Contents Chapter I: Introduction 1-1. Product Features 1-2. Safety information 1-3. Package contents 1-4. Familiar with your new wireless broadband router 1-4-1. Front panel 1-4-2. Back panel Chapter II: System and network setup 2-1. Build network connection 2-2. Connecting to wireless broadband router by web browser 2-2-1.
Chapter I: Introduction Thank you for purchasing the Conceptronic C150BRS4 Wireless Broadband Router! The Conceptronic C150BRS4 utilizes advanced MIMO technology and increases over 8 times transmission range of ordinary 802.11g products. Compatible with IEEE802.11n (Draft 4.0) and IEEE802.11g/b standards, it can provide up to 150Mbps stable transmission rate.
1-1. Product Features Includes router, wireless access point, four-port switch and firewall in one Provides up to 150Mbps uploading and downloading speed Supports two WPS (Wi-Fi Protected Setup) encryption methods: PBC and PIN Compliant to IEEE802.11n, IEEE802.11g, IEEE802.11b, IEEE802.3 and IEEE802.3u standards ...
1-3. Package contents The following items are present in the package of the Conceptronic 150N wireless router: Conceptronic C150BRS4 (v3.0) – 150N wireless router 1x antenna for the wireless router ...
1-4. Familiar with your new wireless broadband router 1-4-1. Front panel Description Status Status Explanation SYS LED The device is switched off ON – FLASHING The device is switched on and ready to use WLAN LED Wireless network is switched off ON - FLASHING Wireless network activity (sending or receiving data) LAN LEDs...
1-4-2. Back panel Description Explanation Power connection Connect the power supply to the router WAN port Connect your broadband connection to the router LAN ports (1 – 4) Connect your computer(s)/network device(s) to the router Reset button Perform a reset (hold) WPS button Activate WPS function (short press) Wireless antenna connector...
Chapter II: System and network setup 2-1. Build network connection Please follow the following instruction to build the network connection between your new WIRELESS router and your computers, network devices: Connect your xDSL / cable modem to the WAN port of router by Ethernet cable. Connect all your computers, network devices (network-enabled consumer devices other than computers, like game console, or switch / hub) to the LAN port of the router.
2-2-1. Windows XP IP address setup: A. Click „Start‟ button (it should be located at lower-left corner of your computer), then click control panel. Double-click Network and Internet Connections icon, click Network Connections, then double-click Local Area Connection, Local Area Connection Status window will appear, and then click „Properties‟...
2-2-2. Windows Vista IP address setup: Click „Start‟ button (it should be located at lower-left corner of your computer), then click control panel. Click View Network Status and Tasks, and then click Manage Network Connections. Right-click Local Area Network, then select ‘Properties’. Local Area Connection Properties window will appear, select „Internet Protocol Version 4 (TCP / IPv4)‟, and then click...
2-2-3. Router IP address lookup After the IP address setup is complete, please click „Start‟ -> „Run‟ at the bottom-lower corner of your desktop: Input „cmd‟, then click „OK‟...
Input „ipconfig‟, then press „Enter‟ key. Please check the IP address followed by „Default Gateway‟ (In this example, the IP address of router is 192.168.0.1, please note that this value may be different.) Note: If the IP address of Gateway is not displayed, or the address followed by „IP Address‟ begins with „169‟, please recheck network connection between your computer and router, and / or go to the beginning of this chapter, to recheck every step of network setup procedure.
Page 15
When the user name and password are correct the wireless router will show the main page with the status of the wireless router: On the main page, you can see the status of the internet connection, the system status, firmware version and activated services.
Chapter III: Configuration - Home 3-1. Home - Wizard You can setup the wireless router through the built-in Wizard. This Wizard will help you configuring the basic settings of the wireless router step by step. Note: Before starting the Wizard, make sure you have all information about your internet connection available. For example: connection type, account information, etc.
Page 17
E. For system management purpose, a correct time setting is critical to have accurate time stamps on the system logs. Set an appropriate Time Zone in this step. When completed, click “Next”. F. Select the Internet Connection method which corresponds with your provider settings.
Page 18
Connection – Dynamic IP H. When your provider requires a Dynamic IP connection, select the “Dynamic IP” option. Some providers require a specific Hostname for their connections. If your provider requires a specific Hostname, enter the Host Name in the field.
Page 19
Connection - PPTP J. When your provider requires a PPTP connection, select the “PPTP” option. Enter the requested information: Server IP PPTP Account PPTP Password Retype Password When completed, click “Next”. Connection – L2TP K. When your provider requires a L2TP connection, select the “L2TP”...
Page 20
You can secure your Wireless Connection with encryption. By default, the wireless router is secured with WPA-PSK/WPA2-PSK Mixed Mode encryption. The predefined encryption key can be found on the bottom of the router. Note: All security options of the Setup Wizard are explained, but it is advised to secure your network with “Mixed WPA-PSK/WPA2-PSK”...
Page 21
P. When all Wireless settings are made, click “Next” to continue. Q. The Setup Wizard is now complete. If you want to apply your settings, click “Save & Take Effect”. If you want to change any setting, click “Back” to return to the previous screen.
3-2. Home - WAN In this screen, select one mode of your Internet connection you use. If you are not clear, press the “Detect” button or contact your Internet Service Provider, and click “Next”. 3-2-1. ADSL Virtual Dial-up (Via PPPoE) Enter the Account and Password provided by your ISP, and click “Next”.
3-2-2. Dynamic IP (Via DHCP) If your connection mode is Dynamic IP, it means your IP address keeps changing every time you connect. You do not need to enter the information like other modes. Click “Next” and “Save” to finish the settings. 3-2-3.
3-2-4. L2TP L2TP Server IP : Enter the Server IP provided by your ISP. User Name : Enter L2TP username. Password : Enter L2TP password. : Maximum Transmission Unit, you may need to change it for optimal performance with your specific ISP. 1400 is the default MTU. Address Mode : Select “Static”...
3-2-5. PPTP PPTP Server IP : Enter the Server IP provided by your ISP. User Name : Enter PPTP username provided by your ISP. Password : Enter PPTP password provided by your ISP. Address Mode : Select “Static” if your ISP supplies you with the IP address, subnet mask, and gateway. In most cases, select Dynamic.
3-3. Home - WAN Advanced In the “WAN Advanced” page, you will find 3 sections: WAN Medium WAN MAC Address Clone WAN Connection Mode...
Page 27
3-3-1. WAN Medium In most cases, ISP provides wired WAN access (ADSL MODEM, Cable MODEM, etc.) and you only need to insert the line into the Router‟s WAN port. Sometime, wireless WAN access type, more flexible and convenient, is also provided by some ISP.
3-3-3. WAN Connection Mode After you have selected the ISP connection type in “WAN” and you want to modify the related settings, here you can modify and configure the settings in details. 3-3-3-1. Virtual Dial-up (PPPoE) Connection Mode : Show your current connection mode. Account : Enter them provided by your ISP.
3-4. Home - LAN LAN Settings are for the basic TCP/IP parameters of LAN ports. MAC Address : The Router‟s physical MAC address as seen on your local network, which is unchangeable. IP Address : The Router‟s LAN IP addresses (not your PC‟s IP address). 192.168.0.1 is the default value.
3-5. Home - DNS Settings DNS is short for Domain Name System (or Service), an Internet service that translate domain names into IP addresses which are provided by your Internet Service Provider. Please consult your Internet Service Provider for details if you do not have them. : Click the checkbox to enable the DNS server.
3-6. Home - DHCP Server A DHCP (Dynamic Host Control Protocol) is to assign an IP address to the computers on the LAN/private network. When you enable the DHCP Server, the DHCP Server will allocate automatically an unused IP address from the IP address pool to the requesting computer in premise of activating “Obtain an IP Address Automatically”.
Chapter IV: Configuration - Wireless 4-1. Wireless - Basic Enable Wireless : Check to enable the Router‟s wireless features; uncheck to disable it. Network Mode : Select one mode from the following. The default is 11b/g/n mode. 11b mode : Allow the wireless client to connect with the device in 11b mode at the maximum speed of 11Mbps.
Page 33
MBSSID AP Isolation : One access control feature based on wireless MAC address. When this feature is enabled, wireless clients connected with the same SSID can not communicate with each other. For example, configure main SSID as AP1, minor SSID as AP2. PC1 and PC2 connect to AP1 via wireless adapter, and configure PC1 and PC2 in the same segment.
4-2. Wireless - Security It is used to configure the AP network‟s security setting. Here presents the encryption methods, including WEP, WPA-personal, WPA-enterprise, WPA2-personal, WPA2- enterprise, etc. 4-2-1. WEP WEP (Wired Equivalent Privacy), a basic encryption method, usually encrypts wireless data using a series of digital keys (64 bits or 128 bits in length).
4-2-2. WPA-PSK (Personal) WPA (Wi-Fi Protected Access), a Wi-Fi standard, is a more recent wireless encryption scheme, designed to improve the security features of WEP. It applies more powerful encryption types (such as TKIP [Temporal Key Integrity Protocol], AES [Advanced Encryption Standard]) or a combination of both and can change the keys dynamically on every authorized wireless device.
4-2-3. WPA2-PSK (Personal) WPA2 (Wi-Fi Protected Access version 2) provides higher security than WEP (Wireless Equivalent Privacy) and WPA (Wi-Fi Protected Access). SSID Choice : Select the SSID (main SSID or minor SSID) to configure security setting from the drop-down menu. Security Mode : From the drop-down menu select the corresponding security encryption modes.
4-2-4. Mixed WPA-PSK / WPA2-PSK (Personal) Mixed WPA-PSK / WPA2-PSK (Personal) combines the WPA-Personal and WPA-2 Personal security levels. Clients which support WPA2-PSK (Personal) will use WPA2-PSK (Personal), while older clients without this support can use WPA-PSK (Personal). SSID Choice : Select the SSID (main SSID or minor SSID) to configure security setting from the drop-down menu.
4-2-5. WPA (Enterprise) This security mode is used when a RADIUS server is connected to the device. SSID Choice : Select the SSID (main SSID or minor SSID) to configure security setting from the drop-down menu. Security Mode : From the drop-down menu select the corresponding security encryption modes. WPA Algorithms : Provides TKIP [Temporal Key Integrity Protocol], AES [Advanced Encryption Standard] or a combination of both.
4-2-6. WPA2 (Enterprise) This security mode is based on Radius authentication server and WPA2 encryption method. WPA2 is used when a RADIUS server is connected to the device. SSID Choice : Select the SSID (main SSID or minor SSID) to configure security setting from the drop-down menu.
4-2-7. Mixed WPA / WPA2 (Enterprise) This security mode combines WPA and WPA2 (Enterprise) and is used when a RADIUS server is connected to the device. When the client supports WPA2 (Enterprise), WPA2 (Enterprise) will be used. Older clients will use WPA (Enterprise).
4-2-8. 802.1x This security mode is used when a RADIUS server is connected to the device. 802.1x, a kind of Port-based authentication protocol, is an authentication type and strategy for users. The port can be either a physic port or logic port (such as VLAN).
4-3. Wireless - Advanced This section is to configure the advanced wireless setting of the Router, including the Radio Preamble, 802.11g/n Rate, Fragmentation Threshold, RTS Threshold, etc. BG protection Mode : Auto by default. It is for 11b/g wireless client to connect 11n wireless network smoothly in a complicated wireless area.
4-4. Wireless - WPS WPS (Wi-Fi Protected Setting) can be easy and quick to establish the connection between the wireless network clients and the device through encrypted contents. The users only enter PIN code or press WPS button on the panel to configure it without selecting encryption method and secret keys by manual.
WPS Encrypt Type : The encryption type used by WPS, generally AES/TKIP. WPS key : The effective key generated by AP automatically. AP PIN(KEY) : The PIN code used by default. Reset OOB : When this button is pressed, the WPS client will be idle state, and WPS indicator will be turned off.
4-6. Wireless - Access Control To secure your wireless LAN, the wireless access control is actually based on the MAC address management to allow or block the specific clients to access the wireless network. MAC Address Filter : Enable/disable MAC address filter. Select “Close” to malfunction MAC address; “disable”...
Chapter V: Configuration - Advanced 5-1. Advanced - Single Port Forwarding Note: In the picture above, you will see an example of some port forwarding rules. The Router can be configured as a virtual server on behalf of local services behind the LAN port. The given remote requests will be re-directed to the local servers via the virtual server.
Page 47
Delete/Enable : Click to check it for corresponding operation. Well-Known Service Port : Select the well-known services as DNS, FTP from the drop-down menu to add to the configured one above. Note: If you set the virtual server of the service port as 80, you must set the Web management port on Remote Web Management page to be any value except 80 such as 8080.
5-2. Advanced - Port Range Forwarding Note: In the picture above, you will see an example of some port forwarding rules. This section deals with the port range forwarding mainly. The Port Range Forwarding allows you to set up a range of public services such as web servers, ftp, e-mail and other specialized Internet applications to an assigned IP address on your LAN.
5-3. Advanced - ALG Service In the context of computer networking, an ALG or application layer gateway consists of a security component that augments a firewall or NAT employed in a computer network. It allows customized NAT traversal filters to be plugged into the gateway to support address and port translation for certain application layer "control/data"...
5-4. Advanced - DMZ The DMZ function is to allow one computer in LAN to be exposed to the Internet for a special-purpose service as Internet gaming or videoconferencing. DMZ Host IP Address : The IP address of the computer you want to expose. Enable : Click the checkbox to enable the DMZ host.
5-5. Advanced - UPNP It supports latest Universal Plug and Play. This function goes into effect on Windows XP or Windows ME or this function would go into effect if you have installed software that supports UPnP. With the UPnP function, host in LAN can request the router to process some special port switching so as to enable host outside to visit the resources in the internal host.
5-6. Advanced - MAC Filters In order to manage the computers in LAN better, you could control the computer‟s access to Internet by MAC Address Filter. MAC Address Filter : Check to enable MAC address filter. Access Policy : Select one number from the drop-down menu. Enable : Check to enable the access policy.
5-7. Advanced - URL Filters In order to control the computer to have access to websites, you can use URL filtering to allow the computer to have access to certain websites at fixed time and forbids it having access to certain websites at fixed time. URL Filter : Check to enable URL filter.
5-8. Advanced - Client Filters To benefit your further management to the computers in the LAN, you can control some ports access to Internet by data packet filter function. Client Filter : Check to enable client filter. Access Policy : Select one number from the drop-down menu. Enable : Check to enable the access policy.
5-9. Advanced - DDNS The DDNS (Dynamic Domain Name System) is supported in this Router. It is to assign a fixed host and domain name to a dynamic Internet IP address, which is used to monitor hosting website, FTP server and so on behind the Router. If you want to activate this function, please select “Enable”...
5-10. Advanced - Prevent Network Attack This section is to protect the internal network from exotic attack such as SYN Flooding attack, Smurf attack, LAND attack, etc. Once detecting the unknown attack, the Router will restrict its bandwidth automatically. The attacker‟s IP address can be found from the “System Log”. Prevent Network Attack : Check to enable it for attack prevention.
5-12. Advanced - Traffic Control Traffic control is used to limit communication speed in the LAN and WAN. Up to 20 entries can be supported with the capability for at most 254 PCs' speed control, including for IP address range configuration. Enable Traffic Control : To enable or disable the internal IP bandwidth control.
5-13. Advanced - URL Monitor This feature is used to record user‟s Internet activity, so in terms of this feature, the administrator can check out and control what they can do and have done. Enable URL Monitor : After checking this feature, the Router will record LAN computer‟s URL information, including the visiting Website, your LAN IP address and the time.
5-14. Advanced - Static Routing This page is used to configure the Router‟s static routing. Destination LAN IP : The address of the remote host with which you want to construct a static route. Subnet Mask : The network portion of the Destination LAN IP. Gateway : The gateway of the next hop, usually the Router or host‟s IP address.
Page 60
Chapter VI: Configuration - Tools 6-1. Tools - Admin The “Admin” page exists of 3 sections: Administrator password section Local Web Management section Remote Web Management section Administrator password section: This section is to set a new user name and password to better secure your router and network. User Name : Enter a new user name for the device.
Page 61
Local Web Management section: Local web management, the alternative to remote web management, is to allow the network administrator to manage the Router in LAN. Any PC in the LAN can access the Web management utility by default. So you can enter the specific MAC address of the LAN computer to function.
6-2. Tools - Time Settings This section is to select the time zone for your location. If you turn off the Router, the settings for time disappear. However, the Router will automatically obtain the GMT time again once it has access to the Internet. Time Zone : Select your time zone from the drop-down menu.
Click “Restore” button to restore previous settings. 6-4. Tools - Upgrade The Router provides the firmware upgrade by clicking the “Upgrade” after browsing the firmware upgrade packet which you can download from www.conceptronic.net. Browse : Click this button to select the upgrade file. Upgrade : Click this button to start the upgrading process.
6-5. Tools - Restore to Factory This button is to reset all settings to the default values. It means the Router will lose all the settings you have set. So please Note down the related settings if necessary. Restore : Click this button to restore to default settings. Factory Default Settings: User Name : admin...
Chapter VII: Configuration - Status 7-1. Status - DHCP Client The Static IP assignment is to add a specifically static IP address to the assigned MAC address. You can view the related information in the DHCP server list. IP Address : Enter the IP address which needs to be bound.
7-2. Status - Wireless Client This page shows wireless client‟s connection status, including MAC address, Channel bandwidth, etc. MAC Address : Shows current MAC addresses of the hosts connecting to the Router. Bandwidth : Shows current bandwidth of the hosts (wireless client). 7-3.
7-4. Status - Routing Table The main duty for a router is to look for a best path for every data frame, and transfer this data frame to a destination. So, it‟s essential for the router to choose the best path, i.e. routing arithmetic. In order to finish this function, many transferring paths, i.e.
Chapter VIII: Appendix 8-1. Troubleshooting If you found the router is working improperly or stop responding to you, don‟t panic! Before you contact your dealer of purchase for help, please read this troubleshooting first. Some problems can be solved by you within very short time! Scenario Solution...
Page 69
I can‟t locate my router by a. „Broadcast ESSID‟ set to off? my wireless client b. All two antennas are properly secured. c. Are you too far from your router? Try to get closer. d. Please remember that you have to input ESSID on your wireless client manually, if ESSID broadcast is disabled.
Page 70
8-2. Glossary Default Gateway (Router): Every non-router IP device needs to configure a default gateway‟s IP address. When the device sends out an IP packet, if the destination is not on the same network, the device has to send the packet to its default gateway, which will then send it out towards the destination.
Page 71
Port: Network Clients (LAN PC) uses port numbers to distinguish one network application/protocol over another. Below you will find a list of some common used ports and their corresponding application: Port Application Port Application FTP data (FTP server) HTTP (Web server) FTP data (FTP server) 110 POP3 (Mail server –...
Availability of source code Conceptronic. has exposed the full source code of the GPL licensed software, including any scripts to control compilation and installation of the object code. All future firmware updates will also be accompanied with their respective source code. For more information on how you can obtain our open source code, please visit our web...
Page 73
GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc. Temple Place, Suite 330, Boston, MA 02111-1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it.
Page 74
GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", below, refers to any such program or work, and a "work based on the Program"...
Page 75
These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it.
Page 76
4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.
Page 77
9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number.
Page 78
How to Apply These Terms to Your New Programs If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms. To do so, attach the following notices to the program.
Page 79
GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
Page 80
To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the library is modified by someone else and passed on, the recipients should know that what they have is not the original version, so that the original author's reputation will not be affected by problems that might be introduced by others.
Page 81
GNU LESSER GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General Public License (also called "this License").
Page 82
c) You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License. d) If a facility in the modified Library refers to a function or a table of data to be supplied by an application program that uses the facility, other than as an argument passed when the facility is invoked, then you must make a good faith effort to ensure that, in the event an application does not supply such function or table, the facility still operates, and performs whatever part of its purpose remains meaningful.
Page 83
4. You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange.
Page 84
a) Accompany the work with the complete corresponding machine-readable source code for the Library including whatever changes were used in the work (which must be distributed under Sections 1 and 2 above); and, if the work is an executable linked with the Library, with the complete machine-readable "work that uses the Library", as object code and/or source code, so that the user can modify the Library and then relink to produce a modified executable containing the modified Library.
Page 85
a) Accompany the combined library with a copy of the same work based on the Library, uncombined with any other library facilities. This must be distributed under the terms of the Sections above. b) Give prominent notice with the combined library of the fact that part of it is a work based on the Library, and explaining where to find the accompanying uncombined form of the same work.
Page 86
12. If the distribution and/or use of the Library is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Library under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded.
Page 87
* Neither the name of Conceptronic nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
Need help?
Do you have a question about the C150BRS4 and is the answer not in the manual?
Questions and answers