Formosa XG-520 User Manual

Wireless 802.11b/g portable router

Advertisement

Quick Links

XG-520
Wireless 802.11b/g
Portable Router
User's Manual

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the XG-520 and is the answer not in the manual?

Questions and answers

Summary of Contents for Formosa XG-520

  • Page 1 XG-520 Wireless 802.11b/g Portable Router User’s Manual...
  • Page 2 FCC Certifications This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
  • Page 3: Table Of Contents

    Table of Content CHAPTER 1: INTRODUCTION ..................4 Features ..........................4 Hardware Connection ....................... 4 LED Indicators ........................5 CHAPTER 2: ABOUT THE OPERATION MODES ..........7 Operation Modes ....................... 7 Access Point Mode......................7 Gateway Mode ........................8 Client Mode (Infrastructure).................... 8 CHAPTER 3: CONFIGURATION .................
  • Page 4: Chapter 1: Introduction

    CHAPTER 1: INTRODUCTION The wireless 802.11b/g portable router is a compact/ travel size IEEE802.11b/g Access Point with 1 Fast Ethernet port, which provides a powerful high-speed wireless connection for compatible wireless-enabled devices into the network with the freedom to roam. With web- based UI, this portable router is easy to be setup and maintained.
  • Page 5: Led Indicators

    LED Indicators Front Panel: (LED Indicators)
  • Page 6 Status Color Indicator Solid Flashing Turns solid Blue when the 1 Power Blue power is applied to this device. Receiving/ Turns solid Blue when an 2 Ethernet Blue Sending data Ethernet cable is connected. Turns solid Blue when the Receiving/ wireless is applied to this 3 Wireless Blue...
  • Page 7: Chapter 2: About The Operation Modes

    CHAPTER 2: ABOUT THE OPERATION MODES This device provides three operational applications with Access Point, Gateway, and Client (Infrastructure) modes, which are mutually exclusive. This device is shipped with configuration that is functional right out of the box. If you want to change the settings in order to perform more advanced configuration or even change the mode of operation, you can manually switch to the mode you desire by the manufacturer as described in the following sections.
  • Page 8: Gateway Mode

    Gateway Mode When Gateway mode is selected, the AP will enter the gateway mode. And the wireless connection will be set up from a point-to-point local LAN into a point-to-multipoint WAN. Client Mode (Infrastructure) If set to Client (Infrastructure) mode, this device can work like a wireless station when it’s connected to a computer so that the computer can send packets from wired end to wireless interface.
  • Page 10: Chapter 3: Configuration

    CHAPTER 3: CONFIGURATION Login 1. Start your computer, then connect an Ethernet cable between your computer and the Wireless Portable Router. 2. Make sure your wired station is set to the same subnet as the Wireless Portable Router, i.e. 192.168.1.123. 3.
  • Page 11: Common Connection Types

    Common Connection Types Cable Modems Type Details ISP Data required Usually, none. Your IP Address is allocated However, some ISP's may Dynamic automatically, when you require you to use a particular IP Address connect to you ISP. Hostname, Domain name, or MAC (physical) address.
  • Page 12: Configuration Via Web

    Mainly used in Europe. • PPTP Server IP Address. You connect to the ISP only • User name and password. when required. The IP address • IP Address allocated to PPTP is usually allocated you, if Static (Fixed). automatically, but may be Static (Fixed).
  • Page 13 In this mode, all Ethernet ports and wireless interface are bridged Access Point together and NAT function is disabled. All the WAN related function and firewall are not supported. The wireless mode is AP mode. In this mode, the device is supposed to connect to internet via ADSL/Cable Modem.
  • Page 14 WLAN must use the same SSID. It is case-sensitive and must not exceed 32 characters. A device will not be permitted to join the BSS unless it can provide the unique SSID. A SSID is also referred to as a network name because essentially it is a name that identifies a wireless network.
  • Page 15 Open system: When this authentication is enabled, there is no need to enter password when making a connection. Shared Key: The client or station must use the same encryption and enter the same password when make a connection with the wireless router.
  • Page 16 WPA2-RADIUS authentication. The two most important features beyond WPA to become standardized through 802.11i/ WPA2 are: pre-authentication, which enables secure fast roaming without noticeable signal latency. Pre-authentication provides a way to establish a PMK security association before a client associates. The advantage is that the client reduces the time that it's disconnected to the network.
  • Page 17 it's disconnected to the network. Authentication RADIUS Server: RADIUS (Remote Authentication Dial-In User Service) is an authentication, authorization and accounting client-server protocol. The client is a Network Access Server that desires to authenticate its links. The server is a server that has access to a user database with authentication information.
  • Page 18 settings. Reset: Click to clear and reset the current settings. Click the Setup button to enter the Wireless Advanced Settings Advanced Settings page. Fragment Threshold: Fragmentation mechanism is used for improving the efficiency when high traffic flows along in the wireless network.
  • Page 19 you encounter inconsistent data flow, only minor modifications of this value are recommended. Warning: Enabling RTS Threshold will cause redundant network overhead that could negatively affect the throughput performance instead of providing a remedy. Preamble Type: A preamble is a signal used in wireless environment to synchronize the transmitting timing including Synchronization and Start frame delimiter.
  • Page 20 Wireless Access Control Mode: Select the Access Control Mode from the pull-down menu. • Disable: Select to disable Wireless Access Control Mode. • Allow Listed: Only the stations shown in the table can associate with the AP. • Deny Listed: Stations shown in the table won’t be able to associate with the AP.
  • Page 21 MAC Address: Enter the AP MAC address in this column; the maximum input is 12 digits. Comment: Enter a comment or description for the AP MAC address. Apply Changes: Click to add a new MAC address in the below Current WDS List. Reset: Click to clear previous settings.
  • Page 22: Gateway Mode

    Gateway Mode Gateway Mode Settings Display the name of this device. Alias Name You can choose one mode of the following you need. Band 2.4GHz (B): 802.11b supported rate only. 2.4GHz (G): 802.11g supported rate only. 2.4GHz (B+G): 802.11b supported rate and 802.11g supported rate.
  • Page 23 Security Click Setup button to enter the Wireless Security Setup page. Authentication: Select an authentication from the pull-down list including Open system or Shared Key, Open System, Open System with 802.1x, Shared Key, WPA-RADIUS, WPA-PSK, WPA2- RADIUS and WPA2-PSK. Encryption: For Open system or Shared Key and Open System authentication modes, the selection of encryption type are None and WEP.
  • Page 24 • ASCII (64 bits): 5 ASCII characters. • ASCII (128 bits): 13 ASCII characters. Default Tx Key: There are four keys 1~4 that you can select at will. All computers, access points, and wireless adapters must use the same key when making a connection. Encryption Key 1~4: Enter the password in the encryption key field that the encryption key number must match the selected Tx key.
  • Page 25 WPA (Wi-Fi Protected Access): It is designed to improve WEP security and provides stronger data protection and network access control than WEP. Most wireless networks should use either WEP or WPA security. WPA-RADIUS/ WPA2-RADIUS: WPA- RADIUS mode (802.1x or WPA-Enterprise). This mode is more difficult to configure, the 802.1x RADIUS servers and an Extensible Authentication Protocol (EAP) are used for authentication.
  • Page 26 mechanism. Pre-Shared Key Format: There are two formats for choice to set the Pre-shared key select the format form the pull-down list, Passphrase and Hex (64 characters). If Hex is selected, users will have to enter a 64 characters string. For easier configuration, the Passphrase (at least 8 than 63 characters) format is recommended.
  • Page 27 stations. Thus, the RTS Threshold mechanism provides a solution to prevent data collisions. When you enable RTS Threshold on a suspect “hidden station”, this station and its Access Point will use a Request to Send (RTS). The station will send an RTS to the Access Point, informing that it is going to transmit the data.
  • Page 28 Wireless Access Control Mode: Select the Access Control Mode from the pull-down menu. • Disable: Select to disable Wireless Access Control Mode. • Allow Listed: Only the stations shown in the table can associate with the AP. • Deny Listed: Stations shown in the table won’t be able to associate with the AP.
  • Page 29: Dhcp Client

    DHCP Client WAN Access Type: Select the WAN access type (Static IP, DHCP, PPPoE and PPTP) from the pull-down menu. Attain DNS Automatically: Select to attain DNS automatically. Set DNS Manually: Select to set DNS manually. DNS 1~3: Enter the DNS server IP address(es) provided by your ISP, or you can specify your own preferred DNS server IP address(es).
  • Page 30 Static IP IP Address: Enter the WAN IP address provided by your ISP in this column. Subnet Mask: Enter the Subnet Mask in this column. Default Gateway: Enter the default gateway IP provided by your ISP in this column. DNS 1~3: The DNS should be set to the address provided by your ISP. Clone MAC Address: Your ISP may require a particular MAC address in order for you to connect to the Internet.
  • Page 31 PPPoE User Name: Input the User Name that provided by your ISP (case sensitive). Password: Input the Password that provided by your ISP (case sensitive). Authentication Type: Select PAP, CHAP, MSCHAP-v1 or MSCHAP-v2 form the pull-down menu. Connection Type: Select the connection type Continuous, Connect on Demand or Manual from the pull-down menu.
  • Page 32 Set DNS Manually: Select to enter DNS manually. DNS 1~3: The DNS should be set to the address provided by your ISP. Clone MAC Address: Your ISP may require a particular MAC address in order for you to connect to the Internet. This MAC address is the PC’s MAC address that your ISP had originally connected your Internet connection to.
  • Page 33 in this column. Server IP address: Enter the server IP address that provided by your ISP. User Name: Input the User Name that provided by your ISP (case sensitive). Password: Input the Password that provided by your ISP (case sensitive). Authentication Type: Select PAP/CHAP or MSCHAP-v1 /MSCHAP-v2 form the pull-down menu.
  • Page 34 Enable Virtual Servers: Check to enable the virtual servers function. Servers: Select the server type (Web, FTP, E-Mail (POP3), E-Mail (SMTP), DNS and Telnet) from the pull-down menu. Local IP Address: Enter the local server’s IP address. Protocol: Select the protocol (TCP, UDP or Both) used to the remote system or service.
  • Page 35 address for DMZ to work properly. Remote Click Setup to enter the Remote Management screen. Management Enable Web Server Access via WAN: To permit remote access of the Router, from outside the local network, select to enable this function. Otherwise, keeps the default setting, Disabled. Port Number: Enter the port number that will be open to outside access.
  • Page 36 MAC Filter Click Setup to enter the MAC Filtering screen. Enable MAC Filtering: Click to enable the MAC filtering function. MAC Address: For MAC filtering enters the 12-digit MAC address in the appropriate MAC address field. Description: You may key in a description for the MAC address. Save: Click to save the current settings.
  • Page 37 Enable IP Filtering: Click to enable the IP filtering function. Local IP Address: For IP filtering enters the 15-digit IP address in the appropriate IP field. Protocol: Select the protocol (TCP, UDP or Both) used to the remote system or service. Description: You may key in a description for the IP address.
  • Page 38: Client Mode

    you do not have an account, please register a new account at http://www.noip.com. Enable DDNS: Check to enable the DDNS function. Service Provider: A company that provides access to the internet. www.no-ip.com Email: Enter your email that you registered in http://www.noip.com website.
  • Page 39 Authentication: Select an authentication from the pull-down list including Open System, Shared Key, WPA-PSK and WPA2-PSK. Encryption: For Open System authentication mode, the selections of encryption type are None and WEP. For Shared Key authentication mode, the selection of encryption type is WEP. For WPA-PSK, and WPA2-PSK authentication modes, the encryption type supports TKIP_AES.
  • Page 40 Default Tx Key: There are four keys 1~4 that you can select at will. All computers, access points, and wireless adapters must use the same key when making a connection. Encryption Key 1~4: Enter the password in the encryption key field that the encryption key number must match the selected Tx key.
  • Page 41 Fragment Threshold: Fragmentation mechanism is used for improving the efficiency when high traffic flows along in the wireless network. If your 802.11g Wireless LAN PC Card often transmit large files in wireless network, you can enter new Fragment Threshold value to split the packet.
  • Page 42 Reset: Click to clear and reset the current settings. Site Survey Site survey displays all the active Access Points, SSID, BSSID, Channel, RSSI and Security in the neighborhood. Refresh: Check this button to refresh all the Site Survey statistics. Connect: Select a site that you would like to communicate, and then click the Connect button.
  • Page 43: Lan Configuration

    Status System System Firmware Version The current version of the firmware installed in this device. Firmware Date The firmware released date. LAN Configuration MAC Address Shows the MAC address of this device. IP Address Shows the LAN IP address. Network Mask Shows the LAN subnet mask.
  • Page 44: Internet Configuration

    SSID A network name because essentially it is a name that identifies a wireless network. Channel The number of channels supported depends on the region of this Access Point. All stations communicating with the Access Point must use the same channel. Internet Configuration Connection Method Shows connection information.
  • Page 45: Lan Interface Setup

    TCP/IP LAN Interface Setup Here shows the IP address of the router. Default setting is IP Address 192.168.1.254 (this is the local address of this Router). Subnet Mask Here shows the subnet mask of the router. Default setting is 255.255.255.0. Default Gateway Shows the default gateway IP address.
  • Page 46: Upgrade Firmware

    Refresh: Click this button to refresh the table. Close: Click this button to close the window. DNS Server Enter the Domain Name Service IP address. Apply Changes After completing the settings on this page, click to save the settings. Click to restore to default values. Reset Other Upgrade Firmware...
  • Page 47: Password Setup

    Password Password Setup New Password Maximum input is 36 alphanumeric characters (case sensitive). Confirmed Password Key in the password again to confirm. After completing the settings on this page, click the Apply Change Apply Change button to save the settings. Reset Click the Reset button to clear settings.
  • Page 49: Chapter 4: Pc Configuration

    CHAPTER 4: PC CONFIGURATION Overview For each PC, the following may need to be configured: • TCP/IP network settings • Internet Access configuration • Wireless configuration Windows Clients • This section describes how to configure Windows clients for Internet access via the Wireless Router.
  • Page 50 Select the TCP/IP protocol for your network card. Click on the Properties button. You should then see a screen like the following. Ensure your TCP/IP settings are correct, as described below. Using DHCP • To use DHCP, select the radio button Obtain an IP Address automatically. This is the default Windows setting.
  • Page 51: Checking Tcp/Ip Settings - Windows Xp

    Using a fixed IP Address ("Use the following IP Address") If your PC is already configured, check with your network administrator before making the following changes. • Enter the Wireless Router's IP address in the Default gateway field and click OK. (Your LAN administrator can advise you of the IP Address they assigned to the Wireless Router.) •...
  • Page 52 Click on the Properties button. You should then see a screen like the following. Ensure your TCP/IP settings are correct. Using DHCP • To use DHCP, select the radio button Obtain an IP Address automatically. This is the default Windows setting. Using this is recommended. By default, the Wireless Router will act as a DHCP Server.
  • Page 53: Internet Access

    Internet Access To configure your PCs to use the Wireless Router for Internet access: • Ensure that the ADSL modem, DSL modem, Cable modem, or other permanent connection is functional. • Use the following procedure to configure your Browser to access the Internet via the LAN, rather than by a Dial-up connection.
  • Page 54: Macintosh Clients

    Click Edit Location. Select TCP/IP for the Network field. (Leave the Phone Number blank.) Click Save, then OK. Configuration is now complete. Before clicking "Sign On", always ensure that you are using the "Wireless Router" location. Macintosh Clients From your Macintosh, you can access the Internet via the Wireless Router. The procedure is as follows.
  • Page 55: Other Unix Systems

    Other Unix Systems To access the Internet via the Wireless Router: • Ensure the "Gateway" field for your network card is set to the IP Address of the Wireless Router. • Ensure your DNS (Name Server) settings are correct. Wireless Station Configuration •...
  • Page 56: Appendix A: Troubleshooting

    APPENDIX A: TROUBLESHOOTING Overview This chapter covers some common problems that may be encountered while using the Wireless Router and some possible solutions to them. If you follow the suggested steps and the Wireless Router still does not function properly, contact your dealer for further advice. General Problems Problem 1: Can't connect to the Wireless Router to configure it.
  • Page 57: Wireless Access

    Wireless Router. Ensure that it is connected and ON. Connect to it and check its settings. (If you can't connect to it, check the LAN and power connections.) • If the Wireless Router is configured correctly, check your Internet connection (DSL/Cable modem etc) to see that it is working correctly. Problem 2: Some applications do not run properly when using the Wireless Router.
  • Page 58 connection speed, you can experiment with the following: • Wireless Router location. Try adjusting the location and orientation of the Wireless Router. • Wireless Channel. If interference is the problem, changing to another channel may show a marked improvement. • Radio Interference.
  • Page 59: Appendix B: About Wireless Lans

    APPENDIX B: ABOUT WIRELESS LANS A group of Wireless Stations and a single Access Point, all using the same ID (SSID), form a Basic Service Set (BSS). Using the same SSID is essential. Devices with different SSIDs are unable to communicate with each other.
  • Page 60: Wireless Lan Configuration

    WPA/WPA2 WPA/WPA2 (Wi-Fi Protected Access) is more secure than WEP. It uses a “Shared Key” which allows the encryption keys to be regenerated at a specified interval. There are several encryption options: TKIP, AES, TKIP-AES and additional setup for RADIUS is required in this method.

Table of Contents