Page 2
FCC Certifications This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
CHAPTER 1: INTRODUCTION The wireless 802.11b/g portable router is a compact/ travel size IEEE802.11b/g Access Point with 1 Fast Ethernet port, which provides a powerful high-speed wireless connection for compatible wireless-enabled devices into the network with the freedom to roam. With web- based UI, this portable router is easy to be setup and maintained.
Page 6
Status Color Indicator Solid Flashing Turns solid Blue when the 1 Power Blue power is applied to this device. Receiving/ Turns solid Blue when an 2 Ethernet Blue Sending data Ethernet cable is connected. Turns solid Blue when the Receiving/ wireless is applied to this 3 Wireless Blue...
CHAPTER 2: ABOUT THE OPERATION MODES This device provides three operational applications with Access Point, Gateway, and Client (Infrastructure) modes, which are mutually exclusive. This device is shipped with configuration that is functional right out of the box. If you want to change the settings in order to perform more advanced configuration or even change the mode of operation, you can manually switch to the mode you desire by the manufacturer as described in the following sections.
Gateway Mode When Gateway mode is selected, the AP will enter the gateway mode. And the wireless connection will be set up from a point-to-point local LAN into a point-to-multipoint WAN. Client Mode (Infrastructure) If set to Client (Infrastructure) mode, this device can work like a wireless station when it’s connected to a computer so that the computer can send packets from wired end to wireless interface.
CHAPTER 3: CONFIGURATION Login 1. Start your computer, then connect an Ethernet cable between your computer and the Wireless Portable Router. 2. Make sure your wired station is set to the same subnet as the Wireless Portable Router, i.e. 192.168.1.123. 3.
Common Connection Types Cable Modems Type Details ISP Data required Usually, none. Your IP Address is allocated However, some ISP's may Dynamic automatically, when you require you to use a particular IP Address connect to you ISP. Hostname, Domain name, or MAC (physical) address.
Mainly used in Europe. • PPTP Server IP Address. You connect to the ISP only • User name and password. when required. The IP address • IP Address allocated to PPTP is usually allocated you, if Static (Fixed). automatically, but may be Static (Fixed).
Page 13
In this mode, all Ethernet ports and wireless interface are bridged Access Point together and NAT function is disabled. All the WAN related function and firewall are not supported. The wireless mode is AP mode. In this mode, the device is supposed to connect to internet via ADSL/Cable Modem.
Page 14
WLAN must use the same SSID. It is case-sensitive and must not exceed 32 characters. A device will not be permitted to join the BSS unless it can provide the unique SSID. A SSID is also referred to as a network name because essentially it is a name that identifies a wireless network.
Page 15
Open system: When this authentication is enabled, there is no need to enter password when making a connection. Shared Key: The client or station must use the same encryption and enter the same password when make a connection with the wireless router.
Page 16
WPA2-RADIUS authentication. The two most important features beyond WPA to become standardized through 802.11i/ WPA2 are: pre-authentication, which enables secure fast roaming without noticeable signal latency. Pre-authentication provides a way to establish a PMK security association before a client associates. The advantage is that the client reduces the time that it's disconnected to the network.
Page 17
it's disconnected to the network. Authentication RADIUS Server: RADIUS (Remote Authentication Dial-In User Service) is an authentication, authorization and accounting client-server protocol. The client is a Network Access Server that desires to authenticate its links. The server is a server that has access to a user database with authentication information.
Page 18
settings. Reset: Click to clear and reset the current settings. Click the Setup button to enter the Wireless Advanced Settings Advanced Settings page. Fragment Threshold: Fragmentation mechanism is used for improving the efficiency when high traffic flows along in the wireless network.
Page 19
you encounter inconsistent data flow, only minor modifications of this value are recommended. Warning: Enabling RTS Threshold will cause redundant network overhead that could negatively affect the throughput performance instead of providing a remedy. Preamble Type: A preamble is a signal used in wireless environment to synchronize the transmitting timing including Synchronization and Start frame delimiter.
Page 20
Wireless Access Control Mode: Select the Access Control Mode from the pull-down menu. • Disable: Select to disable Wireless Access Control Mode. • Allow Listed: Only the stations shown in the table can associate with the AP. • Deny Listed: Stations shown in the table won’t be able to associate with the AP.
Page 21
MAC Address: Enter the AP MAC address in this column; the maximum input is 12 digits. Comment: Enter a comment or description for the AP MAC address. Apply Changes: Click to add a new MAC address in the below Current WDS List. Reset: Click to clear previous settings.
Gateway Mode Gateway Mode Settings Display the name of this device. Alias Name You can choose one mode of the following you need. Band 2.4GHz (B): 802.11b supported rate only. 2.4GHz (G): 802.11g supported rate only. 2.4GHz (B+G): 802.11b supported rate and 802.11g supported rate.
Page 23
Security Click Setup button to enter the Wireless Security Setup page. Authentication: Select an authentication from the pull-down list including Open system or Shared Key, Open System, Open System with 802.1x, Shared Key, WPA-RADIUS, WPA-PSK, WPA2- RADIUS and WPA2-PSK. Encryption: For Open system or Shared Key and Open System authentication modes, the selection of encryption type are None and WEP.
Page 24
• ASCII (64 bits): 5 ASCII characters. • ASCII (128 bits): 13 ASCII characters. Default Tx Key: There are four keys 1~4 that you can select at will. All computers, access points, and wireless adapters must use the same key when making a connection. Encryption Key 1~4: Enter the password in the encryption key field that the encryption key number must match the selected Tx key.
Page 25
WPA (Wi-Fi Protected Access): It is designed to improve WEP security and provides stronger data protection and network access control than WEP. Most wireless networks should use either WEP or WPA security. WPA-RADIUS/ WPA2-RADIUS: WPA- RADIUS mode (802.1x or WPA-Enterprise). This mode is more difficult to configure, the 802.1x RADIUS servers and an Extensible Authentication Protocol (EAP) are used for authentication.
Page 26
mechanism. Pre-Shared Key Format: There are two formats for choice to set the Pre-shared key select the format form the pull-down list, Passphrase and Hex (64 characters). If Hex is selected, users will have to enter a 64 characters string. For easier configuration, the Passphrase (at least 8 than 63 characters) format is recommended.
Page 27
stations. Thus, the RTS Threshold mechanism provides a solution to prevent data collisions. When you enable RTS Threshold on a suspect “hidden station”, this station and its Access Point will use a Request to Send (RTS). The station will send an RTS to the Access Point, informing that it is going to transmit the data.
Page 28
Wireless Access Control Mode: Select the Access Control Mode from the pull-down menu. • Disable: Select to disable Wireless Access Control Mode. • Allow Listed: Only the stations shown in the table can associate with the AP. • Deny Listed: Stations shown in the table won’t be able to associate with the AP.
DHCP Client WAN Access Type: Select the WAN access type (Static IP, DHCP, PPPoE and PPTP) from the pull-down menu. Attain DNS Automatically: Select to attain DNS automatically. Set DNS Manually: Select to set DNS manually. DNS 1~3: Enter the DNS server IP address(es) provided by your ISP, or you can specify your own preferred DNS server IP address(es).
Page 30
Static IP IP Address: Enter the WAN IP address provided by your ISP in this column. Subnet Mask: Enter the Subnet Mask in this column. Default Gateway: Enter the default gateway IP provided by your ISP in this column. DNS 1~3: The DNS should be set to the address provided by your ISP. Clone MAC Address: Your ISP may require a particular MAC address in order for you to connect to the Internet.
Page 31
PPPoE User Name: Input the User Name that provided by your ISP (case sensitive). Password: Input the Password that provided by your ISP (case sensitive). Authentication Type: Select PAP, CHAP, MSCHAP-v1 or MSCHAP-v2 form the pull-down menu. Connection Type: Select the connection type Continuous, Connect on Demand or Manual from the pull-down menu.
Page 32
Set DNS Manually: Select to enter DNS manually. DNS 1~3: The DNS should be set to the address provided by your ISP. Clone MAC Address: Your ISP may require a particular MAC address in order for you to connect to the Internet. This MAC address is the PC’s MAC address that your ISP had originally connected your Internet connection to.
Page 33
in this column. Server IP address: Enter the server IP address that provided by your ISP. User Name: Input the User Name that provided by your ISP (case sensitive). Password: Input the Password that provided by your ISP (case sensitive). Authentication Type: Select PAP/CHAP or MSCHAP-v1 /MSCHAP-v2 form the pull-down menu.
Page 34
Enable Virtual Servers: Check to enable the virtual servers function. Servers: Select the server type (Web, FTP, E-Mail (POP3), E-Mail (SMTP), DNS and Telnet) from the pull-down menu. Local IP Address: Enter the local server’s IP address. Protocol: Select the protocol (TCP, UDP or Both) used to the remote system or service.
Page 35
address for DMZ to work properly. Remote Click Setup to enter the Remote Management screen. Management Enable Web Server Access via WAN: To permit remote access of the Router, from outside the local network, select to enable this function. Otherwise, keeps the default setting, Disabled. Port Number: Enter the port number that will be open to outside access.
Page 36
MAC Filter Click Setup to enter the MAC Filtering screen. Enable MAC Filtering: Click to enable the MAC filtering function. MAC Address: For MAC filtering enters the 12-digit MAC address in the appropriate MAC address field. Description: You may key in a description for the MAC address. Save: Click to save the current settings.
Page 37
Enable IP Filtering: Click to enable the IP filtering function. Local IP Address: For IP filtering enters the 15-digit IP address in the appropriate IP field. Protocol: Select the protocol (TCP, UDP or Both) used to the remote system or service. Description: You may key in a description for the IP address.
you do not have an account, please register a new account at http://www.noip.com. Enable DDNS: Check to enable the DDNS function. Service Provider: A company that provides access to the internet. www.no-ip.com Email: Enter your email that you registered in http://www.noip.com website.
Page 39
Authentication: Select an authentication from the pull-down list including Open System, Shared Key, WPA-PSK and WPA2-PSK. Encryption: For Open System authentication mode, the selections of encryption type are None and WEP. For Shared Key authentication mode, the selection of encryption type is WEP. For WPA-PSK, and WPA2-PSK authentication modes, the encryption type supports TKIP_AES.
Page 40
Default Tx Key: There are four keys 1~4 that you can select at will. All computers, access points, and wireless adapters must use the same key when making a connection. Encryption Key 1~4: Enter the password in the encryption key field that the encryption key number must match the selected Tx key.
Page 41
Fragment Threshold: Fragmentation mechanism is used for improving the efficiency when high traffic flows along in the wireless network. If your 802.11g Wireless LAN PC Card often transmit large files in wireless network, you can enter new Fragment Threshold value to split the packet.
Page 42
Reset: Click to clear and reset the current settings. Site Survey Site survey displays all the active Access Points, SSID, BSSID, Channel, RSSI and Security in the neighborhood. Refresh: Check this button to refresh all the Site Survey statistics. Connect: Select a site that you would like to communicate, and then click the Connect button.
Status System System Firmware Version The current version of the firmware installed in this device. Firmware Date The firmware released date. LAN Configuration MAC Address Shows the MAC address of this device. IP Address Shows the LAN IP address. Network Mask Shows the LAN subnet mask.
SSID A network name because essentially it is a name that identifies a wireless network. Channel The number of channels supported depends on the region of this Access Point. All stations communicating with the Access Point must use the same channel. Internet Configuration Connection Method Shows connection information.
TCP/IP LAN Interface Setup Here shows the IP address of the router. Default setting is IP Address 192.168.1.254 (this is the local address of this Router). Subnet Mask Here shows the subnet mask of the router. Default setting is 255.255.255.0. Default Gateway Shows the default gateway IP address.
Refresh: Click this button to refresh the table. Close: Click this button to close the window. DNS Server Enter the Domain Name Service IP address. Apply Changes After completing the settings on this page, click to save the settings. Click to restore to default values. Reset Other Upgrade Firmware...
Password Password Setup New Password Maximum input is 36 alphanumeric characters (case sensitive). Confirmed Password Key in the password again to confirm. After completing the settings on this page, click the Apply Change Apply Change button to save the settings. Reset Click the Reset button to clear settings.
CHAPTER 4: PC CONFIGURATION Overview For each PC, the following may need to be configured: • TCP/IP network settings • Internet Access configuration • Wireless configuration Windows Clients • This section describes how to configure Windows clients for Internet access via the Wireless Router.
Page 50
Select the TCP/IP protocol for your network card. Click on the Properties button. You should then see a screen like the following. Ensure your TCP/IP settings are correct, as described below. Using DHCP • To use DHCP, select the radio button Obtain an IP Address automatically. This is the default Windows setting.
Using a fixed IP Address ("Use the following IP Address") If your PC is already configured, check with your network administrator before making the following changes. • Enter the Wireless Router's IP address in the Default gateway field and click OK. (Your LAN administrator can advise you of the IP Address they assigned to the Wireless Router.) •...
Page 52
Click on the Properties button. You should then see a screen like the following. Ensure your TCP/IP settings are correct. Using DHCP • To use DHCP, select the radio button Obtain an IP Address automatically. This is the default Windows setting. Using this is recommended. By default, the Wireless Router will act as a DHCP Server.
Internet Access To configure your PCs to use the Wireless Router for Internet access: • Ensure that the ADSL modem, DSL modem, Cable modem, or other permanent connection is functional. • Use the following procedure to configure your Browser to access the Internet via the LAN, rather than by a Dial-up connection.
Click Edit Location. Select TCP/IP for the Network field. (Leave the Phone Number blank.) Click Save, then OK. Configuration is now complete. Before clicking "Sign On", always ensure that you are using the "Wireless Router" location. Macintosh Clients From your Macintosh, you can access the Internet via the Wireless Router. The procedure is as follows.
Other Unix Systems To access the Internet via the Wireless Router: • Ensure the "Gateway" field for your network card is set to the IP Address of the Wireless Router. • Ensure your DNS (Name Server) settings are correct. Wireless Station Configuration •...
APPENDIX A: TROUBLESHOOTING Overview This chapter covers some common problems that may be encountered while using the Wireless Router and some possible solutions to them. If you follow the suggested steps and the Wireless Router still does not function properly, contact your dealer for further advice. General Problems Problem 1: Can't connect to the Wireless Router to configure it.
Wireless Router. Ensure that it is connected and ON. Connect to it and check its settings. (If you can't connect to it, check the LAN and power connections.) • If the Wireless Router is configured correctly, check your Internet connection (DSL/Cable modem etc) to see that it is working correctly. Problem 2: Some applications do not run properly when using the Wireless Router.
Page 58
connection speed, you can experiment with the following: • Wireless Router location. Try adjusting the location and orientation of the Wireless Router. • Wireless Channel. If interference is the problem, changing to another channel may show a marked improvement. • Radio Interference.
APPENDIX B: ABOUT WIRELESS LANS A group of Wireless Stations and a single Access Point, all using the same ID (SSID), form a Basic Service Set (BSS). Using the same SSID is essential. Devices with different SSIDs are unable to communicate with each other.
WPA/WPA2 WPA/WPA2 (Wi-Fi Protected Access) is more secure than WEP. It uses a “Shared Key” which allows the encryption keys to be regenerated at a specified interval. There are several encryption options: TKIP, AES, TKIP-AES and additional setup for RADIUS is required in this method.
Need help?
Do you have a question about the XG-520 and is the answer not in the manual?
Questions and answers