1. ACKNOWLEDGEMENTS Thank you very much for purchasing this WR150N Wireless Router. This guide will introduce the features of this device and tell you how to connect, use and configure the Router to connect with Internet. Please follow the instructions in this guide to avoid affecting the Router’s performance by improper operation.
Page 3
POWER This indicator lights blue when the hub is receives power, otherwise it is off. This indicator blinks blue when Router powered on. This indicator lights blue when there are wireless devices connected and WLAN transmitting data to WLAN Router. When the WAN port is connected successfully the indicator lights blue.
Page 4
- 2. Connect the other end of the UTP LAN cable to your computer’s LAN port. - 3. Connect the second UTP LAN cable to router’s WAN port. - 4. Connect the other end of the UTP LAN cable to ADSL or Modem port. - 5.
If the result displayed is similar to that shown in above figure, it means that the connection between your PC and the Router has been established. If the result displayed is similar to that shown in the above figure, it means that your PC has not connected to the Router successfully.
Page 6
Enter admin for User Name and Password, both in lower case letters. Then click OK button or press Enter key . Note: If the above screen does not prompt, it means that your web-browser has been set to using a proxy.
Page 7
4.2 Changing Password First, we recommend that you change the password to protect the security of your router. Please go to Management-Password change the password required to log into your Router. Old Password: please enter the current password of this router. New Password: new password is used for administrator authentication.
Page 8
4.3.1 Internet Configuration Wizard This interface is used to configure the parameters for Internet network which connects to the WAN port of your Access Point. There are three methods provided to allow you to access Internet. Please choose the appropriate one according to the information provided by your ISP (Internet Service Provider).
Page 9
two systems that enables encapsulated data transport. It relies on two widely accepted standards: PPP and Ethernet. It connects users through an Ethernet to the Internet with a common broadband medium, such as wireless device or cable modem. All the users over the Ethernet can share a common connection.
Page 10
System Information - Company Website: our company’s website. - System Run Time: shows how long the system has run. - Firmware Version: displays the current firmware version of the Router. - MAC Address: displays the MAC address of the WAN interface. - Connection Status: displays the connection type of the WAN port.
Page 11
5.2 Network Settings 5.2.1 WAN Interface This page is used to configure the parameters for the WAN port of your Access Point. Since we have discussed this setting on Setup Wizard, here we introduce the MTU value. MTU: It means Max Transmit Unit for packet. When using slow links, large packets can cause some delays thereby increasing lag and latency.
Page 12
192.0.0.x to 223.255.255.x. Class C network netmask uses 24 bits to identify the network and 8 bits to identify the host. LAN host name: this is optional, by default, it is EVOLVE. LAN DNS: you can choose to enable or disable this function. By default, it is Enable selected.
Page 13
function, you will get a dynamic IP address from your ISP automatically. DHCP server means that all the computers connected to this router will get IP address dynamically. Start of IP Pool IP Address: displays the start IP Address of the range that will be assigned to each computer connected with the router.
Page 14
5.3 Wireless 5.3.1 Wireless Status This page displays the current wireless status of the router. 5.3.2 Wireless Basic Settings On this page, you could configure the parameters for Wireless LAN clients that may connect to your Access Point. ...
Page 15
Mode: This option allows you to choose the radio standard for operation of your Router. 802.11b and 802.11g are old 2.4GHz mode, while 802.11n is the latest standard based on faster Orthogonal Frequency Division Multiplexing (OFDM) modulation. Here, by default, the B, G, N Mode is selected, this mode offers better compatibility.
Page 16
Authentication: One of the following authentication modes should be selected if WEP security method is used: Open System - station is authenticated automatically by AP . Shared Key - station is authenticated after the challenge, generated by AP . Encryption: 64-bit (selected by default) or 128-bit WEP Key length should be selected.
Page 17
Protocol, which uses the Advanced Encryption Standards (AES) algorithm. Encryption key: This is a pre-defined key used for encryption during data transmission. It has two formats: Passphrase and Hex (64 characters). Then you need to enter the Pre-Shared Key, either 8~63 ASCII characters, such as 012345678..(or 64 Hexadecimal digits leading by 0x, such as “0x321253abcde…”).
Page 18
Wireless Repeater Network Name (SSID): choose the SSID you want to implement the repeater function. Bridge MAC Address: or you can enter the MAC address. Channel: select one channel according to the main Router and your method. Upper/Lower: you can keep it the default setting. Authentication: select one encryption method for this repeater function.
Page 19
5.3.5 MAC Authentication You can control the PC to connect with the wireless Router through MAC authentication 5.3.6 WPS Settings WPS (Wi-Fi Protected Setup) provides easy procedure to make network connection between wireless station and wireless access point with the encryption of WPA and WPA2. It is enabled by default.
Page 20
5.3.7 Advanced Settings BG Protection Mode: Background Protection Mode, by default, it is Auto selected. Basic Data Rates: you can choose the wireless data rate. This router provides three options. Be default, it is Default (1-2-5.5-11Mbps). Beacon Interval: By default, it is set to 100ms. Higher Beacon interval will improve the device’s wireless performance and is also power-saving for client side.
Page 21
than the threshold, the RTS/CTS handshake gets triggered. If the packet size is equal to or less than threshold the data frame gets sent immediately. System uses Request to Send/Clear to send frames for the handshake that provide collision reduction for an access point with hidden stations.
Page 22
5.4.1 Access Control First, you can choose to enable or disable this function according to your needs. Name: Enter the name of the router. Action: you could choose to allow or deny the following addresses entered by you. Source: select the interface of the address, and enter the starting IP address that you want to deny or allow.
Page 23
You can select to enable or disable IP/Port Filtering function. By default, it is disabled. IP Address: the IP address range that you want to filter. Port: the Port address that you want to filter. Protocol Type: choose which particular protocol type should be filtered. Here you can choose UDP/TCP .
Page 24
This router allows you to disable MAC Filtering function or allow/deny MAC address listed. MAC Name: the name of the computer with the MAC you entered. MAC Address: you can enter the MAC addresses that you want to deny or allow. DHCP Client: display the information about one DHCP client.
Page 25
Enable/Disable: you can choose to enable or disable this function. Comment: please enter the reason for this port trigger action. Trigger Port: type in the starting & ending ports number of the service. Trigger type: Specify the transport layer protocol. It could be TCP, UDP or both. Public Port: type in the public port number.
Page 26
Protocol: the L3 protocol type of the IP Address. External Port: range of the public port number. Internal Port: internal port number. It is the TCP/UDP port of the application running on the host that is connected to the internal network. Port Forwarding List: the port forwarding list will show you the detailed information about the forwarded port.
Page 27
Current Firmware Version: shows the current firmware version. Firmware Date: the date that you upgrade the current firmware. Firmware Upgrade: select the firmware version on your computer then click Apply to upgrade the firmware version. 5.5.2 DDNS DDNS means Dynamic Domain Name System. The ISP often provides you with a dynamic IP address when you connect to the Internet via your ISP .
Page 28
Host Name: type in the host name you registered from the DDNS provider. User Name/Email Address: enter the User Name or Email you registered from the DDNS provider. Password: enter the Password or Key you set for the User Name. 5.5.3 Time Zone Settings This page allows you to maintain the system time by synchronizing with a public time server over the Internet.
Page 29
Click Log Settings button, it will display the page below: Remote Syslog Server/IP Address: enter an IP address that allows syslog remote sending function while System log messages are sent to a remote server. ...
Page 30
SMTP Server/IP: enter a SMTP Server address. Email Address: enter an Email address. Log Type: you can choose one type for log. 5.5.6 Save/Reload Settings This page allows you to save current settings to a file or reload the settings from the file which was saved previously.
Page 31
Remote Management: if you enable this function, you can manage the router remotely. Port: choose the Port number. 5.5.8 Reboot Click this Reboot button to reboot your router quickly. ...
Need help?
Do you have a question about the WR15ON and is the answer not in the manual?
Questions and answers