information

    1-3. Package contents The following items are present in the package of the Conceptronic 150N Wireless Router:  Conceptronic C150BRS4 – 150N Wireless Router ...
  • Page 7: Familiar With Your New Wireless Broadband Router

    1-4. Familiar with your new wireless broadband router Front Panel LED Name Light Status Description Router is switched on and correctly powered. Wireless WPS function is enabled. WLAN Wireless network is switched off. Flashing Wireless LAN activity (transferring or receiving data). WAN port is connected.
  • Page 8: Chapter Ii: System And Network Setup

    Chapter II: System and network setup 2-1. Build network connection Please follow the following instruction to build the network connection between your new WIRELESS router and your computers, network devices: Connect your xDSL / cable modem to the WAN port of router by Ethernet cable. Connect all your computers, network devices (network-enabled consumer devices other than computers, like game console, or switch / hub) to the LAN port of the router.
  • Page 9: Windows Xp Ip Address Setup

    2-2-1. Windows XP IP address setup: A. Click „Start‟ button (it should be located at lower-left corner of your computer), then click control panel. Double-click Network and Internet Connections icon, click Network Connections, then double-click Local Area Connection, Local Area Connection Status window will appear, and then click „Properties‟...
  • Page 10: Windows Vista Ip Address Setup

    2-2-2. Windows Vista IP address setup: Click „Start‟ button (it should be located at lower-left corner of your computer), then click control panel. Click View Network Status and Tasks, and then click Manage Network Connections. Right-click Local Area Network, then select ‘Properties’. Local Area Connection Properties window will appear, select „Internet Protocol Version 4 (TCP / IPv4)‟, and then click...
  • Page 11: Router Ip Address Lookup

    2-2-3. Router IP address lookup After the IP address setup is complete, please click „Start‟ -> „Run‟ at the bottom-lower corner of your desktop: Input „cmd‟, then click „OK‟...
  • Page 12: Connect The Router's Management Interface By Web Browser

    Input „ipconfig‟, then press „Enter‟ key. Please check the IP address followed by „Default Gateway‟ (In this example, the IP address of router is 192.168.0.1, please note that this value may be different.) Note: If the IP address of Gateway is not displayed, or the address followed by „IP Address‟ begins with „169‟, please recheck network connection between your computer and router, and / or go to the beginning of this chapter, to recheck every step of network setup procedure.
  • Page 13 Note: If you can‟t see the web management interface, and you‟re being prompted to input user name and password again, it means you didn‟t input username and password correctly. Please retype user name and password again. If you‟re certain about the user name and password you type are correct, please go to „4-2 Troubleshooting‟...
  • Page 14: Using 'Quick Setup

    2-3. Using ‘Quick Setup’ This router provides a „Quick Setup‟ procedure, which will help you to complete all required settings you need to access the Internet in very short time. Please follow the following instructions to complete the „Quick Setup‟: Please go to QuickSetup menu by clicking „Quick Setup‟...
  • Page 15 After you finish with all settings, please click „Apply‟ button. Broadband Type Please choose the broadband (Internet connection) type you‟re using in this page. There are six types of Internet connection, they are: Dynamic IP - Please go to section 2-3-1 Static IP - Please go to section 2-3-2 PPPoE...
  • Page 16: Setup Procedure For 'Dynamic Ip

    2-3-1. Setup procedure for ‘Dynamic IP’ Here are descriptions of every setup items: Host Name Please input the host name of your computer, this is optional, and only required if your service provider asks you to do so. MAC address Please input MAC address of your computer here, if your service provider only permits computer with certain MAC address to access internet.
  • Page 17: Setup Procedure For 'Static Ip

    2-3-2. Setup procedure for ‘Static IP’ Here are descriptions of every setup items: IP address Please input IP address assigned by your service provider. Subnet Mask Please input subnet mask assigned by your service provider DNS address Please input the IP address of DNS server provided by your service provider. Gateway Address Please input the IP address of the Gateway provided by your service provider.
  • Page 18: Setup Procedure For 'Pppoe Xdsl

    2-3-3. Setup procedure for ‘PPPoE’ Here are descriptions of every setup items: User Name Please input user name assigned by your Internet service provider here. Password Please input the password assigned by your Internet service provider here. Service Name Please give a name to this Internet service, this is optional Please input the MTU value of your network connection here.
  • Page 19: Setup Procedure For 'Pptp Xdsl

    2-3-4. Setup procedure for ‘PPTP’ PPTP requires two kinds of setting: WAN interface setting (setup IP address) and PPTP setting (PPTP user name and password). Here we start from WAN interface setting: Select the type of how you obtain IP address from your service provider here. You can choose „Obtain an IP address automatically‟...
  • Page 20 Next, the PPTP settings section: Here are descriptions of every setup items: User Name Please input user ID (user name) assigned by your Internet service provider here. Password Please input the password assigned by your Internet service provider here. PPTP Gateway Please input the IP address of PPTP gateway assigned by your Internet service provider here.
  • Page 21: Setup Procedure For 'L2Tp Xdsl

    2-3-5. Setup procedure for ‘L2TP’ L2TP is another popular connection method for xDSL and other Internet connection types, and all required setting items are the same with PPTP connection. Like PPTP, there are two kinds of required setting. We‟ll start from „WAN Interface Settings‟: Please select the type of how you obtain IP address from your service provider here.
  • Page 22 Next, the L2TP settings section: Here are descriptions of every setup items: User Name Please input user ID (user name) assigned by your Internet service provider here. Password Please input the password assigned by your Internet service provider here. L2TP Gateway Please input the IP address of PPTP gateway assigned by your Internet service provider here.
  • Page 23: Setup Procedure For 'Telstra Big Pond

    2-3-6. Setup procedure for ‘Telstra Big Pond’ This setting only works when you‟re using Telstra big pond‟s network service in Australia. You need to input: User Name Please input the user name assigned by Telstra. Password Please input the password assigned by Telstra. Assign login server manually Check this box to choose login server by yourself.
  • Page 24: Basic Setup

    2-4. Basic Setup In this chapter, you‟ll know how to change the time zone, password, and remote management settings. Please start your web browser and log onto router web management interface, then click „General Setup‟ button on the left, or click „General Setup‟ link at the upper-right corner of web management interface. 2-4-1.
  • Page 25: Change Management Password

    You‟ll see the following message displayed on web browser: Press „Continue‟ to save the settings made and back to web management interface; press „Apply‟ to save the settings made and restart the router so the settings will take effect after it reboots. Note: You can refer to the instructions given in last chapter: „Using Quick Setup‟, for detailed descriptions on time zone settings.
  • Page 26 If the password you typed in „New Password‟ and „Confirm Password‟ field are not the same, you‟ll see the following message: Please retype the new password again when you see above message. If you see the following message: It means the content in „Current Password‟ field is wrong, please click „OK‟ to go back to previous menu, and try to input current password again.
  • Page 27: Remote Management

    2-4-3. Remote Management This router does not allow management access from Internet, to prevent possible security risks (especially when you defined a weak password, or didn‟t change default password). However, you can still management this router from a specific IP address by enabling the „Remote Management‟ Function. To do so, please follow the following instructions: Please click „System‟...
  • Page 28 Note: When you want to manage this router from another computer on internet, you have to input the IP address and port number of this router. If your Internet service provider assigns you with a static IP address, it will not be a problem; but if the IP address your service provider assigns to you will vary every time you establish an internet connection, this will be a problem.
  • Page 29: Setup Internet Connection (Wan Setup)

    2-5. Setup Internet Connection (WAN Setup) Internet connections setup can be done by using „Quick Setup‟ menu described in chapter 2-3. However, you can setup WAN connections up by using WAN configuration menu. You can also set advanced functions like DDNS (Dynamic DNS) here.
  • Page 30: Setup Procedure For 'Dynamic Ip

    2-5-1. Setup procedure for ‘Dynamic IP’: Here are descriptions of every setup items: Host Name Please input host name of your computer, this is optional, and only required if your service provider asks you to do so. MAC Address Please input MAC address of your computer, if your service provider only permits computer with certain MAC address to access internet.
  • Page 31: Setup Procedure For 'Static Ip

    2-5-2. Setup procedure for ‘Static IP’: Here are descriptions of every setup items: IP Address Please input IP address assigned by your service provider. Subnet Mask Please input subnet mask assigned by your service provider Default Gateway Please input the IP address of DNS server provided by your service provider. After you finish with all settings, please click „Apply‟...
  • Page 32: Setup Procedure For 'Pppoe

    2-5-3. Setup procedure for ‘PPPoE’: Here are descriptions of every setup items: User Name Please input user name assigned by your Internet service provider here. Password Please input the password assigned by your Internet service provider here. Service Name Please give a name to this Internet service, this is optional. Please input the MTU value of your network connection here.
  • Page 33: Setup Procedure For 'Pptp

    After you finish with all settings, please click „Apply‟ button and the following message will be displayed on your web browser: Please click „Continue‟ to back to previous setup menu; to continue on other setup procedures, or click „Apply‟ to reboot the router so the settings will take effect (Please wait for about 30 seconds while router is rebooting). If you want to reset all settings in this page back to previously-saved value, please click „Cancel‟...
  • Page 34 Here we start from WAN interface setting: Select the type of how you obtain IP address from your service provider here. You can choose „Obtain an IP address automatically‟ (equal to DHCP, please refer to „Dynamic IP‟ section above), or „Use the following IP address‟...
  • Page 35: Setup Procedure For 'L2Tp

    2-5-5. Setup procedure for ‘L2TP’: Here are descriptions of every setup items: User ID Please input user ID (user name) assigned by your Internet service provider here. Password Please input the password assigned by your Internet service provider here. L2TP Gateway Please input the IP address of PPTP gateway assigned by your Internet service provider here.
  • Page 36: Setup Procedure For 'Telstra Big Pond

    Please click „Continue‟ to back to previous setup menu; to continue on other setup procedures, or click „Apply‟ to reboot the router so the settings will take effect (Please wait for about 30 seconds while router is rebooting). If you want to reset all settings in this page back to previously-saved value, please click „Cancel‟ button. 2-5-6.
  • Page 37 to reboot the router so the settings will take effect (Please wait for about 30 seconds while router is rebooting). If you want to reset all settings in this page back to previously-saved value, please click „Cancel‟ button.
  • Page 38: Setup Procedure For 'Dns

    2-5-7. Setup procedure for ‘DNS’: If you select „Dynamic IP’ or „PPPoE‟ as Internet connection method, at least one DNS server‟s IP address should be assigned automatically. However, if you have preferred DNS server, or your service provider didn‟t assign the IP address of DNS server because of any reason, you can input the IP address of DNS server here.
  • Page 39: Setup Procedure For 'Ddns

    2-5-8. Setup procedure for ‘DDNS’: DDNS (Dynamic DNS) is an IP-to-Hostname mapping service for those Internet users who don‟t have a static (fixed) IP address. It will be a problem when such user wants to provide services to other users on Internet, because their IP address will vary every time when connected to Internet, and other user will not be able to know the IP address they‟re using at a certain time.
  • Page 40 After you finish with all settings, please click „Apply‟ button and the following message will be displayed on your web browser: Please click „Continue‟ to back to previous setup menu; to continue on other setup procedures, or click „Apply‟ to reboot the router so the settings will take effect (Please wait for about 30 seconds while router is rebooting). If you want to reset all settings in this page back to previously-saved value, please click „Cancel‟...
  • Page 41: Wired Lan Configurations

    2-6. Wired LAN Configurations Before all computers using wired Ethernet connection (i.e. those computers connect to this router‟s LAN port 1 to 4 by Ethernet cable) can communicate with each other and access internet, they must have a valid IP address. There are two ways to assign IP addresses to computers: static IP address (set the IP address for every computer manually), and dynamic IP address (IP address of computers will be assigned by router automatically.
  • Page 42: Lan Ip Section

    2-6-1. LAN IP section: Here are descriptions of every setup items: IP address Please input the IP address of this router. Subnet Mask Please input subnet mask for this network. 802.1d Spanning Tree If you wish to activate 802.1d spanning tree function, select „Enabled‟ for setup item „802.1d Spanning Tree‟, or set it to „Disabled‟...
  • Page 43: Dhcp Server

    2-6-2. DHCP Server: These settings are only available when „DHCP Server‟ in „LAN IP‟ section is „Enabled‟, and here are descriptions of every setup items: Lease Time Please choose a lease time (the duration that every computer can keep a specific IP address) of every IP address assigned by this router from dropdown menu.
  • Page 44: Static Dhcp Leases Table

    2-6-3. Static DHCP Leases Table: This function allows you to assign a static IP address to a specific computer forever, so you don‟t have to set the IP address for a computer, and still enjoy the benefit of using DHCP server. Maximum 16 static IP addresses can be assigned here.
  • Page 45: Wireless Lan Configurations

    2-7. Wireless LAN Configurations If your computer, PDA, game console, or other network devices which is equipped with wireless network interface, you can use the wireless function of this router to let them connect to Internet and share resources with other computers with wired-LAN connection. You can also use the built-in security functions to protect your network from being intruded by malicious intruders.
  • Page 46: Basic Wireless Settings

    2-7-1. Basic Wireless Settings Please click „Wireless‟ menu on the left of web management interface, then click „Basic Settings‟, and the following message will be displayed on your web browser: This wireless router can work in 6 modes: Access Point Standard wireless AP.
  • Page 47 Please select a proper operation mode you want to use from „Mode‟ dropdown menu, and continue on other operation mode specific settings: Access Point - Please go to section 2-7-1-1 Station-Infrastructure - Please go to section 2-7-1-2 AP Bridge-Point to Point - Please go to section 2-7-1-3 AP Bridge-Point to Multi-Point - Please go to section 2-7-1-4 AP Bridge-WDS...
  • Page 48 2.4 GHz (G) 2.4GHz band, only allows 802.11g wireless network client to connect this router (maximum transfer rate 54Mbps). 2.4 GHz (B+G+N) 2.4GHz band, allows 802.11b, 802.11g, and 802.11n wireless network client to connect this router (maximum transfer rate 11Mbps for 802.11b clients, maximum 54Mbps for 802.11g clients, and maximum 150Mbps for 802.11n clients).
  • Page 49: Setup Procedure For 'Station-Infrastructure

    2-7-1-2. Setup procedure for ‘Station-Infrastructure’: In this mode, you can connect the router to Ethernet device such us TV, Game player, HDD&DVD to enable the Ethernet device be a wireless station and join to a wireless network through an access point or AP router. Here are descriptions of every setup items: Band Select the band you want to use.
  • Page 50: Setup Procedure For 'Ap Bridge-Point To Point

    2-7-1-3. Setup procedure for ‘AP Bridge-Point to Point’: In this mode, you can connect your wireless router with another, to combine two access points and expand the scope of wireless network, and all clients (wired only – AP will not accept wireless clients in this mode) of two wireless routers will think they‟re on the same physical network.
  • Page 51: Setup Procedure For 'Ap Bridge-Point To Multi-Point

    2-7-1-4. Setup procedure for ‘AP Bridge-Point to Multi-Point’: In this mode, you can connect your wireless router with at least four wireless routers to expand the scope of wireless network, and all clients (wired only – AP will not accept wireless clients in this mode) of the wireless routers will think they‟re on the same physical network.
  • Page 52: Setup Procedure For 'Ap Bridge - Wds

    2-7-1-5. Setup procedure for ‘AP Bridge – WDS’ In this mode, you can expand the scope of network by combining up to four other access points together, and every access point can still accept wireless clients. Note: For WDS mode, the output signal nature is the same as that of normal AP mode. Here are descriptions of every setup items: Band Select the band you want to use, all the wireless routers must use the same setting.
  • Page 53: Setup Procedure For 'Universal Repeater

    2-7-1-6. Setup procedure for ‘Universal Repeater’ In this mode, the router can act as a wireless repeater; it can be Station and AP at the same time. It can use Station function to connect to a Root AP and use AP function to service all wireless stations within its coverage. Note: For Repeater Mode, this router will demodulate the received signal, checking if this signal is noise for the operating network then have the signal modulated and amplified again.
  • Page 54: Advanced Wireless Settings

    After you finish the wireless setting, please click „Apply‟ button, after you click „Apply‟, the following message will be displayed on your web browser: Please click „Continue‟ to back to previous setup menu; to continue on router setup, or click „Apply‟ to reboot the router so the settings will take effect (Please wait for about 30 seconds while router is rebooting).
  • Page 55 Here are descriptions of every setup items: Fragment Threshold Set the Fragment threshold of wireless radio. Do not modify default value if you don’t know what it is, default value is 2346. RTS Threshold Set the RTS threshold of wireless radio. Do not modify default value if you don’t know what it is, default value is 2347.
  • Page 56: Wireless Security

    After you finish these wireless settings, please click „Apply‟ button, button, and the following message will be displayed on your web browser: Please click „Continue‟ to back to previous setup menu; to continue on router setup, or click „Apply‟ to reboot the router so the settings will take effect (Please wait for about 30 seconds while router is rebooting).
  • Page 57: Wep - Wired Equivalent Privacy

    2-7-3-2. WEP - Wired Equivalent Privacy When you select this mode, the wireless router will use WEP encryption, and the following setup menu will be shown on your web browser: Here are descriptions of every setup items: Key Length There are two types of WEP key length: 64-bit and 128-bit. Using „128-bit‟ is safer than ‟64-bit‟, but will reduce some data transfer performance.
  • Page 58 RADIUS Server IP Address Please input the IP address of radius server here RADIUS Server Port Please input the port number of radius server here. RADIUS Server Password Please input the port number of radiuspassword here. Tips: Some examples of WEP key (Don‟t use those examples; use the one of your own!): ASCII (5 characters): pilot phone...
  • Page 59: Wi-Fi Protected Access (Wpa)

    2-7-3-3. Wi-Fi Protected Access (WPA): When you select this mode, the wireless router will use WPA encryption, and the following setup menu will be shown on your web browser: Here are descriptions of every setup items: WPA Unicast Cipher Suite Please select a type of WPA cipher suite.
  • Page 60: Wpa Radius

    2-7-3-4. WPA RADIUS: If you have a RADIUS server, this router can work with it and provide safer wireless authentication. Here are descriptions of every setup items: WPA Unicast Cipher Suite Please select a type of WPA cipher suite. Available options are: WPA (TKIP), WPA2 (AES), and WPA2 Mixed. You can select one of them, but you have to make sure your wireless client support the cipher you selected.
  • Page 61: Wireless Access Control

    2-7-4. Wireless Access Control This function will help you to prevent unauthorized users from connecting to your wireless router; only those wireless devices who have the MAC address you assigned here can gain access to your wireless router. You can use this function with other security measures described in previous section, to create a safer wireless environment.
  • Page 62 Comment You can input any text here as the comment of this MAC address, like „ROOM 2A Computer‟ or anything. You can input up to 16 alphanumerical characters here. This is optional and you can leave it blank, however, it‟s recommended to use this field to write a comment for every MAC addresses as a memory aid.
  • Page 63: Wi-Fi Protected Setup (Wps)

    2-7-5. Wi-Fi Protected Setup (WPS) Wi-Fi Protected Setup (WPS) is the simplest way to build connection between wireless network clients and this wireless router. You don‟t have to select encryption mode and input a long encryption passphrase every time when you need to setup a wireless client, you only have to press a button on wireless client and this wireless router, and the WPS will do the rest for you.
  • Page 64 Here are descriptions of every setup items: Enable WPS Check this box to enable WPS function, uncheck it to disable WPS. WPS Information WPS-related system information will be displayed here: WPS Status: If the wireless security (encryption) function of this wireless router is properly set, you‟ll see „Configured‟...
  • Page 65: Security Tips For Wireless Network

    2-7-6. Security Tips for Wireless Network Here are some quick tips to help you improve the security level of your wireless network: 1. Never use simple words (like school, apple and computer) as WEP encryption or WPA passphrase. 2. A complicated (the combination of number, alphabet, even symbol, and long enough) WEP key and WPA passphrase is much safer than simple and short ones.
  • Page 66: Chapter Iii: Advanced Functions

    Chapter III: Advanced functions 3-1. Quality of Service (QoS) Quality of service provides an efficient way for computers on the network to share the internet bandwidth with a promised quality of internet service. Without QoS, all computers and devices on the network will compete with each other to get internet bandwidth, and some applications which require guaranteed bandwidth (like video streaming and network telephone) will be affected, therefore an unpleasing result will occur, like the interruption of video / audio transfer.
  • Page 67 Here are descriptions of every setting: Enable QoS Check this box to enable QoS function, unselect this box if you don‟t want to enforce QoS bandwidth limitations. Total Download Bandwidth You can set the limit of total download bandwidth in kbits. To disable download bandwidth limitation, input „0‟...
  • Page 68: Add A New Qos Rule

    3-1-2. Add a new QoS rule After you click „Add‟ button in QoS menu, the following message will appear: Here are descriptions of every setup items: Rule Name Please give a name to this QoS rule (up to 15 alphanumerical characters) Bandwidth Set the bandwidth limitation of this QoS rule.
  • Page 69 Traffic Type Please select the traffic type of this rule, available options are None, SMTP, HTTP, POP3, and FTP. You can select a specific traffic type for this rule, if you want to make this rule as a IP address based rule (apply the limitation on all traffics from / to the specified IP address / port number), select „None‟.
  • Page 70: Network Address Translation (Nat)

    3-2. Network Address Translation (NAT) Network address translations solve the problem if sharing a single IP address to multiple computers. Without NAT, all computers must be assigned with a valid Internet IP address to get connected to Internet, but Internet service providers only provide very few IP addresses to every user.
  • Page 71: Port Forwarding

    3-2-2. Port Forwarding This function allows you to redirect a single port or consecutive ports of Internet IP address to the same port of the IP address on local network. The port number(s) of Internet IP address and private IP address (the IP address on local network) must be the same.
  • Page 72 Add the mapping to port forwarding table. Reset Remove all inputted values. Port Forwarding Table All existing port forwarding mappings will be displayed here. Delete Please select a port forwarding mapping by clicking the „Select‟ box of the mapping, then click „Delete Selected‟ button to remove the mapping. If there‟s no existing mapping, this button will be grayed out.
  • Page 73: Virtual Server

    3-2-3. Virtual Server This function allows you to redirect a port on Internet IP address (on WAN port) to a specified port of an IP address on local network, so you can setup an Internet service on the computer on local network, without exposing it on Internet directly.
  • Page 74 Delete Please select a virtual server mapping by clicking the „Select‟ box of the mapping, then click „Delete Selected‟ button to remove the mapping. If there‟s no existing mapping, this button will be grayed out. Delete All Delete all mappings existed in virtual server table. Reset Unselect all mappings.
  • Page 75: Port Mapping For Special Applications

    3-2-4. Port Mapping for Special Applications Some applications require more than one connection a time; these applications won‟t work with simple NAT rules. In order to make these applications work, you can use this function to let these applications work. Here are descriptions of every setup items: Enable Check this box to enable special applications and uncheck this box to disable virtual...
  • Page 76 Current Trigger-Port All the settings for the special applications will be listed here. If you want to remove some Special Application settings from the " Current Trigger-Port Table", select the Special Application settings you want to remove in the table and then click "Delete Selected".
  • Page 77: Upnp Setting

    3-2-5. UPnP Setting This function enables network auto-configuration for peer-to-peer communications, with this function, network devices will be able to communicate with other devices directly, and learn about information about other devices. Many network device and applications rely on UPnP function nowadays. Please click „NAT‟...
  • Page 78: Alg Settings

    3-2-6. ALG Settings Application Layer Gateway (ALG) is a special function of this router. It includes many preset routing rules for numerous applications which require special support. With these supports, those applications which required special support will be able to work with NAT architecture. Please click „NAT‟...
  • Page 79: Firewall

    3-3. Firewall Excepting NAT, this router also provides firewall function to block malicious intruders from accessing your computers on local network. These functions include inbound attack prevention, and block outbound traffics, like block URLs which have pre-defined keywords. Please follow the following instructions to enable or disable firewall function: Please click „Firewall‟...
  • Page 80: Access Control

    3-3-1. Access Control This function allows or denies computers with specific MAC address from connecting to the network; it can also allow or deny computers with specific IP address, protocol, or port. Please click „Firewall‟ menu on the left of web management interface, then click „Access Control‟, and the following message will be displayed on your web browser: Here are descriptions of every setup items: Enable MAC Filtering...
  • Page 81: Add Pc

    Click „Add‟ button to add the MAC address and associated comment to the MAC address filtering table. Reset Remove all inputted values. Current MAC Filtering Table All existing MAC addresses in filtering table will be listed here. Delete If you want to delete a specific MAC address entry, check the „select‟ box of the MAC address you want to delete, then click „Delete Selected‟...
  • Page 82 3-3-1-1. Add PC After button is clicked, the following message will be displayed on your web browser: Here are descriptions of every setup items: Client PC Description Please input any text to describe this IP address, up to 16 alphanumerical characters. Client PC IP Address Please input the starting IP address in the left field, and input the end IP address in the right field to define a range of IP addresses, or just input the IP address in the left field...
  • Page 83: Url Blocking

    3-3-2. URL Blocking If you want to prevent computers in local network from accessing certain website (like pornography, violence, or anything you want to block), you can use this function to stop computers in local network from accessing the site you defined here.
  • Page 84 After you finish with all settings, please click „Apply‟ button, and the following message will be displayed on your web browser: Please click „Continue‟ to back to previous setup menu; to continue on other setup procedures, or click „Apply‟ to reboot the router so the settings will take effect (Please wait for about 30 seconds while router is rebooting). If you want to reset all settings in this page back to previously-saved value, please click „Cancel‟...
  • Page 85: Dos Attack Prevention

    3-3-3. DoS Attack Prevention Denial of Service (DoS) is a common attack measure, by transmitting a great amount of data or request to your Internet IP address and server, the Internet connection will become very slow, and server may stop responding because it is not capable to handle too much traffics.
  • Page 86 Sync Flood This is another kind of attack, which uses a lot of fake connection request to consume the memory of your server, and try to make your server become unusable. Check this box and the router will filter this kind of traffic out. Advanced Settings Click this button and you can set advanced settings of the DoS prevention method listed above, please see section 3-3-3-1 „DoS –...
  • Page 87: Dos - Advanced Settings

    3-3-3-1. DoS - Advanced Settings When you click „Advanced‟ button in DoS menu, the following message will be displayed on your web browser: Here are descriptions of every setup items: Ping of Death Set the threshold of when this DoS prevention mechanism will be activated. Please check the box of Ping of Death, and input the frequency of threshold (how many packets per second, minute, or hour), you can also input the „Burst‟...
  • Page 88: Demilitarized Zone (Dmz)

    3-3-4. Demilitarized Zone (DMZ) Demilitarized Zone (DMZ) refers to a special area in your local network. This area resides in local network, and all computers in this area uses private IP address, too. But these private IP addresses are mapped to a certain Internet IP address, so other people on Internet can fully access those computers in DMZ.
  • Page 89 Current DMZ Table All existing public IP address and private IP address mapping will be displayed here. Delete If you want to delete a specific DMZ entry, check the „select‟ box of the DMZ entry you want to delete, then click „Delete Selected‟ button. (You can select more than one DMZ entries).
  • Page 90: System Status

    3-4. System Status The functions described here will provide you with system related information. To enter system status menu, please either click „Status‟ link located at the upper-right corner of web management interface, or click „Status‟ button in main menu. 3-4-1.
  • Page 91: Internet Connection Status

    3-4-2. Internet Connection Status You can use this function to know the status of current Internet connection. Please click „Internet Connection‟ menu on the left of web management interface, and the following message will be displayed on your web browser: This information will vary depending on the connection status.
  • Page 92: System Log

    3-4-4. System Log All important system events are logged. You can use this function to check the event log of your router. Please click „System Log‟ menu on the left of web management interface, and the following message will be displayed on your web browser: The system events will be displayed in this page, and here are descriptions of every buttons: Save...
  • Page 93 3-4-5. Security Log All information about network and system security is kept here, and you can use this function to check the security event log of your router. Please click „Security Log‟ menu on the left of web management interface, and the following message will be displayed on your web browser: The system events will be displayed in this page, and here are descriptions of every buttons: Save...
  • Page 94: Active Dhcp Client List

    3-4-5. Active DHCP client list If you‟re using the DHCP server function of this router, you can use this function to check all active DHCP leases issued by this router. Please click „Active DHCP client‟ menu on the left of web management interface, and the following message will be displayed on your web browser: All information about active DHCP leases issued by this router will be displayed here.
  • Page 95: Configuration Backup And Restore

    3-5. Configuration Backup and Restore You can backup all configurations of this router to a file, so you can make several copied of router configuration for security reason. To backup or restore router configuration, please follow the following instructions: Please click „Tool‟ located at the upper-right corner of web management interface, then click „Configuration Tools‟...
  • Page 96: Firmware Upgrade

    3-6. Firmware Upgrade The system software used by this router is called as „firmware‟, just like any applications on your computer, when you replace the old application with a new one; your computer will be equipped with new function. You can also use this firmware upgrade function to add new functions to your router, even fix the bugs of this router.
  • Page 97: System Reset

    3-7. System Reset If you think the network performance is bad, or you found the behavior of the router is strange, you can perform a router reset, sometime it will solve the problem. To do so, please click „Tool‟ located at the upper-right corner of web management interface, then click „Reset‟ on the left of web management interface, then the following message will be displayed on your web browser: Please click „Apply‟...
  • Page 98: Chapter Iv: Appendix

    Chapter IV: Appendix 4-1. Troubleshooting If you found the router is working improperly or stop responding to you, don‟t panic! Before you contact your dealer of purchase for help, please read this troubleshooting first. Some problems can be solved by you within very short time! Scenario Solution...
  • Page 99 I can‟t locate my router by a. „Broadcast ESSID‟ set to off? my wireless client b. All two antennas are properly secured. c. Are you too far from your router? Try to get closer. d. Please remember that you have to input ESSID on your wireless client manually, if ESSID broadcast is disabled.
  • Page 100: Glossary

    4-2. Glossary Default Gateway (Router): Every non-router IP device needs to configure a default gateway‟s IP address. When the device sends out an IP packet, if the destination is not on the same network, the device has to send the packet to its default gateway, which will then send it out towards the destination.
  • Page 101 Port: Network Clients (LAN PC) uses port numbers to distinguish one network application/protocol over another. Below you will find a list of some common used ports and their corresponding application: Port Application Port Application FTP data (FTP server) HTTP (Web server) FTP data (FTP server) 110 POP3 (Mail server –...
  • Page 102: License Agreement

    Availability of source code Conceptronic. has exposed the full source code of the GPL licensed software, including any scripts to control compilation and installation of the object code. All future firmware updates will also be accompanied with their respective source code. For more information on how you can obtain our open source code, please visit our web...
  • Page 103 GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc. Temple Place, Suite 330, Boston, MA 02111-1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it.
  • Page 104 Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all.
  • Page 105 b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License.
  • Page 106 c) Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.) The source code for a work means the preferred form of the work for making modifications to it.
  • Page 107 7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all.
  • Page 108 10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally.
  • Page 109 GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
  • Page 110 To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the library is modified by someone else and passed on, the recipients should know that what they have is not the original version, so that the original author's reputation will not be affected by problems that might be introduced by others.
  • Page 111 The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a "work based on the library" and a "work that uses the library". The former contains code derived from the library, whereas the latter must be combined with the library in order to run. GNU LESSER GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0.
  • Page 112 2. You may modify your copy or copies of the Library or any portion of it, thus forming a work based on the Library, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) The modified work must itself be a software library.
  • Page 113 3. You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the Library. To do this, you must alter all the notices that refer to this License, so that they refer to the ordinary GNU General Public License, version 2, instead of to this License.
  • Page 114 Otherwise, if the work is a derivative of the Library, you may distribute the object code for the work under the terms of Section 6. Any executables containing that work also fall under Section 6, whether or not they are linked directly with the Library itself.
  • Page 115 For an executable, the required form of the "work that uses the Library" must include any data and utility programs needed for reproducing the executable from it. However, as a special exception, the materials to be distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
  • Page 116 11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Library at all.
  • Page 117 NO WARRANTY 15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
  • Page 118 * Neither the name of Conceptronic nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
  • Page 119 * Neither the name of Conceptronic nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.

Table of Contents